lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20210618082217.GA18386@xsang-OptiPlex-9020>
Date:   Fri, 18 Jun 2021 16:22:17 +0800
From:   kernel test robot <oliver.sang@...el.com>
To:     "Darrick J. Wong" <djwong@...nel.org>
Cc:     LKML <linux-kernel@...r.kernel.org>,
        "Darrick J. Wong" <darrick.wong@...cle.com>, lkp@...ts.01.org,
        lkp@...el.com
Subject: [xfs]  18bb7d74fb: Assertion_failed



Greeting,

FYI, we noticed the following commit (built with gcc-9):

commit: 18bb7d74fbd6886c19068d0f6eea3d983ebf4c23 ("xfs: allow queued AG intents to drain before scrubbing")
https://git.kernel.org/cgit/linux/kernel/git/djwong/xfs-linux.git scrub-drain-intents


in testcase: xfstests
version: xfstests-x86_64-820b5e3-1_20210609
with following parameters:

	disk: 4HDD
	fs: xfs
	test: xfs-reflink-15
	ucode: 0x28

test-description: xfstests is a regression test suite for xfs and other files ystems.
test-url: git://git.kernel.org/pub/scm/fs/xfs/xfstests-dev.git


on test machine: 8 threads 1 sockets Intel(R) Core(TM) i7-4790 v3 @ 3.60GHz with 6G memory

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):



If you fix the issue, kindly add following tag
Reported-by: kernel test robot <oliver.sang@...el.com>



[   67.979803] XFS (sdb4): Unmounting Filesystem
[   68.939007] XFS (sdb4): Mounting V5 Filesystem
[   68.983028] XFS (sdb4): Ending clean mount
[   69.017237] xfs filesystem being mounted at /fs/scratch supports timestamps until 2038 (0x7fffffff)
[   69.257224] XFS (sdb4): Unmounting Filesystem
[   69.321334] XFS: Assertion failed: atomic_read(&pag->pag_intents) == 0, file: fs/xfs/xfs_mount.c, line: 152
[   69.331066] ------------[ cut here ]------------
[   69.335675] kernel BUG at fs/xfs/xfs_message.c:110!
[   69.340564] invalid opcode: 0000 [#1] SMP PTI
[   69.344918] CPU: 3 PID: 12251 Comm: umount Not tainted 5.13.0-rc6-00320-g18bb7d74fbd6 #1
[   69.352995] Hardware name: Dell Inc. OptiPlex 9020/03CPWF, BIOS A11 04/01/2015
[   69.360198] RIP: 0010:assfail (kbuild/src/consumer/fs/xfs/./xfs_trace.h:164) xfs
[ 69.364634] Code: 67 fc ff ff 0f 0b c3 0f 1f 44 00 00 41 89 c8 48 89 d1 48 89 f2 48 c7 c6 80 48 81 c0 e8 82 f9 ff ff 80 3d 24 df 0c 00 00 74 02 <0f> 0b 0f 0b c3 48 8d 45 10 48 89 e2 4c 89 e6 48 89 1c 24 48 89 44
All code
========
   0:	67 fc                	addr32 cld 
   2:	ff                   	(bad)  
   3:	ff 0f                	decl   (%rdi)
   5:	0b c3                	or     %ebx,%eax
   7:	0f 1f 44 00 00       	nopl   0x0(%rax,%rax,1)
   c:	41 89 c8             	mov    %ecx,%r8d
   f:	48 89 d1             	mov    %rdx,%rcx
  12:	48 89 f2             	mov    %rsi,%rdx
  15:	48 c7 c6 80 48 81 c0 	mov    $0xffffffffc0814880,%rsi
  1c:	e8 82 f9 ff ff       	callq  0xfffffffffffff9a3
  21:	80 3d 24 df 0c 00 00 	cmpb   $0x0,0xcdf24(%rip)        # 0xcdf4c
  28:	74 02                	je     0x2c
  2a:*	0f 0b                	ud2    		<-- trapping instruction
  2c:	0f 0b                	ud2    
  2e:	c3                   	retq   
  2f:	48 8d 45 10          	lea    0x10(%rbp),%rax
  33:	48 89 e2             	mov    %rsp,%rdx
  36:	4c 89 e6             	mov    %r12,%rsi
  39:	48 89 1c 24          	mov    %rbx,(%rsp)
  3d:	48                   	rex.W
  3e:	89                   	.byte 0x89
  3f:	44                   	rex.R

Code starting with the faulting instruction
===========================================
   0:	0f 0b                	ud2    
   2:	0f 0b                	ud2    
   4:	c3                   	retq   
   5:	48 8d 45 10          	lea    0x10(%rbp),%rax
   9:	48 89 e2             	mov    %rsp,%rdx
   c:	4c 89 e6             	mov    %r12,%rsi
   f:	48 89 1c 24          	mov    %rbx,(%rsp)
  13:	48                   	rex.W
  14:	89                   	.byte 0x89
  15:	44                   	rex.R
[   69.383359] RSP: 0018:ffffc9000996fdf0 EFLAGS: 00010202
[   69.388568] RAX: 0000000000000000 RBX: ffff888191d86000 RCX: 0000000000000000
[   69.395683] RDX: 00000000ffffffc0 RSI: 000000000000000a RDI: ffffffffc0805241
[   69.402799] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[   69.409921] R10: 000000000000000a R11: f000000000000000 R12: ffff888192010580
[   69.417045] R13: ffff888192010000 R14: ffff888192010570 R15: ffff888191774f80
[   69.424161] FS:  00007f9f57447080(0000) GS:ffff88819eac0000(0000) knlGS:0000000000000000
[   69.432229] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   69.437958] CR2: 000055acc59e3ae8 CR3: 0000000191c4e003 CR4: 00000000001706e0
[   69.445072] Call Trace:
[   69.447513] xfs_free_perag (kbuild/src/consumer/fs/xfs/xfs_mount.c:152 (discriminator 1)) xfs
[   69.451917] xfs_unmountfs (kbuild/src/consumer/fs/xfs/xfs_mount.c:1239) xfs
[   69.456152] xfs_fs_put_super (kbuild/src/consumer/fs/xfs/xfs_super.c:1099) xfs
[   69.460553] generic_shutdown_super (kbuild/src/consumer/include/linux/list.h:282 kbuild/src/consumer/fs/super.c:467) 
[   69.464987] kill_block_super (kbuild/src/consumer/fs/super.c:1396) 


To reproduce:

        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        bin/lkp install                job.yaml  # job file is attached in this email
        bin/lkp split-job --compatible job.yaml  # generate the yaml file for lkp run
        bin/lkp run                    generated-yaml-file



---
0DAY/LKP+ Test Infrastructure                   Open Source Technology Center
https://lists.01.org/hyperkitty/list/lkp@lists.01.org       Intel Corporation

Thanks,
Oliver Sang


View attachment "config-5.13.0-rc6-00320-g18bb7d74fbd6" of type "text/plain" (174182 bytes)

View attachment "job-script" of type "text/plain" (5762 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (25792 bytes)

View attachment "job.yaml" of type "text/plain" (4676 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ