lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <05d7e0d6-d96a-404c-b872-d5501c475780@linux.vnet.ibm.com>
Date: Sun, 16 Feb 2025 23:05:06 +0530
From: Venkat Rao Bagalkote <venkat88@...ux.vnet.ibm.com>
To: linuxppc-dev@...ts.ozlabs.org, linux-kernel@...r.kernel.org,
        Michael Ellerman <mpe@...erman.id.au>, sfr@...b.auug.org.au,
        neilb@...e.de, brauner@...nel.org
Subject: [linux-next-20250214]Kernel OOPs while running LTP test readahead02
 on 6.14.0-rc2-next-20250214

Greetings!!!


I am observing kernel oops on IBM Power system while running LTP test 
readahead02 on 6.14.0-rc2-next-20250214 kernel.


By Reverting the below patch, issue is not seen.

     Revert "VFS: add common error checks to lookup_one_qstr_excl()"

     This reverts commit 22d9d5e93d0eaf7e8662602713b24e9b6171759f


Please help to fix this issue and request to add the below tag.

Reported-by: Venkat Rao Bagalkote <venkat88@...ux.vnet.ibm.com>


Traces:

[ 2154.427377] BUG: Unable to handle kernel data access at 
0xffffffffffffffdc
[ 2154.427390] Faulting instruction address: 0xc00000000062a560
[ 2154.427397] Oops: Kernel access of bad area, sig: 11 [#1]
[ 2154.427402] LE PAGE_SIZE=64K MMU=Hash SMP NR_CPUS=8192 NUMA pSeries
[ 2154.427410] Modules linked in: dns_resolver(E) tun(E) brd(E) 
overlay(E) exfat(E) vfat(E) fat(E) loop(E) sctp(E) ip6_udp_tunnel(E) 
udp_tunnel(E) ext4(E) mbcache(E) jbd2(E) dm_mod(E) bonding(E) tls(E) 
nft_fib_inet(E) nft_fib_ipv4(E) nft_fib_ipv6(E) nft_fib(E) 
nft_reject_inet(E) nf_reject_ipv4(E) nf_reject_ipv6(E) nft_reject(E) 
nft_ct(E) nft_chain_nat(E) nf_nat(E) nf_conntrack(E) nf_defrag_ipv6(E) 
nf_defrag_ipv4(E) ip_set(E) rfkill(E) nf_tables(E) nfnetlink(E) hvcs(E) 
pseries_rng(E) hvcserver(E) vmx_crypto(E) drm(E) 
drm_panel_orientation_quirks(E) xfs(E) sr_mod(E) cdrom(E) sd_mod(E) 
lpfc(E) sg(E) nvmet_fc(E) nvmet(E) ibmvscsi(E) scsi_transport_srp(E) 
ibmveth(E) nvme_fc(E) nvme_fabrics(E) bnx2x(E) nvme_core(E) be2net(E) 
mdio(E) scsi_transport_fc(E) fuse(E) [last unloaded: hwpoison_inject(E)]
[ 2154.427514] CPU: 30 UID: 0 PID: 784383 Comm: rename10 Tainted: 
G           OE      6.14.0-rc2-next-20250214 #1
[ 2154.427524] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
[ 2154.427528] Hardware name: IBM,8375-42A POWER9 (architected) 0x4e0202 
0xf000005 of:IBM,FW950.80 (VL950_131) hv:phyp pSeries
[ 2154.427534] NIP:  c00000000062a560 LR: c00000000062a618 CTR: 
c00800000dbb4a10
[ 2154.427540] REGS: c00000054af579b0 TRAP: 0380   Tainted: G           
OE       (6.14.0-rc2-next-20250214)
[ 2154.427547] MSR:  8000000000009033 <SF,EE,ME,IR,DR,RI,LE>  CR: 
2802222f  XER: 20040000
[ 2154.427561] CFAR: c00000000062a61c IRQMASK: 0
[ 2154.427561] GPR00: c00000000062a618 c00000054af57c50 c000000001677600 
0000000000000000
[ 2154.427561] GPR04: c0000003c48560b0 00000000000a0000 0000000000000000 
c000000002cfaa88
[ 2154.427561] GPR08: 0000000000002710 0000000000000000 0000000000000000 
6161616161616161
[ 2154.427561] GPR12: c00800000dbb4a10 c00000000f75af00 0000000000000000 
0000000000000000
[ 2154.427561] GPR16: 0000000000000000 00000000000a0000 0000000000000000 
0000000000000000
[ 2154.427561] GPR20: 0000000000100000 0000000000000002 00000000000a0000 
0000000000000000
[ 2154.427561] GPR24: fffffffffffff000 ffffffffffffff9c ffffffffffffff9c 
c0000005488e1c28
[ 2154.427561] GPR28: c00000054af57d08 c0000005484eae00 00000000000a0000 
ffffffffffffffdc
[ 2154.427627] NIP [c00000000062a560] lookup_one_qstr_excl+0x50/0x148
[ 2154.427639] LR [c00000000062a618] lookup_one_qstr_excl+0x108/0x148
[ 2154.427646] Call Trace:
[ 2154.427649] [c00000054af57c50] [c00000000062a618] 
lookup_one_qstr_excl+0x108/0x148 (unreliable)
[ 2154.427659] [c00000054af57ca0] [c00000000063510c] 
do_renameat2+0x360/0x63c
[ 2154.427666] [c00000054af57de0] [c000000000635570] sys_rename+0x5c/0x74
[ 2154.427672] [c00000054af57e10] [c000000000033638] 
system_call_exception+0x138/0x330
[ 2154.427681] [c00000054af57e50] [c00000000000d05c] 
system_call_vectored_common+0x15c/0x2ec
[ 2154.427690] --- interrupt: 3000 at 0x7fffa1580804
[ 2154.427697] NIP:  00007fffa1580804 LR: 00007fffa1580804 CTR: 
0000000000000000
[ 2154.427702] REGS: c00000054af57e80 TRAP: 3000   Tainted: G           
OE       (6.14.0-rc2-next-20250214)
[ 2154.427708] MSR:  800000000280f033 
<SF,VEC,VSX,EE,PR,FP,ME,IR,DR,RI,LE>  CR: 44002228  XER: 00000000
[ 2154.427725] IRQMASK: 0
[ 2154.427725] GPR00: 0000000000000026 00007ffff0fb00d0 00007fffa1757200 
000000001002df18
[ 2154.427725] GPR04: 0000000010051698 0000000000000047 0000000000000000 
0000000000000000
[ 2154.427725] GPR08: 0000000010012b3c 0000000000000000 0000000000000000 
0000000000000000
[ 2154.427725] GPR12: 0000000000000000 00007fffa181a560 0000000000000000 
0000000010032300
[ 2154.427725] GPR16: 0000000010032a70 0000000010033100 0000000010033104 
0000000010032a98
[ 2154.427725] GPR20: 00000000100328c8 0000000010032f70 0000000010031a00 
0000000000000000
[ 2154.427725] GPR24: 0000000010052830 0000000010053cac 0000000010054544 
0000000010050690
[ 2154.427725] GPR28: 0000000010053cb0 0000000000000000 000000001002df48 
00007fffa1813570
[ 2154.427786] NIP [00007fffa1580804] 0x7fffa1580804
[ 2154.427790] LR [00007fffa1580804] 0x7fffa1580804
[ 2154.427794] --- interrupt: 3000
[ 2154.427798] Code: fbc1fff0 fbe1fff8 7c9d2378 7c7c1b78 7cbe2b78 
f8010010 f821ffb1 f8410018 4bfffee9 eb7d0030 7c7f1b79 41820064 
<813f0000> 75290038 40820038 77de0002
[ 2154.427820] ---[ end trace 0000000000000000 ]---
[ 2154.591618] pstore: backend (nvram) writing error (-1)


Regards,

Venkat.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ