lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:   Sat, 10 Jun 2023 23:15:34 +0800
From:   kernel test robot <oliver.sang@...el.com>
To:     Tejun Heo <tj@...nel.org>
CC:     <oe-lkp@...ts.linux.dev>, <lkp@...el.com>,
        <linux-kernel@...r.kernel.org>, <oliver.sang@...el.com>
Subject: [tj-wq:affinity-scopes-dbg-invalid-cpu] [workqueue] 3dc062d6ad:
 WARNING:at_kernel/workqueue.c:#kick_pool


hi, Tejun Heo,

we noticed this is a DEBUG PATCH, and in our boot tests on vm, the WARNING
you added is hit. not sure if this report is useable to you. just FYI


Hello,

kernel test robot noticed "WARNING:at_kernel/workqueue.c:#kick_pool" on:

commit: 3dc062d6add06ae7896803e807ea8b4971135f39 ("workqueue: DEBUG PATCH")
https://git.kernel.org/cgit/linux/kernel/git/tj/wq.git affinity-scopes-dbg-invalid-cpu

in testcase: boot

compiler: gcc-12
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G

(please refer to attached dmesg/kmsg for entire log/backtrace)



If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@...el.com>
| Closes: https://lore.kernel.org/oe-lkp/202306102251.61f5a4f9-oliver.sang@intel.com


[    2.179626][    T1] ------------[ cut here ]------------
[ 2.180364][ T1] WARNING: CPU: 0 PID: 1 at kernel/workqueue.c:1130 kick_pool (workqueue.c:?) 
[    2.180364][    T1] Modules linked in:
[    2.180364][    T1] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 6.4.0-rc1-00036-g3dc062d6add0 #1
[ 2.180364][ T1] EIP: kick_pool (workqueue.c:?) 
[ 2.180364][ T1] Code: 78 0c 00 75 41 8b 57 40 0f a3 50 08 72 38 8b 43 40 8d 70 fc 8b 83 10 02 00 00 83 c0 08 e8 15 93 8d 00 3b 05 78 0c 31 c2 72 04 <0f> 0b eb 03 89 47 40 89 f0 e8 f5 f6 ff ff 83 80 9c 00 00 00 01 83
All code
========
   0:	78 0c                	js     0xe
   2:	00 75 41             	add    %dh,0x41(%rbp)
   5:	8b 57 40             	mov    0x40(%rdi),%edx
   8:	0f a3 50 08          	bt     %edx,0x8(%rax)
   c:	72 38                	jb     0x46
   e:	8b 43 40             	mov    0x40(%rbx),%eax
  11:	8d 70 fc             	lea    -0x4(%rax),%esi
  14:	8b 83 10 02 00 00    	mov    0x210(%rbx),%eax
  1a:	83 c0 08             	add    $0x8,%eax
  1d:	e8 15 93 8d 00       	callq  0x8d9337
  22:	3b 05 78 0c 31 c2    	cmp    -0x3dcef388(%rip),%eax        # 0xffffffffc2310ca0
  28:	72 04                	jb     0x2e
  2a:*	0f 0b                	ud2    		<-- trapping instruction
  2c:	eb 03                	jmp    0x31
  2e:	89 47 40             	mov    %eax,0x40(%rdi)
  31:	89 f0                	mov    %esi,%eax
  33:	e8 f5 f6 ff ff       	callq  0xfffffffffffff72d
  38:	83 80 9c 00 00 00 01 	addl   $0x1,0x9c(%rax)
  3f:	83                   	.byte 0x83

Code starting with the faulting instruction
===========================================
   0:	0f 0b                	ud2    
   2:	eb 03                	jmp    0x7
   4:	89 47 40             	mov    %eax,0x40(%rdi)
   7:	89 f0                	mov    %esi,%eax
   9:	e8 f5 f6 ff ff       	callq  0xfffffffffffff703
   e:	83 80 9c 00 00 00 01 	addl   $0x1,0x9c(%rax)
  15:	83                   	.byte 0x83
[    2.180364][    T1] EAX: 00000002 EBX: eb8d4780 ECX: 00000000 EDX: 00000000
[    2.180364][    T1] ESI: c21d03ac EDI: c31e1340 EBP: c3171f48 ESP: c3171f3c
[    2.180364][    T1] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00010046
[    2.180364][    T1] CR0: 80050033 CR2: ff7ff000 CR3: 023e3000 CR4: 000406b0
[    2.180364][    T1] Call Trace:
[ 2.180364][ T1] create_worker (workqueue.c:?) 
[ 2.180364][ T1] workqueue_init (??:?) 
[ 2.180364][ T1] kernel_init_freeable (main.c:?) 
[ 2.180364][ T1] ? rest_init (main.c:?) 
[ 2.180364][ T1] kernel_init (main.c:?) 
[ 2.180364][ T1] ret_from_fork (??:?) 
[    2.180364][    T1] irq event stamp: 196
[ 2.180364][ T1] hardirqs last enabled at (195): _raw_spin_unlock_irqrestore (??:?) 
[ 2.180364][ T1] hardirqs last disabled at (196): _raw_spin_lock_irq (??:?) 
[ 2.180364][ T1] softirqs last enabled at (0): copy_process (??:?) 
[ 2.180364][ T1] softirqs last disabled at (0): 0x0 
[    2.180364][    T1] ---[ end trace 0000000000000000 ]---
[    2.181060][    T1] cblist_init_generic: Setting adjustable number of callback queues.


To reproduce:

        # build kernel
	cd linux
	cp config-6.4.0-rc1-00036-g3dc062d6add0 .config
	make HOSTCC=gcc-12 CC=gcc-12 ARCH=i386 olddefconfig prepare modules_prepare bzImage modules
	make HOSTCC=gcc-12 CC=gcc-12 ARCH=i386 INSTALL_MOD_PATH=<mod-install-dir> modules_install
	cd <mod-install-dir>
	find lib/ | cpio -o -H newc --quiet | gzip > modules.cgz


        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        bin/lkp qemu -k <bzImage> -m modules.cgz job-script # job-script is attached in this email

        # if come across any failure that blocks the test,
        # please remove ~/.lkp and /lkp dir to run from a clean state.



-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki



View attachment "config-6.4.0-rc1-00036-g3dc062d6add0" of type "text/plain" (154446 bytes)

View attachment "job-script" of type "text/plain" (4949 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (38944 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ