linux-mm.kvack.org archive mirror
 help / color / mirror / Atom feed
* [linux-next:master] [kasan]  0e8b630f30: BUG_kmem_cache_node(Tainted:G_T):Poison_overwritten
@ 2023-11-23  6:19 kernel test robot
  2023-11-23 16:04 ` Andrey Konovalov
  0 siblings, 1 reply; 2+ messages in thread
From: kernel test robot @ 2023-11-23  6:19 UTC (permalink / raw)
  To: Andrey Konovalov
  Cc: oe-lkp, lkp, Linux Memory Management List, Andrew Morton,
	Marco Elver, Alexander Potapenko, Dmitry Vyukov,
	Evgenii Stepanov, Oscar Salvador, Vlastimil Babka, kasan-dev,
	oliver.sang



Hello,

kernel test robot noticed "BUG_kmem_cache_node(Tainted:G_T):Poison_overwritten" on:

commit: 0e8b630f3053f0ff84b7c3ab8ff98a7393863824 ("kasan: use stack_depot_put for Generic mode")
https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git master

[test failed on linux-next/master 07b677953b9dca02928be323e2db853511305fa9]

in testcase: boot

compiler: clang-16
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G

(please refer to attached dmesg/kmsg for entire log/backtrace)


+--------------------------------------------------------------+------------+------------+
|                                                              | 882f84db75 | 0e8b630f30 |
+--------------------------------------------------------------+------------+------------+
| BUG_kmem_cache_node(Tainted:G_T):Poison_overwritten          | 0          | 55         |
| BUG_kmem_cache_node(Tainted:G_B_T):Poison_overwritten        | 0          | 55         |
+--------------------------------------------------------------+------------+------------+


If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@intel.com>
| Closes: https://lore.kernel.org/oe-lkp/202311231356.1e1fb71f-oliver.sang@intel.com


[    5.031171][    T0] ** administrator!                                       **
[    5.031752][    T0] **                                                      **
[    5.032336][    T0] **   NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE   **
[    5.032920][    T0] **********************************************************
[    5.034153][    T0] =============================================================================
[    5.034907][    T0] BUG kmem_cache_node (Tainted: G                T ): Poison overwritten
[    5.035573][    T0] -----------------------------------------------------------------------------
[    5.035573][    T0]
[    5.036459][    T0] 0xffff888100040200-0xffff88810004020f @offset=512. First byte 0x0 instead of 0x6b
[    5.037203][    T0] Slab 0xffffea0004001000 objects=10 used=2 fp=0xffff888100040380 flags=0x4000000000000800(slab|zone=1)
[    5.038098][    T0] Object 0xffff888100040200 @offset=512 fp=0xffff888100040380
[    5.038098][    T0] 
[    5.038908][    T0] Redzone  ffff888100040180: bb bb bb bb bb bb bb bb bb bb bb bb bb bb bb bb  ................
[    5.039738][    T0] Redzone  ffff888100040190: bb bb bb bb bb bb bb bb bb bb bb bb bb bb bb bb  ................
[    5.040565][    T0] Redzone  ffff8881000401a0: bb bb bb bb bb bb bb bb bb bb bb bb bb bb bb bb  ................
[    5.041384][    T0] Redzone  ffff8881000401b0: bb bb bb bb bb bb bb bb bb bb bb bb bb bb bb bb  ................
[    5.042210][    T0] Redzone  ffff8881000401c0: bb bb bb bb bb bb bb bb bb bb bb bb bb bb bb bb  ................
[    5.043030][    T0] Redzone  ffff8881000401d0: bb bb bb bb bb bb bb bb bb bb bb bb bb bb bb bb  ................
[    5.043849][    T0] Redzone  ffff8881000401e0: bb bb bb bb bb bb bb bb bb bb bb bb bb bb bb bb  ................
[    5.044670][    T0] Redzone  ffff8881000401f0: bb bb bb bb bb bb bb bb bb bb bb bb bb bb bb bb  ................
[    5.045495][    T0] Object   ffff888100040200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
[    5.046316][    T0] Object   ffff888100040210: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk
[    5.047135][    T0] Object   ffff888100040220: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk
[    5.047955][    T0] Object   ffff888100040230: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk
[    5.048774][    T0] Object   ffff888100040240: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk
[    5.049598][    T0] Object   ffff888100040250: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk
[    5.050415][    T0] Object   ffff888100040260: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk
[    5.051232][    T0] Object   ffff888100040270: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b a5  kkkkkkkkkkkkkkk.
[    5.052052][    T0] Redzone  ffff888100040280: bb bb bb bb bb bb bb bb                          ........
[    5.052815][    T0] Padding  ffff8881000402e0: 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a  ZZZZZZZZZZZZZZZZ
[    5.053642][    T0] Padding  ffff8881000402f0: 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a  ZZZZZZZZZZZZZZZZ
[    5.054459][    T0] CPU: 0 PID: 0 Comm: swapper Tainted: G                T  6.7.0-rc1-00136-g0e8b630f3053 #1
[    5.055259][    T0] Call Trace:
[    5.055514][    T0]  <TASK>
[    5.055744][    T0]  dump_stack_lvl+0x83/0x13b
[    5.056703][    T0]  check_bytes_and_report+0x121/0x140
[    5.057130][    T0]  check_object+0x1b9/0x380
[    5.057496][    T0]  alloc_debug_processing+0x157/0x200
[    5.057920][    T0]  ___slab_alloc+0x593/0xdc0
[    5.058283][    T0]  ? __kmem_cache_create+0x115/0x4b0
[    5.058702][    T0]  ? __kmem_cache_create+0x115/0x4b0
[    5.059119][    T0]  kmem_cache_alloc_node+0x250/0x2b0
[    5.059540][    T0]  __kmem_cache_create+0x115/0x4b0
[    5.059951][    T0]  create_boot_cache+0x89/0xbb
[    5.060331][    T0]  kmem_cache_init+0x94/0x13b
[    5.060699][    T0]  mm_core_init+0x33/0x7b
[    5.061039][    T0]  start_kernel+0x19e/0x3fb
[    5.061397][    T0]  x86_64_start_reservations+0x2a/0x3b
[    5.061835][    T0]  x86_64_start_kernel+0x5f/0x7b
[    5.062223][    T0]  secondary_startup_64_no_verify+0x101/0x13b
[    5.062710][    T0]  </TASK>
[    5.062943][    T0] Disabling lock debugging due to kernel taint
[    5.063426][    T0] FIX kmem_cache_node: Restoring Poison 0xffff888100040200-0xffff88810004020f=0x6b
[    5.064163][    T0] FIX kmem_cache_node: Marking all objects used
[    5.064664][    T0] =============================================================================
[    5.065387][    T0] BUG kmem_cache_node (Tainted: G    B           T ): Poison overwritten
[    5.066068][    T0] -----------------------------------------------------------------------------
[    5.066068][    T0] 
[    5.066962][    T0] 0xffff888100041080-0xffff88810004108f @offset=128. First byte 0x0 instead of 0x6b
[    5.067711][    T0] Slab 0xffffea0004001040 objects=10 used=1 fp=0xffff888100041200 flags=0x4000000000000800(slab|zone=1)
[    5.068593][    T0] Object 0xffff888100041080 @offset=128 fp=0xffff888100041200
[    5.068593][    T0] 
[    5.069355][    T0] Redzone  ffff888100041000: bb bb bb bb bb bb bb bb bb bb bb bb bb bb bb bb  ................
[    5.070180][    T0] Redzone  ffff888100041010: bb bb bb bb bb bb bb bb bb bb bb bb bb bb bb bb  ................
[    5.070996][    T0] Redzone  ffff888100041020: bb bb bb bb bb bb bb bb bb bb bb bb bb bb bb bb  ................
[    5.071812][    T0] Redzone  ffff888100041030: bb bb bb bb bb bb bb bb bb bb bb bb bb bb bb bb  ................
[    5.072628][    T0] Redzone  ffff888100041040: bb bb bb bb bb bb bb bb bb bb bb bb bb bb bb bb  ................
[    5.073450][    T0] Redzone  ffff888100041050: bb bb bb bb bb bb bb bb bb bb bb bb bb bb bb bb  ................
[    5.074267][    T0] Redzone  ffff888100041060: bb bb bb bb bb bb bb bb bb bb bb bb bb bb bb bb  ................
[    5.075083][    T0] Redzone  ffff888100041070: bb bb bb bb bb bb bb bb bb bb bb bb bb bb bb bb  ................
[    5.075907][    T0] Object   ffff888100041080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
[    5.076729][    T0] Object   ffff888100041090: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk
[    5.077557][    T0] Object   ffff8881000410a0: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk
[    5.078372][    T0] Object   ffff8881000410b0: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk
[    5.079187][    T0] Object   ffff8881000410c0: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk
[    5.080001][    T0] Object   ffff8881000410d0: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk
[    5.080816][    T0] Object   ffff8881000410e0: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b  kkkkkkkkkkkkkkkk
[    5.081638][    T0] Object   ffff8881000410f0: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b a5  kkkkkkkkkkkkkkk.
[    5.082453][    T0] Redzone  ffff888100041100: bb bb bb bb bb bb bb bb                          ........
[    5.083212][    T0] Padding  ffff888100041160: 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a  ZZZZZZZZZZZZZZZZ
[    5.084028][    T0] Padding  ffff888100041170: 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a  ZZZZZZZZZZZZZZZZ
[    5.084847][    T0] CPU: 0 PID: 0 Comm: swapper Tainted: G    B           T  6.7.0-rc1-00136-g0e8b630f3053 #1
[    5.085659][    T0] Call Trace:
[    5.085975][    T0]  <TASK>
[    5.086203][    T0]  dump_stack_lvl+0x83/0x13b
[    5.086566][    T0]  check_bytes_and_report+0x121/0x140
[    5.087005][    T0]  check_object+0x1b9/0x380
[    5.087370][    T0]  alloc_debug_processing+0x157/0x200
[    5.087792][    T0]  ___slab_alloc+0x89d/0xdc0
[    5.088166][    T0]  ? __kmem_cache_create+0x115/0x4b0
[    5.088612][    T0]  ? __kmem_cache_create+0x115/0x4b0
[    5.089033][    T0]  kmem_cache_alloc_node+0x250/0x2b0
[    5.089462][    T0]  __kmem_cache_create+0x115/0x4b0
[    5.089881][    T0]  create_boot_cache+0x89/0xbb
[    5.090264][    T0]  kmem_cache_init+0x94/0x13b
[    5.090634][    T0]  mm_core_init+0x33/0x7b
[    5.090973][    T0]  start_kernel+0x19e/0x3fb
[    5.091338][    T0]  x86_64_start_reservations+0x2a/0x3b
[    5.091796][    T0]  x86_64_start_kernel+0x5f/0x7b
[    5.092188][    T0]  secondary_startup_64_no_verify+0x101/0x13b
[    5.092701][    T0]  </TASK>
[    5.092948][    T0] FIX kmem_cache_node: Restoring Poison 0xffff888100041080-0xffff88810004108f=0x6b
[    5.093695][    T0] FIX kmem_cache_node: Marking all objects used
[    5.094209][    T0] =============================================================================
[    5.094974][    T0] BUG kmem_cache_node (Tainted: G    B           T ): Poison overwritten
[    5.095654][    T0] -----------------------------------------------------------------------------
[    5.095654][    T0] 
[    5.096573][    T0] 0xffff888100042080-0xffff88810004208f @offset=128. First byte 0x0 instead of 0x6b
[    5.097348][    T0] Slab 0xffffea0004001080 objects=10 used=1 fp=0xffff888100042200 flags=0x4000000000000800(slab|zone=1)
[    5.098267][    T0] Object 0xffff888100042080 @offset=128 fp=0xffff888100042200
[    5.098267][    T0] 


The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20231123/202311231356.1e1fb71f-oliver.sang@intel.com



-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki



^ permalink raw reply	[flat|nested] 2+ messages in thread

* Re: [linux-next:master] [kasan] 0e8b630f30: BUG_kmem_cache_node(Tainted:G_T):Poison_overwritten
  2023-11-23  6:19 [linux-next:master] [kasan] 0e8b630f30: BUG_kmem_cache_node(Tainted:G_T):Poison_overwritten kernel test robot
@ 2023-11-23 16:04 ` Andrey Konovalov
  0 siblings, 0 replies; 2+ messages in thread
From: Andrey Konovalov @ 2023-11-23 16:04 UTC (permalink / raw)
  To: kernel test robot
  Cc: Andrey Konovalov, oe-lkp, lkp, Linux Memory Management List,
	Andrew Morton, Marco Elver, Alexander Potapenko, Dmitry Vyukov,
	Evgenii Stepanov, Oscar Salvador, Vlastimil Babka, kasan-dev

On Thu, Nov 23, 2023 at 7:19 AM kernel test robot <oliver.sang@intel.com> wrote:
>
> kernel test robot noticed "BUG_kmem_cache_node(Tainted:G_T):Poison_overwritten" on:
>
> commit: 0e8b630f3053f0ff84b7c3ab8ff98a7393863824 ("kasan: use stack_depot_put for Generic mode")
> https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git master
>
> [test failed on linux-next/master 07b677953b9dca02928be323e2db853511305fa9]
>
> in testcase: boot
>
> compiler: clang-16
> test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G
>
> (please refer to attached dmesg/kmsg for entire log/backtrace)
>
>
> +--------------------------------------------------------------+------------+------------+
> |                                                              | 882f84db75 | 0e8b630f30 |
> +--------------------------------------------------------------+------------+------------+
> | BUG_kmem_cache_node(Tainted:G_T):Poison_overwritten          | 0          | 55         |
> | BUG_kmem_cache_node(Tainted:G_B_T):Poison_overwritten        | 0          | 55         |
> +--------------------------------------------------------------+------------+------------+

This should be fixed by "slub, kasan: improve interaction of KASAN and
slub_debug poisoning" and the most recent version of "kasan: Improve
free meta storage in Generic KASAN".


^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2023-11-23 16:04 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2023-11-23  6:19 [linux-next:master] [kasan] 0e8b630f30: BUG_kmem_cache_node(Tainted:G_T):Poison_overwritten kernel test robot
2023-11-23 16:04 ` Andrey Konovalov

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox