lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Sat, 15 Apr 2023 14:42:31 +0800
From:   kernel test robot <oliver.sang@...el.com>
To:     Arnd Bergmann <arnd@...nel.org>
CC:     <oe-lkp@...ts.linux.dev>, <lkp@...el.com>,
        <linux-snps-arc@...ts.infradead.org>, <linux-mm@...ck.org>,
        Vineet Gupta <vgupta@...nel.org>,
        Andrew Morton <akpm@...ux-foundation.org>,
        Mike Rapoport <rppt@...nel.org>,
        Nathan Chancellor <nathan@...nel.org>,
        Nick Desaulniers <ndesaulniers@...gle.com>,
        David Hildenbrand <david@...hat.com>,
        "Vlastimil Babka" <vbabka@...e.cz>, Arnd Bergmann <arnd@...db.de>,
        <llvm@...ts.linux.dev>, Tom Rix <trix@...hat.com>,
        "Liam R. Howlett" <Liam.Howlett@...cle.com>,
        "Matthew Wilcox (Oracle)" <willy@...radead.org>,
        Suren Baghdasaryan <surenb@...gle.com>,
        Naoya Horiguchi <naoya.horiguchi@....com>,
        <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH] mm: make arch_has_descending_max_zone_pfns() static


Hello,

kernel test robot noticed "kernel_BUG_at_lib/list_debug.c" on:

commit: c31fe5eb2ec68f6d2331fabc924e0030cc6bb2b3 ("[PATCH] mm: make arch_has_descending_max_zone_pfns() static")
url: https://github.com/intel-lab-lkp/linux/commits/Arnd-Bergmann/mm-make-arch_has_descending_max_zone_pfns-static/20230414-160608
base: https://git.kernel.org/cgit/linux/kernel/git/akpm/mm.git mm-everything
patch link: https://lore.kernel.org/all/20230414080418.110236-1-arnd@kernel.org/
patch subject: [PATCH] mm: make arch_has_descending_max_zone_pfns() static

in testcase: boot

compiler: gcc-11
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G

(please refer to attached dmesg/kmsg for entire log/backtrace)


+------------------------------------------+------------+------------+
|                                          | 32ed3874f2 | c31fe5eb2e |
+------------------------------------------+------------+------------+
| boot_successes                           | 10         | 0          |
| boot_failures                            | 0          | 6          |
| kernel_BUG_at_lib/list_debug.c           | 0          | 6          |
| invalid_opcode:#[##]                     | 0          | 6          |
| EIP:__list_add_valid                     | 0          | 6          |
| Kernel_panic-not_syncing:Fatal_exception | 0          | 6          |
+------------------------------------------+------------+------------+


If you fix the issue, kindly add following tag
| Reported-by: kernel test robot <oliver.sang@...el.com>
| Link: https://lore.kernel.org/oe-lkp/202304151422.5e4d380b-oliver.sang@intel.com


[    0.004000][    T0] ------------[ cut here ]------------
[    0.004000][    T0] kernel BUG at lib/list_debug.c:33!
[    0.004000][    T0] invalid opcode: 0000 [#1] SMP
[    0.004000][    T0] CPU: 0 PID: 0 Comm: swapper Not tainted 6.3.0-rc5-00613-gc31fe5eb2ec6 #42
[ 0.004000][ T0] EIP: __list_add_valid (??:?) 
[ 0.004000][ T0] Code: 56 51 68 78 b0 4c c2 e8 39 c7 de ff 0f 0b b8 f4 60 a4 c2 eb 1c 39 d3 74 04 39 f3 75 19 51 50 53 68 ca b0 4c c2 e8 1b c7 de ff <0f> 0b b8 e8 60 a4 c2 e8 be 71 06 00 8d 65 f8 b0 01 5b 5e 5d 31 d2
All code
========
   0:	56                   	push   %rsi
   1:	51                   	push   %rcx
   2:	68 78 b0 4c c2       	pushq  $0xffffffffc24cb078
   7:	e8 39 c7 de ff       	callq  0xffffffffffdec745
   c:	0f 0b                	ud2    
   e:	b8 f4 60 a4 c2       	mov    $0xc2a460f4,%eax
  13:	eb 1c                	jmp    0x31
  15:	39 d3                	cmp    %edx,%ebx
  17:	74 04                	je     0x1d
  19:	39 f3                	cmp    %esi,%ebx
  1b:	75 19                	jne    0x36
  1d:	51                   	push   %rcx
  1e:	50                   	push   %rax
  1f:	53                   	push   %rbx
  20:	68 ca b0 4c c2       	pushq  $0xffffffffc24cb0ca
  25:	e8 1b c7 de ff       	callq  0xffffffffffdec745
  2a:*	0f 0b                	ud2    		<-- trapping instruction
  2c:	b8 e8 60 a4 c2       	mov    $0xc2a460e8,%eax
  31:	e8 be 71 06 00       	callq  0x671f4
  36:	8d 65 f8             	lea    -0x8(%rbp),%esp
  39:	b0 01                	mov    $0x1,%al
  3b:	5b                   	pop    %rbx
  3c:	5e                   	pop    %rsi
  3d:	5d                   	pop    %rbp
  3e:	31 d2                	xor    %edx,%edx

Code starting with the faulting instruction
===========================================
   0:	0f 0b                	ud2    
   2:	b8 e8 60 a4 c2       	mov    $0xc2a460e8,%eax
   7:	e8 be 71 06 00       	callq  0x671ca
   c:	8d 65 f8             	lea    -0x8(%rbp),%esp
   f:	b0 01                	mov    $0x1,%al
  11:	5b                   	pop    %rbx
  12:	5e                   	pop    %rsi
  13:	5d                   	pop    %rbp
  14:	31 d2                	xor    %edx,%edx
[    0.004000][    T0] EAX: 00000040 EBX: ec373004 ECX: 00000000 EDX: 00000000
[    0.004000][    T0] ESI: c2ba2b20 EDI: ec373004 EBP: c2689e94 ESP: c2689e7c
[    0.004000][    T0] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00210046
[    0.004000][    T0] CR0: 80050033 CR2: 00000000 CR3: 02c7d000 CR4: 00040690
[    0.004000][    T0] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[    0.004000][    T0] DR6: fffe0ff0 DR7: 00000400
[    0.004000][    T0] Call Trace:
[ 0.004000][ T0] list_add_tail (uncore.c:?) 
[ 0.004000][ T0] __free_one_page (page_alloc.c:?) 
[ 0.004000][ T0] __free_pages_ok (page_alloc.c:?) 
[ 0.004000][ T0] __free_pages_core (??:?) 
[ 0.004000][ T0] memblock_free_pages (??:?) 
[ 0.004000][ T0] memblock_free_all (??:?) 
[ 0.004000][ T0] mem_init (??:?) 
[ 0.004000][ T0] mm_core_init (??:?) 
[ 0.004000][ T0] ? cpu_init (??:?) 
[ 0.004000][ T0] start_kernel (??:?) 
[ 0.004000][ T0] i386_start_kernel (??:?) 
[ 0.004000][ T0] startup_32_smp (??:?) 
[    0.004000][    T0] Modules linked in:
[    0.004000][    T0] ---[ end trace 0000000000000000 ]---
[ 0.004000][ T0] EIP: __list_add_valid (??:?) 
[ 0.004000][ T0] Code: 56 51 68 78 b0 4c c2 e8 39 c7 de ff 0f 0b b8 f4 60 a4 c2 eb 1c 39 d3 74 04 39 f3 75 19 51 50 53 68 ca b0 4c c2 e8 1b c7 de ff <0f> 0b b8 e8 60 a4 c2 e8 be 71 06 00 8d 65 f8 b0 01 5b 5e 5d 31 d2
All code
========
   0:	56                   	push   %rsi
   1:	51                   	push   %rcx
   2:	68 78 b0 4c c2       	pushq  $0xffffffffc24cb078
   7:	e8 39 c7 de ff       	callq  0xffffffffffdec745
   c:	0f 0b                	ud2    
   e:	b8 f4 60 a4 c2       	mov    $0xc2a460f4,%eax
  13:	eb 1c                	jmp    0x31
  15:	39 d3                	cmp    %edx,%ebx
  17:	74 04                	je     0x1d
  19:	39 f3                	cmp    %esi,%ebx
  1b:	75 19                	jne    0x36
  1d:	51                   	push   %rcx
  1e:	50                   	push   %rax
  1f:	53                   	push   %rbx
  20:	68 ca b0 4c c2       	pushq  $0xffffffffc24cb0ca
  25:	e8 1b c7 de ff       	callq  0xffffffffffdec745
  2a:*	0f 0b                	ud2    		<-- trapping instruction
  2c:	b8 e8 60 a4 c2       	mov    $0xc2a460e8,%eax
  31:	e8 be 71 06 00       	callq  0x671f4
  36:	8d 65 f8             	lea    -0x8(%rbp),%esp
  39:	b0 01                	mov    $0x1,%al
  3b:	5b                   	pop    %rbx
  3c:	5e                   	pop    %rsi
  3d:	5d                   	pop    %rbp
  3e:	31 d2                	xor    %edx,%edx

Code starting with the faulting instruction
===========================================
   0:	0f 0b                	ud2    
   2:	b8 e8 60 a4 c2       	mov    $0xc2a460e8,%eax
   7:	e8 be 71 06 00       	callq  0x671ca
   c:	8d 65 f8             	lea    -0x8(%rbp),%esp
   f:	b0 01                	mov    $0x1,%al
  11:	5b                   	pop    %rbx
  12:	5e                   	pop    %rsi
  13:	5d                   	pop    %rbp
  14:	31 d2                	xor    %edx,%edx


To reproduce:

        # build kernel
	cd linux
	cp config-6.3.0-rc5-00613-gc31fe5eb2ec6 .config
	make HOSTCC=gcc-11 CC=gcc-11 ARCH=i386 olddefconfig prepare modules_prepare bzImage modules
	make HOSTCC=gcc-11 CC=gcc-11 ARCH=i386 INSTALL_MOD_PATH=<mod-install-dir> modules_install
	cd <mod-install-dir>
	find lib/ | cpio -o -H newc --quiet | gzip > modules.cgz


        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        bin/lkp qemu -k <bzImage> -m modules.cgz job-script # job-script is attached in this email

        # if come across any failure that blocks the test,
        # please remove ~/.lkp and /lkp dir to run from a clean state.



-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests



View attachment "config-6.3.0-rc5-00613-gc31fe5eb2ec6" of type "text/plain" (141987 bytes)

View attachment "job-script" of type "text/plain" (4980 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (4280 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ