[sean-jc:x86/dynamic_mmu_page_hash] [KVM] 9a65885b67: canonical_address#:#[##]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




Hello,

kernel test robot noticed "canonical_address#:#[##]" on:

commit: 9a65885b675adcef145312ef0e2e9447194aecda ("KVM: x86/mmu: Dynamically allocate shadow MMU's hashed page list")
https://github.com/sean-jc/linux x86/dynamic_mmu_page_hash

in testcase: kvm-unit-tests-qemu
version: 
with following parameters:




compiler: gcc-12
test machine: 128 threads 2 sockets Intel(R) Xeon(R) Platinum 8358 CPU @ 2.60GHz (Ice Lake) with 128G memory

(please refer to attached dmesg/kmsg for entire log/backtrace)



If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@xxxxxxxxx>
| Closes: https://lore.kernel.org/oe-lkp/202308291427.85de5a98-oliver.sang@xxxxxxxxx


[  360.237618][ T1478] make[1]: Leaving directory '/lkp/benchmarks/qemu/build'
[  360.237641][ T1478]
[  360.294097][T15381] memfd_create() without MFD_EXEC nor MFD_NOEXEC_SEAL, pid=15381 'qemu-system-x86'
[  362.275836][ T1478] 2023-08-24 21:56:55 ./run_tests.sh
[  362.275856][ T1478]
[  363.747534][T15500] general protection fault, probably for non-canonical address 0xdffffc000000032b: 0000 [#1] PREEMPT SMP KASAN NOPTI
[  363.761514][T15500] KASAN: probably user-memory-access in range [0x0000000000001958-0x000000000000195f]
[  363.771827][T15500] CPU: 119 PID: 15500 Comm: qemu-system-x86 Tainted: G S                 6.5.0-rc2-00178-g9a65885b675a #1
[  363.783889][T15500] Hardware name: Intel Corporation M50CYP2SB1U/M50CYP2SB1U, BIOS SE5C620.86B.01.01.0003.2104260124 04/26/2021
[363.797245][T15500] RIP: kvm_uevent_notify_change+0x13e/0x350 kvm
[ 363.805596][T15500] Code: c0 74 08 3c 03 0f 8e 91 01 00 00 48 8d bd 58 19 00 00 41 8b 95 50 09 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 f9 48 c1 e9 03 <0f> b6 04 01 84 c0 74 08 3c 03 0f 8e 6c 01 00 00 89 95 58 19 00 00
All code
========
   0:	c0 74 08 3c 03       	shlb   $0x3,0x3c(%rax,%rcx,1)
   5:	0f 8e 91 01 00 00    	jle    0x19c
   b:	48 8d bd 58 19 00 00 	lea    0x1958(%rbp),%rdi
  12:	41 8b 95 50 09 00 00 	mov    0x950(%r13),%edx
  19:	48 b8 00 00 00 00 00 	movabs $0xdffffc0000000000,%rax
  20:	fc ff df 
  23:	48 89 f9             	mov    %rdi,%rcx
  26:	48 c1 e9 03          	shr    $0x3,%rcx
  2a:*	0f b6 04 01          	movzbl (%rcx,%rax,1),%eax		<-- trapping instruction
  2e:	84 c0                	test   %al,%al
  30:	74 08                	je     0x3a
  32:	3c 03                	cmp    $0x3,%al
  34:	0f 8e 6c 01 00 00    	jle    0x1a6
  3a:	89 95 58 19 00 00    	mov    %edx,0x1958(%rbp)

Code starting with the faulting instruction
===========================================
   0:	0f b6 04 01          	movzbl (%rcx,%rax,1),%eax
   4:	84 c0                	test   %al,%al
   6:	74 08                	je     0x10
   8:	3c 03                	cmp    $0x3,%al
   a:	0f 8e 6c 01 00 00    	jle    0x17c
  10:	89 95 58 19 00 00    	mov    %edx,0x1958(%rbp)
[  363.827013][T15500] RSP: 0018:ffa000002714fe48 EFLAGS: 00010206
[  363.833927][T15500] RAX: dffffc0000000000 RBX: ff110010e99bc000 RCX: 000000000000032b
[  363.842760][T15500] RDX: 0000000000003c8c RSI: 1ff4000004e29f97 RDI: 0000000000001959
[  363.851588][T15500] RBP: 0000000000000001 R08: ff110010e99bc218 R09: fff3fc0004e29f67
[  363.860411][T15500] R10: 0000000000000003 R11: 000000000000000a R12: ffffffff8424d5d0
[  363.869223][T15500] R13: ff11001211108000 R14: 0000000000000001 R15: 0000000000000001
[  363.878032][T15500] FS:  00007fb8cd2b8c80(0000) GS:ff11002020380000(0000) knlGS:0000000000000000
[  363.887789][T15500] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  363.895177][T15500] CR2: 000056119a3bc320 CR3: 00000011a77dc004 CR4: 0000000000771ee0
[  363.903973][T15500] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  363.912759][T15500] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  363.921532][T15500] PKRU: 55555554
[  363.925873][T15500] Call Trace:
[  363.929948][T15500]  <TASK>
[363.933659][T15500] ? die_addr (kbuild/src/consumer/arch/x86/kernel/dumpstack.c:421 kbuild/src/consumer/arch/x86/kernel/dumpstack.c:460) 
[363.938586][T15500] ? exc_general_protection (kbuild/src/consumer/arch/x86/kernel/traps.c:786 kbuild/src/consumer/arch/x86/kernel/traps.c:728) 
[363.944897][T15500] ? asm_exc_general_protection (kbuild/src/consumer/arch/x86/include/asm/idtentry.h:564) 
[363.951376][T15500] ? kvm_uevent_notify_change+0x13e/0x350 kvm


The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20230829/202308291427.85de5a98-oliver.sang@xxxxxxxxx



-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki




[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux