lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <202408121253.8a1d34f7-lkp@intel.com>
Date: Mon, 12 Aug 2024 13:06:55 +0800
From: kernel test robot <oliver.sang@...el.com>
To: Peter Zijlstra <peterz@...radead.org>
CC: <oe-lkp@...ts.linux.dev>, <lkp@...el.com>, <linux-kernel@...r.kernel.org>,
	<oliver.sang@...el.com>
Subject: [linus:master] [x86/mm]  3db03fb499:
 WARNING:at_arch/x86/mm/pti.c:#pti_clone_pgtable



Hello,

kernel test robot noticed "WARNING:at_arch/x86/mm/pti.c:#pti_clone_pgtable" on:

commit: 3db03fb4995ef85fc41e86262ead7b4852f4bcf0 ("x86/mm: Fix pti_clone_entry_text() for i386")
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master

[test failed on linus/master      b446a2dae984fa5bd56dd7c3a02a426f87e05813]
[test failed on linux-next/master 1e391b34f6aa043c7afa40a2103163a0ef06d179]

in testcase: boot

compiler: gcc-12
test machine: qemu-system-i386 -enable-kvm -cpu SandyBridge -smp 2 -m 4G

(please refer to attached dmesg/kmsg for entire log/backtrace)


+-------------------------------------------------+------------+------------+
|                                                 | 41e71dbb0e | 3db03fb499 |
+-------------------------------------------------+------------+------------+
| WARNING:at_arch/x86/mm/pti.c:#pti_clone_pgtable | 0          | 12         |
| EIP:pti_clone_pgtable                           | 0          | 12         |
+-------------------------------------------------+------------+------------+


If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@...el.com>
| Closes: https://lore.kernel.org/oe-lkp/202408121253.8a1d34f7-lkp@intel.com


[   11.814894][    T1] ------------[ cut here ]------------
[ 11.815370][ T1] WARNING: CPU: 1 PID: 1 at arch/x86/mm/pti.c:256 pti_clone_pgtable (arch/x86/mm/pti.c:256 arch/x86/mm/pti.c:393) 
[   11.816203][    T1] Modules linked in:
[   11.816557][    T1] CPU: 1 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.11.0-rc1-00006-g3db03fb4995e #1 77da0921d99dee185d449e76648f3c514bb36724
[ 11.817684][ T1] EIP: pti_clone_pgtable (arch/x86/mm/pti.c:256 arch/x86/mm/pti.c:393) 
[ 11.818151][ T1] Code: 00 00 00 8b 10 b8 00 00 e0 ff 89 d1 81 e1 80 00 00 00 83 c9 00 75 05 b8 00 f0 ff ff f7 d0 21 d0 25 80 00 00 00 83 c8 00 74 04 <0f> 0b eb 71 83 e2 9f 83 ca 00 75 30 31 d2 b8 c0 0d 00 00 e8 3d b5
All code
========
   0:	00 00                	add    %al,(%rax)
   2:	00 8b 10 b8 00 00    	add    %cl,0xb810(%rbx)
   8:	e0 ff                	loopne 0x9
   a:	89 d1                	mov    %edx,%ecx
   c:	81 e1 80 00 00 00    	and    $0x80,%ecx
  12:	83 c9 00             	or     $0x0,%ecx
  15:	75 05                	jne    0x1c
  17:	b8 00 f0 ff ff       	mov    $0xfffff000,%eax
  1c:	f7 d0                	not    %eax
  1e:	21 d0                	and    %edx,%eax
  20:	25 80 00 00 00       	and    $0x80,%eax
  25:	83 c8 00             	or     $0x0,%eax
  28:	74 04                	je     0x2e
  2a:*	0f 0b                	ud2		<-- trapping instruction
  2c:	eb 71                	jmp    0x9f
  2e:	83 e2 9f             	and    $0xffffff9f,%edx
  31:	83 ca 00             	or     $0x0,%edx
  34:	75 30                	jne    0x66
  36:	31 d2                	xor    %edx,%edx
  38:	b8 c0 0d 00 00       	mov    $0xdc0,%eax
  3d:	e8                   	.byte 0xe8
  3e:	3d                   	.byte 0x3d
  3f:	b5                   	.byte 0xb5

Code starting with the faulting instruction
===========================================
   0:	0f 0b                	ud2
   2:	eb 71                	jmp    0x75
   4:	83 e2 9f             	and    $0xffffff9f,%edx
   7:	83 ca 00             	or     $0x0,%edx
   a:	75 30                	jne    0x3c
   c:	31 d2                	xor    %edx,%edx
   e:	b8 c0 0d 00 00       	mov    $0xdc0,%eax
  13:	e8                   	.byte 0xe8
  14:	3d                   	.byte 0x3d
  15:	b5                   	.byte 0xb5
[   11.819851][    T1] EAX: 00000080 EBX: d9e26618 ECX: 00000080 EDX: 186001e3
[   11.820470][    T1] ESI: c1014618 EDI: ed116398 EBP: c110df74 ESP: c110df48
[   11.821083][    T1] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00010202
[   11.821767][    T1] CR0: 80050033 CR2: 00000000 CR3: 19e2a000 CR4: 000406f0
[   11.822373][    T1] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[   11.823030][    T1] DR6: fffe0ff0 DR7: 00000400
[   11.823441][    T1] Call Trace:
[ 11.823770][ T1] ? show_regs (arch/x86/kernel/dumpstack.c:479 arch/x86/kernel/dumpstack.c:465) 
[ 11.824143][ T1] ? pti_clone_pgtable (arch/x86/mm/pti.c:256 arch/x86/mm/pti.c:393) 
[ 11.824588][ T1] ? __warn (kernel/panic.c:735) 
[ 11.824933][ T1] ? report_bug (lib/bug.c:201 lib/bug.c:219) 
[ 11.825321][ T1] ? pti_clone_pgtable (arch/x86/mm/pti.c:256 arch/x86/mm/pti.c:393) 
[ 11.825759][ T1] ? exc_overflow (arch/x86/kernel/traps.c:252) 
[ 11.826183][ T1] ? handle_bug (arch/x86/kernel/traps.c:239) 
[ 11.826563][ T1] ? exc_invalid_op (arch/x86/kernel/traps.c:260 (discriminator 1)) 
[ 11.826970][ T1] ? handle_exception (arch/x86/entry/entry_32.S:1047) 
[ 11.827415][ T1] ? _raw_write_trylock (include/linux/rwlock_api_smp.h:136 kernel/locking/spinlock.c:292) 
[ 11.827844][ T1] ? exc_overflow (arch/x86/kernel/traps.c:252) 
[ 11.828123][ T1] ? pti_clone_pgtable (arch/x86/mm/pti.c:256 arch/x86/mm/pti.c:393) 
[ 11.828434][ T1] ? _raw_write_trylock (include/linux/rwlock_api_smp.h:136 kernel/locking/spinlock.c:292) 
[ 11.828723][ T1] ? exc_overflow (arch/x86/kernel/traps.c:252) 
[ 11.828984][ T1] ? pti_clone_pgtable (arch/x86/mm/pti.c:256 arch/x86/mm/pti.c:393) 
[ 11.829283][ T1] ? __SCT__tp_func_ma_write (??:?) 
[ 11.829613][ T1] ? __SCT__tp_func_ma_write (??:?) 
[ 11.829916][ T1] ? rest_init (init/main.c:1459) 
[ 11.830179][ T1] pti_finalize (arch/x86/mm/pti.c:524 arch/x86/mm/pti.c:564 arch/x86/mm/pti.c:663) 
[ 11.830418][ T1] kernel_init (init/main.c:1485) 
[ 11.830653][ T1] ret_from_fork (arch/x86/kernel/process.c:153) 
[ 11.830899][ T1] ? rest_init (init/main.c:1459) 
[ 11.831144][ T1] ret_from_fork_asm (arch/x86/entry/entry_32.S:737) 
[ 11.831408][ T1] entry_INT80_32 (arch/x86/entry/entry_32.S:944) 
[   11.832355][    T1] irq event stamp: 830689
[ 11.832597][ T1] hardirqs last enabled at (830697): console_unlock (arch/x86/include/asm/irqflags.h:26 arch/x86/include/asm/irqflags.h:87 arch/x86/include/asm/irqflags.h:147 kernel/printk/printk.c:341 kernel/printk/printk.c:2801 kernel/printk/printk.c:3120) 
[ 11.833089][ T1] hardirqs last disabled at (830706): console_unlock (kernel/printk/printk.c:339 kernel/printk/printk.c:2801 kernel/printk/printk.c:3120) 
[ 11.833556][ T1] softirqs last enabled at (830318): handle_softirqs (kernel/softirq.c:401 kernel/softirq.c:582) 
[ 11.834022][ T1] softirqs last disabled at (830303): __do_softirq (kernel/softirq.c:589) 
[   11.834455][    T1] ---[ end trace 0000000000000000 ]---


The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20240812/202408121253.8a1d34f7-lkp@intel.com



-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ