lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20220413015330.GA15258@xsang-OptiPlex-9020>
Date:   Wed, 13 Apr 2022 09:53:30 +0800
From:   kernel test robot <oliver.sang@...el.com>
To:     Peter Zijlstra <peterz@...radead.org>
Cc:     Don Hiatt <dhiatt@...italocean.com>,
        Hongyu Ning <hongyu.ning@...ux.intel.com>,
        Vincent Guittot <vincent.guittot@...aro.org>,
        LKML <linux-kernel@...r.kernel.org>, lkp@...ts.01.org,
        lkp@...el.com, aubrey.li@...ux.intel.com, yu.c.chen@...el.com
Subject: [sched/fair]  9099a14708:
 WARNING:at_kernel/sched/fair.c:#select_idle_sibling



Greeting,

FYI, we noticed the following commit (built with gcc-11):

commit: 9099a14708ce1dfecb6002605594a0daa319b555 ("sched/fair: Add a few assertions")
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master

in testcase: boot

on test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):


please be noted the issue is random, but warning reported from the new line in
patch, and we still observed similar issue on mainline, so still report at
least for information, regardingless the commit is quite old.

0cd7c741f01de13d 9099a14708ce1dfecb600260559
---------------- ---------------------------
       fail:runs  %reproduction    fail:runs
           |             |             |
           :60          15%           9:60    dmesg.RIP:select_idle_sibling
           :60          15%           9:60    dmesg.WARNING:at_kernel/sched/fair.c:#select_idle_sibling


If you fix the issue, kindly add following tag
Reported-by: kernel test robot <oliver.sang@...el.com>


[   61.202318][    C1] ------------[ cut here ]------------
[ 61.202335][ C1] WARNING: CPU: 1 PID: 379 at kernel/sched/fair.c:6294 select_idle_sibling (fair.c:?) 
[   61.202352][    C1] Modules linked in:
[   61.202390][    C1] CPU: 1 PID: 379 Comm: lkp-setup-rootf Not tainted 5.13.0-rc1-00089-g9099a14708ce #1
[ 61.202407][ C1] RIP: 0010:select_idle_sibling (fair.c:?) 
[ 61.202425][ C1] Code: 04 85 c0 0f 8f 05 02 00 00 41 89 d8 48 83 c4 20 44 89 c0 5b 41 5c 41 5d 41 5e 41 5f 5d c3 65 8b 05 0b b1 28 52 85 c0 74 c7 90 <0f> 0b 90 89 df e8 10 50 ff ff 85 c0 75 c3 48 c7 c0 80 f1 1e 00 4c
All code
========
   0:	04 85                	add    $0x85,%al
   2:	c0 0f 8f             	rorb   $0x8f,(%rdi)
   5:	05 02 00 00 41       	add    $0x41000002,%eax
   a:	89 d8                	mov    %ebx,%eax
   c:	48 83 c4 20          	add    $0x20,%rsp
  10:	44 89 c0             	mov    %r8d,%eax
  13:	5b                   	pop    %rbx
  14:	41 5c                	pop    %r12
  16:	41 5d                	pop    %r13
  18:	41 5e                	pop    %r14
  1a:	41 5f                	pop    %r15
  1c:	5d                   	pop    %rbp
  1d:	c3                   	retq   
  1e:	65 8b 05 0b b1 28 52 	mov    %gs:0x5228b10b(%rip),%eax        # 0x5228b130
  25:	85 c0                	test   %eax,%eax
  27:	74 c7                	je     0xfffffffffffffff0
  29:	90                   	nop
  2a:*	0f 0b                	ud2    		<-- trapping instruction
  2c:	90                   	nop
  2d:	89 df                	mov    %ebx,%edi
  2f:	e8 10 50 ff ff       	callq  0xffffffffffff5044
  34:	85 c0                	test   %eax,%eax
  36:	75 c3                	jne    0xfffffffffffffffb
  38:	48 c7 c0 80 f1 1e 00 	mov    $0x1ef180,%rax
  3f:	4c                   	rex.WR

Code starting with the faulting instruction
===========================================
   0:	0f 0b                	ud2    
   2:	90                   	nop
   3:	89 df                	mov    %ebx,%edi
   5:	e8 10 50 ff ff       	callq  0xffffffffffff501a
   a:	85 c0                	test   %eax,%eax
   c:	75 c3                	jne    0xffffffffffffffd1
   e:	48 c7 c0 80 f1 1e 00 	mov    $0x1ef180,%rax
  15:	4c                   	rex.WR
[   61.202454][    C1] RSP: 0018:ffff8f540ec330b8 EFLAGS: 00010002
[   61.202486][    C1] RAX: 0000000000000001 RBX: 0000000000000000 RCX: ffffffffadd8ff64
[   61.202505][    C1] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8f540ec5c000
[   61.202520][    C1] RBP: ffff8f540ec33100 R08: 0000000000000000 R09: ffff8f5400503258
[   61.202536][    C1] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8f540ec5c000
[   61.202549][    C1] R13: 0000000000000000 R14: 0000000000000008 R15: 0000000000000001
[   61.202565][    C1] FS:  0000000000000000(0000) GS:ffff8f572fc00000(0000) knlGS:0000000000000000
[   61.202580][    C1] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   61.202592][    C1] CR2: 00007f6ff1dc0c39 CR3: 000000010cc7c000 CR4: 00000000000406a0
[   61.202608][    C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   61.202652][    C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   61.202679][    C1] Call Trace:
[ 61.202687][ C1] ? desc_read (printk_ringbuffer.c:?) 
[ 61.202695][ C1] select_task_rq_fair (fair.c:?) 
[ 61.202704][ C1] try_to_wake_up (core.c:?) 
[ 61.202715][ C1] ? _prb_read_valid (printk_ringbuffer.c:?) 
[ 61.202723][ C1] ? memchr (??:?) 
[ 61.202731][ C1] wake_up_process (??:?) 
[ 61.202740][ C1] __up+0x95/0xa0 
[ 61.202747][ C1] up (??:?) 
[ 61.202754][ C1] ? vprintk_emit (??:?) 
[ 61.202763][ C1] __up_console_sem (printk.c:?) 
[ 61.202775][ C1] console_unlock (??:?) 
[ 61.202784][ C1] vprintk_emit (??:?) 
[ 61.202793][ C1] vprintk_default (??:?) 
[ 61.202802][ C1] vprintk (??:?) 
[ 61.202810][ C1] printk (??:?) 
[ 61.202817][ C1] print_report.cold (report.c:?) 
[ 61.202827][ C1] ? trace_hardirqs_off (??:?) 
[ 61.202836][ C1] ? __tsan_read8 (??:?) 
[ 61.202844][ C1] ? tracer_hardirqs_off (??:?) 
[ 61.202853][ C1] ? trace_hardirqs_off (??:?) 
[ 61.202863][ C1] ? lock_page_memcg (??:?) 
[ 61.202894][ C1] ? kcsan_report (??:?) 
[ 61.202903][ C1] ? kcsan_setup_watchpoint (core.c:?) 
[ 61.202912][ C1] ? __tsan_read8 (??:?) 
[ 61.202921][ C1] ? trace_hardirqs_off (??:?) 
[ 61.202930][ C1] ? lock_page_memcg (??:?) 
[ 61.202940][ C1] ? page_remove_rmap (??:?) 
[ 61.202951][ C1] ? zap_pte_range (memory.c:?) 
[ 61.202960][ C1] ? zap_p4d_range (memory.c:?) 
[ 61.202969][ C1] ? unmap_page_range (??:?) 
[ 61.202980][ C1] ? unmap_vmas (??:?) 
[ 61.202988][ C1] ? exit_mmap (??:?) 
[ 61.202998][ C1] ? mmput (??:?) 
[ 61.203005][ C1] ? exec_mmap (exec.c:?) 
[ 61.203013][ C1] ? begin_new_exec (??:?) 
[ 61.203024][ C1] ? load_elf_binary (binfmt_elf.c:?) 
[ 61.203034][ C1] ? search_binary_handler (exec.c:?) 
[ 61.203045][ C1] ? exec_binprm (exec.c:?) 
[ 61.203055][ C1] ? bprm_execve (exec.c:?) 
[ 61.203064][ C1] ? do_execveat_common (exec.c:?) 
[ 61.203075][ C1] ? __x64_sys_execve (??:?) 
[ 61.203096][ C1] ? do_syscall_64 (??:?) 
[ 61.203106][ C1] ? entry_SYSCALL_64_after_hwframe (??:?) 
[ 61.203117][ C1] kcsan_report (??:?) 
[ 61.203144][ C1] kcsan_setup_watchpoint (core.c:?) 
[ 61.203155][ C1] __tsan_read8 (??:?) 
[ 61.203164][ C1] trace_hardirqs_off (??:?) 
[ 61.203178][ C1] lock_page_memcg (??:?) 
[ 61.203188][ C1] page_remove_rmap (??:?) 
[ 61.203198][ C1] ? mark_page_accessed (??:?) 
[ 61.203209][ C1] zap_pte_range (memory.c:?) 
[ 61.203219][ C1] zap_p4d_range (memory.c:?) 
[ 61.203228][ C1] unmap_page_range (??:?) 
[ 61.203238][ C1] unmap_vmas (??:?) 
[ 61.203247][ C1] exit_mmap (??:?) 
[ 61.203255][ C1] mmput (??:?) 
[ 61.203265][ C1] exec_mmap (exec.c:?) 
[ 61.203273][ C1] begin_new_exec (??:?) 
[ 61.203282][ C1] ? write_comp_data (kcov.c:?) 
[ 61.203291][ C1] ? __sanitizer_cov_trace_cmp8 (??:?) 
[ 61.203302][ C1] load_elf_binary (binfmt_elf.c:?) 
[ 61.203311][ C1] ? search_binary_handler (exec.c:?) 
[ 61.203321][ C1] ? kvm_sched_clock_read (kvmclock.c:?) 
[ 61.203330][ C1] ? sched_clock (??:?) 
[ 61.203340][ C1] ? sched_clock_cpu (??:?) 
[ 61.203348][ C1] ? search_binary_handler (exec.c:?) 
[ 61.203358][ C1] search_binary_handler (exec.c:?) 
[ 61.203369][ C1] exec_binprm (exec.c:?) 
[ 61.203381][ C1] bprm_execve (exec.c:?) 
[ 61.203409][ C1] do_execveat_common (exec.c:?) 
[ 61.203418][ C1] __x64_sys_execve (??:?) 
[ 61.203428][ C1] do_syscall_64 (??:?) 
[ 61.203437][ C1] ? vtime_user_enter (??:?) 
[ 61.203447][ C1] ? __context_tracking_enter (??:?) 
[ 61.203457][ C1] ? irqentry_exit_to_user_mode (??:?) 
[ 61.203469][ C1] ? static_key_count (common.c:?) 
[ 61.203480][ C1] ? do_syscall_64 (??:?) 
[ 61.203490][ C1] entry_SYSCALL_64_after_hwframe (??:?) 
[   61.203500][    C1] RIP: 0033:0x7f6ff1e6b427
[ 61.203510][ C1] Code: Unable to access opcode bytes at RIP 0x7f6ff1e6b3fd.

Code starting with the faulting instruction
===========================================


To reproduce:

        # build kernel
	cd linux
	cp config-5.13.0-rc1-00089-g9099a14708ce .config
	make HOSTCC=gcc-11 CC=gcc-11 ARCH=x86_64 olddefconfig prepare modules_prepare bzImage modules
	make HOSTCC=gcc-11 CC=gcc-11 ARCH=x86_64 INSTALL_MOD_PATH=<mod-install-dir> modules_install
	cd <mod-install-dir>
	find lib/ | cpio -o -H newc --quiet | gzip > modules.cgz


        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        bin/lkp qemu -k <bzImage> -m modules.cgz job-script # job-script is attached in this email

        # if come across any failure that blocks the test,
        # please remove ~/.lkp and /lkp dir to run from a clean state.



-- 
0-DAY CI Kernel Test Service
https://01.org/lkp



View attachment "config-5.13.0-rc1-00089-g9099a14708ce" of type "text/plain" (142189 bytes)

View attachment "job-script" of type "text/plain" (4666 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (121024 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ