Greeting, FYI, we noticed general_protection_fault:#[##] due to commit (built with gcc-11): commit: b008ae4cc74d3ab43074099746f6c32d353e01aa ("string.h: fix incompatibility between FORTIFY_SOURCE and KASAN") https://github.com/ammarfaizi2/linux-block stable/linux-stable-rc/queue/rc-5.4 in testcase: boot on test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace): Starting Load Kernel Modules... Starting Remount Root and Kernel File Systems... Starting Coldplug All udev Devices... [ 30.456454][ T204] kasan: CONFIG_KASAN_INLINE enabled [ 30.457639][ T204] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 30.459199][ T204] general protection fault: 0000 [#1] SMP KASAN [ 30.460245][ T204] CPU: 0 PID: 204 Comm: modprobe Not tainted 5.4.47-00158-gb008ae4cc74d3 #1 [ 30.461748][ T204] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-debian-1.16.0-4 04/01/2014 [ 30.463402][ T204] RIP: 0010:memcmp (??:?) [ 30.464093][ T204] Code: ff df 55 48 89 f5 53 48 89 fb 48 83 ec 08 eb 0d 48 83 c3 01 48 83 c5 01 49 39 dd 74 4b 48 89 d8 48 89 d9 48 c1 e8 03 83 e1 07 <42> 0f b6 04 20 38 c8 7f 04 84 c0 75 53 48 89 e9 48 89 ee 0f b6 03 All code ======== 0: ff (bad) 1: df 55 48 fists 0x48(%rbp) 4: 89 f5 mov %esi,%ebp 6: 53 push %rbx 7: 48 89 fb mov %rdi,%rbx a: 48 83 ec 08 sub $0x8,%rsp e: eb 0d jmp 0x1d 10: 48 83 c3 01 add $0x1,%rbx 14: 48 83 c5 01 add $0x1,%rbp 18: 49 39 dd cmp %rbx,%r13 1b: 74 4b je 0x68 1d: 48 89 d8 mov %rbx,%rax 20: 48 89 d9 mov %rbx,%rcx 23: 48 c1 e8 03 shr $0x3,%rax 27: 83 e1 07 and $0x7,%ecx 2a:* 42 0f b6 04 20 movzbl (%rax,%r12,1),%eax <-- trapping instruction 2f: 38 c8 cmp %cl,%al 31: 7f 04 jg 0x37 33: 84 c0 test %al,%al 35: 75 53 jne 0x8a 37: 48 89 e9 mov %rbp,%rcx 3a: 48 89 ee mov %rbp,%rsi 3d: 0f b6 03 movzbl (%rbx),%eax Code starting with the faulting instruction =========================================== 0: 42 0f b6 04 20 movzbl (%rax,%r12,1),%eax 5: 38 c8 cmp %cl,%al 7: 7f 04 jg 0xd 9: 84 c0 test %al,%al b: 75 53 jne 0x60 d: 48 89 e9 mov %rbp,%rcx 10: 48 89 ee mov %rbp,%rsi 13: 0f b6 03 movzbl (%rbx),%eax [ 30.468942][ T204] RSP: 0018:ffff88839c7efae8 EFLAGS: 00010202 [ 30.469836][ T204] RAX: 00000000000cbd90 RBX: 000000000065ec81 RCX: 0000000000000001 [ 30.471001][ T204] RDX: 0000000000000005 RSI: ffff88839c7efb48 RDI: 000000000065ec81 [ 30.472165][ T204] RBP: ffff88839c7efb48 R08: ffff88839c7efb48 R09: 0000000000000000 [ 30.473339][ T204] R10: ffffffff855924c7 R11: 0000000000000001 R12: dffffc0000000000 [ 30.474525][ T204] R13: 000000000065ec86 R14: 0000000000000000 R15: ffffffff8421e304 [ 30.475685][ T204] FS: 00007f49a0d31540(0000) GS:ffff8883a0400000(0000) knlGS:0000000000000000 [ 30.476992][ T204] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 30.477947][ T204] CR2: 000055bad2e05e50 CR3: 000000032f16d000 CR4: 00000000000406f0 [ 30.479203][ T204] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 30.480538][ T204] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 30.481760][ T204] Call Trace: [ 30.482344][ T204] __jump_label_set_jump_code+0x1ca/0x2d0 [ 30.483211][ T204] ? __lock_release+0x42c/0x9b0 [ 30.483959][ T204] ? mask_and_ack_8259A.cold+0x6f/0x6f [ 30.484787][ T204] ? mutex_lock_io_nested+0x1020/0x1020 [ 30.485625][ T204] __jump_label_transform+0x59/0x140 [ 30.488747][ T204] ? get_trap_addr+0x210/0x210 [ 30.489500][ T204] arch_jump_label_transform_static+0xcd/0x115 [ 30.490465][ T204] ? arch_jump_label_transform_apply+0x50/0x50 [ 30.491513][ T204] ? __ww_mutex_check_kill+0x520/0x520 [ 30.492472][ T204] jump_label_apply_nops+0xd9/0x110 [ 30.493387][ T204] module_finalize+0x34e/0x540 [ 30.494230][ T204] load_module+0x1522/0x20c0 [ 30.495033][ T204] __do_sys_finit_module+0x110/0x180 [ 30.495937][ T204] ? __x64_sys_init_module+0xa0/0xa0 [ 30.496706][ T204] ? vm_mmap_pgoff+0x142/0x170 [ 30.497439][ T204] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 30.498205][ T204] ? do_syscall_64+0x23/0x737 [ 30.498986][ T204] do_syscall_64+0xd3/0x737 [ 30.499784][ T204] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 30.500741][ T204] RIP: 0033:0x7f49a0e529b9 [ 30.501513][ T204] Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d a7 54 0c 00 f7 d8 64 89 01 48 [ 30.504513][ T204] RSP: 002b:00007ffedd724b58 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 [ 30.505937][ T204] RAX: ffffffffffffffda RBX: 00005644c4b69df0 RCX: 00007f49a0e529b9 [ 30.507311][ T204] RDX: 0000000000000000 RSI: 00005644c31c1260 RDI: 0000000000000003 [ 30.508668][ T204] RBP: 0000000000060000 R08: 0000000000000000 R09: 00005644c4b6b070 [ 30.509720][ T204] R10: 0000000000000003 R11: 0000000000000246 R12: 00005644c31c1260 [ 30.511890][ T204] R13: 0000000000000000 R14: 00005644c4b69f20 R15: 00005644c4b69df0 [ 30.513035][ T204] Modules linked in: [ 30.513764][ T204] ---[ end trace b968400d252f50e6 ]--- [ 30.514724][ T204] RIP: 0010:memcmp+0x43/0xb0 [ 30.515500][ T204] Code: ff df 55 48 89 f5 53 48 89 fb 48 83 ec 08 eb 0d 48 83 c3 01 48 83 c5 01 49 39 dd 74 4b 48 89 d8 48 89 d9 48 c1 e8 03 83 e1 07 <42> 0f b6 04 20 38 c8 7f 04 84 c0 75 53 48 89 e9 48 89 ee 0f b6 03 [ 30.518439][ T204] RSP: 0018:ffff88839c7efae8 EFLAGS: 00010202 [ 30.519453][ T204] RAX: 00000000000cbd90 RBX: 000000000065ec81 RCX: 0000000000000001 [ 30.520571][ T204] RDX: 0000000000000005 RSI: ffff88839c7efb48 RDI: 000000000065ec81 [ 30.521756][ T204] RBP: ffff88839c7efb48 R08: ffff88839c7efb48 R09: 0000000000000000 [ 30.523086][ T204] R10: ffffffff855924c7 R11: 0000000000000001 R12: dffffc0000000000 [ 30.524464][ T204] R13: 000000000065ec86 R14: 0000000000000000 R15: ffffffff8421e304 [ 30.525743][ T204] FS: 00007f49a0d31540(0000) GS:ffff8883a0400000(0000) knlGS:0000000000000000 [ 30.527217][ T204] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 30.528214][ T204] CR2: 000055bad2e05e50 CR3: 000000032f16d000 CR4: 00000000000406f0 [ 30.529351][ T204] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 30.530744][ T204] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 30.532155][ T204] Kernel panic - not syncing: Fatal exception [ 30.533150][ T204] Kernel Offset: disabled If you fix the issue, kindly add following tag | Reported-by: kernel test robot | Link: https://lore.kernel.org/oe-lkp/202212140958.55eeac34-yujie.liu@intel.com To reproduce: # build kernel cd linux cp config-5.4.47-00158-gb008ae4cc74d3 .config make HOSTCC=gcc-11 CC=gcc-11 ARCH=x86_64 olddefconfig prepare modules_prepare bzImage modules make HOSTCC=gcc-11 CC=gcc-11 ARCH=x86_64 INSTALL_MOD_PATH= modules_install cd find lib/ | cpio -o -H newc --quiet | gzip > modules.cgz git clone https://github.com/intel/lkp-tests.git cd lkp-tests bin/lkp qemu -k -m modules.cgz job-script # job-script is attached in this email # if come across any failure that blocks the test, # please remove ~/.lkp and /lkp dir to run from a clean state. -- 0-DAY CI Kernel Test Service https://01.org/lkp