lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:   Thu, 11 Aug 2022 10:36:14 +0800
From:   kernel test robot <oliver.sang@...el.com>
To:     Marek Majkowski <marek@...udflare.com>
CC:     0day robot <lkp@...el.com>, LKML <linux-kernel@...r.kernel.org>,
        <netdev@...r.kernel.org>, <lkp@...ts.01.org>,
        <bpf@...r.kernel.org>, <kernel-team@...udflare.com>,
        <ivan@...udflare.com>, <edumazet@...gle.com>,
        <davem@...emloft.net>, <kuba@...nel.org>, <pabeni@...hat.com>,
        <ast@...nel.org>, <daniel@...earbox.net>, <andrii@...nel.org>,
        <brakmo@...com>, Marek Majkowski <marek@...udflare.com>
Subject: b75edfb063: divide_error:#[##]



Greeting,

FYI, we noticed the following commit (built with gcc-11):

commit: b75edfb0639efd402dece99ee19470ba7d9222c1 ("[PATCH net-next v2 1/2] RTAX_INITRWND should be able to set the rcv_ssthresh above 64KiB")
url: https://github.com/intel-lab-lkp/linux/commits/Marek-Majkowski/RTAX_INITRWND-should-be-able-to-bring-the-rcv_ssthresh-above-64KiB/20220729-224048
base: https://git.kernel.org/cgit/linux/kernel/git/davem/net-next.git 6957730e20389a63eb333afb6fcf38b45f549ea8
patch link: https://lore.kernel.org/netdev/20220729143935.2432743-2-marek@cloudflare.com

in testcase: nvml
version: nvml-x86_64-3de7d358f-1_20211217
with following parameters:

	test: pmem
	group: pmemspoil
	nr_pmem: 1
	fs: ext4
	mount_option: dax
	bp_memmap: 32G!4G
	ucode: 0x700001c



on test machine: 16 threads 1 sockets Intel(R) Xeon(R) CPU D-1541 @ 2.10GHz with 48G memory

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):



If you fix the issue, kindly add following tag
Reported-by: kernel test robot <oliver.sang@...el.com>


[  167.002883][  T446]
[  185.985422][  T446] clang -MD -c -o ../nondebug/core/fs_posix.o -std=gnu99 -Wall -Werror -Wmissing-prototypes -Wpointer-arith -Wsign-conversion -Wsign-compare -Wunused-parameter -Wconversion -Wunused-macros -Wmissing-field-initializers -Wunreachable-code-return -Wmissing-variable-declarations -Wfloat-equal -Wswitch-default -O2 -U_FORTIFY_SOURCE -D_FORTIFY_SOURCE=2 -std=gnu99 -fno-common -pthread -DSRCVERSION="1.11.0+git148.gfe27e1033" -fno-lto -DSDS_ENABLED -DNDCTL_ENABLED=1 -DPAGE_SIZE=4096 -DUSE_VALGRIND -Wno-error  -I../include -I../common/ -I../core/  -fPIC  fs_posix.c
[  185.985438][  T446]
[  205.137489][  T446] clang -MD -c -o ../nondebug/common/ctl_prefault.o -std=gnu99 -Wall -Werror -Wmissing-prototypes -Wpointer-arith -Wsign-conversion -Wsign-compare -Wunused-parameter -Wconversion -Wunused-macros -Wmissing-field-initializers -Wunreachable-code-return -Wmissing-variable-declarations -Wfloat-equal -Wswitch-default -O2 -U_FORTIFY_SOURCE -D_FORTIFY_SOURCE=2 -std=gnu99 -fno-common -pthread -DSRCVERSION="1.11.0+git148.gfe27e1033" -fno-lto -DSDS_ENABLED -DNDCTL_ENABLED=1 -DPAGE_SIZE=4096 -DUSE_VALGRIND -Wno-error  -I/usr/local/include -DUSE_LIBDL -I../include -I../common/ -I../core/  -fPIC  ctl_prefault.c
[  205.137505][  T446]
[  217.005256][ T6783] divide error: 0000 [#1] SMP KASAN PTI
[  217.012321][ T6783] CPU: 6 PID: 6783 Comm: sshd Not tainted 5.19.0-rc8-01990-gb75edfb0639e #1
[  217.022407][ T6783] Hardware name: Supermicro SYS-5018D-FN4T/X10SDV-8C-TLN4F, BIOS 1.1 03/02/2016
[ 217.032861][ T6783] RIP: 0010:tcp_rcv_space_adjust (kbuild/src/consumer/net/ipv4/tcp_input.c:740) 
[ 217.040305][ T6783] Code: b7 ab 08 06 00 00 31 d2 4c 8b 1c 24 89 ef 49 c1 eb 03 81 c5 80 03 00 00 c1 e7 04 48 63 ff 48 01 c7 44 89 c0 29 c8 48 0f af c7 <48> f7 f1 4c 89 d2 48 c1 ea 03 48 8d 04 47 48 89 44 24 08 48 b8 00
All code
========
   0:	b7 ab                	mov    $0xab,%bh
   2:	08 06                	or     %al,(%rsi)
   4:	00 00                	add    %al,(%rax)
   6:	31 d2                	xor    %edx,%edx
   8:	4c 8b 1c 24          	mov    (%rsp),%r11
   c:	89 ef                	mov    %ebp,%edi
   e:	49 c1 eb 03          	shr    $0x3,%r11
  12:	81 c5 80 03 00 00    	add    $0x380,%ebp
  18:	c1 e7 04             	shl    $0x4,%edi
  1b:	48 63 ff             	movslq %edi,%rdi
  1e:	48 01 c7             	add    %rax,%rdi
  21:	44 89 c0             	mov    %r8d,%eax
  24:	29 c8                	sub    %ecx,%eax
  26:	48 0f af c7          	imul   %rdi,%rax
  2a:*	48 f7 f1             	div    %rcx		<-- trapping instruction
  2d:	4c 89 d2             	mov    %r10,%rdx
  30:	48 c1 ea 03          	shr    $0x3,%rdx
  34:	48 8d 04 47          	lea    (%rdi,%rax,2),%rax
  38:	48 89 44 24 08       	mov    %rax,0x8(%rsp)
  3d:	48                   	rex.W
  3e:	b8                   	.byte 0xb8
	...

Code starting with the faulting instruction
===========================================
   0:	48 f7 f1             	div    %rcx
   3:	4c 89 d2             	mov    %r10,%rdx
   6:	48 c1 ea 03          	shr    $0x3,%rdx
   a:	48 8d 04 47          	lea    (%rdi,%rax,2),%rax
   e:	48 89 44 24 08       	mov    %rax,0x8(%rsp)
  13:	48                   	rex.W
  14:	b8                   	.byte 0xb8
	...
[  217.063062][ T6783] RSP: 0018:ffffc9000ee37880 EFLAGS: 00010206
[  217.070673][ T6783] RAX: 0000001248c44d42 RBX: ffff88892254ca00 RCX: 0000000000000000
[  217.080170][ T6783] RDX: 0000000000000000 RSI: ffffffff8614b880 RDI: 000000000012044a
[  217.089643][ T6783] RBP: 000000000001034b R08: 00000000000103cd R09: ffff88892254d248
[  217.099133][ T6783] R10: ffff88892254ca30 R11: 1ffff111244a9a01 R12: ffff88892254d250
[  217.108597][ T6783] R13: ffff88892254d24c R14: ffff88892254d038 R15: ffff88892254cf74
[  217.118095][ T6783] FS:  00007f1977fefe40(0000) GS:ffff888bb7500000(0000) knlGS:0000000000000000
[  217.128557][ T6783] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  217.136676][ T6783] CR2: 000055db10ef5000 CR3: 0000000a41d5e006 CR4: 00000000003706e0
[  217.146176][ T6783] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  217.155630][ T6783] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  217.165095][ T6783] Call Trace:
[  217.169853][ T6783]  <TASK>
[ 217.174282][ T6783] ? skb_copy_datagram_iter (kbuild/src/consumer/net/core/datagram.c:527) 
[ 217.181181][ T6783] tcp_recvmsg_locked (kbuild/src/consumer/net/ipv4/tcp.c:2608) 
[ 217.187708][ T6783] ? tcp_update_recv_tstamps (kbuild/src/consumer/net/ipv4/tcp.c:2420) 
[ 217.194794][ T6783] ? _raw_spin_lock_bh (kbuild/src/consumer/arch/x86/include/asm/atomic.h:202 kbuild/src/consumer/include/linux/atomic/atomic-instrumented.h:543 kbuild/src/consumer/include/asm-generic/qspinlock.h:111 kbuild/src/consumer/include/linux/spinlock.h:185 kbuild/src/consumer/include/linux/spinlock_api_smp.h:127 kbuild/src/consumer/kernel/locking/spinlock.c:178) 


To reproduce:

        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        sudo bin/lkp install job.yaml           # job file is attached in this email
        bin/lkp split-job --compatible job.yaml # generate the yaml file for lkp run
        sudo bin/lkp run generated-yaml-file

        # if come across any failure that blocks the test,
        # please remove ~/.lkp and /lkp dir to run from a clean state.



-- 
0-DAY CI Kernel Test Service
https://01.org/lkp



View attachment "config-5.19.0-rc8-01990-gb75edfb0639e" of type "text/plain" (167754 bytes)

View attachment "job-script" of type "text/plain" (6018 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (31956 bytes)

View attachment "nvml" of type "text/plain" (138011 bytes)

View attachment "job.yaml" of type "text/plain" (4932 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ