[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20190412141927.GA24200@shao2-debian>
Date: Fri, 12 Apr 2019 22:19:27 +0800
From: kernel test robot <rong.a.chen@...el.com>
To: Mina Almasry <almasrymina@...gle.com>
Cc: Mina Almasry <almasrymina@...gle.com>,
Greg Thelen <gthelen@...gle.com>,
Shakeel B <shakeelb@...gle.com>,
Alexander Viro <viro@...iv.linux.org.uk>,
linux-fsdevel@...r.kernel.org, linux-kernel@...r.kernel.org,
lkp@...org
Subject: [fs] 853fbf8946: BUG:unable_to_handle_kernel
FYI, we noticed the following commit (built with gcc-7):
commit: 853fbf894629ed7df6b3d494bdf0dca547325188 ("[PATCH] fs: Fix ovl_i_mutex_dir_key/p->lock/cred cred_guard_mutex deadlock")
url: https://github.com/0day-ci/linux/commits/Mina-Almasry/fs-Fix-ovl_i_mutex_dir_key-p-lock-cred-cred_guard_mutex-deadlock/20190412-080519
in testcase: boot
on test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 2G
caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):
+-------------------------------------------------+------------+------------+
| | 582549e3fb | 853fbf8946 |
+-------------------------------------------------+------------+------------+
| boot_successes | 39 | 0 |
| boot_failures | 24 | 5 |
| BUG:kernel_reboot-without-warning_in_test_stage | 24 | |
| BUG:unable_to_handle_kernel | 0 | 5 |
| Oops:#[##] | 0 | 5 |
| RIP:kfree | 0 | 5 |
| Kernel_panic-not_syncing:Fatal_exception | 0 | 5 |
+-------------------------------------------------+------------+------------+
[ 0.775676] BUG: unable to handle kernel paging request at ffffebe9e000cac8
[ 0.775676] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645041785100000 ns
[ 0.775676] #PF error: [normal kernel read fault]
[ 0.775676] PGD 0 P4D 0
[ 0.775676] Oops: 0000 [#1] SMP PTI
[ 0.775676] CPU: 1 PID: 21 Comm: kworker/u4:0 Not tainted 5.1.0-rc4-00059-g853fbf8 #2
[ 0.775676] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014
[ 0.775676] RIP: 0010:kfree+0xa1/0x153
[ 0.779952] futex hash table entries: 512 (order: 3, 32768 bytes)
[ 0.780581] xor: automatically using best checksumming function avx
[ 0.779965] Code: 15 9c 1a 16 01 48 01 d8 72 0e 49 c7 c2 00 00 00 80 4c 2b 15 01 93 0b 01 49 01 c2 49 c1 ea 0c 49 c1 e2 06 4c 03 15 df 92 0b 01 <49> 8b 42 08 a8 01 74 04 4c 8d 50 ff 49 8b 52 08 4c 89 d0 f6 c2 01
[ 0.779965] RSP: 0000:ffffc900003cbe60 EFLAGS: 00010286
[ 0.779965] RAX: 000002f88032b644 RBX: 000002f80032b644 RCX: 0000000000000000
[ 0.779965] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000002f80032b644
[ 0.779965] RBP: ffffc900003cbf08 R08: 0000000080000000 R09: ffffc900003cba68
[ 0.779965] R10: ffffebe9e000cac0 R11: 8080808080808080 R12: ffffffff812dcc00
[ 0.779965] R13: 00000000fffffffe R14: 00000000ffffff9c R15: 0000000000000000
[ 0.779965] FS: 0000000000000000(0000) GS:ffff88806e700000(0000) knlGS:0000000000000000
[ 0.782372] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 0.782372] CR2: ffffebe9e000cac8 CR3: 000000000240e000 CR4: 00000000000406e0
[ 0.782372] Call Trace:
[ 0.782372] free_bprm+0x73/0x7c
[ 0.782372] __do_execve_file+0x720/0x7a6
[ 0.782372] do_execve+0x21/0x24
[ 0.782372] call_usermodehelper_exec_async+0x141/0x16c
[ 0.782372] ? umh_complete+0x1a/0x1a
[ 0.782372] ret_from_fork+0x3a/0x50
[ 0.782372] Modules linked in:
[ 0.782372] CR2: ffffebe9e000cac8
[ 0.782372] ---[ end trace 803d9c656c15319d ]---
To reproduce:
# build kernel
cd linux
cp config-5.1.0-rc4-00059-g853fbf8 .config
make HOSTCC=gcc-7 CC=gcc-7 ARCH=x86_64 olddefconfig
make HOSTCC=gcc-7 CC=gcc-7 ARCH=x86_64 prepare
make HOSTCC=gcc-7 CC=gcc-7 ARCH=x86_64 modules_prepare
make HOSTCC=gcc-7 CC=gcc-7 ARCH=x86_64 SHELL=/bin/bash
make HOSTCC=gcc-7 CC=gcc-7 ARCH=x86_64 bzImage
git clone https://github.com/intel/lkp-tests.git
cd lkp-tests
bin/lkp qemu -k <bzImage> job-script # job-script is attached in this email
Thanks,
Rong Chen
View attachment "config-5.1.0-rc4-00059-g853fbf8" of type "text/plain" (109610 bytes)
Download attachment "dmesg.xz" of type "application/x-xz" (6168 bytes)
Powered by blists - more mailing lists