lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <5a31cac7.i9WLKx5al8+rBn73%fengguang.wu@intel.com>
Date:   Thu, 14 Dec 2017 08:50:15 +0800
From:   kernel test robot <fengguang.wu@...el.com>
To:     Christoph Hellwig <hch@....de>
Cc:     LKP <lkp@...org>, linux-kernel@...r.kernel.org,
        Linux Memory Management List <linux-mm@...ck.org>,
        Andrew Morton <akpm@...ux-foundation.org>, wfg@...ux.intel.com
Subject: d1fc031747 ("sched/wait: assert the wait_queue_head lock is .."):  EIP: __wake_up_common

Greetings,

0day kernel testing robot got the below dmesg and the first bad commit is

https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master

commit d1fc0317472217762fa7741260ca464077b4c877
Author:     Christoph Hellwig <hch@....de>
AuthorDate: Wed Dec 13 11:52:12 2017 +1100
Commit:     Stephen Rothwell <sfr@...b.auug.org.au>
CommitDate: Wed Dec 13 16:04:58 2017 +1100

    sched/wait: assert the wait_queue_head lock is held in __wake_up_common
    
    Better ensure we actually hold the lock using lockdep than just commenting
    on it.  Due to the various exported _locked interfaces it is far too easy
    to get the locking wrong.
    
    Link: http://lkml.kernel.org/r/20171130142037.19339-2-hch@lst.de
    Signed-off-by: Christoph Hellwig <hch@....de>
    Cc: Ingo Molnar <mingo@...hat.com>
    Cc: Peter Zijlstra <peterz@...radead.org>
    Cc: Al Viro <viro@...iv.linux.org.uk>
    Signed-off-by: Andrew Morton <akpm@...ux-foundation.org>
    Signed-off-by: Stephen Rothwell <sfr@...b.auug.org.au>

3960623f6c  epoll: use the waitqueue lock to protect ep->wq
d1fc031747  sched/wait: assert the wait_queue_head lock is held in __wake_up_common
41d8c16909  Add linux-next specific files for 20171213
+--------------------------------------------------+------------+------------+---------------+
|                                                  | 3960623f6c | d1fc031747 | next-20171213 |
+--------------------------------------------------+------------+------------+---------------+
| boot_successes                                   | 35         | 4          | 47            |
| boot_failures                                    | 0          | 11         | 12            |
| EIP:__wake_up_common                             | 0          | 11         | 12            |
| WARNING:at_kernel/sched/wait.c:#__wake_up_common | 0          | 8          | 11            |
+--------------------------------------------------+------------+------------+---------------+


[main] Couldn't open socket (21:5:0). Address family not suppo

Can'
[   14.081397] CPU: 0 PID: 529 Comm: trinity-c3 Not tainted 4.15.0-rc3-04525-gd1fc031 #1
[   14.082685] EIP: __wake_up_common+0x13b/0x170
[   14.083410] EFLAGS: 00010246 CPU: 0
[   14.083991] EAX: 00000000 EBX: 00000001 ECX: 00000001 EDX: 00000000
[   14.085006] ESI: 8c8e47b0 EDI: 8c8e4780 EBP: 8c9c7e20 ESP: 8c9c7e00
[   14.086017]  DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068
[   14.086903] CR0: 80050033 CR2: 00000309 CR3: 0bcb6000 CR4: 00040694
[   14.087920] Call Trace:
[   14.088341]  __wake_up_locked_key+0x23/0x30
[   14.089035]  userfaultfd_release+0x14c/0x1d0
[   14.089732]  ? _raw_spin_unlock+0x1d/0x30
[   14.090387]  ? locks_remove_file+0x195/0x1e0
[   14.091096]  __fput+0xa4/0x1e0
[   14.091602]  ____fput+0x8/0x10
[   14.092124]  task_work_run+0x87/0xc0
[   14.092723]  do_exit+0x200/0x8f0
[   14.093258]  ? __might_fault+0x41/0xa0
[   14.093880]  ? sched_clock_cpu+0x13/0x180
[   14.094538]  __secure_computing+0x6d/0x70
[   14.095203]  syscall_trace_enter+0x13c/0x1c0
[   14.095906]  do_fast_syscall_32+0x1af/0x340
[   14.096591]  entry_SYSENTER_32+0x53/0x86
[   14.097242] EIP: 0x77f58d25
[   14.097717] EFLAGS: 00000212 CPU: 0
[   14.098289] EAX: ffffffda EBX: 00000007 ECX: 00000000 EDX: 00000000
[   14.099296] ESI: 00000007 EDI: 775e9030 EBP: 0a95d850 ESP: 7fd34bb8
[   14.100309]  DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b
[   14.101188] Code: 14 5b 5e 5f 5d c3 8d 76 00 8d bc 27 00 00 00 00 8d 40 10 ba ff ff ff ff 89 4d f0 e8 20 1a 01 00 8b 4d f0 85 c0 0f 85 e1 fe ff ff <0f> ff e9 da fe ff ff 8d b6 00 00 00 00 8b 4d 10 8b 7d 10 c7 01
[   14.104352] ---[ end trace e8af8f7d2a9d67d8 ]---


                                                          # HH:MM RESULT GOOD BAD GOOD_BUT_DIRTY DIRTY_NOT_BAD
git bisect start 41d8c16909ebda40f7b4982a7f5e2ad102705ade 50c4c4e268a2d7a3e58ebb698ac74da0de40ae36 --
git bisect good 3ad731d278f4701251c8dfb16d45f6d3bc6b158a  # 03:29  G     11     0   11  11  Merge remote-tracking branch 'v4l-dvb-next/master'
git bisect good b2f6fb053a5489d152bf1a1cdfc5c9b1996ce998  # 03:54  G     11     0   11  11  Merge remote-tracking branch 'vfio/next'
git bisect good ec0353a73f73c2709ddb20c6fe7cd5abd1c9a6f7  # 04:19  G     11     0    0   0  Merge remote-tracking branch 'staging/staging-next'
git bisect good 8650eac850bb7b206ac95a0dea9195f1ddf82e1d  # 04:39  G     11     0    0   0  Merge remote-tracking branch 'pwm/for-next'
git bisect good f738c2af2681883a74ee23bbd29d6186dfa421fb  # 05:23  G     11     0    0   0  Merge remote-tracking branch 'at24/at24/for-next'
git bisect good 20015962d5863106692a6acb6eb3a530de3a4625  # 05:44  G     11     0    0   0  Merge remote-tracking branch 'kspp/for-next/kspp'
git bisect good 6c5ee26e760706b3171166ea82797e4c45e92c24  # 06:03  G     11     0    0   0  Merge branch 'akpm-current/current'
git bisect  bad dc2234ac929a2de36784d17ee4a9495404fc4afb  # 06:17  B      0    10   23   0  Merge branch 'akpm/master'
git bisect  bad a3c5bc79e716b7d371df96bf7e1bc17ff4abb196  # 06:49  B      0    11   25   0  mm: remove unneeded kallsyms include
git bisect good 0a8a3bfabca1413f8484fb245d17a4e1ad0208f0  # 07:12  G     11     0    0   0  mm/userfaultfd.c: remove duplicate include
git bisect good 3960623f6c1bc42c545fa43b991ca8fca70f22ad  # 07:37  G     11     0    0   0  epoll: use the waitqueue lock to protect ep->wq
git bisect  bad d1fc0317472217762fa7741260ca464077b4c877  # 08:03  B      0     4   17   0  sched/wait: assert the wait_queue_head lock is held in __wake_up_common
# first bad commit: [d1fc0317472217762fa7741260ca464077b4c877] sched/wait: assert the wait_queue_head lock is held in __wake_up_common
git bisect good 3960623f6c1bc42c545fa43b991ca8fca70f22ad  # 08:15  G     31     0    0   0  epoll: use the waitqueue lock to protect ep->wq
# extra tests with debug options
git bisect  bad d1fc0317472217762fa7741260ca464077b4c877  # 08:29  B      0     6   19   0  sched/wait: assert the wait_queue_head lock is held in __wake_up_common
# extra tests on HEAD of linux-next/master
git bisect  bad 41d8c16909ebda40f7b4982a7f5e2ad102705ade  # 08:29  B      0    12   28   0  Add linux-next specific files for 20171213
# extra tests on tree/branch linux-next/master
git bisect  bad 41d8c16909ebda40f7b4982a7f5e2ad102705ade  # 08:30  B      0    12   28   0  Add linux-next specific files for 20171213
# extra tests with first bad commit reverted
git bisect good 739afa1f8a8a9598a8534a4b62d8382f79d4ca7c  # 08:49  G     11     0    0   0  Revert "sched/wait: assert the wait_queue_head lock is held in __wake_up_common"

---
0-DAY kernel test infrastructure                Open Source Technology Center
https://lists.01.org/pipermail/lkp                          Intel Corporation

Download attachment "dmesg-yocto-vp-19:20171214000714:i386-randconfig-c0-12140116:4.15.0-rc3-04525-gd1fc031:1.gz" of type "application/gzip" (14346 bytes)

View attachment "reproduce-yocto-vp-19:20171214000714:i386-randconfig-c0-12140116:4.15.0-rc3-04525-gd1fc031:1" of type "text/plain" (900 bytes)

View attachment "config-4.15.0-rc3-04525-gd1fc031" of type "text/plain" (88702 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ