lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <202403281553.79f5a16f-lkp@intel.com>
Date: Thu, 28 Mar 2024 15:36:28 +0800
From: kernel test robot <oliver.sang@...el.com>
To: Pawan Gupta <pawan.kumar.gupta@...ux.intel.com>
CC: <oe-lkp@...ts.linux.dev>, <lkp@...el.com>, <linux-kernel@...r.kernel.org>,
	Dave Hansen <dave.hansen@...ux.intel.com>, <kvm@...r.kernel.org>,
	<oliver.sang@...el.com>
Subject: [linus:master] [x86/bugs]  6613d82e61: general_protection_fault:#[##]



Hello,


we reported a performance issue for this commit in
https://lore.kernel.org/all/202403041300.a7fb1462-yujie.liu@intel.com/

now we noticed a persistent crash issue:

a0e2dab44d22b913 6613d82e617dd7eb8b0c40b2fe3
---------------- ---------------------------
       fail:runs  %reproduction    fail:runs
           |             |             |
           :100         99%          100:100   dmesg.EIP:restore_all_switch_stack
           :100         99%          100:100   dmesg.Kernel_panic-not_syncing:Fatal_exception
           :100         99%          100:100   dmesg.general_protection_fault:#[##]


below details FYI.


kernel test robot noticed "general_protection_fault:#[##]" on:

commit: 6613d82e617dd7eb8b0c40b2fe3acea655b1d611 ("x86/bugs: Use ALTERNATIVE() instead of mds_user_clear static key")
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master

[test failed on linus/master 70293240c5ce675a67bfc48f419b093023b862b3]
[test failed on linux-next/master 13ee4a7161b6fd938aef6688ff43b163f6d83e37]

in testcase: trinity
version: 
with following parameters:

	runtime: 600s



compiler: clang-17
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G

(please refer to attached dmesg/kmsg for entire log/backtrace)



If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@...el.com>
| Closes: https://lore.kernel.org/oe-lkp/202403281553.79f5a16f-lkp@intel.com


[   25.175767][  T670] VFS: Warning: trinity-c2 using old stat() call. Recompile your binary.
[   25.245597][  T669] general protection fault: 0000 [#1] PREEMPT SMP
[   25.246417][  T669] CPU: 1 PID: 669 Comm: trinity-c1 Not tainted 6.8.0-rc5-00004-g6613d82e617d #1 85a4928d2e6b42899c3861e57e26bdc646c4c5f9
[   25.247743][  T669] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
[ 25.248865][ T669] EIP: restore_all_switch_stack (kbuild/src/consumer/arch/x86/entry/entry_32.S:957) 
[ 25.249510][ T669] Code: 4c 24 10 36 89 48 fc 8b 4c 24 0c 81 e1 ff ff 00 00 36 89 48 f8 8b 4c 24 08 36 89 48 f4 8b 4c 24 04 36 89 48 f0 59 8d 60 f0 58 <0f> 00 2d 00 94 d5 c1 cf 6a 00 68 88 6b d4 c1 eb 00 fc 0f a0 50 b8
All code
========
   0:	4c 24 10             	rex.WR and $0x10,%al
   3:	36 89 48 fc          	ss mov %ecx,-0x4(%rax)
   7:	8b 4c 24 0c          	mov    0xc(%rsp),%ecx
   b:	81 e1 ff ff 00 00    	and    $0xffff,%ecx
  11:	36 89 48 f8          	ss mov %ecx,-0x8(%rax)
  15:	8b 4c 24 08          	mov    0x8(%rsp),%ecx
  19:	36 89 48 f4          	ss mov %ecx,-0xc(%rax)
  1d:	8b 4c 24 04          	mov    0x4(%rsp),%ecx
  21:	36 89 48 f0          	ss mov %ecx,-0x10(%rax)
  25:	59                   	pop    %rcx
  26:	8d 60 f0             	lea    -0x10(%rax),%esp
  29:	58                   	pop    %rax
  2a:*	0f 00 2d 00 94 d5 c1 	verw   -0x3e2a6c00(%rip)        # 0xffffffffc1d59431		<-- trapping instruction
  31:	cf                   	iret
  32:	6a 00                	push   $0x0
  34:	68 88 6b d4 c1       	push   $0xffffffffc1d46b88
  39:	eb 00                	jmp    0x3b
  3b:	fc                   	cld
  3c:	0f a0                	push   %fs
  3e:	50                   	push   %rax
  3f:	b8                   	.byte 0xb8

Code starting with the faulting instruction
===========================================
   0:	0f 00 2d 00 94 d5 c1 	verw   -0x3e2a6c00(%rip)        # 0xffffffffc1d59407
   7:	cf                   	iret
   8:	6a 00                	push   $0x0
   a:	68 88 6b d4 c1       	push   $0xffffffffc1d46b88
   f:	eb 00                	jmp    0x11
  11:	fc                   	cld
  12:	0f a0                	push   %fs
  14:	50                   	push   %rax
  15:	b8                   	.byte 0xb8
[   25.251494][  T669] EAX: 00000000 EBX: 000001a0 ECX: 000001a1 EDX: 00000000
[   25.252271][  T669] ESI: 00000000 EDI: 00000000 EBP: 00000000 ESP: ffa2efdc
[   25.253037][  T669] DS: 0000 ES: 0000 FS: 0000 GS: 0033 SS: 0068 EFLAGS: 00010046
[   25.253892][  T669] CR0: 80050033 CR2: b7dabd6e CR3: 2cc341c0 CR4: 000406b0
[   25.254655][  T669] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[   25.255413][  T669] DR6: fffe0ff0 DR7: 00000400
[   25.255952][  T669] Call Trace:
[ 25.256376][ T669] ? __die_body (kbuild/src/consumer/arch/x86/kernel/dumpstack.c:478 kbuild/src/consumer/arch/x86/kernel/dumpstack.c:420) 
[ 25.256907][ T669] ? die_addr (kbuild/src/consumer/arch/x86/kernel/dumpstack.c:?) 
[ 25.257411][ T669] ? exc_general_protection (kbuild/src/consumer/arch/x86/kernel/traps.c:698) 
[ 25.258067][ T669] ? __entry_text_start (??:?) 
[ 25.258691][ T669] ? irqentry_exit_to_user_mode (kbuild/src/consumer/kernel/entry/common.c:228) 


The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20240328/202403281553.79f5a16f-lkp@intel.com



-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ