lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20171028183506.zbulmpxdvvantjtb@inn>
Date:   Sun, 29 Oct 2017 02:35:06 +0800
From:   kernel test robot <fengguang.wu@...el.com>
To:     Will Deacon <will.deacon@....com>
Cc:     linux-kernel@...r.kernel.org, Will Deacon <will.deacon@....com>,
        Mark Rutland <mark.rutland@....com>,
        Al Viro <viro@...iv.linux.org.uk>,
        Andrea Arcangeli <aarcange@...hat.com>,
        "Rafael J. Wysocki" <rjw@...ysocki.net>, stable@...r.kernel.org,
        lkp@...org
Subject: [fs/userfaultfd]  d9e2304493:
 WARNING:at_kernel/sched/core.c:#__might_sleep

FYI, we noticed the following commit (built with gcc-6):

commit: d9e230449345e80bb364545a34e6658b6b36ad9e ("fs/userfaultfd: Don't try to freeze uninterruptible tasks")
url: https://github.com/0day-ci/linux/commits/Will-Deacon/fs-userfaultfd-Don-t-try-to-freeze-uninterruptible-tasks/20171023-204514


in testcase: stress-ng
with following parameters:

	testtime: 1s
	class: vm
	cpufreq_governor: performance



on test machine: 88 threads Intel(R) Xeon(R) CPU E5-2699 v4 @ 2.20GHz with 128G memory

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):


+----------------------------------------------------------------------------------+------------+------------+
|                                                                                  | 02982f8550 | d9e2304493 |
+----------------------------------------------------------------------------------+------------+------------+
| boot_successes                                                                   | 3          | 19         |
| boot_failures                                                                    | 3          | 17         |
| ACPI_Error:Method_parse/execution_failed~_SB.PMI0._PMC,AE_NOT_EXIST(#/psparse-#) | 3          |            |
| ACPI_Error:Region_IPMI(ID=#)has_no_handler(#/exfldio-#)                          | 1          |            |
| WARNING:at_kernel/sched/core.c:#__might_sleep                                    | 0          | 17         |
+----------------------------------------------------------------------------------+------------+------------+



[  194.995482] WARNING: CPU: 70 PID: 13739 at kernel/sched/core.c:5988 __might_sleep+0x72/0x80
[  195.007786] Modules linked in: rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver intel_rapl sd_mod sg sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm irqbypass crct10dif_pclmul crc32_pclmul crc32c_intel mgag200 ghash_clmulni_intel ttm pcbc drm_kms_helper snd_pcm syscopyarea aesni_intel sysfillrect snd_timer ahci crypto_simd sysimgblt snd libahci fb_sys_fops glue_helper soundcore drm mxm_wmi pcspkr cryptd libata shpchp ipmi_si ipmi_devintf ipmi_msghandler acpi_pad wmi acpi_power_meter ip_tables
[  195.065730] CPU: 70 PID: 13739 Comm: stress-ng-userf Not tainted 4.14.0-rc5-00299-gd9e2304 #3
[  195.076889] Hardware name: Intel Corporation S2600WT2R/S2600WT2R, BIOS SE5C610.86B.01.01.0020.122820161512 12/28/2016
[  195.090406] task: ffff881ecabc0000 task.stack: ffffc9002088c000
[  195.098689] RIP: 0010:__might_sleep+0x72/0x80
[  195.105208] RSP: 0018:ffffc9002088fca0 EFLAGS: 00010286
[  195.112684] RAX: 000000000000006d RBX: ffffffff81ca2270 RCX: 0000000000000000
[  195.122306] RDX: ffff882022e96180 RSI: ffff882022e8e018 RDI: ffff882022e8e018
[  195.132055] RBP: ffffc9002088fcb8 R08: 000077ff80000000 R09: 000000000000aef7
[  195.141773] R10: ffffc90006613e70 R11: 00000000000003b8 R12: 0000000000000038
[  195.151465] R13: 0000000000000000 R14: ffff881ecabc0000 R15: ffff881ecabc0000
[  195.161168] FS:  00007f6165522700(0000) GS:ffff882022e80000(0000) knlGS:0000000000000000
[  195.171954] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  195.180110] CR2: 00007f6165002750 CR3: 0000000f3d662002 CR4: 00000000003606e0
[  195.189812] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  195.199515] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  195.209214] Call Trace:
[  195.213640]  ? handle_userfault+0x32e/0x6d0
[  195.219979]  handle_userfault+0x39b/0x6d0
[  195.226132]  ? userfaultfd_read+0x710/0x710
[  195.232462]  __handle_mm_fault+0x10d2/0x1130
[  195.238855]  handle_mm_fault+0xe7/0x1e0
[  195.244737]  __do_page_fault+0x251/0x4f0
[  195.250718]  do_page_fault+0x38/0x130
[  195.256392]  page_fault+0x22/0x30
[  195.261652] RIP: 0033:0x55dc090745f8
[  195.267177] RSP: 002b:000055dc09840080 EFLAGS: 00010206
[  195.274580] RAX: 00007f6151b00000 RBX: 00007ffdc4e6f740 RCX: 00007f6164d48077
[  195.284124] RDX: 0000000000000004 RSI: 0000000010000000 RDI: 00007f614f5e1000
[  195.293652] RBP: 00007f615f5e1000 R08: 0000000000000000 R09: 0000000000000000
[  195.303150] R10: 000000000000064b R11: 0000000000000206 R12: 0000000000000000
[  195.312659] R13: 0000000000000000 R14: 00007f614f5e1000 R15: 0000000000001000
[  195.322161] Code: fe ff ff 5b 41 5c 41 5d 5d c3 48 8b 90 d8 21 00 00 48 8b 70 08 48 c7 c7 60 67 ca 81 c6 05 05 34 f7 00 01 48 89 d1 e8 ef 85 03 00 <0f> ff eb c6 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 55 48 
[  195.346197] ---[ end trace 64aba37dbb254166 ]---


To reproduce:

        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        bin/lkp install job.yaml  # job file is attached in this email
        bin/lkp run     job.yaml



Thanks,
lkp

View attachment "config-4.14.0-rc5-00299-gd9e2304" of type "text/plain" (163200 bytes)

View attachment "job-script" of type "text/plain" (6627 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (116636 bytes)

View attachment "stress-ng" of type "text/plain" (2601 bytes)

View attachment "job.yaml" of type "text/plain" (4332 bytes)

View attachment "reproduce" of type "text/plain" (254 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ