lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <202411122234.64f169e3-oliver.sang@intel.com>
Date: Tue, 12 Nov 2024 22:58:13 +0800
From: kernel test robot <oliver.sang@...el.com>
To: Daniel Golle <daniel@...rotopia.org>
CC: <oe-lkp@...ts.linux.dev>, <lkp@...el.com>, Paolo Abeni
	<pabeni@...hat.com>, Andrew Lunn <andrew@...n.ch>, <netdev@...r.kernel.org>,
	<oliver.sang@...el.com>
Subject: [linux-next:master] [net]  1758af47b9:
 WARNING:at_arch/x86/kernel/cpu/bugs.c:#__warn_thunk



Hello,

kernel test robot noticed "WARNING:at_arch/x86/kernel/cpu/bugs.c:#__warn_thunk" on:

commit: 1758af47b98c17da464cb45f476875150955dd48 ("net: phy: intel-xway: add support for PHY LEDs")
https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git master

[test failed on linux-next/master 74741a050b79d31d8d2eeee12c77736596d0a6b2]

in testcase: boot

config: x86_64-randconfig-076-20241107
compiler: clang-19
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G

(please refer to attached dmesg/kmsg for entire log/backtrace)


+------------------------------------------------------------------------------+------------+------------+
|                                                                              | eb89c79c1b | 1758af47b9 |
+------------------------------------------------------------------------------+------------+------------+
| WARNING:at_arch/x86/kernel/cpu/bugs.c:#__warn_thunk                          | 0          | 24         |
| RIP:__warn_thunk                                                             | 0          | 24         |
+------------------------------------------------------------------------------+------------+------------+


If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@...el.com>
| Closes: https://lore.kernel.org/oe-lkp/202411122234.64f169e3-oliver.sang@intel.com


[    3.216697][    T1] ------------[ cut here ]------------
[    3.217114][    T1] Unpatched return thunk in use. This should not happen!
[ 3.217622][ T1] WARNING: CPU: 0 PID: 1 at arch/x86/kernel/cpu/bugs.c:3031 __warn_thunk (arch/x86/kernel/cpu/bugs.c:3031) 
[    3.218287][    T1] Modules linked in:
[    3.218572][    T1] CPU: 0 UID: 0 PID: 1 Comm: swapper/0 Tainted: G                T  6.12.0-rc2-00578-g1758af47b98c #1
[    3.219355][    T1] Tainted: [T]=RANDSTRUCT
[    3.219665][    T1] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
[ 3.220404][ T1] RIP: 0010:__warn_thunk (arch/x86/kernel/cpu/bugs.c:3031) 
[ 3.220772][ T1] Code: 90 0f 1f 44 00 00 80 3d 73 2b d4 04 00 74 06 c3 cc cc cc cc cc c6 05 64 2b d4 04 01 90 48 c7 c7 40 c4 a1 91 e8 d8 67 0a 00 90 <0f> 0b 90 90 c3 cc cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 0f 1f
All code
========
   0:	90                   	nop
   1:	0f 1f 44 00 00       	nopl   0x0(%rax,%rax,1)
   6:	80 3d 73 2b d4 04 00 	cmpb   $0x0,0x4d42b73(%rip)        # 0x4d42b80
   d:	74 06                	je     0x15
   f:	c3                   	retq   
  10:	cc                   	int3   
  11:	cc                   	int3   
  12:	cc                   	int3   
  13:	cc                   	int3   
  14:	cc                   	int3   
  15:	c6 05 64 2b d4 04 01 	movb   $0x1,0x4d42b64(%rip)        # 0x4d42b80
  1c:	90                   	nop
  1d:	48 c7 c7 40 c4 a1 91 	mov    $0xffffffff91a1c440,%rdi
  24:	e8 d8 67 0a 00       	callq  0xa6801
  29:	90                   	nop
  2a:*	0f 0b                	ud2    		<-- trapping instruction
  2c:	90                   	nop
  2d:	90                   	nop
  2e:	c3                   	retq   
  2f:	cc                   	int3   
  30:	cc                   	int3   
  31:	cc                   	int3   
  32:	cc                   	int3   
  33:	cc                   	int3   
  34:	66 2e 0f 1f 84 00 00 	nopw   %cs:0x0(%rax,%rax,1)
  3b:	00 00 00 
  3e:	0f                   	.byte 0xf
  3f:	1f                   	(bad)  

Code starting with the faulting instruction
===========================================
   0:	0f 0b                	ud2    
   2:	90                   	nop
   3:	90                   	nop
   4:	c3                   	retq   
   5:	cc                   	int3   
   6:	cc                   	int3   
   7:	cc                   	int3   
   8:	cc                   	int3   
   9:	cc                   	int3   
   a:	66 2e 0f 1f 84 00 00 	nopw   %cs:0x0(%rax,%rax,1)
  11:	00 00 00 
  14:	0f                   	.byte 0xf
  15:	1f                   	(bad)  
[    3.222164][    T1] RSP: 0000:ffffc9000001fe88 EFLAGS: 00010246
[    3.222603][    T1] RAX: 74186e1ad2fd4400 RBX: ffffffff9456fee0 RCX: 0000000000000000
[    3.222824][    T1] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000001
[    3.223395][    T1] RBP: ffffc9000001fed8 R08: 0000000000000003 R09: 0000000000000004
[    3.223962][    T1] R10: dffffc0000000000 R11: fffffbfff259d7f8 R12: 0000000000000000
[    3.224528][    T1] R13: 0000000000000000 R14: dffffc0000000000 R15: ffffffff9456fee0
[    3.225094][    T1] FS:  0000000000000000(0000) GS:ffff8883aee00000(0000) knlGS:0000000000000000
[    3.225728][    T1] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[    3.226196][    T1] CR2: ffff88843ffff000 CR3: 00000003ab498000 CR4: 00000000000406b0
[    3.226772][    T1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[    3.227340][    T1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[    3.227911][    T1] Call Trace:
[    3.228147][    T1]  <TASK>
[ 3.228360][ T1] ? __warn (kernel/panic.c:748) 
[ 3.228710][ T1] ? __warn_thunk (arch/x86/kernel/cpu/bugs.c:3031) 
[ 3.229129][ T1] ? __warn_thunk (arch/x86/kernel/cpu/bugs.c:3031) 
[ 3.229545][ T1] ? report_bug (lib/bug.c:? lib/bug.c:219) 
[ 3.229942][ T1] ? console_unlock (kernel/printk/printk.c:3258 kernel/printk/printk.c:3279) 
[ 3.230293][ T1] ? handle_bug (arch/x86/kernel/traps.c:285) 
[ 3.230607][ T1] ? exc_invalid_op (arch/x86/kernel/traps.c:309) 
[ 3.230944][ T1] ? asm_exc_invalid_op (arch/x86/include/asm/idtentry.h:621) 
[ 3.231315][ T1] ? __warn_thunk (arch/x86/kernel/cpu/bugs.c:3031) 
[ 3.231641][ T1] ? __warn_thunk (arch/x86/kernel/cpu/bugs.c:3031) 
[ 3.231964][ T1] warn_thunk_thunk (arch/x86/entry/entry.S:48) 
[ 3.232302][ T1] ? __cfi_asan.module_ctor (main.c:?) 
[ 3.232693][ T1] do_basic_setup (init/main.c:1129 init/main.c:1365) 
[ 3.232829][ T1] kernel_init_freeable (init/main.c:1582) 
[ 3.233203][ T1] ? __cfi_kernel_init (init/main.c:1461) 
[ 3.233556][ T1] kernel_init (init/main.c:1471) 
[ 3.233867][ T1] ? __cfi_kernel_init (init/main.c:1461) 
[ 3.234224][ T1] ret_from_fork (arch/x86/kernel/process.c:147) 
[ 3.234543][ T1] ? __cfi_kernel_init (init/main.c:1461) 
[ 3.234896][ T1] ret_from_fork_asm (arch/x86/entry/entry_64.S:257) 
[    3.235249][    T1]  </TASK>
[    3.235466][    T1] irq event stamp: 3707
[ 3.235763][ T1] hardirqs last enabled at (3715): __console_unlock (arch/x86/include/asm/irqflags.h:26 arch/x86/include/asm/irqflags.h:87 arch/x86/include/asm/irqflags.h:147 kernel/printk/printk.c:344 kernel/printk/printk.c:2844) 
[ 3.236428][ T1] hardirqs last disabled at (3722): __console_unlock (kernel/printk/printk.c:342 kernel/printk/printk.c:2844) 
[ 3.237092][ T1] softirqs last enabled at (3640): handle_softirqs (arch/x86/include/asm/preempt.h:26 kernel/softirq.c:401 kernel/softirq.c:582) 
[ 3.237762][ T1] softirqs last disabled at (3631): __irq_exit_rcu (kernel/softirq.c:617 kernel/softirq.c:639) 
[    3.238433][    T1] ---[ end trace 0000000000000000 ]---


The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20241112/202411122234.64f169e3-oliver.sang@intel.com



-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ