lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <202404020901.da75a60f-oliver.sang@intel.com>
Date: Tue, 2 Apr 2024 10:14:07 +0800
From: kernel test robot <oliver.sang@...el.com>
To: Borislav Petkov <bp@...en8.de>
CC: <oe-lkp@...ts.linux.dev>, <lkp@...el.com>, <linux-kernel@...r.kernel.org>,
	Linus Torvalds <torvalds@...ux-foundation.org>, Ingo Molnar
	<mingo@...nel.org>, <oliver.sang@...el.com>
Subject: [linus:master] [x86/bugs]  4535e1a417:
 WARNING:at_arch/x86/kernel/alternative.c:#apply_returns



Hello,

kernel test robot noticed "WARNING:at_arch/x86/kernel/alternative.c:#apply_returns" on:

commit: 4535e1a4174c4111d92c5a9a21e542d232e0fcaa ("x86/bugs: Fix the SRSO mitigation on Zen3/4")
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master

[test failed (WARNING still exists) on linus/master 026e680b0a08a62b1d948e5a8ca78700bfac0e6e]

in testcase: boot

compiler: gcc-12
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G

(please refer to attached dmesg/kmsg for entire log/backtrace)


+-------------------------------------------------------------+------------+------------+
|                                                             | 091619baac | 4535e1a417 |
+-------------------------------------------------------------+------------+------------+
| WARNING:at_arch/x86/kernel/alternative.c:#apply_returns     | 0          | 26         |
| RIP:apply_returns                                           | 0          | 26         |
+-------------------------------------------------------------+------------+------------+


If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@...el.com>
| Closes: https://lore.kernel.org/oe-lkp/202404020901.da75a60f-oliver.sang@intel.com


[    4.454924][    T0] ------------[ cut here ]------------
[ 4.455865][ T0] missing return thunk: srso_alias_untrain_ret+0x0/0x10-0x0: eb 0e 66 66 2e 
[ 4.455900][ T0] WARNING: CPU: 0 PID: 0 at arch/x86/kernel/alternative.c:826 apply_returns (arch/x86/kernel/alternative.c:826 (discriminator 3)) 
[    4.459866][    T0] Modules linked in:
[    4.460995][    T0] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 6.9.0-rc1-00206-g4535e1a4174c #1
[    4.463858][    T0] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
[ 4.466087][ T0] RIP: 0010:apply_returns (arch/x86/kernel/alternative.c:826 (discriminator 3)) 
[ 4.467863][ T0] Code: 6c 08 00 0f 85 55 ff ff ff 49 89 e8 b9 05 00 00 00 4c 89 fa 48 89 ee 48 c7 c7 40 16 21 86 c6 05 70 35 6c 08 01 e8 b9 67 13 00 <0f> 0b e9 2d ff ff ff 48 89 ee 48 c7 c7 c0 15 21 86 89 54 24 20 e8
All code
========
   0:	6c                   	insb   (%dx),%es:(%rdi)
   1:	08 00                	or     %al,(%rax)
   3:	0f 85 55 ff ff ff    	jne    0xffffffffffffff5e
   9:	49 89 e8             	mov    %rbp,%r8
   c:	b9 05 00 00 00       	mov    $0x5,%ecx
  11:	4c 89 fa             	mov    %r15,%rdx
  14:	48 89 ee             	mov    %rbp,%rsi
  17:	48 c7 c7 40 16 21 86 	mov    $0xffffffff86211640,%rdi
  1e:	c6 05 70 35 6c 08 01 	movb   $0x1,0x86c3570(%rip)        # 0x86c3595
  25:	e8 b9 67 13 00       	call   0x1367e3
  2a:*	0f 0b                	ud2		<-- trapping instruction
  2c:	e9 2d ff ff ff       	jmp    0xffffffffffffff5e
  31:	48 89 ee             	mov    %rbp,%rsi
  34:	48 c7 c7 c0 15 21 86 	mov    $0xffffffff862115c0,%rdi
  3b:	89 54 24 20          	mov    %edx,0x20(%rsp)
  3f:	e8                   	.byte 0xe8

Code starting with the faulting instruction
===========================================
   0:	0f 0b                	ud2
   2:	e9 2d ff ff ff       	jmp    0xffffffffffffff34
   7:	48 89 ee             	mov    %rbp,%rsi
   a:	48 c7 c7 c0 15 21 86 	mov    $0xffffffff862115c0,%rdi
  11:	89 54 24 20          	mov    %edx,0x20(%rsp)
  15:	e8                   	.byte 0xe8
[    4.471957][    T0] RSP: 0000:ffffffff87c07da8 EFLAGS: 00010286
[    4.473322][    T0] RAX: dffffc0000000000 RBX: ffffffff8a7dd3d4 RCX: 1ffffffff0f99780
[    4.475864][    T0] RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffffffff87ccbc00
[    4.477470][    T0] RBP: ffffffff85f20ec0 R08: ffffffff813065f6 R09: fffffbfff0f99780
[    4.479864][    T0] R10: ffffffff87ccbc03 R11: 0000000000000001 R12: ffffffff87c07e18
[    4.483858][    T0] R13: ffffffff87c07e38 R14: dffffc0000000000 R15: 0000000000000000
[    4.485336][    T0] FS:  0000000000000000(0000) GS:ffff8883ae800000(0000) knlGS:0000000000000000
[    4.487866][    T0] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[    4.489476][    T0] CR2: ffff88843ffff000 CR3: 0000000007c2c000 CR4: 00000000000406b0
[    4.491094][    T0] Call Trace:
[    4.491866][    T0]  <TASK>
[ 4.492462][ T0] ? __warn (kernel/panic.c:694) 
[ 4.493552][ T0] ? apply_returns (arch/x86/kernel/alternative.c:826 (discriminator 3)) 
[ 4.494545][ T0] ? report_bug (lib/bug.c:180 lib/bug.c:219) 
[ 4.495483][ T0] ? handle_bug (arch/x86/kernel/traps.c:239) 
[ 4.495865][ T0] ? exc_invalid_op (arch/x86/kernel/traps.c:260 (discriminator 1)) 
[ 4.496810][ T0] ? asm_exc_invalid_op (arch/x86/include/asm/idtentry.h:621) 
[ 4.497820][ T0] ? __x86_indirect_thunk_r15 (arch/x86/lib/retpoline.S:231) 
[ 4.499863][ T0] ? this_cpu_in_panic (arch/x86/include/asm/atomic.h:23 include/linux/atomic/atomic-arch-fallback.h:457 include/linux/atomic/atomic-instrumented.h:33 kernel/printk/printk.c:359) 
[ 4.500846][ T0] ? apply_returns (arch/x86/kernel/alternative.c:826 (discriminator 3)) 
[ 4.501836][ T0] ? apply_returns (arch/x86/kernel/alternative.c:826 (discriminator 3)) 
[ 4.502811][ T0] ? reacquire_held_locks (kernel/locking/lockdep.c:5405) 
[ 4.503861][ T0] ? lock_sync (kernel/locking/lockdep.c:5722) 
[ 4.504758][ T0] ? apply_retpolines (arch/x86/kernel/alternative.c:804) 
[ 4.506093][ T0] ? unregister_die_notifier (kernel/notifier.c:203 kernel/notifier.c:608) 
[ 4.507869][ T0] ? __x86_indirect_thunk_r15 (arch/x86/lib/retpoline.S:231) 
[ 4.509312][ T0] ? srso_alias_untrain_ret (arch/x86/lib/retpoline.S:231) 
[ 4.510384][ T0] ? srso_alias_untrain_ret (arch/x86/lib/retpoline.S:231) 
[ 4.511446][ T0] ? int3_selftest_ip (arch/x86/kernel/alternative.c:1610 (discriminator 2)) 
[ 4.511865][ T0] ? debug_alt (arch/x86/kernel/alternative.c:1610) 
[ 4.513050][ T0] alternative_instructions (arch/x86/kernel/alternative.c:1705) 
[ 4.514165][ T0] arch_cpu_finalize_init (arch/x86/kernel/cpu/common.c:2368) 
[ 4.515869][ T0] start_kernel (init/main.c:1042) 
[ 4.517000][ T0] x86_64_start_reservations (arch/x86/kernel/head64.c:495) 
[ 4.518085][ T0] x86_64_start_kernel (??:?) 
[ 4.520060][ T0] common_startup_64 (arch/x86/kernel/head_64.S:421) 
[    4.521097][    T0]  </TASK>
[    4.521858][    T0] irq event stamp: 197308
[ 4.522913][ T0] hardirqs last enabled at (197316): console_unlock (arch/x86/include/asm/irqflags.h:26 arch/x86/include/asm/irqflags.h:67 arch/x86/include/asm/irqflags.h:127 kernel/printk/printk.c:341 kernel/printk/printk.c:2731 kernel/printk/printk.c:3050) 
[ 4.523863][ T0] hardirqs last disabled at (197333): console_unlock (kernel/printk/printk.c:339 kernel/printk/printk.c:2731 kernel/printk/printk.c:3050) 
[ 4.525769][ T0] softirqs last enabled at (197331): __do_softirq (arch/x86/include/asm/preempt.h:26 kernel/softirq.c:401 kernel/softirq.c:583) 
[ 4.527861][ T0] softirqs last disabled at (197350): irq_exit_rcu (kernel/softirq.c:428 kernel/softirq.c:633 kernel/softirq.c:645) 
[    4.531857][    T0] ---[ end trace 0000000000000000 ]---



The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20240402/202404020901.da75a60f-oliver.sang@intel.com



-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ