lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CA+G9fYs1ytc7B2ffLpYCqscwVTZ2vb7aAV0cEc-s+2QS1g3hyA@mail.gmail.com>
Date:   Mon, 27 Mar 2023 11:47:22 +0530
From:   Naresh Kamboju <naresh.kamboju@...aro.org>
To:     open list <linux-kernel@...r.kernel.org>,
        Linux-Next Mailing List <linux-next@...r.kernel.org>,
        linux-mm <linux-mm@...ck.org>, linux-fsdevel@...r.kernel.org,
        lkft-triage@...ts.linaro.org
Cc:     Andrew Morton <akpm@...ux-foundation.org>,
        Stephen Rothwell <sfr@...b.auug.org.au>,
        Christian Brauner <brauner@...nel.org>,
        Al Viro <viro@...iv.linux.org.uk>,
        Arnd Bergmann <arnd@...db.de>,
        Anders Roxell <anders.roxell@...aro.org>
Subject: next: x86: RIP: 0010:do_iter_read+0x241/0x340 - BUG: unable to handle
 page fault for address: 000000000042da60

Following LTP syscalls test cases on arm64 FVP, x86_64 and i386.

Regressions found on i386 x86 and fvp-aemva:

 - ltp-syscalls/preadv202_64
 - ltp-syscalls/process_vm_writev01
 - ltp-syscalls/pwritev02
 - ltp-syscalls/pwritev02_64
 - ltp-syscalls/preadv02_64
 - ltp-syscalls/preadv202
 - ltp-syscalls/recvmsg01
 - ltp-syscalls/preadv02
 - ltp-syscalls/process_vm_readv01
 - ltp-syscalls/readv02


Reported-by: Linux Kernel Functional Testing <lkft@...aro.org>

test crash log:
--------------
[  606.816186] BUG: unable to handle page fault for address: 000000000042da60
[  606.824151] #PF: supervisor read access in kernel mode
[  606.829296] #PF: error_code(0x0001) - permissions violation
[  606.834869] PGD 80000001373fb067 P4D 80000001373fb067 PUD 113a7b067
PMD 1085d5067 PTE 8000000119372067
[  606.844200] Oops: 0001 [#3] PREEMPT SMP KASAN PTI
[  606.848908] CPU: 2 PID: 100812 Comm: preadv202 Tainted: G    B D W
        6.3.0-rc3-next-20230327 #1
[  606.858206] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS
2.2 05/23/2018
[  606.865599] RIP: 0010:do_iter_read+0x241/0x340
[  606.870054] Code: 00 00 00 48 8b 7d a8 e8 4d af fb ff 48 8b 45 d0
4c 8b 78 28 48 8b 7d 98 e8 3c af fb ff 49 8b 5c 24 18 48 89 df e8 2f
af fb ff <48> 8b 03 48 8b 7d a0 48 89 45 c0 e8 1f af fb ff 48 8d 7b 08
4d 8b
[  606.888807] RSP: 0018:ffff8881080b7c38 EFLAGS: 00010286
[  606.894034] RAX: 0000000000000000 RBX: 000000000042da60 RCX: ffffffff87a89ce1
[  606.901174] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 000000000042da60
[  606.908333] RBP: ffff8881080b7cb0 R08: 0000000000000000 R09: ffff888101adf457
[  606.915466] R10: ffffed102035be8a R11: 0000000000000001 R12: ffff8881080b7d10
[  606.922607] R13: 0000000000000000 R14: 0000000000000040 R15: ffffffff8955a380
[  606.929739] FS:  00007f7d8b9a6740(0000) GS:ffff888230900000(0000)
knlGS:0000000000000000
[  606.937834] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  606.943589] CR2: 000000000042da60 CR3: 00000001139a0006 CR4: 00000000003706e0
[  606.950730] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  606.957861] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  606.964995] Call Trace:
[  606.967447]  <TASK>
[  606.969558]  vfs_readv+0xce/0x140
[  606.972882]  ? __pfx_vfs_readv+0x10/0x10
[  606.976817]  ? do_send_sig_info+0x9d/0xd0
[  606.980839]  ? preempt_count_sub+0x50/0x80
[  606.984945]  ? _raw_spin_unlock_irqrestore+0x37/0x60
[  606.989919]  ? do_send_sig_info+0x9d/0xd0
[  606.993941]  ? __rcu_read_unlock+0x3b/0x80
[  606.998050]  ? __kasan_check_read+0x15/0x20
[  607.002245]  ? __fget_light+0x1d0/0x210
[  607.006091]  ? kill_something_info+0x1d3/0x200
[  607.010538]  do_preadv+0x132/0x190
[  607.013952]  ? __pfx_do_preadv+0x10/0x10
[  607.017880]  __x64_sys_preadv2+0x71/0xa0
[  607.021815]  do_syscall_64+0x3c/0x90
[  607.025401]  entry_SYSCALL_64_after_hwframe+0x72/0xdc
[  607.030461] RIP: 0033:0x7f7d8baaac8c
[  607.034051] Code: 49 89 cc 55 89 fd 53 44 89 c3 48 83 ec 18 64 8b
04 25 18 00 00 00 85 c0 75 7c 45 89 c1 49 89 ca 45 31 c0 b8 47 01 00
00 0f 05 <48> 3d 00 f0 ff ff 0f 87 c8 00 00 00 48 85 c0 79 49 48 8b 0d
5c e1
[  607.052804] RSP: 002b:00007ffdd4ce73c0 EFLAGS: 00000246 ORIG_RAX:
0000000000000147
[  607.060380] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7d8baaac8c
[  607.067520] RDX: 0000000000000001 RSI: 000000000042d670 RDI: 0000000000000005
[  607.074660] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000
[  607.081795] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[  607.088934] R13: 000000000042d670 R14: 0000000000000000 R15: 0000000000000001
[  607.096070]  </TASK>
[  607.098261] Modules linked in: tun x86_pkg_temp_thermal
[  607.103495] CR2: 000000000042da60
[  607.106815] ---[ end trace 0000000000000000 ]---
[  607.111442] RIP: 0010:do_iter_read+0x241/0x340
[  607.115897] Code: 00 00 00 48 8b 7d a8 e8 4d af fb ff 48 8b 45 d0
4c 8b 78 28 48 8b 7d 98 e8 3c af fb ff 49 8b 5c 24 18 48 89 df e8 2f
af fb ff <48> 8b 03 48 8b 7d a0 48 89 45 c0 e8 1f af fb ff 48 8d 7b 08
4d 8b
[  607.134652] RSP: 0018:ffff88810713fc78 EFLAGS: 00010286
[  607.139885] RAX: 0000000000000001 RBX: 000000000042da60 RCX: ffffffff876b219e
[  607.147026] RDX: fffffbfff1665005 RSI: 0000000000000008 RDI: ffffffff8b328020
[  607.154191] RBP: ffff88810713fcf0 R08: 0000000000000001 R09: ffffffff8b328027
[  607.161325] R10: fffffbfff1665004 R11: 0000000000000001 R12: ffff88810713fd50
[  607.168459] R13: 0000000000000000 R14: 0000000000000040 R15: ffffffff8955a380
[  607.175593] FS:  00007f7d8b9a6740(0000) GS:ffff888230900000(0000)
knlGS:0000000000000000
[  607.183686] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  607.189432] CR2: 000000000042da60 CR3: 00000001139a0006 CR4: 00000000003706e0
[  607.196572] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  607.203706] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  607.210840] note: preadv202[100812] exited with irqs disabled
adv2() read 32 bytes with content 'b' expectedly
preadv201.c:90: TPASS: preadv2() read 64 bytes with content 'a' expectedly
preadv201.c:90: TPASS: preadv2() read 64 bytes with content 'a' expectedly
preadv201.c:90: TPASS: preadv2() read 64 bytes with co[  607.237557]
BUG: unable to handle page fault for address: 000000000042da60
[  607.245714] #PF: supervisor read access in kernel mode
[  607.250859] #PF: error_code(0x0001) - permissions violation
[  607.256431] PGD 8000000100dde067 P4D 8000000100dde067 PUD 10c184067
PMD 137231067 PTE 8000000116a0d067
[  607.265758] Oops: 0001 [#4] PREEMPT SMP KASAN PTI
[  607.270501] CPU: 0 PID: 100814 Comm: preadv202_64 Tainted: G    B D
W          6.3.0-rc3-next-20230327 #1
[  607.280094] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS
2.2 05/23/2018
[  607.287519] RIP: 0010:do_iter_read+0x241/0x340
[  607.292000] Code: 00 00 00 48 8b 7d a8 e8 4d af fb ff 48 8b 45 d0
4c 8b 78 28 48 8b 7d 98 e8 3c af fb ff 49 8b 5c 24 18 48 89 df e8 2f
af fb ff <48> 8b 03 48 8b 7d a0 48 89 45 c0 e8 1f af fb ff 48 8d 7b 08
4d 8b
[  607.310781] RSP: 0018:ffff88810aabfc38 EFLAGS: 00010286
[  607.316042] RAX: 0000000000000000 RBX: 000000000042da60 RCX: ffffffff87a89ce1
[  607.323206] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 000000000042da60
[  607.330366] RBP: ffff88810aabfcb0 R08: 0000000000000000 R09: ffff888101adf457
[  607.337525] R10: ffffed102035be8a R11: 0000000000000001 R12: ffff88810aabfd10
[  607.344692] R13: 0000000000000000 R14: 0000000000000040 R15: ffffffff8955a380
[  607.351850] FS:  00007f3989bcd740(0000) GS:ffff888230800000(0000)
knlGS:0000000000000000
[  607.359973] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  607.365752] CR2: 000000000042da60 CR3: 0000000111308001 CR4: 00000000003706f0
[  607.372919] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  607.380079] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  607.387238] Call Trace:
[  607.389714]  <TASK>
[  607.391824]  vfs_readv+0xce/0x140
[  607.395174]  ? __pfx_vfs_readv+0x10/0x10
[  607.399172]  ? do_send_sig_info+0x9d/0xd0
[  607.403237]  ? preempt_count_sub+0x50/0x80
[  607.407368]  ? _raw_spin_unlock_irqrestore+0x37/0x60
[  607.412371]  ? do_send_sig_info+0x9d/0xd0
[  607.416426]  ? __rcu_read_unlock+0x3b/0x80
[  607.420560]  ? __kasan_check_read+0x15/0x20
[  607.424780]  ? __fget_light+0x1d0/0x210
[  607.428618]  ? kill_something_info+0x1d3/0x200
[  607.433102]  do_preadv+0x132/0x190
[  607.436533]  ? __pfx_do_preadv+0x10/0x10
[  607.440485]  __x64_sys_preadv2+0x71/0xa0
[  607.444444]  do_syscall_64+0x3c/0x90
[  607.448032]  entry_SYSCALL_64_after_hwframe+0x72/0xdc
[  607.453112] RIP: 0033:0x7f3989cd1c8c
[  607.456700] Code: 49 89 cc 55 89 fd 53 44 89 c3 48 83 ec 18 64 8b
04 25 18 00 00 00 85 c0 75 7c 45 89 c1 49 89 ca 45 31 c0 b8 47 01 00
00 0f 05 <48> 3d 00 f0 ff ff 0f 87 c8 00 00 00 48 85 c0 79 49 48 8b 0d
5c e1
[  607.475479] RSP: 002b:00007ffdfa87c790 EFLAGS: 00000246 ORIG_RAX:
0000000000000147
[  607.483054] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3989cd1c8c
[  607.490195] RDX: 0000000000000001 RSI: 000000000042d670 RDI: 0000000000000005
[  607.497397] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000
[  607.504562] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[  607.511723] R13: 000000000042d670 R14: 0000000000000000 R15: 0000000000000001
[  607.518884]  </TASK>
[  607.521107] Modules linked in: tun x86_pkg_temp_thermal
[  607.526396] CR2: 000000000042da60
[  607.529742] ---[ end trace 0000000000000000 ]---
[  607.534394] RIP: 0010:do_iter_read+0x241/0x340
[  607.538876] Code: 00 00 00 48 8b 7d a8 e8 4d af fb ff 48 8b 45 d0
4c 8b 78 28 48 8b 7d 98 e8 3c af fb ff 49 8b 5c 24 18 48 89 df e8 2f
af fb ff <48> 8b 03 48 8b 7d a0 48 89 45 c0 e8 1f af fb ff 48 8d 7b 08
4d 8b
[  607.557656] RSP: 0018:ffff88810713fc78 EFLAGS: 00010286
[  607.562915] RAX: 0000000000000001 RBX: 000000000042da60 RCX: ffffffff876b219e
[  607.570082] RDX: fffffbfff1665005 RSI: 0000000000000008 RDI: ffffffff8b328020
[  607.577250] RBP: ffff88810713fcf0 R08: 0000000000000001 R09: ffffffff8b328027
[  607.584418] R10: fffffbfff1665004 R11: 0000000000000001 R12: ffff88810713fd50
[  607.591576] R13: 0000000000000000 R14: 0000000000000040 R15: ffffffff8955a380
[  607.598733] FS:  00007f3989bcd740(0000) GS:ffff888230800000(0000)
knlGS:0000000000000000
[  607.606847] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  607.612602] CR2: 000000000042da60 CR3: 0000000111308001 CR4: 00000000003706f0
[  607.619766] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  607.626928] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  607.634095] note: preadv202_64[100814] exited with irqs disabled


Test log links,
---------
 - https://qa-reports.linaro.org/lkft/linux-next-master/build/next-20230327/testrun/15902655/suite/
- ltp-syscalls/test/preadv202/log
 - https://qa-reports.linaro.org/lkft/linux-next-master/build/next-20230327/testrun/15899127/suite/
- ltp-syscalls/test/preadv202/history/

metadata:
  git_ref: master
  git_repo: https://gitlab.com/Linaro/lkft/mirrors/next/linux-next
  git_sha: 011eb7443621f49ca1e8cdf9c74c215f25019118
  git_describe: next-20230327
  kernel_version: 6.3.0-rc3
  kernel-config:
https://storage.tuxsuite.com/public/linaro/lkft/builds/2NZpQvNrdOzi9UUukh8f6b4TmOv/config
  build-url: https://gitlab.com/Linaro/lkft/mirrors/next/linux-next/-/pipelines/818444740
  artifact-location:
https://storage.tuxsuite.com/public/linaro/lkft/builds/2NZpQvNrdOzi9UUukh8f6b4TmOv
  toolchain: gcc-11



--
Linaro LKFT
https://lkft.linaro.org

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ