lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20230327075841.pblnllclg2idy3rp@wittgenstein>
Date:   Mon, 27 Mar 2023 09:58:41 +0200
From:   Christian Brauner <brauner@...nel.org>
To:     Naresh Kamboju <naresh.kamboju@...aro.org>,
        Jens Axboe <axboe@...nel.dk>
Cc:     open list <linux-kernel@...r.kernel.org>,
        Linux-Next Mailing List <linux-next@...r.kernel.org>,
        linux-mm <linux-mm@...ck.org>, linux-fsdevel@...r.kernel.org,
        lkft-triage@...ts.linaro.org,
        Andrew Morton <akpm@...ux-foundation.org>,
        Stephen Rothwell <sfr@...b.auug.org.au>,
        Al Viro <viro@...iv.linux.org.uk>,
        Arnd Bergmann <arnd@...db.de>,
        Anders Roxell <anders.roxell@...aro.org>
Subject: Re: next: x86: RIP: 0010:do_iter_read+0x241/0x340 - BUG: unable to
 handle page fault for address: 000000000042da60

+Jens for awareness because of

Subject: [PATCHSET 0/2] Turn single segment imports into ITER_UBUF
https://lore.kernel.org/linux-fsdevel/20230324204443.45950-1-axboe@kernel.dk

which seems like a likely candidate.

On Mon, Mar 27, 2023 at 11:47:22AM +0530, Naresh Kamboju wrote:
> Following LTP syscalls test cases on arm64 FVP, x86_64 and i386.
> 
> Regressions found on i386 x86 and fvp-aemva:
> 
>  - ltp-syscalls/preadv202_64
>  - ltp-syscalls/process_vm_writev01
>  - ltp-syscalls/pwritev02
>  - ltp-syscalls/pwritev02_64
>  - ltp-syscalls/preadv02_64
>  - ltp-syscalls/preadv202
>  - ltp-syscalls/recvmsg01
>  - ltp-syscalls/preadv02
>  - ltp-syscalls/process_vm_readv01
>  - ltp-syscalls/readv02
> 
> 
> Reported-by: Linux Kernel Functional Testing <lkft@...aro.org>
> 
> test crash log:
> --------------
> [  606.816186] BUG: unable to handle page fault for address: 000000000042da60
> [  606.824151] #PF: supervisor read access in kernel mode
> [  606.829296] #PF: error_code(0x0001) - permissions violation
> [  606.834869] PGD 80000001373fb067 P4D 80000001373fb067 PUD 113a7b067
> PMD 1085d5067 PTE 8000000119372067
> [  606.844200] Oops: 0001 [#3] PREEMPT SMP KASAN PTI
> [  606.848908] CPU: 2 PID: 100812 Comm: preadv202 Tainted: G    B D W
>         6.3.0-rc3-next-20230327 #1
> [  606.858206] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS
> 2.2 05/23/2018
> [  606.865599] RIP: 0010:do_iter_read+0x241/0x340
> [  606.870054] Code: 00 00 00 48 8b 7d a8 e8 4d af fb ff 48 8b 45 d0
> 4c 8b 78 28 48 8b 7d 98 e8 3c af fb ff 49 8b 5c 24 18 48 89 df e8 2f
> af fb ff <48> 8b 03 48 8b 7d a0 48 89 45 c0 e8 1f af fb ff 48 8d 7b 08
> 4d 8b
> [  606.888807] RSP: 0018:ffff8881080b7c38 EFLAGS: 00010286
> [  606.894034] RAX: 0000000000000000 RBX: 000000000042da60 RCX: ffffffff87a89ce1
> [  606.901174] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 000000000042da60
> [  606.908333] RBP: ffff8881080b7cb0 R08: 0000000000000000 R09: ffff888101adf457
> [  606.915466] R10: ffffed102035be8a R11: 0000000000000001 R12: ffff8881080b7d10
> [  606.922607] R13: 0000000000000000 R14: 0000000000000040 R15: ffffffff8955a380
> [  606.929739] FS:  00007f7d8b9a6740(0000) GS:ffff888230900000(0000)
> knlGS:0000000000000000
> [  606.937834] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [  606.943589] CR2: 000000000042da60 CR3: 00000001139a0006 CR4: 00000000003706e0
> [  606.950730] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> [  606.957861] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
> [  606.964995] Call Trace:
> [  606.967447]  <TASK>
> [  606.969558]  vfs_readv+0xce/0x140
> [  606.972882]  ? __pfx_vfs_readv+0x10/0x10
> [  606.976817]  ? do_send_sig_info+0x9d/0xd0
> [  606.980839]  ? preempt_count_sub+0x50/0x80
> [  606.984945]  ? _raw_spin_unlock_irqrestore+0x37/0x60
> [  606.989919]  ? do_send_sig_info+0x9d/0xd0
> [  606.993941]  ? __rcu_read_unlock+0x3b/0x80
> [  606.998050]  ? __kasan_check_read+0x15/0x20
> [  607.002245]  ? __fget_light+0x1d0/0x210
> [  607.006091]  ? kill_something_info+0x1d3/0x200
> [  607.010538]  do_preadv+0x132/0x190
> [  607.013952]  ? __pfx_do_preadv+0x10/0x10
> [  607.017880]  __x64_sys_preadv2+0x71/0xa0
> [  607.021815]  do_syscall_64+0x3c/0x90
> [  607.025401]  entry_SYSCALL_64_after_hwframe+0x72/0xdc
> [  607.030461] RIP: 0033:0x7f7d8baaac8c
> [  607.034051] Code: 49 89 cc 55 89 fd 53 44 89 c3 48 83 ec 18 64 8b
> 04 25 18 00 00 00 85 c0 75 7c 45 89 c1 49 89 ca 45 31 c0 b8 47 01 00
> 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 c8 00 00 00 48 85 c0 79 49 48 8b 0d
> 5c e1
> [  607.052804] RSP: 002b:00007ffdd4ce73c0 EFLAGS: 00000246 ORIG_RAX:
> 0000000000000147
> [  607.060380] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7d8baaac8c
> [  607.067520] RDX: 0000000000000001 RSI: 000000000042d670 RDI: 0000000000000005
> [  607.074660] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000
> [  607.081795] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
> [  607.088934] R13: 000000000042d670 R14: 0000000000000000 R15: 0000000000000001
> [  607.096070]  </TASK>
> [  607.098261] Modules linked in: tun x86_pkg_temp_thermal
> [  607.103495] CR2: 000000000042da60
> [  607.106815] ---[ end trace 0000000000000000 ]---
> [  607.111442] RIP: 0010:do_iter_read+0x241/0x340
> [  607.115897] Code: 00 00 00 48 8b 7d a8 e8 4d af fb ff 48 8b 45 d0
> 4c 8b 78 28 48 8b 7d 98 e8 3c af fb ff 49 8b 5c 24 18 48 89 df e8 2f
> af fb ff <48> 8b 03 48 8b 7d a0 48 89 45 c0 e8 1f af fb ff 48 8d 7b 08
> 4d 8b
> [  607.134652] RSP: 0018:ffff88810713fc78 EFLAGS: 00010286
> [  607.139885] RAX: 0000000000000001 RBX: 000000000042da60 RCX: ffffffff876b219e
> [  607.147026] RDX: fffffbfff1665005 RSI: 0000000000000008 RDI: ffffffff8b328020
> [  607.154191] RBP: ffff88810713fcf0 R08: 0000000000000001 R09: ffffffff8b328027
> [  607.161325] R10: fffffbfff1665004 R11: 0000000000000001 R12: ffff88810713fd50
> [  607.168459] R13: 0000000000000000 R14: 0000000000000040 R15: ffffffff8955a380
> [  607.175593] FS:  00007f7d8b9a6740(0000) GS:ffff888230900000(0000)
> knlGS:0000000000000000
> [  607.183686] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [  607.189432] CR2: 000000000042da60 CR3: 00000001139a0006 CR4: 00000000003706e0
> [  607.196572] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> [  607.203706] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
> [  607.210840] note: preadv202[100812] exited with irqs disabled
> adv2() read 32 bytes with content 'b' expectedly
> preadv201.c:90: TPASS: preadv2() read 64 bytes with content 'a' expectedly
> preadv201.c:90: TPASS: preadv2() read 64 bytes with content 'a' expectedly
> preadv201.c:90: TPASS: preadv2() read 64 bytes with co[  607.237557]
> BUG: unable to handle page fault for address: 000000000042da60
> [  607.245714] #PF: supervisor read access in kernel mode
> [  607.250859] #PF: error_code(0x0001) - permissions violation
> [  607.256431] PGD 8000000100dde067 P4D 8000000100dde067 PUD 10c184067
> PMD 137231067 PTE 8000000116a0d067
> [  607.265758] Oops: 0001 [#4] PREEMPT SMP KASAN PTI
> [  607.270501] CPU: 0 PID: 100814 Comm: preadv202_64 Tainted: G    B D
> W          6.3.0-rc3-next-20230327 #1
> [  607.280094] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS
> 2.2 05/23/2018
> [  607.287519] RIP: 0010:do_iter_read+0x241/0x340
> [  607.292000] Code: 00 00 00 48 8b 7d a8 e8 4d af fb ff 48 8b 45 d0
> 4c 8b 78 28 48 8b 7d 98 e8 3c af fb ff 49 8b 5c 24 18 48 89 df e8 2f
> af fb ff <48> 8b 03 48 8b 7d a0 48 89 45 c0 e8 1f af fb ff 48 8d 7b 08
> 4d 8b
> [  607.310781] RSP: 0018:ffff88810aabfc38 EFLAGS: 00010286
> [  607.316042] RAX: 0000000000000000 RBX: 000000000042da60 RCX: ffffffff87a89ce1
> [  607.323206] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 000000000042da60
> [  607.330366] RBP: ffff88810aabfcb0 R08: 0000000000000000 R09: ffff888101adf457
> [  607.337525] R10: ffffed102035be8a R11: 0000000000000001 R12: ffff88810aabfd10
> [  607.344692] R13: 0000000000000000 R14: 0000000000000040 R15: ffffffff8955a380
> [  607.351850] FS:  00007f3989bcd740(0000) GS:ffff888230800000(0000)
> knlGS:0000000000000000
> [  607.359973] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [  607.365752] CR2: 000000000042da60 CR3: 0000000111308001 CR4: 00000000003706f0
> [  607.372919] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> [  607.380079] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
> [  607.387238] Call Trace:
> [  607.389714]  <TASK>
> [  607.391824]  vfs_readv+0xce/0x140
> [  607.395174]  ? __pfx_vfs_readv+0x10/0x10
> [  607.399172]  ? do_send_sig_info+0x9d/0xd0
> [  607.403237]  ? preempt_count_sub+0x50/0x80
> [  607.407368]  ? _raw_spin_unlock_irqrestore+0x37/0x60
> [  607.412371]  ? do_send_sig_info+0x9d/0xd0
> [  607.416426]  ? __rcu_read_unlock+0x3b/0x80
> [  607.420560]  ? __kasan_check_read+0x15/0x20
> [  607.424780]  ? __fget_light+0x1d0/0x210
> [  607.428618]  ? kill_something_info+0x1d3/0x200
> [  607.433102]  do_preadv+0x132/0x190
> [  607.436533]  ? __pfx_do_preadv+0x10/0x10
> [  607.440485]  __x64_sys_preadv2+0x71/0xa0
> [  607.444444]  do_syscall_64+0x3c/0x90
> [  607.448032]  entry_SYSCALL_64_after_hwframe+0x72/0xdc
> [  607.453112] RIP: 0033:0x7f3989cd1c8c
> [  607.456700] Code: 49 89 cc 55 89 fd 53 44 89 c3 48 83 ec 18 64 8b
> 04 25 18 00 00 00 85 c0 75 7c 45 89 c1 49 89 ca 45 31 c0 b8 47 01 00
> 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 c8 00 00 00 48 85 c0 79 49 48 8b 0d
> 5c e1
> [  607.475479] RSP: 002b:00007ffdfa87c790 EFLAGS: 00000246 ORIG_RAX:
> 0000000000000147
> [  607.483054] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3989cd1c8c
> [  607.490195] RDX: 0000000000000001 RSI: 000000000042d670 RDI: 0000000000000005
> [  607.497397] RBP: 0000000000000005 R08: 0000000000000000 R09: 0000000000000000
> [  607.504562] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
> [  607.511723] R13: 000000000042d670 R14: 0000000000000000 R15: 0000000000000001
> [  607.518884]  </TASK>
> [  607.521107] Modules linked in: tun x86_pkg_temp_thermal
> [  607.526396] CR2: 000000000042da60
> [  607.529742] ---[ end trace 0000000000000000 ]---
> [  607.534394] RIP: 0010:do_iter_read+0x241/0x340
> [  607.538876] Code: 00 00 00 48 8b 7d a8 e8 4d af fb ff 48 8b 45 d0
> 4c 8b 78 28 48 8b 7d 98 e8 3c af fb ff 49 8b 5c 24 18 48 89 df e8 2f
> af fb ff <48> 8b 03 48 8b 7d a0 48 89 45 c0 e8 1f af fb ff 48 8d 7b 08
> 4d 8b
> [  607.557656] RSP: 0018:ffff88810713fc78 EFLAGS: 00010286
> [  607.562915] RAX: 0000000000000001 RBX: 000000000042da60 RCX: ffffffff876b219e
> [  607.570082] RDX: fffffbfff1665005 RSI: 0000000000000008 RDI: ffffffff8b328020
> [  607.577250] RBP: ffff88810713fcf0 R08: 0000000000000001 R09: ffffffff8b328027
> [  607.584418] R10: fffffbfff1665004 R11: 0000000000000001 R12: ffff88810713fd50
> [  607.591576] R13: 0000000000000000 R14: 0000000000000040 R15: ffffffff8955a380
> [  607.598733] FS:  00007f3989bcd740(0000) GS:ffff888230800000(0000)
> knlGS:0000000000000000
> [  607.606847] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [  607.612602] CR2: 000000000042da60 CR3: 0000000111308001 CR4: 00000000003706f0
> [  607.619766] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> [  607.626928] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
> [  607.634095] note: preadv202_64[100814] exited with irqs disabled
> 
> 
> Test log links,
> ---------
>  - https://qa-reports.linaro.org/lkft/linux-next-master/build/next-20230327/testrun/15902655/suite/
> - ltp-syscalls/test/preadv202/log
>  - https://qa-reports.linaro.org/lkft/linux-next-master/build/next-20230327/testrun/15899127/suite/
> - ltp-syscalls/test/preadv202/history/
> 
> metadata:
>   git_ref: master
>   git_repo: https://gitlab.com/Linaro/lkft/mirrors/next/linux-next
>   git_sha: 011eb7443621f49ca1e8cdf9c74c215f25019118
>   git_describe: next-20230327
>   kernel_version: 6.3.0-rc3
>   kernel-config:
> https://storage.tuxsuite.com/public/linaro/lkft/builds/2NZpQvNrdOzi9UUukh8f6b4TmOv/config
>   build-url: https://gitlab.com/Linaro/lkft/mirrors/next/linux-next/-/pipelines/818444740
>   artifact-location:
> https://storage.tuxsuite.com/public/linaro/lkft/builds/2NZpQvNrdOzi9UUukh8f6b4TmOv
>   toolchain: gcc-11
> 
> 
> 
> --
> Linaro LKFT
> https://lkft.linaro.org

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ