[<prev] [next>] [day] [month] [year] [list]
Message-ID: <202408121253.8a1d34f7-lkp@intel.com>
Date: Mon, 12 Aug 2024 13:06:55 +0800
From: kernel test robot <oliver.sang@...el.com>
To: Peter Zijlstra <peterz@...radead.org>
CC: <oe-lkp@...ts.linux.dev>, <lkp@...el.com>, <linux-kernel@...r.kernel.org>,
<oliver.sang@...el.com>
Subject: [linus:master] [x86/mm] 3db03fb499:
WARNING:at_arch/x86/mm/pti.c:#pti_clone_pgtable
Hello,
kernel test robot noticed "WARNING:at_arch/x86/mm/pti.c:#pti_clone_pgtable" on:
commit: 3db03fb4995ef85fc41e86262ead7b4852f4bcf0 ("x86/mm: Fix pti_clone_entry_text() for i386")
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master
[test failed on linus/master b446a2dae984fa5bd56dd7c3a02a426f87e05813]
[test failed on linux-next/master 1e391b34f6aa043c7afa40a2103163a0ef06d179]
in testcase: boot
compiler: gcc-12
test machine: qemu-system-i386 -enable-kvm -cpu SandyBridge -smp 2 -m 4G
(please refer to attached dmesg/kmsg for entire log/backtrace)
+-------------------------------------------------+------------+------------+
| | 41e71dbb0e | 3db03fb499 |
+-------------------------------------------------+------------+------------+
| WARNING:at_arch/x86/mm/pti.c:#pti_clone_pgtable | 0 | 12 |
| EIP:pti_clone_pgtable | 0 | 12 |
+-------------------------------------------------+------------+------------+
If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@...el.com>
| Closes: https://lore.kernel.org/oe-lkp/202408121253.8a1d34f7-lkp@intel.com
[ 11.814894][ T1] ------------[ cut here ]------------
[ 11.815370][ T1] WARNING: CPU: 1 PID: 1 at arch/x86/mm/pti.c:256 pti_clone_pgtable (arch/x86/mm/pti.c:256 arch/x86/mm/pti.c:393)
[ 11.816203][ T1] Modules linked in:
[ 11.816557][ T1] CPU: 1 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.11.0-rc1-00006-g3db03fb4995e #1 77da0921d99dee185d449e76648f3c514bb36724
[ 11.817684][ T1] EIP: pti_clone_pgtable (arch/x86/mm/pti.c:256 arch/x86/mm/pti.c:393)
[ 11.818151][ T1] Code: 00 00 00 8b 10 b8 00 00 e0 ff 89 d1 81 e1 80 00 00 00 83 c9 00 75 05 b8 00 f0 ff ff f7 d0 21 d0 25 80 00 00 00 83 c8 00 74 04 <0f> 0b eb 71 83 e2 9f 83 ca 00 75 30 31 d2 b8 c0 0d 00 00 e8 3d b5
All code
========
0: 00 00 add %al,(%rax)
2: 00 8b 10 b8 00 00 add %cl,0xb810(%rbx)
8: e0 ff loopne 0x9
a: 89 d1 mov %edx,%ecx
c: 81 e1 80 00 00 00 and $0x80,%ecx
12: 83 c9 00 or $0x0,%ecx
15: 75 05 jne 0x1c
17: b8 00 f0 ff ff mov $0xfffff000,%eax
1c: f7 d0 not %eax
1e: 21 d0 and %edx,%eax
20: 25 80 00 00 00 and $0x80,%eax
25: 83 c8 00 or $0x0,%eax
28: 74 04 je 0x2e
2a:* 0f 0b ud2 <-- trapping instruction
2c: eb 71 jmp 0x9f
2e: 83 e2 9f and $0xffffff9f,%edx
31: 83 ca 00 or $0x0,%edx
34: 75 30 jne 0x66
36: 31 d2 xor %edx,%edx
38: b8 c0 0d 00 00 mov $0xdc0,%eax
3d: e8 .byte 0xe8
3e: 3d .byte 0x3d
3f: b5 .byte 0xb5
Code starting with the faulting instruction
===========================================
0: 0f 0b ud2
2: eb 71 jmp 0x75
4: 83 e2 9f and $0xffffff9f,%edx
7: 83 ca 00 or $0x0,%edx
a: 75 30 jne 0x3c
c: 31 d2 xor %edx,%edx
e: b8 c0 0d 00 00 mov $0xdc0,%eax
13: e8 .byte 0xe8
14: 3d .byte 0x3d
15: b5 .byte 0xb5
[ 11.819851][ T1] EAX: 00000080 EBX: d9e26618 ECX: 00000080 EDX: 186001e3
[ 11.820470][ T1] ESI: c1014618 EDI: ed116398 EBP: c110df74 ESP: c110df48
[ 11.821083][ T1] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00010202
[ 11.821767][ T1] CR0: 80050033 CR2: 00000000 CR3: 19e2a000 CR4: 000406f0
[ 11.822373][ T1] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[ 11.823030][ T1] DR6: fffe0ff0 DR7: 00000400
[ 11.823441][ T1] Call Trace:
[ 11.823770][ T1] ? show_regs (arch/x86/kernel/dumpstack.c:479 arch/x86/kernel/dumpstack.c:465)
[ 11.824143][ T1] ? pti_clone_pgtable (arch/x86/mm/pti.c:256 arch/x86/mm/pti.c:393)
[ 11.824588][ T1] ? __warn (kernel/panic.c:735)
[ 11.824933][ T1] ? report_bug (lib/bug.c:201 lib/bug.c:219)
[ 11.825321][ T1] ? pti_clone_pgtable (arch/x86/mm/pti.c:256 arch/x86/mm/pti.c:393)
[ 11.825759][ T1] ? exc_overflow (arch/x86/kernel/traps.c:252)
[ 11.826183][ T1] ? handle_bug (arch/x86/kernel/traps.c:239)
[ 11.826563][ T1] ? exc_invalid_op (arch/x86/kernel/traps.c:260 (discriminator 1))
[ 11.826970][ T1] ? handle_exception (arch/x86/entry/entry_32.S:1047)
[ 11.827415][ T1] ? _raw_write_trylock (include/linux/rwlock_api_smp.h:136 kernel/locking/spinlock.c:292)
[ 11.827844][ T1] ? exc_overflow (arch/x86/kernel/traps.c:252)
[ 11.828123][ T1] ? pti_clone_pgtable (arch/x86/mm/pti.c:256 arch/x86/mm/pti.c:393)
[ 11.828434][ T1] ? _raw_write_trylock (include/linux/rwlock_api_smp.h:136 kernel/locking/spinlock.c:292)
[ 11.828723][ T1] ? exc_overflow (arch/x86/kernel/traps.c:252)
[ 11.828984][ T1] ? pti_clone_pgtable (arch/x86/mm/pti.c:256 arch/x86/mm/pti.c:393)
[ 11.829283][ T1] ? __SCT__tp_func_ma_write (??:?)
[ 11.829613][ T1] ? __SCT__tp_func_ma_write (??:?)
[ 11.829916][ T1] ? rest_init (init/main.c:1459)
[ 11.830179][ T1] pti_finalize (arch/x86/mm/pti.c:524 arch/x86/mm/pti.c:564 arch/x86/mm/pti.c:663)
[ 11.830418][ T1] kernel_init (init/main.c:1485)
[ 11.830653][ T1] ret_from_fork (arch/x86/kernel/process.c:153)
[ 11.830899][ T1] ? rest_init (init/main.c:1459)
[ 11.831144][ T1] ret_from_fork_asm (arch/x86/entry/entry_32.S:737)
[ 11.831408][ T1] entry_INT80_32 (arch/x86/entry/entry_32.S:944)
[ 11.832355][ T1] irq event stamp: 830689
[ 11.832597][ T1] hardirqs last enabled at (830697): console_unlock (arch/x86/include/asm/irqflags.h:26 arch/x86/include/asm/irqflags.h:87 arch/x86/include/asm/irqflags.h:147 kernel/printk/printk.c:341 kernel/printk/printk.c:2801 kernel/printk/printk.c:3120)
[ 11.833089][ T1] hardirqs last disabled at (830706): console_unlock (kernel/printk/printk.c:339 kernel/printk/printk.c:2801 kernel/printk/printk.c:3120)
[ 11.833556][ T1] softirqs last enabled at (830318): handle_softirqs (kernel/softirq.c:401 kernel/softirq.c:582)
[ 11.834022][ T1] softirqs last disabled at (830303): __do_softirq (kernel/softirq.c:589)
[ 11.834455][ T1] ---[ end trace 0000000000000000 ]---
The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20240812/202408121253.8a1d34f7-lkp@intel.com
--
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki
Powered by blists - more mailing lists