lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Y76E5WPTP86nUezT@localhost>
Date:   Wed, 11 Jan 2023 09:44:05 +0000
From:   Hyeonggon Yoo <42.hyeyoo@...il.com>
To:     kernel test robot <oliver.sang@...el.com>
Cc:     Vlastimil Babka <vbabka@...e.cz>, oe-lkp@...ts.linux.dev,
        lkp@...el.com, Mike Rapoport <rppt@...ux.ibm.com>,
        Christoph Lameter <cl@...ux.com>, linux-kernel@...r.kernel.org,
        linux-mm@...ck.org
Subject: BUG: unable to handle page fault for address: f6ffe000

On Sat, Dec 31, 2022 at 11:26:25PM +0800, kernel test robot wrote:
> 
> Greeting,
> 
> FYI, we noticed kernel_BUG_at_include/linux/mm.h due to commit (built with gcc-11):
> 
> commit: 0af8489b0216fa1dd83e264bef8063f2632633d7 ("mm, slub: remove percpu slabs with CONFIG_SLUB_TINY")
> https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master
> 
> [test failed on linux-next/master c76083fac3bae1a87ae3d005b5cb1cbc761e31d5]
> 
> in testcase: rcutorture
> version: 
> with following parameters:
> 
> 	runtime: 300s
> 	test: default
> 	torture_type: tasks-tracing
> 
> test-description: rcutorture is rcutorture kernel module load/unload test.
> test-url: https://www.kernel.org/doc/Documentation/RCU/torture.txt
> 
> 
> on test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G
> 
> caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):
> 
> 
> If you fix the issue, kindly add following tag
> | Reported-by: kernel test robot <oliver.sang@...el.com>
> | Link: https://lore.kernel.org/oe-lkp/202212312021.bc1efe86-oliver.sang@intel.com
> 
> 
> [   25.804432][  T214] ------------[ cut here ]------------
> [   25.804917][  T214] kernel BUG at include/linux/mm.h:825!
> [   25.805402][  T214] invalid opcode: 0000 [#1] SMP
> [   25.805820][  T214] CPU: 0 PID: 214 Comm: udevadm Tainted: G S                 6.1.0-rc2-00014-g0af8489b0216 #2 1c4d7707ec0ce574ed62a77e82a8580202758048
> [ 25.806944][ T214] EIP: __dump_page.cold (include/linux/mm.h:825 mm/debug.c:97) 
> [ 25.807376][ T214] Code: ff ff 83 05 e8 5d bb c5 01 ba 4c c4 2f c4 89 f8 83 15 ec 5d bb c5 00 e8 f2 92 ed fd 83 05 f8 5d bb c5 01 83 15 fc 5d bb c5 00 <0f> 0b 83 05 00 5e bb c5 01 b8 ac 85 a3 c4 83 15 04 5e bb c5 00 e8


FYI, I found a panic from trying to read non-present page,
on the same commit.

I'm not sure if this BUG is related to what we're looking at.

[   26.970492][  T180] systemd-journald[180]: Received request to flush runtime journal from PID 1
[   28.117157][  T187] BUG: unable to handle page fault for address: f6ffe000
[   28.117686][  T187] #PF: supervisor read access in kernel mode
[   28.117686][  T187] #PF: error_code(0x0000) - not-present page
[   28.117686][  T187] *pde = 065b9067 *pte = 00000000 
[   28.117686][  T187] Oops: 0000 [#1] SMP
[   28.117686][  T187] CPU: 0 PID: 187 Comm: udevadm Tainted: G S                 6.1.0-rc2-00014-g0af8489b0216 #13 6ab653106aca2d29fecfea6da29eac9984fd4186
[   28.117686][  T187] EIP: kernfs_name_hash+0x60/0xe0
[   28.117686][  T187] Code: c6 01 83 d7 00 31 d2 01 c6 89 c8 89 75 ec 11 d7 8b 35 f0 9e c1 c5 89 7d f0 8b 3d f4 9e c1 c5 29 f0 8d b4 26 00 00 00 00 66 90 <0f> be 0c 30 89 ca c1 e2 04 c1 e9 04 01 d1 01 cb 8b 4d f0 83 c6 01
[   28.117686][  T187] EAX: f0eadd57 EBX: ec9ced85 ECX: 05c29e82 EDX: 05c29e82
[   28.117686][  T187] ESI: 061502a9 EDI: 00000000 EBP: f5fe1c88 ESP: f5fe1c70
[   28.117686][  T187] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 00010206
[   28.117686][  T187] CR0: 80050033 CR2: f6ffe000 CR3: 35f29000 CR4: 000406d0
[   28.117686][  T187] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[   28.117686][  T187] DR6: fffe0ff0 DR7: 00000400
[   28.117686][  T187] Call Trace:
[   28.117686][  T187]  kernfs_find_ns+0xb3/0x200
[   28.117686][  T187]  ? kernfs_iop_lookup+0x3c/0x1a0
[   28.117686][  T187]  kernfs_iop_lookup+0x76/0x1a0
[   28.117686][  T187]  lookup_open+0x308/0x970
[   28.117686][  T187]  open_last_lookups+0xa4/0x680
[   28.117686][  T187]  path_openat+0xa9/0x410
[   28.117686][  T187]  do_filp_open+0x99/0x180
[   28.117686][  T187]  ? lock_release+0xe8/0x350
[   28.117686][  T187]  ? _raw_spin_unlock+0x50/0x90
[   28.117686][  T187]  ? alloc_fd+0x252/0x3e0
[   28.117686][  T187]  do_sys_openat2+0xf3/0x2e0
[   28.117686][  T187]  ? find_held_lock+0x37/0x110
[   28.117686][  T187]  do_sys_open+0x8e/0xe0
[   28.117686][  T187]  __ia32_sys_open+0x2a/0x40
[   28.117686][  T187]  __do_fast_syscall_32+0x72/0xd0
[   28.117686][  T187]  ? lockdep_hardirqs_on_prepare+0x232/0x3f0
[   28.117686][  T187]  ? syscall_exit_to_user_mode+0x35/0x50
[   28.117686][  T187]  ? __do_fast_syscall_32+0x7c/0xd0
[   28.117686][  T187]  ? lockdep_hardirqs_on_prepare+0x232/0x3f0
[   28.117686][  T187]  ? irqentry_exit_to_user_mode+0x23/0x30
[   28.117686][  T187]  ? irqentry_exit+0x7d/0xc0
[   28.117686][  T187]  do_fast_syscall_32+0x32/0x70
[   28.117686][  T187]  do_SYSENTER_32+0x15/0x20
[   28.117686][  T187]  entry_SYSENTER_32+0xa2/0xfb
[   28.117686][  T187] EIP: 0xb7f26549
[   28.117686][  T187] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d 76 00 58 b8 77 00 00 00 cd 80 90 8d 76
[   28.117686][  T187] EAX: ffffffda EBX: bf83a680 ECX: 00088000 EDX: 000001b6
[   28.117686][  T187] ESI: 00ab30b0 EDI: 00000008 EBP: b7e31000 ESP: bf83a4c8
[   28.117686][  T187] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b EFLAGS: 00000246
[   28.117686][  T187] Modules linked in:
[   28.117686][  T187] CR2: 00000000f6ffe000
[   28.117686][  T187] ---[ end trace 0000000000000000 ]---
[   28.117686][  T187] EIP: kernfs_name_hash+0x60/0xe0
[   28.117686][  T187] Code: c6 01 83 d7 00 31 d2 01 c6 89 c8 89 75 ec 11 d7 8b 35 f0 9e c1 c5 89 7d f0 8b 3d f4 9e c1 c5 29 f0 8d b4 26 00 00 00 00 66 90 <0f> be 0c 30 89 ca c1 e2 04 c1 e9 04 01 d1 01 cb 8b 4d f0 83 c6 01

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ