From: Peter Zijlstra <[email protected]>
To: kernel test robot <[email protected]>
Cc: Borislav Petkov <[email protected]>,
Josh Poimboeuf <[email protected]>,
LKML <[email protected]>,
[email protected], [email protected], [email protected]
Subject: Re: [x86,static_call] ee88d363d1: WARNING:at_arch/x86/kernel/alternative.c:#apply_returns
Date: Wed, 13 Jul 2022 14:28:55 +0200 [thread overview]
Message-ID: <[email protected]> (raw)
In-Reply-To: <Ys58BxHxoDZ7rfpr@xsang-OptiPlex-9020>
On Wed, Jul 13, 2022 at 04:02:15PM +0800, kernel test robot wrote:
> [ 22.065014][ T0] ------------[ cut here ]------------
> [ 22.066738][ T0] WARNING: CPU: 0 PID: 0 at arch/x86/kernel/alternative.c:557 apply_returns (arch/x86/kernel/alternative.c:557 (discriminator 1))
> [ 22.069534][ T0] Modules linked in:
> [ 22.070738][ T0] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.19.0-rc4-00008-gee88d363d156 #1
> [ 22.072739][ T0] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-debian-1.16.0-4 04/01/2014
> [ 22.074741][ T0] RIP: 0010:apply_returns (arch/x86/kernel/alternative.c:557 (discriminator 1))
> [ 22.076739][ T0] Code: ff ff 74 cb 48 83 c5 04 49 39 ee 0f 87 81 fe ff ff e9 22 ff ff ff 0f 0b 48 83 c5 04 49 39 ee 0f 87 6d fe ff ff e9 0e ff ff ff <0f> 0b 48 83 c5 04 49 39 ee 0f 87 59 fe ff ff e9 fa fe ff ff 48 89
> All code
> ========
> 0: ff (bad)
> 1: ff 74 cb 48 pushq 0x48(%rbx,%rcx,8)
> 5: 83 c5 04 add $0x4,%ebp
> 8: 49 39 ee cmp %rbp,%r14
> b: 0f 87 81 fe ff ff ja 0xfffffffffffffe92
> 11: e9 22 ff ff ff jmpq 0xffffffffffffff38
> 16: 0f 0b ud2
> 18: 48 83 c5 04 add $0x4,%rbp
> 1c: 49 39 ee cmp %rbp,%r14
> 1f: 0f 87 6d fe ff ff ja 0xfffffffffffffe92
> 25: e9 0e ff ff ff jmpq 0xffffffffffffff38
> 2a:* 0f 0b ud2 <-- trapping instruction
> 2c: 48 83 c5 04 add $0x4,%rbp
> 30: 49 39 ee cmp %rbp,%r14
> 33: 0f 87 59 fe ff ff ja 0xfffffffffffffe92
> 39: e9 fa fe ff ff jmpq 0xffffffffffffff38
> 3e: 48 rex.W
> 3f: 89 .byte 0x89
>
> Code starting with the faulting instruction
> ===========================================
> 0: 0f 0b ud2
> 2: 48 83 c5 04 add $0x4,%rbp
> 6: 49 39 ee cmp %rbp,%r14
> 9: 0f 87 59 fe ff ff ja 0xfffffffffffffe68
> f: e9 fa fe ff ff jmpq 0xffffffffffffff0e
> 14: 48 rex.W
> 15: 89 .byte 0x89
> [ 22.078738][ T0] RSP: 0000:ffffffffa2807dc0 EFLAGS: 00010202
> [ 22.080737][ T0] RAX: 0000000000000000 RBX: ffffffffa1b8fe05 RCX: 0000000000000000
> [ 22.082546][ T0] RDX: 000000000000000f RSI: ffffffffa184a3e0 RDI: ffffffffa1b8fe05
> [ 22.083738][ T0] RBP: ffffffffa42851e8 R08: 0000000000000001 R09: ffffffffa1b8fe05
> [ 22.086491][ T0] R10: 0000000000000000 R11: 0000000000000000 R12: ffffffffa1b8fe00
> [ 22.087738][ T0] R13: dffffc0000000000 R14: ffffffffa4299890 R15: 1ffffffff4500fbb
> [ 22.089739][ T0] FS: 0000000000000000(0000) GS:ffff888396600000(0000) knlGS:0000000000000000
> [ 22.091743][ T0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [ 22.093738][ T0] CR2: ffff88843ffff000 CR3: 00000003a562a000 CR4: 00000000000006f0
> [ 22.095753][ T0] Call Trace:
> [ 22.097742][ T0] <TASK>
> [ 22.098765][ T0] ? rwlock_bug+0xc0/0xc0
> [ 22.100230][ T0] ? apply_retpolines (arch/x86/kernel/alternative.c:538)
> [ 22.101791][ T0] ? int3_exception_notify (arch/x86/kernel/alternative.c:849)
> [ 22.103261][ T0] ? check_bugs (arch/x86/kernel/cpu/bugs.c:149)
> [ 22.104751][ T0] alternative_instructions (arch/x86/kernel/alternative.c:932)
> [ 22.106766][ T0] check_bugs (arch/x86/kernel/cpu/bugs.c:159)
> [ 22.108244][ T0] start_kernel (init/main.c:1132)
> [ 22.109747][ T0] secondary_startup_64_no_verify (arch/x86/kernel/head_64.S:358)
> [ 22.111300][ T0] </TASK>
> [ 22.112742][ T0] irq event stamp: 87769
> [ 22.113741][ T0] hardirqs last enabled at (87781): __up_console_sem (arch/x86/include/asm/irqflags.h:45 (discriminator 1) arch/x86/include/asm/irqflags.h:80 (discriminator 1) arch/x86/include/asm/irqflags.h:138 (discriminator 1) kernel/printk/printk.c:264 (discriminator 1))
> [ 22.115740][ T0] hardirqs last disabled at (87794): __up_console_sem (kernel/printk/printk.c:262 (discriminator 1))
> [ 22.117739][ T0] softirqs last enabled at (2774): cgroup_idr_alloc+0x5b/0x1c0
> [ 22.119739][ T0] softirqs last disabled at (2772): cgroup_idr_alloc+0x2e/0x1c0
> [ 22.121741][ T0] ---[ end trace 0000000000000000 ]---
diff --git a/arch/x86/kernel/alternative.c b/arch/x86/kernel/alternative.c
index d6858533e6e5..ff309e829192 100644
--- a/arch/x86/kernel/alternative.c
+++ b/arch/x86/kernel/alternative.c
@@ -555,8 +555,10 @@ void __init_or_module noinline apply_returns(s32 *start, s32 *end)
dest = addr + insn.length + insn.immediate.value;
if (__static_call_fixup(addr, op, dest) ||
- WARN_ON_ONCE(dest != &__x86_return_thunk))
+ WARN_ON_ONCE(dest != &__x86_return_thunk)) {
+ printk("XXX: %pS %pS : %*ph", addr, dest, 5, addr);
continue;
+ }
DPRINTK("return thunk at: %pS (%px) len: %d to: %pS",
addr, addr, insn.length,
Gets me:
[ 2.559091][ T0] ---[ end trace 0000000000000000 ]---
[ 2.561092][ T0] XXX: lkdtm_rodata_do_nothing+0x0/0x1240 lkdtm_rodata_do_nothing+0x5/0x1240 : e9 00 00 00 00
which is a result of:
drivers/misc/lkdtm/Makefile:OBJCOPYFLAGS_rodata_objcopy.o := \
drivers/misc/lkdtm/Makefile: --rename-section .noinstr.text=.rodata,alloc,readonly,load,contents
which makes that:
0000000000000000 <lkdtm_rodata_do_nothing>:
0: e9 00 00 00 00 jmp 5 <lkdtm_rodata_do_nothing+0x5> 1: R_X86_64_PLT32 __x86_return_thunk-0x4
remains unresolved.
Kees, what's up with that thing, this is 'weird' at best.
prev parent reply other threads:[~2022-07-13 12:29 UTC|newest]
Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-07-13 8:02 [x86,static_call] ee88d363d1: WARNING:at_arch/x86/kernel/alternative.c:#apply_returns kernel test robot
2022-07-13 12:28 ` Peter Zijlstra [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
[email protected] \
[email protected] \
[email protected] \
[email protected] \
[email protected] \
[email protected] \
[email protected] \
[email protected] \
[email protected] \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox