lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Sun, 3 Jan 2021 23:03:23 +0800
From:   kernel test robot <oliver.sang@...el.com>
To:     Petr Mladek <pmladek@...e.com>
Cc:     0day robot <lkp@...el.com>, LKML <linux-kernel@...r.kernel.org>,
        lkp@...ts.01.org, Thomas Gleixner <tglx@...utronix.de>,
        Ingo Molnar <mingo@...nel.org>,
        Peter Zijlstra <peterz@...radead.org>,
        Laurence Oberman <loberman@...hat.com>,
        Vincent Whitchurch <vincent.whitchurch@...s.com>,
        Michal Hocko <mhocko@...e.com>, Petr Mladek <pmladek@...e.com>
Subject: 3cc3ef45b2: RIP:version_proc_show


Greeting,

FYI, we noticed the following commit (built with gcc-9):

commit: 3cc3ef45b202a39814f9ce979495d4cc130c2998 ("[PATCH v2 7/7] Test softlockup")
url: https://github.com/0day-ci/linux/commits/Petr-Mladek/watchdog-softlockup-Report-overall-time-and-some-cleanup/20201211-004447
base: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git a2f5ea9e314ba6778f885c805c921e9362ec0420

in testcase: will-it-scale
version: will-it-scale-x86_64-b695a1b-1_20201217
with following parameters:

	nr_task: 16
	mode: thread
	test: dup1
	cpufreq_governor: performance
	ucode: 0x2006a08

test-description: Will It Scale takes a testcase and runs it from 1 through to n parallel copies to see if the testcase will scale. It builds both a process and threads based test in order to see any differences between the two.
test-url: https://github.com/antonblanchard/will-it-scale


on test machine: 104 threads Skylake with 192G memory

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):


+----------------+------------+------------+
|                | 36cc821a5c | 3cc3ef45b2 |
+----------------+------------+------------+
| boot_successes | 7          | 0          |
+----------------+------------+------------+


If you fix the issue, kindly add following tag
Reported-by: kernel test robot <oliver.sang@...el.com>


[   71.563905] watchdog: BUG: soft lockup - CPU#1 stuck for 26s! [perf:2556]
[   71.567713] watchdog: BUG: soft lockup - CPU#89 stuck for 26s! [perf:2463]
[   71.571549] Modules linked in:
[   71.579258] Modules linked in: btrfs
[   71.583153]  btrfs
[   71.583155]  blake2b_generic xor
[   71.587506]  blake2b_generic xor
[   71.590295]  zstd_compress
[   71.594294]  zstd_compress
[   71.598244]  raid6_pq
[   71.601673]  raid6_pq
[   71.605052]  libcrc32c
[   71.607994]  libcrc32c sd_mod
[   71.610890]  sd_mod
[   71.613885]  sg intel_rapl_msr
[   71.617440]  sg
[   71.620110]  intel_rapl_common
[   71.623700]  intel_rapl_msr
[   71.625991]  skx_edac nfit
[   71.629542]  intel_rapl_common
[   71.632828]  libnvdimm
[   71.635968]  skx_edac nfit
[   71.639490]  x86_pkg_temp_thermal intel_powerclamp
[   71.642284]  libnvdimm
[   71.645444]  coretemp
[   71.650664]  x86_pkg_temp_thermal intel_powerclamp
[   71.653486]  kvm_intel kvm
[   71.656188]  coretemp kvm_intel
[   71.661439]  irqbypass
[   71.664562]  kvm irqbypass
[   71.668156]  crct10dif_pclmul crc32_pclmul
[   71.670946]  crct10dif_pclmul crc32_pclmul
[   71.674111]  ast
[   71.678633]  ast
[   71.683172]  crc32c_intel
[   71.685409]  crc32c_intel ipmi_ssif
[   71.687673]  ipmi_ssif
[   71.690688]  ghash_clmulni_intel
[   71.694599]  ghash_clmulni_intel
[   71.697357]  drm_vram_helper drm_ttm_helper
[   71.701005]  drm_vram_helper drm_ttm_helper
[   71.704608]  rapl
[   71.709201]  rapl ttm
[   71.713766]  ttm
[   71.716107]  intel_cstate drm_kms_helper
[   71.718768]  intel_cstate drm_kms_helper
[   71.721031]  syscopyarea nvme
[   71.725347]  syscopyarea nvme
[   71.729673]  sysfillrect ahci
[   71.732998]  sysfillrect
[   71.736335]  sysimgblt nvme_core
[   71.739641]  ahci sysimgblt
[   71.742526]  fb_sys_fops libahci
[   71.746074]  nvme_core fb_sys_fops
[   71.749228]  mei_me acpi_ipmi
[   71.752780]  libahci mei_me
[   71.756540]  intel_uncore drm
[   71.759838]  acpi_ipmi intel_uncore
[   71.762994]  t10_pi ioatdma
[   71.766299]  drm
[   71.770165]  libata
[   71.773300]  t10_pi ioatdma
[   71.775523]  mei ipmi_si
[   71.777964]  libata mei
[   71.781137]  joydev dca
[   71.784012]  ipmi_si joydev
[   71.786832]  wmi ipmi_devintf
[   71.789621]  dca
[   71.792793]  ipmi_msghandler
[   71.796103]  wmi
[   71.798316]  acpi_pad acpi_power_meter
[   71.801532]  ipmi_devintf ipmi_msghandler
[   71.803745]  ip_tables
[   71.807821]  acpi_pad
[   71.812205] 
[   71.812209] CPU: 1 PID: 2556 Comm: perf Not tainted 5.10.0-rc7-g3cc3ef45b202 #1
[   71.814904]  acpi_power_meter ip_tables
[   71.817550] Hardware name: Intel Corporation S2600BT/S2600BT, BIOS SE5C620.86B.1D.01.0147.121320181755 12/13/2018
[   71.817559] RIP: 0010:version_proc_show+0x2f/0x6a
[   71.819377] 
[   71.819380] CPU: 89 PID: 2463 Comm: perf Not tainted 5.10.0-rc7-g3cc3ef45b202 #1
[   71.827068] Code: 55 48 c7 c6 40 e0 04 82 48 89 fd 48 c7 c7 c8 35 37 82 e8 e7 68 ff ff c6 05 6e 61 9b 01 01 8a 05 68 61 9b 01 84 c0 74 04 f3 90 <eb> f2 65 48 8b 04 25 40 6f 01 00 48 8b 80 40 0b 00 00 48 89 ef 48
[   71.827071] RSP: 0018:ffffc9000feafdd0 EFLAGS: 00000202
[   71.831260] Hardware name: Intel Corporation S2600BT/S2600BT, BIOS SE5C620.86B.1D.01.0147.121320181755 12/13/2018
[   71.841939] 
[   71.841941] RAX: 0000000000000001 RBX: ffff88814503bf78 RCX: 0000000000000000
[   71.847043] RIP: 0010:version_proc_show+0x29/0x6a
[   71.848967] RDX: 0000000000000000 RSI: ffff8897e0457ce0 RDI: ffff8897e0457ce0
[   71.848969] RBP: ffff88814503bf78 R08: ffff8897e0457ce0 R09: ffffc9000feafbf0
[   71.856781] Code: c3 0f 1f 44 00 00 55 48 c7 c6 40 e0 04 82 48 89 fd 48 c7 c7 c8 35 37 82 e8 e7 68 ff ff c6 05 6e 61 9b 01 01 8a 05 68 61 9b 01 <84> c0 74 04 f3 90 eb f2 65 48 8b 04 25 40 6f 01 00 48 8b 80 40 0b
[   71.876442] R10: 0000000000000001 R11: 0000000000000001 R12: ffffc9000feafe88
[   71.876444] R13: ffffc9000feafe60 R14: ffff88814503bfa0 R15: 0000000000000001
[   71.882140] RSP: 0018:ffffc90020f07dd0 EFLAGS: 00000202
[   71.892930] FS:  00007f2ea8803d40(0000) GS:ffff8897e0440000(0000) knlGS:0000000000000000
[   71.892933] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   71.894934] RAX: 0000000000000001 RBX: ffff88b03967cf78 RCX: 0000000000000000
[   71.894937] RDX: 0000000000000000 RSI: ffff88afbcf57ce0 RDI: ffff88afbcf57ce0
[   71.902631] CR2: 0000557da575e600 CR3: 0000000165fa6004 CR4: 00000000007706e0
[   71.902633] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   71.907872] RBP: ffff88b03967cf78 R08: ffff88afbcf57ce0 R09: ffffc90020f07bf0
[   71.907874] R10: 0000000000000001 R11: 0000000000000001 R12: ffffc90020f07e88
[   71.915584] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400


To reproduce:

        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        bin/lkp install job.yaml  # job file is attached in this email
        bin/lkp run     job.yaml



Thanks,
Oliver Sang


View attachment "config-5.10.0-rc7-g3cc3ef45b202" of type "text/plain" (171047 bytes)

View attachment "job-script" of type "text/plain" (7656 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (32000 bytes)

View attachment "job.yaml" of type "text/plain" (4922 bytes)

View attachment "reproduce" of type "text/plain" (335 bytes)

Powered by blists - more mailing lists