lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 30 Dec 2022 14:48:21 +0800 From: kernel test robot <yujie.liu@...el.com> To: Mathieu Desnoyers <mathieu.desnoyers@...icios.com> CC: <oe-lkp@...ts.linux.dev>, <lkp@...el.com>, Peter Zijlstra <peterz@...radead.org>, <linux-kernel@...r.kernel.org>, <x86@...nel.org>, <linux-mm@...ck.org> Subject: [tip:sched/core] [sched] af7f588d8f: WARNING:at_kernel/sched/core.c:#sched_mm_cid_after_execve Greeting, FYI, we noticed WARNING:at_kernel/sched/core.c:#sched_mm_cid_after_execve due to commit (built with gcc-11): commit: af7f588d8f7355bc4298dd1962d7826358fc95f0 ("sched: Introduce per-memory-map concurrency ID") https://git.kernel.org/cgit/linux/kernel/git/tip/tip.git sched/core in testcase: boot on test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace): [ 17.705597][ T48] ------------[ cut here ]------------ [ 17.706795][ T48] WARNING: CPU: 0 PID: 48 at kernel/sched/core.c:11344 sched_mm_cid_after_execve (??:?) [ 17.708842][ T48] Modules linked in: [ 17.709685][ T48] CPU: 0 PID: 48 Comm: kworker/u4:0 Tainted: G T 6.2.0-rc1-00009-gaf7f588d8f73 #1 [ 17.725504][ T48] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-debian-1.16.0-5 04/01/2014 [ 17.727337][ T48] RIP: 0010:sched_mm_cid_after_execve (??:?) [ 17.728520][ T48] Code: 00 20 75 17 4d 85 ed 75 09 48 ff 05 b9 e6 9e 04 eb 09 48 ff 05 b8 e6 9e 04 eb 20 48 ff 05 b7 e6 9e 04 90 48 ff 05 b7 e6 9e 04 <0f> 0b 48 ff 05 b6 e6 9e 04 90 48 ff 05 b6 e6 9e 04 9c 58 48 ff 05 All code ======== 0: 00 20 add %ah,(%rax) 2: 75 17 jne 0x1b 4: 4d 85 ed test %r13,%r13 7: 75 09 jne 0x12 9: 48 ff 05 b9 e6 9e 04 incq 0x49ee6b9(%rip) # 0x49ee6c9 10: eb 09 jmp 0x1b 12: 48 ff 05 b8 e6 9e 04 incq 0x49ee6b8(%rip) # 0x49ee6d1 19: eb 20 jmp 0x3b 1b: 48 ff 05 b7 e6 9e 04 incq 0x49ee6b7(%rip) # 0x49ee6d9 22: 90 nop 23: 48 ff 05 b7 e6 9e 04 incq 0x49ee6b7(%rip) # 0x49ee6e1 2a:* 0f 0b ud2 <-- trapping instruction 2c: 48 ff 05 b6 e6 9e 04 incq 0x49ee6b6(%rip) # 0x49ee6e9 33: 90 nop 34: 48 ff 05 b6 e6 9e 04 incq 0x49ee6b6(%rip) # 0x49ee6f1 3b: 9c pushfq 3c: 58 pop %rax 3d: 48 rex.W 3e: ff .byte 0xff 3f: 05 .byte 0x5 Code starting with the faulting instruction =========================================== 0: 0f 0b ud2 2: 48 ff 05 b6 e6 9e 04 incq 0x49ee6b6(%rip) # 0x49ee6bf 9: 90 nop a: 48 ff 05 b6 e6 9e 04 incq 0x49ee6b6(%rip) # 0x49ee6c7 11: 9c pushfq 12: 58 pop %rax 13: 48 rex.W 14: ff .byte 0xff 15: 05 .byte 0x5 [ 17.732461][ T48] RSP: 0000:ffffc900001afea8 EFLAGS: 00010202 [ 17.733671][ T48] RAX: fffffffffffffffe RBX: ffff88810d0fc000 RCX: 0000000000000000 [ 17.735287][ T48] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff88810d0fc000 [ 17.736888][ T48] RBP: ffffc900001afec0 R08: 0000000000000000 R09: 0000000000000000 [ 17.738459][ T48] R10: 0000000000000000 R11: 0000000000000000 R12: ffff88810d0fc000 [ 17.740095][ T48] R13: 0000000000000000 R14: 0000000000000000 R15: ffff88810d0fc000 [ 17.741661][ T48] FS: 0000000000000000(0000) GS:ffff88842fa00000(0000) knlGS:0000000000000000 [ 17.743440][ T48] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 17.744623][ T48] CR2: ffff88843ffff000 CR3: 0000000003e24000 CR4: 00000000000406f0 [ 17.746241][ T48] Call Trace: [ 17.746912][ T48] <TASK> [ 17.747520][ T48] bprm_execve (exec.c:?) [ 17.748358][ T48] ? call_usermodehelper_exec_work (umh.c:?) [ 17.749462][ T48] kernel_execve (??:?) [ 17.750332][ T48] call_usermodehelper_exec_async (umh.c:?) [ 17.751363][ T48] ? call_usermodehelper_exec_work (umh.c:?) [ 17.752163][ T48] ret_from_fork (??:?) [ 17.752648][ T48] </TASK> [ 17.752951][ T48] irq event stamp: 395 [ 17.753354][ T48] hardirqs last enabled at (403): __up_console_sem (printk.c:?) [ 17.754946][ T48] hardirqs last disabled at (410): __up_console_sem (printk.c:?) [ 17.756385][ T48] softirqs last enabled at (278): __do_softirq (??:?) [ 17.757317][ T48] softirqs last disabled at (273): __irq_exit_rcu (softirq.c:?) [ 17.758540][ T48] ---[ end trace 0000000000000000 ]--- If you fix the issue, kindly add following tag | Reported-by: kernel test robot <yujie.liu@...el.com> | Link: https://lore.kernel.org/oe-lkp/202212301353.5c959d72-yujie.liu@intel.com To reproduce: # build kernel cd linux cp config-6.2.0-rc1-00009-gaf7f588d8f73 .config make HOSTCC=gcc-11 CC=gcc-11 ARCH=x86_64 olddefconfig prepare modules_prepare bzImage modules make HOSTCC=gcc-11 CC=gcc-11 ARCH=x86_64 INSTALL_MOD_PATH=<mod-install-dir> modules_install cd <mod-install-dir> find lib/ | cpio -o -H newc --quiet | gzip > modules.cgz git clone https://github.com/intel/lkp-tests.git cd lkp-tests bin/lkp qemu -k <bzImage> -m modules.cgz job-script # job-script is attached in this email # if come across any failure that blocks the test, # please remove ~/.lkp and /lkp dir to run from a clean state. -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests View attachment "config-6.2.0-rc1-00009-gaf7f588d8f73" of type "text/plain" (151049 bytes) View attachment "job-script" of type "text/plain" (4732 bytes) Download attachment "dmesg.xz" of type "application/x-xz" (23744 bytes)
Powered by blists - more mailing lists