public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* [vbabka:slub-kunit-fix-v1] [kunit]  4b30efe586: Oops:general_protection_fault,probably_for_non-canonical_address#:#[##]SMP_KASAN
@ 2024-10-10  7:46 kernel test robot
  0 siblings, 0 replies; only message in thread
From: kernel test robot @ 2024-10-10  7:46 UTC (permalink / raw)
  To: Vlastimil Babka
  Cc: oe-lkp, lkp, Guenter Roeck, Paul E. McKenney, Boqun Feng,
	Uladzislau Rezki, Brendan Higgins, David Gow, Rae Moar,
	linux-kernel, oliver.sang



Hello,

kernel test robot noticed "Oops:general_protection_fault,probably_for_non-canonical_address#:#[##]SMP_KASAN" on:

commit: 4b30efe586f89319cc6d258ca11022273e33657a ("kunit: move call to kunit_run_all_tests() after rcu_end_inkernel_boot()")
https://git.kernel.org/cgit/linux/kernel/git/vbabka/linux.git slub-kunit-fix-v1

in testcase: boot

compiler: clang-18
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G

(please refer to attached dmesg/kmsg for entire log/backtrace)


+----------------------------------------------------------------------------------+------------+------------+
|                                                                                  | 2c61269169 | 4b30efe586 |
+----------------------------------------------------------------------------------+------------+------------+
| boot_successes                                                                   | 12         | 0          |
| boot_failures                                                                    | 0          | 12         |
| Oops:general_protection_fault,probably_for_non-canonical_address#:#[##]SMP_KASAN | 0          | 12         |
| KASAN:maybe_wild-memory-access_in_range[#-#]                                     | 0          | 12         |
| RIP:kunit_merge_suite_sets                                                       | 0          | 12         |
| Kernel_panic-not_syncing:Fatal_exception                                         | 0          | 12         |
+----------------------------------------------------------------------------------+------------+------------+


If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@intel.com>
| Closes: https://lore.kernel.org/oe-lkp/202410101542.ad347b41-lkp@intel.com


[   26.739545][    T1] PM: genpd: Disabling unused power domains
[   26.749167][    T1] Freeing unused kernel image (initmem) memory: 5116K
[   26.749818][    T1] Write protecting the kernel read-only data: 186368k
[   26.752543][    T1] Freeing unused kernel image (rodata/data gap) memory: 496K
[   26.859076][    T1] x86/mm: Checked W+X mappings: passed, no W+X pages found.
[   26.859779][    T1] Oops: general protection fault, probably for non-canonical address 0xf9999599999999e2: 0000 [#1] SMP KASAN
[   26.860605][    T1] KASAN: maybe wild-memory-access in range [0xcccccccccccccf10-0xcccccccccccccf17]
[   26.861265][    T1] CPU: 0 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.12.0-rc1-00003-g4b30efe586f8 #1
[   26.861938][    T1] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
[ 26.862671][ T1] RIP: 0010:kunit_merge_suite_sets (kbuild/src/consumer/lib/kunit/executor.c:315) 
[ 26.863128][ T1] Code: 8d 3c c4 4c 89 f8 48 c1 e8 03 80 3c 18 00 74 08 4c 89 ff e8 03 12 61 fe 4d 8b 3f b8 44 02 00 00 49 01 c7 4c 89 f8 48 c1 e8 03 <0f> b6 04 18 84 c0 75 12 49 63 c5 41 c6 07 01 44 8d 68 01 49 39 c6
All code
========
   0:	8d 3c c4             	lea    (%rsp,%rax,8),%edi
   3:	4c 89 f8             	mov    %r15,%rax
   6:	48 c1 e8 03          	shr    $0x3,%rax
   a:	80 3c 18 00          	cmpb   $0x0,(%rax,%rbx,1)
   e:	74 08                	je     0x18
  10:	4c 89 ff             	mov    %r15,%rdi
  13:	e8 03 12 61 fe       	call   0xfffffffffe61121b
  18:	4d 8b 3f             	mov    (%r15),%r15
  1b:	b8 44 02 00 00       	mov    $0x244,%eax
  20:	49 01 c7             	add    %rax,%r15
  23:	4c 89 f8             	mov    %r15,%rax
  26:	48 c1 e8 03          	shr    $0x3,%rax
  2a:*	0f b6 04 18          	movzbl (%rax,%rbx,1),%eax		<-- trapping instruction
  2e:	84 c0                	test   %al,%al
  30:	75 12                	jne    0x44
  32:	49 63 c5             	movslq %r13d,%rax
  35:	41 c6 07 01          	movb   $0x1,(%r15)
  39:	44 8d 68 01          	lea    0x1(%rax),%r13d
  3d:	49 39 c6             	cmp    %rax,%r14

Code starting with the faulting instruction
===========================================
   0:	0f b6 04 18          	movzbl (%rax,%rbx,1),%eax
   4:	84 c0                	test   %al,%al
   6:	75 12                	jne    0x1a
   8:	49 63 c5             	movslq %r13d,%rax
   b:	41 c6 07 01          	movb   $0x1,(%r15)
   f:	44 8d 68 01          	lea    0x1(%rax),%r13d
  13:	49 39 c6             	cmp    %rax,%r14
[   26.864463][    T1] RSP: 0000:ffffc9000001fe40 EFLAGS: 00010a06
[   26.864908][    T1] RAX: 19999999999999e2 RBX: dffffc0000000000 RCX: 0000000000000000
[   26.865480][    T1] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[   26.866060][    T1] RBP: ffffc9000001fea0 R08: cccccccccccccccc R09: cccccccccccccccc
[   26.866640][    T1] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8881451e7000
[   26.867222][    T1] R13: 0000000000000001 R14: 0000000000000001 R15: cccccccccccccf10
[   26.867800][    T1] FS:  0000000000000000(0000) GS:ffff8883ad800000(0000) knlGS:0000000000000000
[   26.868425][    T1] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   26.868896][    T1] CR2: ffff88843ffff000 CR3: 000000017491d000 CR4: 00000000000406f0
[   26.869465][    T1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   26.870038][    T1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   26.870617][    T1] Call Trace:
[   26.870865][    T1]  <TASK>
[ 26.871081][ T1] ? __die_body (kbuild/src/consumer/arch/x86/kernel/dumpstack.c:421) 
[ 26.871400][ T1] ? die_addr (kbuild/src/consumer/arch/x86/kernel/dumpstack.c:?) 
[ 26.871706][ T1] ? exc_general_protection (kbuild/src/consumer/arch/x86/kernel/traps.c:751) 
[ 26.872119][ T1] ? asm_exc_general_protection (kbuild/src/consumer/arch/x86/include/asm/idtentry.h:617) 


The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20241010/202410101542.ad347b41-lkp@intel.com



-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki


^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2024-10-10  7:46 UTC | newest]

Thread overview: (only message) (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2024-10-10  7:46 [vbabka:slub-kunit-fix-v1] [kunit] 4b30efe586: Oops:general_protection_fault,probably_for_non-canonical_address#:#[##]SMP_KASAN kernel test robot

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox