lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <202212301353.5c959d72-yujie.liu@intel.com>
Date:   Fri, 30 Dec 2022 14:48:21 +0800
From:   kernel test robot <yujie.liu@...el.com>
To:     Mathieu Desnoyers <mathieu.desnoyers@...icios.com>
CC:     <oe-lkp@...ts.linux.dev>, <lkp@...el.com>,
        Peter Zijlstra <peterz@...radead.org>,
        <linux-kernel@...r.kernel.org>, <x86@...nel.org>,
        <linux-mm@...ck.org>
Subject: [tip:sched/core] [sched] af7f588d8f:
 WARNING:at_kernel/sched/core.c:#sched_mm_cid_after_execve

Greeting,

FYI, we noticed WARNING:at_kernel/sched/core.c:#sched_mm_cid_after_execve due to commit (built with gcc-11):

commit: af7f588d8f7355bc4298dd1962d7826358fc95f0 ("sched: Introduce per-memory-map concurrency ID")
https://git.kernel.org/cgit/linux/kernel/git/tip/tip.git sched/core

in testcase: boot

on test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):


[   17.705597][   T48] ------------[ cut here ]------------
[ 17.706795][ T48] WARNING: CPU: 0 PID: 48 at kernel/sched/core.c:11344 sched_mm_cid_after_execve (??:?) 
[   17.708842][   T48] Modules linked in:
[   17.709685][   T48] CPU: 0 PID: 48 Comm: kworker/u4:0 Tainted: G                T  6.2.0-rc1-00009-gaf7f588d8f73 #1
[   17.725504][   T48] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-debian-1.16.0-5 04/01/2014
[ 17.727337][ T48] RIP: 0010:sched_mm_cid_after_execve (??:?) 
[ 17.728520][ T48] Code: 00 20 75 17 4d 85 ed 75 09 48 ff 05 b9 e6 9e 04 eb 09 48 ff 05 b8 e6 9e 04 eb 20 48 ff 05 b7 e6 9e 04 90 48 ff 05 b7 e6 9e 04 <0f> 0b 48 ff 05 b6 e6 9e 04 90 48 ff 05 b6 e6 9e 04 9c 58 48 ff 05
All code
========
   0:	00 20                	add    %ah,(%rax)
   2:	75 17                	jne    0x1b
   4:	4d 85 ed             	test   %r13,%r13
   7:	75 09                	jne    0x12
   9:	48 ff 05 b9 e6 9e 04 	incq   0x49ee6b9(%rip)        # 0x49ee6c9
  10:	eb 09                	jmp    0x1b
  12:	48 ff 05 b8 e6 9e 04 	incq   0x49ee6b8(%rip)        # 0x49ee6d1
  19:	eb 20                	jmp    0x3b
  1b:	48 ff 05 b7 e6 9e 04 	incq   0x49ee6b7(%rip)        # 0x49ee6d9
  22:	90                   	nop
  23:	48 ff 05 b7 e6 9e 04 	incq   0x49ee6b7(%rip)        # 0x49ee6e1
  2a:*	0f 0b                	ud2    		<-- trapping instruction
  2c:	48 ff 05 b6 e6 9e 04 	incq   0x49ee6b6(%rip)        # 0x49ee6e9
  33:	90                   	nop
  34:	48 ff 05 b6 e6 9e 04 	incq   0x49ee6b6(%rip)        # 0x49ee6f1
  3b:	9c                   	pushfq 
  3c:	58                   	pop    %rax
  3d:	48                   	rex.W
  3e:	ff                   	.byte 0xff
  3f:	05                   	.byte 0x5

Code starting with the faulting instruction
===========================================
   0:	0f 0b                	ud2    
   2:	48 ff 05 b6 e6 9e 04 	incq   0x49ee6b6(%rip)        # 0x49ee6bf
   9:	90                   	nop
   a:	48 ff 05 b6 e6 9e 04 	incq   0x49ee6b6(%rip)        # 0x49ee6c7
  11:	9c                   	pushfq 
  12:	58                   	pop    %rax
  13:	48                   	rex.W
  14:	ff                   	.byte 0xff
  15:	05                   	.byte 0x5
[   17.732461][   T48] RSP: 0000:ffffc900001afea8 EFLAGS: 00010202
[   17.733671][   T48] RAX: fffffffffffffffe RBX: ffff88810d0fc000 RCX: 0000000000000000
[   17.735287][   T48] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff88810d0fc000
[   17.736888][   T48] RBP: ffffc900001afec0 R08: 0000000000000000 R09: 0000000000000000
[   17.738459][   T48] R10: 0000000000000000 R11: 0000000000000000 R12: ffff88810d0fc000
[   17.740095][   T48] R13: 0000000000000000 R14: 0000000000000000 R15: ffff88810d0fc000
[   17.741661][   T48] FS:  0000000000000000(0000) GS:ffff88842fa00000(0000) knlGS:0000000000000000
[   17.743440][   T48] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   17.744623][   T48] CR2: ffff88843ffff000 CR3: 0000000003e24000 CR4: 00000000000406f0
[   17.746241][   T48] Call Trace:
[   17.746912][   T48]  <TASK>
[ 17.747520][ T48] bprm_execve (exec.c:?) 
[ 17.748358][ T48] ? call_usermodehelper_exec_work (umh.c:?) 
[ 17.749462][ T48] kernel_execve (??:?) 
[ 17.750332][ T48] call_usermodehelper_exec_async (umh.c:?) 
[ 17.751363][ T48] ? call_usermodehelper_exec_work (umh.c:?) 
[ 17.752163][ T48] ret_from_fork (??:?) 
[   17.752648][   T48]  </TASK>
[   17.752951][   T48] irq event stamp: 395
[ 17.753354][ T48] hardirqs last enabled at (403): __up_console_sem (printk.c:?) 
[ 17.754946][ T48] hardirqs last disabled at (410): __up_console_sem (printk.c:?) 
[ 17.756385][ T48] softirqs last enabled at (278): __do_softirq (??:?) 
[ 17.757317][ T48] softirqs last disabled at (273): __irq_exit_rcu (softirq.c:?) 
[   17.758540][   T48] ---[ end trace 0000000000000000 ]---


If you fix the issue, kindly add following tag
| Reported-by: kernel test robot <yujie.liu@...el.com>
| Link: https://lore.kernel.org/oe-lkp/202212301353.5c959d72-yujie.liu@intel.com


To reproduce:

        # build kernel
	cd linux
	cp config-6.2.0-rc1-00009-gaf7f588d8f73 .config
	make HOSTCC=gcc-11 CC=gcc-11 ARCH=x86_64 olddefconfig prepare modules_prepare bzImage modules
	make HOSTCC=gcc-11 CC=gcc-11 ARCH=x86_64 INSTALL_MOD_PATH=<mod-install-dir> modules_install
	cd <mod-install-dir>
	find lib/ | cpio -o -H newc --quiet | gzip > modules.cgz


        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        bin/lkp qemu -k <bzImage> -m modules.cgz job-script # job-script is attached in this email

        # if come across any failure that blocks the test,
        # please remove ~/.lkp and /lkp dir to run from a clean state.


-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests

View attachment "config-6.2.0-rc1-00009-gaf7f588d8f73" of type "text/plain" (151049 bytes)

View attachment "job-script" of type "text/plain" (4732 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (23744 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ