[<prev] [next>] [day] [month] [year] [list]
Message-ID: <202212140958.55eeac34-yujie.liu@intel.com>
Date: Wed, 14 Dec 2022 10:20:30 +0800
From: kernel test robot <yujie.liu@...el.com>
To: Daniel Axtens <dja@...ens.net>
CC: <oe-lkp@...ts.linux.dev>, <lkp@...el.com>,
Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
Andrew Morton <akpm@...ux-foundation.org>,
David Gow <davidgow@...gle.com>,
Dmitry Vyukov <dvyukov@...gle.com>,
"Daniel Micay" <danielmicay@...il.com>,
Andrey Ryabinin <aryabinin@...tuozzo.com>,
Alexander Potapenko <glider@...gle.com>,
Linus Torvalds <torvalds@...ux-foundation.org>,
Sasha Levin <sashal@...nel.org>,
Ammar Faizi <ammarfaizi2@...weeb.org>,
GNU/Weeb Mailing List <gwml@...r.gnuweeb.org>,
<linux-kernel@...r.kernel.org>
Subject: [ammarfaizi2-block:stable/linux-stable-rc/queue/rc-5.4] [string.h]
b008ae4cc7: general_protection_fault
Greeting,
FYI, we noticed general_protection_fault:#[##] due to commit (built with gcc-11):
commit: b008ae4cc74d3ab43074099746f6c32d353e01aa ("string.h: fix incompatibility between FORTIFY_SOURCE and KASAN")
https://github.com/ammarfaizi2/linux-block stable/linux-stable-rc/queue/rc-5.4
in testcase: boot
on test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G
caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):
Starting Load Kernel Modules...
Starting Remount Root and Kernel File Systems...
Starting Coldplug All udev Devices...
[ 30.456454][ T204] kasan: CONFIG_KASAN_INLINE enabled
[ 30.457639][ T204] kasan: GPF could be caused by NULL-ptr deref or user memory access
[ 30.459199][ T204] general protection fault: 0000 [#1] SMP KASAN
[ 30.460245][ T204] CPU: 0 PID: 204 Comm: modprobe Not tainted 5.4.47-00158-gb008ae4cc74d3 #1
[ 30.461748][ T204] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-debian-1.16.0-4 04/01/2014
[ 30.463402][ T204] RIP: 0010:memcmp (??:?)
[ 30.464093][ T204] Code: ff df 55 48 89 f5 53 48 89 fb 48 83 ec 08 eb 0d 48 83 c3 01 48 83 c5 01 49 39 dd 74 4b 48 89 d8 48 89 d9 48 c1 e8 03 83 e1 07 <42> 0f b6 04 20 38 c8 7f 04 84 c0 75 53 48 89 e9 48 89 ee 0f b6 03
All code
========
0: ff (bad)
1: df 55 48 fists 0x48(%rbp)
4: 89 f5 mov %esi,%ebp
6: 53 push %rbx
7: 48 89 fb mov %rdi,%rbx
a: 48 83 ec 08 sub $0x8,%rsp
e: eb 0d jmp 0x1d
10: 48 83 c3 01 add $0x1,%rbx
14: 48 83 c5 01 add $0x1,%rbp
18: 49 39 dd cmp %rbx,%r13
1b: 74 4b je 0x68
1d: 48 89 d8 mov %rbx,%rax
20: 48 89 d9 mov %rbx,%rcx
23: 48 c1 e8 03 shr $0x3,%rax
27: 83 e1 07 and $0x7,%ecx
2a:* 42 0f b6 04 20 movzbl (%rax,%r12,1),%eax <-- trapping instruction
2f: 38 c8 cmp %cl,%al
31: 7f 04 jg 0x37
33: 84 c0 test %al,%al
35: 75 53 jne 0x8a
37: 48 89 e9 mov %rbp,%rcx
3a: 48 89 ee mov %rbp,%rsi
3d: 0f b6 03 movzbl (%rbx),%eax
Code starting with the faulting instruction
===========================================
0: 42 0f b6 04 20 movzbl (%rax,%r12,1),%eax
5: 38 c8 cmp %cl,%al
7: 7f 04 jg 0xd
9: 84 c0 test %al,%al
b: 75 53 jne 0x60
d: 48 89 e9 mov %rbp,%rcx
10: 48 89 ee mov %rbp,%rsi
13: 0f b6 03 movzbl (%rbx),%eax
[ 30.468942][ T204] RSP: 0018:ffff88839c7efae8 EFLAGS: 00010202
[ 30.469836][ T204] RAX: 00000000000cbd90 RBX: 000000000065ec81 RCX: 0000000000000001
[ 30.471001][ T204] RDX: 0000000000000005 RSI: ffff88839c7efb48 RDI: 000000000065ec81
[ 30.472165][ T204] RBP: ffff88839c7efb48 R08: ffff88839c7efb48 R09: 0000000000000000
[ 30.473339][ T204] R10: ffffffff855924c7 R11: 0000000000000001 R12: dffffc0000000000
[ 30.474525][ T204] R13: 000000000065ec86 R14: 0000000000000000 R15: ffffffff8421e304
[ 30.475685][ T204] FS: 00007f49a0d31540(0000) GS:ffff8883a0400000(0000) knlGS:0000000000000000
[ 30.476992][ T204] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 30.477947][ T204] CR2: 000055bad2e05e50 CR3: 000000032f16d000 CR4: 00000000000406f0
[ 30.479203][ T204] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 30.480538][ T204] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 30.481760][ T204] Call Trace:
[ 30.482344][ T204] __jump_label_set_jump_code+0x1ca/0x2d0
[ 30.483211][ T204] ? __lock_release+0x42c/0x9b0
[ 30.483959][ T204] ? mask_and_ack_8259A.cold+0x6f/0x6f
[ 30.484787][ T204] ? mutex_lock_io_nested+0x1020/0x1020
[ 30.485625][ T204] __jump_label_transform+0x59/0x140
[ 30.488747][ T204] ? get_trap_addr+0x210/0x210
[ 30.489500][ T204] arch_jump_label_transform_static+0xcd/0x115
[ 30.490465][ T204] ? arch_jump_label_transform_apply+0x50/0x50
[ 30.491513][ T204] ? __ww_mutex_check_kill+0x520/0x520
[ 30.492472][ T204] jump_label_apply_nops+0xd9/0x110
[ 30.493387][ T204] module_finalize+0x34e/0x540
[ 30.494230][ T204] load_module+0x1522/0x20c0
[ 30.495033][ T204] __do_sys_finit_module+0x110/0x180
[ 30.495937][ T204] ? __x64_sys_init_module+0xa0/0xa0
[ 30.496706][ T204] ? vm_mmap_pgoff+0x142/0x170
[ 30.497439][ T204] ? trace_hardirqs_on_thunk+0x1a/0x20
[ 30.498205][ T204] ? do_syscall_64+0x23/0x737
[ 30.498986][ T204] do_syscall_64+0xd3/0x737
[ 30.499784][ T204] entry_SYSCALL_64_after_hwframe+0x49/0xbe
[ 30.500741][ T204] RIP: 0033:0x7f49a0e529b9
[ 30.501513][ T204] Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d a7 54 0c 00 f7 d8 64 89 01 48
[ 30.504513][ T204] RSP: 002b:00007ffedd724b58 EFLAGS: 00000246 ORIG_RAX: 0000000000000139
[ 30.505937][ T204] RAX: ffffffffffffffda RBX: 00005644c4b69df0 RCX: 00007f49a0e529b9
[ 30.507311][ T204] RDX: 0000000000000000 RSI: 00005644c31c1260 RDI: 0000000000000003
[ 30.508668][ T204] RBP: 0000000000060000 R08: 0000000000000000 R09: 00005644c4b6b070
[ 30.509720][ T204] R10: 0000000000000003 R11: 0000000000000246 R12: 00005644c31c1260
[ 30.511890][ T204] R13: 0000000000000000 R14: 00005644c4b69f20 R15: 00005644c4b69df0
[ 30.513035][ T204] Modules linked in:
[ 30.513764][ T204] ---[ end trace b968400d252f50e6 ]---
[ 30.514724][ T204] RIP: 0010:memcmp+0x43/0xb0
[ 30.515500][ T204] Code: ff df 55 48 89 f5 53 48 89 fb 48 83 ec 08 eb 0d 48 83 c3 01 48 83 c5 01 49 39 dd 74 4b 48 89 d8 48 89 d9 48 c1 e8 03 83 e1 07 <42> 0f b6 04 20 38 c8 7f 04 84 c0 75 53 48 89 e9 48 89 ee 0f b6 03
[ 30.518439][ T204] RSP: 0018:ffff88839c7efae8 EFLAGS: 00010202
[ 30.519453][ T204] RAX: 00000000000cbd90 RBX: 000000000065ec81 RCX: 0000000000000001
[ 30.520571][ T204] RDX: 0000000000000005 RSI: ffff88839c7efb48 RDI: 000000000065ec81
[ 30.521756][ T204] RBP: ffff88839c7efb48 R08: ffff88839c7efb48 R09: 0000000000000000
[ 30.523086][ T204] R10: ffffffff855924c7 R11: 0000000000000001 R12: dffffc0000000000
[ 30.524464][ T204] R13: 000000000065ec86 R14: 0000000000000000 R15: ffffffff8421e304
[ 30.525743][ T204] FS: 00007f49a0d31540(0000) GS:ffff8883a0400000(0000) knlGS:0000000000000000
[ 30.527217][ T204] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 30.528214][ T204] CR2: 000055bad2e05e50 CR3: 000000032f16d000 CR4: 00000000000406f0
[ 30.529351][ T204] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 30.530744][ T204] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 30.532155][ T204] Kernel panic - not syncing: Fatal exception
[ 30.533150][ T204] Kernel Offset: disabled
If you fix the issue, kindly add following tag
| Reported-by: kernel test robot <yujie.liu@...el.com>
| Link: https://lore.kernel.org/oe-lkp/202212140958.55eeac34-yujie.liu@intel.com
To reproduce:
# build kernel
cd linux
cp config-5.4.47-00158-gb008ae4cc74d3 .config
make HOSTCC=gcc-11 CC=gcc-11 ARCH=x86_64 olddefconfig prepare modules_prepare bzImage modules
make HOSTCC=gcc-11 CC=gcc-11 ARCH=x86_64 INSTALL_MOD_PATH=<mod-install-dir> modules_install
cd <mod-install-dir>
find lib/ | cpio -o -H newc --quiet | gzip > modules.cgz
git clone https://github.com/intel/lkp-tests.git
cd lkp-tests
bin/lkp qemu -k <bzImage> -m modules.cgz job-script # job-script is attached in this email
# if come across any failure that blocks the test,
# please remove ~/.lkp and /lkp dir to run from a clean state.
--
0-DAY CI Kernel Test Service
https://01.org/lkp
View attachment "config-5.4.47-00158-gb008ae4cc74d3" of type "text/plain" (151355 bytes)
View attachment "job-script" of type "text/plain" (4945 bytes)
Download attachment "dmesg.xz" of type "application/x-xz" (38808 bytes)
Powered by blists - more mailing lists