lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <202304251215.21f443c1-oliver.sang@intel.com>
Date:   Tue, 25 Apr 2023 14:10:52 +0800
From:   kernel test robot <oliver.sang@...el.com>
To:     Ard Biesheuvel <ardb@...nel.org>
CC:     <oe-lkp@...ts.linux.dev>, <lkp@...el.com>,
        <linux-kernel@...r.kernel.org>, <linux-arch@...r.kernel.org>,
        <oliver.sang@...el.com>
Subject: [ardb:x86-pie] [x86]  b158035449:
 WARNING:at_arch/x86/kernel/ftrace.c:#ftrace_verify_code



Hello,

kernel test robot noticed "WARNING:at_arch/x86/kernel/ftrace.c:#ftrace_verify_code" on:

commit: b1580354498f38290d1d5b94bd3f58562d6b8647 ("x86: Use PIE codegen for the core kernel")
git://git.kernel.org/cgit/linux/kernel/git/ardb/linux.git x86-pie

in testcase: boot

compiler: gcc-11
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G

(please refer to attached dmesg/kmsg for entire log/backtrace)



If you fix the issue, kindly add following tag
| Reported-by: kernel test robot <oliver.sang@...el.com>
| Link: https://lore.kernel.org/oe-lkp/202304251215.21f443c1-oliver.sang@intel.com


[    0.004000][    T0] ------------[ cut here ]------------
[ 0.004000][ T0] WARNING: CPU: 0 PID: 0 at arch/x86/kernel/ftrace.c:99 ftrace_verify_code (ftrace.c:?) 
[    0.004000][    T0] Modules linked in:
[    0.004000][    T0] CPU: 0 PID: 0 Comm: swapper Not tainted 6.3.0-rc4-00016-gb1580354498f #1
[    0.004000][    T0] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-debian-1.16.0-5 04/01/2014
[ 0.004000][ T0] RIP: 0010:ftrace_verify_code (ftrace.c:?) 
[ 0.004000][ T0] Code: 00 48 85 c0 74 09 0f 0b b8 f2 ff ff ff eb 22 ba 05 00 00 00 48 89 de 48 89 ef e8 61 63 a9 00 85 c0 74 0e 48 89 1d 66 27 fe 01 <0f> 0b b8 ea ff ff ff 48 8b 54 24 08 65 48 2b 15 a2 65 e7 01 74 05
All code
========
   0:	00 48 85             	add    %cl,-0x7b(%rax)
   3:	c0 74 09 0f 0b       	shlb   $0xb,0xf(%rcx,%rcx,1)
   8:	b8 f2 ff ff ff       	mov    $0xfffffff2,%eax
   d:	eb 22                	jmp    0x31
   f:	ba 05 00 00 00       	mov    $0x5,%edx
  14:	48 89 de             	mov    %rbx,%rsi
  17:	48 89 ef             	mov    %rbp,%rdi
  1a:	e8 61 63 a9 00       	callq  0xa96380
  1f:	85 c0                	test   %eax,%eax
  21:	74 0e                	je     0x31
  23:	48 89 1d 66 27 fe 01 	mov    %rbx,0x1fe2766(%rip)        # 0x1fe2790
  2a:*	0f 0b                	ud2    		<-- trapping instruction
  2c:	b8 ea ff ff ff       	mov    $0xffffffea,%eax
  31:	48 8b 54 24 08       	mov    0x8(%rsp),%rdx
  36:	65 48 2b 15 a2 65 e7 	sub    %gs:0x1e765a2(%rip),%rdx        # 0x1e765e0
  3d:	01 
  3e:	74 05                	je     0x45

Code starting with the faulting instruction
===========================================
   0:	0f 0b                	ud2    
   2:	b8 ea ff ff ff       	mov    $0xffffffea,%eax
   7:	48 8b 54 24 08       	mov    0x8(%rsp),%rdx
   c:	65 48 2b 15 a2 65 e7 	sub    %gs:0x1e765a2(%rip),%rdx        # 0x1e765b6
  13:	01 
  14:	74 05                	je     0x1b
[    0.004000][    T0] RSP: 0000:ffffffff82403e70 EFLAGS: 00010082
[    0.004000][    T0] RAX: 00000000ffffff7f RBX: ffffffff82f0f228 RCX: 0000000000000001
[    0.004000][    T0] RDX: 0000000000000005 RSI: ffffffff82f0f228 RDI: ffffffff82403e73
[    0.004000][    T0] RBP: ffffffff82403e73 R08: 00000000000000e8 R09: ffffffff81001004
[    0.004000][    T0] R10: 0000000000000001 R11: ffffffff82eec640 R12: 0000000000000000
[    0.004000][    T0] R13: ffff88810c854000 R14: 0000000000000000 R15: ffffffff81046320
[    0.004000][    T0] FS:  0000000000000000(0000) GS:ffff8884acd44000(0000) knlGS:0000000000000000
[    0.004000][    T0] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[    0.004000][    T0] CR2: ffff88843ffff000 CR3: 000000000241a000 CR4: 00000000000406b0
[    0.004000][    T0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[    0.004000][    T0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[    0.004000][    T0] Call Trace:
[    0.004000][    T0]  <TASK>
[ 0.004000][ T0] ftrace_modify_code_direct (ftrace.c:?) 
[ 0.004000][ T0] ? __traceiter_initcall_level (??:?) 
[ 0.004000][ T0] ftrace_process_locs (ftrace.c:?) 
[ 0.004000][ T0] ftrace_init (??:?) 
[ 0.004000][ T0] start_kernel (??:?) 
[ 0.004000][ T0] secondary_startup_64_no_verify (??:?) 
[    0.004000][    T0]  </TASK>
[    0.004000][    T0] ---[ end trace 0000000000000000 ]---
[    0.004000][    T0] ------------[ ftrace bug ]------------
[    0.004000][    T0] ftrace failed to modify
[ 0.004000][ T0] __traceiter_initcall_level (??:?) 
[    0.004000][    T0]  actual:   67:e8:16:53:04
[    0.004000][    T0]  expected: e8:17:53:04:00
[    0.004000][    T0] Initializing ftrace call sites
[    0.004000][    T0] ftrace record flags: 0
[    0.004000][    T0]  (0)
[    0.004000][    T0]  expected tramp: ffffffff81046330


To reproduce:

        # build kernel
	cd linux
	cp config-6.3.0-rc4-00016-gb1580354498f .config
	make HOSTCC=gcc-11 CC=gcc-11 ARCH=x86_64 olddefconfig prepare modules_prepare bzImage modules
	make HOSTCC=gcc-11 CC=gcc-11 ARCH=x86_64 INSTALL_MOD_PATH=<mod-install-dir> modules_install
	cd <mod-install-dir>
	find lib/ | cpio -o -H newc --quiet | gzip > modules.cgz


        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        bin/lkp qemu -k <bzImage> -m modules.cgz job-script # job-script is attached in this email

        # if come across any failure that blocks the test,
        # please remove ~/.lkp and /lkp dir to run from a clean state.



-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests



View attachment "config-6.3.0-rc4-00016-gb1580354498f" of type "text/plain" (130046 bytes)

View attachment "job-script" of type "text/plain" (4723 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (27656 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ