lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Sat, 12 Nov 2022 23:14:42 +0800
From:   kernel test robot <yujie.liu@...el.com>
To:     Andrey Ryabinin <ryabinin.a.a@...il.com>
CC:     <oe-lkp@...ts.linux.dev>, <lkp@...el.com>,
        Dave Hansen <dave.hansen@...ux.intel.com>,
        Yujie Liu <yujie.liu@...el.com>,
        <linux-kernel@...r.kernel.org>, <x86@...nel.org>,
        <kasan-dev@...glegroups.com>, Han Ning <ning.han@...el.com>
Subject: [tip:x86/mm] [x86/kasan] 9fd429c280:
 BUG:unable_to_handle_page_fault_for_address

Greeting,

FYI, we noticed BUG:unable_to_handle_page_fault_for_address due to commit (built with gcc-11):

commit: 9fd429c28073fa40f5465cd6e4769a0af80bf398 ("x86/kasan: Map shadow for percpu pages on demand")
https://git.kernel.org/cgit/linux/kernel/git/tip/tip.git x86/mm

[test failed on linux-next/master f8f60f322f0640c8edda2942ca5f84b7a27c417a]

on test machine: 128 threads 2 sockets Intel(R) Xeon(R) Platinum 8358 CPU @ 2.60GHz (Ice Lake) with 128G memory

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):


[  158.064712][ T8416] BUG: unable to handle page fault for address: fffffbc00012de04
[  158.074534][ T8416] #PF: supervisor read access in kernel mode
[  158.074537][ T8416] #PF: error_code(0x0000) - not-present page
[  158.095763][ T8416] PGD 207e210067 P4D 1fef217067 PUD 1fef216067 PMD 103344b067 PTE 0
[  158.095770][ T8416] Oops: 0000 [#1] SMP KASAN NOPTI
[  158.095773][ T8416] CPU: 34 PID: 8416 Comm: umip_test_basic Not tainted 6.1.0-rc2-00001-g9fd429c28073 #1
[ 158.107429][ T8416] RIP: 0010:get_desc (arch/x86/lib/insn-eval.c:660) 
[ 158.107435][ T8416] Code: b7 02 00 00 83 e0 07 38 c2 0f 9e c1 84 d2 0f 95 c0 84 c1 0f 85 a2 02 00 00 48 ba 00 00 00 00 00 fc ff df 48 89 d8 48 c1 e8 03 <0f> b6 0c 10 48 8d 43 07 48 89 c6 48 c1 ee 03 0f b6 14 16 48 89 de
All code
========
   0:	b7 02                	mov    $0x2,%bh
   2:	00 00                	add    %al,(%rax)
   4:	83 e0 07             	and    $0x7,%eax
   7:	38 c2                	cmp    %al,%dl
   9:	0f 9e c1             	setle  %cl
   c:	84 d2                	test   %dl,%dl
   e:	0f 95 c0             	setne  %al
  11:	84 c1                	test   %al,%cl
  13:	0f 85 a2 02 00 00    	jne    0x2bb
  19:	48 ba 00 00 00 00 00 	movabs $0xdffffc0000000000,%rdx
  20:	fc ff df 
  23:	48 89 d8             	mov    %rbx,%rax
  26:	48 c1 e8 03          	shr    $0x3,%rax
  2a:*	0f b6 0c 10          	movzbl (%rax,%rdx,1),%ecx		<-- trapping instruction
  2e:	48 8d 43 07          	lea    0x7(%rbx),%rax
  32:	48 89 c6             	mov    %rax,%rsi
  35:	48 c1 ee 03          	shr    $0x3,%rsi
  39:	0f b6 14 16          	movzbl (%rsi,%rdx,1),%edx
  3d:	48 89 de             	mov    %rbx,%rsi

Code starting with the faulting instruction
===========================================
   0:	0f b6 0c 10          	movzbl (%rax,%rdx,1),%ecx
   4:	48 8d 43 07          	lea    0x7(%rbx),%rax
   8:	48 89 c6             	mov    %rax,%rsi
   b:	48 c1 ee 03          	shr    $0x3,%rsi
   f:	0f b6 14 16          	movzbl (%rsi,%rdx,1),%edx
  13:	48 89 de             	mov    %rbx,%rsi
[  158.107438][ T8416] RSP: 0000:ffa0000031fb7c20 EFLAGS: 00010a02
[  158.107440][ T8416] RAX: 1fffffc00012de04 RBX: fffffe000096f020 RCX: 0000000000000001
[  158.107442][ T8416] RDX: dffffc0000000000 RSI: 0000000000000001 RDI: ffa0000031fb7ce0
[  158.107443][ T8416] RBP: 1ff40000063f6f98 R08: 0000000000000000 R09: 0000000000000000
[  158.107444][ T8416] R10: 0000000000000000 R11: 0000000000000000 R12: ffa0000031fb7ce0
[  158.107446][ T8416] R13: 1ff40000063f6f85 R14: 0000000000000000 R15: 0000000000000000
[  158.107447][ T8416] FS:  0000000000000000(0000) GS:ff11001fed300000(0063) knlGS:00000000f7eeb340
[  158.107449][ T8416] CS:  0010 DS: 002b ES: 002b CR0: 0000000080050033
[  158.107450][ T8416] CR2: fffffbc00012de04 CR3: 000000109c3d0006 CR4: 0000000000771ee0
[  158.107452][ T8416] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  158.107453][ T8416] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  158.107454][ T8416] PKRU: 55555554
[  158.107455][ T8416] Call Trace:
[  158.107456][ T8416]  <TASK>
[ 158.107457][ T8416] ? get_segment_selector (arch/x86/lib/insn-eval.c:622) 
[ 158.107460][ T8416] ? __mod_lruvec_page_state (arch/x86/include/asm/preempt.h:85 include/linux/rcupdate.h:99 include/linux/rcupdate.h:770 mm/memcontrol.c:843) 
[ 158.107465][ T8416] insn_get_seg_base (arch/x86/lib/insn-eval.c:725) 
[ 158.107467][ T8416] ? do_read_fault (mm/memory.c:4523 mm/memory.c:4549) 
[ 158.107471][ T8416] ? pt_regs_offset (arch/x86/lib/insn-eval.c:682) 
[ 158.107473][ T8416] ? _raw_spin_lock_irq (arch/x86/include/asm/atomic.h:202 include/linux/atomic/atomic-instrumented.h:543 include/asm-generic/qspinlock.h:111 include/linux/spinlock.h:186 include/linux/spinlock_api_smp.h:120 kernel/locking/spinlock.c:170) 
[ 158.107478][ T8416] ? _raw_spin_lock_bh (kernel/locking/spinlock.c:169) 
[  158.109757][ T1590]
[ 158.117492][ T8416] insn_fetch_from_user (arch/x86/lib/insn-eval.c:1476 arch/x86/lib/insn-eval.c:1505) 
[ 158.117496][ T8416] fixup_umip_exception (arch/x86/kernel/umip.c:353) 
[ 158.131844][ T8416] ? emulate_umip_insn (arch/x86/kernel/umip.c:337) 
[ 158.146371][ T8416] ? __ia32_sys_pidfd_send_signal (kernel/signal.c:4088) 
[ 158.146376][ T8416] ? __might_fault (mm/memory.c:5648) 
[ 158.171730][ T8416] ? __ia32_compat_sys_rt_sigaction (kernel/signal.c:4464 kernel/signal.c:4435 kernel/signal.c:4435) 
[ 158.171733][ T8416] ? __ia32_sys_rt_sigaction (kernel/signal.c:4435) 
[ 158.187382][ T8416] exc_general_protection (arch/x86/kernel/traps.c:733 arch/x86/kernel/traps.c:721) 
[ 158.187386][ T8416] asm_exc_general_protection (arch/x86/include/asm/idtentry.h:564) 
[  158.203024][ T8416] RIP: 0023:0x8049aaf
[ 158.203026][ T8416] Code: 55 ee 8b 45 dc 01 d0 c6 00 00 83 45 dc 01 83 7d dc 05 7e eb 83 ec 08 8d 45 ee 50 8d 83 44 d6 ff ff 50 e8 54 f6 ff ff 83 c4 10 <0f> 01 45 ee 90 90 90 90 90 90 90 90 90 90 90 90 90 90 83 ec 08 6a
All code
========
   0:	55                   	push   %rbp
   1:	ee                   	out    %al,(%dx)
   2:	8b 45 dc             	mov    -0x24(%rbp),%eax
   5:	01 d0                	add    %edx,%eax
   7:	c6 00 00             	movb   $0x0,(%rax)
   a:	83 45 dc 01          	addl   $0x1,-0x24(%rbp)
   e:	83 7d dc 05          	cmpl   $0x5,-0x24(%rbp)
  12:	7e eb                	jle    0xffffffffffffffff
  14:	83 ec 08             	sub    $0x8,%esp
  17:	8d 45 ee             	lea    -0x12(%rbp),%eax
  1a:	50                   	push   %rax
  1b:	8d 83 44 d6 ff ff    	lea    -0x29bc(%rbx),%eax
  21:	50                   	push   %rax
  22:	e8 54 f6 ff ff       	callq  0xfffffffffffff67b
  27:	83 c4 10             	add    $0x10,%esp
  2a:*	0f 01 45 ee          	sgdt   -0x12(%rbp)		<-- trapping instruction
  2e:	90                   	nop
  2f:	90                   	nop
  30:	90                   	nop
  31:	90                   	nop
  32:	90                   	nop
  33:	90                   	nop
  34:	90                   	nop
  35:	90                   	nop
  36:	90                   	nop
  37:	90                   	nop
  38:	90                   	nop
  39:	90                   	nop
  3a:	90                   	nop
  3b:	90                   	nop
  3c:	83 ec 08             	sub    $0x8,%esp
  3f:	6a                   	.byte 0x6a

Code starting with the faulting instruction
===========================================
   0:	0f 01 45 ee          	sgdt   -0x12(%rbp)
   4:	90                   	nop
   5:	90                   	nop
   6:	90                   	nop
   7:	90                   	nop
   8:	90                   	nop
   9:	90                   	nop
   a:	90                   	nop
   b:	90                   	nop
   c:	90                   	nop
   d:	90                   	nop
   e:	90                   	nop
   f:	90                   	nop
  10:	90                   	nop
  11:	90                   	nop
  12:	83 ec 08             	sub    $0x8,%esp
  15:	6a                   	.byte 0x6a


We are sorry that the testcase and reproducing steps are not available
for this case. Hope the call trace can help to investigate, and we can
also help to do further verification if needed. Thanks.


If you fix the issue, kindly add following tag
| Reported-by: kernel test robot <yujie.liu@...el.com>
| Link: https://lore.kernel.org/oe-lkp/202211121255.f840971-yujie.liu@intel.com


-- 
0-DAY CI Kernel Test Service
https://01.org/lkp

View attachment "config-6.1.0-rc2-00001-g9fd429c28073" of type "text/plain" (170376 bytes)

View attachment "job-script" of type "text/plain" (5742 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (104240 bytes)

View attachment "job.yaml" of type "text/plain" (4994 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ