lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <c393e02b-65f2-4454-ba53-ae0eab5fb279@suse.cz>
Date: Mon, 26 Aug 2024 22:19:15 +0200
From: Vlastimil Babka <vbabka@...e.cz>
To: kernel test robot <oliver.sang@...el.com>
Cc: oe-lkp@...ts.linux.dev, lkp@...el.com,
 Linux Memory Management List <linux-mm@...ck.org>,
 linux-kernel@...r.kernel.org
Subject: Re: [linux-next:master] [kunit, slub] 2377a7d90f:
 WARNING:at_mm/slab_common.c:#kmem_cache_destroy

On 8/25/24 11:25, kernel test robot wrote:
> 
> 
> Hello,
> 
> kernel test robot noticed "WARNING:at_mm/slab_common.c:#kmem_cache_destroy" on:
> 
> commit: 2377a7d90f5bb2ccc302b5fb0e6ba4c67cf24ddd ("kunit, slub: add test_kfree_rcu() and test_leak_destroy()")
> https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git master

Hmm in slub_kunit we generally try to suppress dmesg splats in the kunit
test context so guess I can do that for this warning as well. Thanks.

> [test failed on linux-next/master c79c85875f1af04040fe4492ed94ce37ad729c4d]
> 
> in testcase: kunit
> version: 
> with following parameters:
> 
> 	group: group-00
> 
> 
> 
> compiler: gcc-12
> test machine: 36 threads 1 sockets Intel(R) Core(TM) i9-10980XE CPU @ 3.00GHz (Cascade Lake) with 128G memory
> 
> (please refer to attached dmesg/kmsg for entire log/backtrace)
> 
> 
> 
> If you fix the issue in a separate patch/commit (i.e. not just a new version of
> the same patch/commit), kindly add following tags
> | Reported-by: kernel test robot <oliver.sang@...el.com>
> | Closes: https://lore.kernel.org/oe-lkp/202408251723.42f3d902-oliver.sang@intel.com
> 
> 
> kern  :warn  : [  402.601850] ------------[ cut here ]------------
> kern :warn : [  402.602683] kmem_cache_destroy TestSlub_kfree_rcu: Slab cache still has objects when called from test_leak_destroy (lib/slub_kunit.c:186) slub_kunit
> kern :warn : [  402.602700] WARNING: CPU: 0 PID: 4936 at mm/slab_common.c:528 kmem_cache_destroy (mm/slab_common.c:528 mm/slab_common.c:504) 
> kern  :warn  : [  402.605758] Modules linked in: slub_kunit linear_ranges intel_rapl_msr intel_rapl_common skx_edac_common nfit sd_mod sg libnvdimm x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm crct10dif_pclmul crc32_generic crc32_pclmul ghash_clmulni_intel sha512_ssse3 btrfs blake2b_generic xor raid6_pq libcrc32c snd_soc_avs snd_soc_hda_codec snd_hda_ext_core snd_hda_codec snd_hda_core snd_intel_dspcfg crc32c_intel rapl snd_soc_core snd_compress ahci snd_pcm libahci intel_cstate ipmi_devintf ipmi_msghandler nvme intel_uncore wmi_bmof intel_wmi_thunderbolt mxm_wmi wdat_wdt snd_timer mei_me libata nvme_core snd ioatdma mei soundcore dca wmi binfmt_misc drm fuse loop dm_mod ip_tables cts xts [last unloaded: rational_test]
> kern  :warn  : [  402.613823] CPU: 0 UID: 0 PID: 4936 Comm: kunit_try_catch Tainted: G    B            N 6.11.0-rc2-00008-g2377a7d90f5b #1
> kern  :warn  : [  402.615894] Tainted: [B]=BAD_PAGE, [N]=TEST
> kern  :warn  : [  402.616872] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021
> kern :warn : [  402.618338] RIP: 0010:kmem_cache_destroy (mm/slab_common.c:528 mm/slab_common.c:504) 
> kern :warn : [ 402.619412] Code: 8c ff c3 cc cc cc cc e8 57 e0 ab ff eb ad 48 8b 53 60 48 8b 4c 24 10 48 c7 c6 20 21 55 84 48 c7 c7 d0 b9 ee 84 e8 a9 d4 8b ff <0f> 0b e9 28 ff ff ff 66 90 90 90 90 90 90 90 90 90 90 90 90 90 90
> All code
> ========
>    0:	8c ff                	mov    %?,%edi
>    2:	c3                   	retq   
>    3:	cc                   	int3   
>    4:	cc                   	int3   
>    5:	cc                   	int3   
>    6:	cc                   	int3   
>    7:	e8 57 e0 ab ff       	callq  0xffffffffffabe063
>    c:	eb ad                	jmp    0xffffffffffffffbb
>    e:	48 8b 53 60          	mov    0x60(%rbx),%rdx
>   12:	48 8b 4c 24 10       	mov    0x10(%rsp),%rcx
>   17:	48 c7 c6 20 21 55 84 	mov    $0xffffffff84552120,%rsi
>   1e:	48 c7 c7 d0 b9 ee 84 	mov    $0xffffffff84eeb9d0,%rdi
>   25:	e8 a9 d4 8b ff       	callq  0xffffffffff8bd4d3
>   2a:*	0f 0b                	ud2    		<-- trapping instruction
>   2c:	e9 28 ff ff ff       	jmpq   0xffffffffffffff59
>   31:	66 90                	xchg   %ax,%ax
>   33:	90                   	nop
>   34:	90                   	nop
>   35:	90                   	nop
>   36:	90                   	nop
>   37:	90                   	nop
>   38:	90                   	nop
>   39:	90                   	nop
>   3a:	90                   	nop
>   3b:	90                   	nop
>   3c:	90                   	nop
>   3d:	90                   	nop
>   3e:	90                   	nop
>   3f:	90                   	nop
> 
> Code starting with the faulting instruction
> ===========================================
>    0:	0f 0b                	ud2    
>    2:	e9 28 ff ff ff       	jmpq   0xffffffffffffff2f
>    7:	66 90                	xchg   %ax,%ax
>    9:	90                   	nop
>    a:	90                   	nop
>    b:	90                   	nop
>    c:	90                   	nop
>    d:	90                   	nop
>    e:	90                   	nop
>    f:	90                   	nop
>   10:	90                   	nop
>   11:	90                   	nop
>   12:	90                   	nop
>   13:	90                   	nop
>   14:	90                   	nop
>   15:	90                   	nop
> kern  :warn  : [  402.622288] RSP: 0018:ffffc9000300fd38 EFLAGS: 00010282
> kern  :warn  : [  402.623454] RAX: 0000000000000000 RBX: ffff8881ac7a88c0 RCX: 0000000000000027
> kern  :warn  : [  402.624796] RDX: 0000000000000027 RSI: 0000000000000004 RDI: ffff889fc3230b08
> kern  :warn  : [  402.626072] RBP: 0000000000000001 R08: 0000000000000001 R09: ffffed13f8646161
> kern  :warn  : [  402.627396] R10: ffff889fc3230b0b R11: 0000000000000001 R12: ffffc900009877c8
> kern  :warn  : [  402.628741] R13: dffffc0000000000 R14: 0000000000000000 R15: ffffc9000300fe40
> kern  :warn  : [  402.630015] FS:  0000000000000000(0000) GS:ffff889fc3200000(0000) knlGS:0000000000000000
> kern  :warn  : [  402.631431] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> kern  :warn  : [  402.632653] CR2: 000056455377c3b0 CR3: 000000209c662004 CR4: 00000000003706f0
> kern  :warn  : [  402.633979] DR0: ffffffff8741b384 DR1: ffffffff8741b385 DR2: ffffffff8741b382
> kern  :warn  : [  402.635257] DR3: ffffffff8741b383 DR6: 00000000fffe0ff0 DR7: 0000000000000600
> kern  :warn  : [  402.636580] Call Trace:
> kern  :warn  : [  402.637518]  <TASK>
> kern :warn : [  402.638397] ? __warn (kernel/panic.c:735) 
> kern :warn : [  402.639368] ? kmem_cache_destroy (mm/slab_common.c:528 mm/slab_common.c:504) 
> kern :warn : [  402.640432] ? report_bug (lib/bug.c:180 lib/bug.c:219) 
> kern :warn : [  402.641445] ? handle_bug (arch/x86/kernel/traps.c:239) 
> kern :warn : [  402.642443] ? exc_invalid_op (arch/x86/kernel/traps.c:260 (discriminator 1)) 
> kern :warn : [  402.643469] ? asm_exc_invalid_op (arch/x86/include/asm/idtentry.h:621) 
> kern :warn : [  402.644529] ? kmem_cache_destroy (mm/slab_common.c:528 mm/slab_common.c:504) 
> kern :warn : [  402.645601] ? kmem_cache_destroy (mm/slab_common.c:528 mm/slab_common.c:504) 
> kern :warn : [  402.646668] test_leak_destroy (lib/slub_kunit.c:186) slub_kunit
> kern :warn : [  402.647868] ? __pfx_test_leak_destroy (lib/slub_kunit.c:179) slub_kunit
> kern :warn : [  402.649054] ? __kunit_add_resource (lib/kunit/resource.c:44) 
> kern :warn : [  402.650182] ? ktime_get_ts64 (kernel/time/timekeeping.c:195 (discriminator 4) kernel/time/timekeeping.c:395 (discriminator 4) kernel/time/timekeeping.c:403 (discriminator 4) kernel/time/timekeeping.c:983 (discriminator 4)) 
> kern :warn : [  402.651224] ? test_init (lib/slub_kunit.c:196) slub_kunit
> kern :warn : [  402.652347] kunit_try_run_case (lib/kunit/test.c:398 lib/kunit/test.c:443) 
> kern :warn : [  402.653447] ? __pfx_kunit_try_run_case (lib/kunit/test.c:430) 
> kern :warn : [  402.654525] ? set_cpus_allowed_ptr (kernel/sched/core.c:3025) 
> kern :warn : [  402.655563] ? __pfx_set_cpus_allowed_ptr (kernel/sched/core.c:3025) 
> kern :warn : [  402.656629] ? __pfx_kunit_try_run_case (lib/kunit/test.c:430) 
> kern :warn : [  402.657662] ? __pfx_kunit_generic_run_threadfn_adapter (lib/kunit/try-catch.c:26) 
> kern :warn : [  402.658854] kunit_generic_run_threadfn_adapter (lib/kunit/try-catch.c:30) 
> kern :warn : [  402.659920] kthread (kernel/kthread.c:389) 
> kern :warn : [  402.660818] ? __pfx_kthread (kernel/kthread.c:342) 
> kern :warn : [  402.661706] ret_from_fork (arch/x86/kernel/process.c:147) 
> kern :warn : [  402.662601] ? __pfx_kthread (kernel/kthread.c:342) 
> kern :warn : [  402.663457] ret_from_fork_asm (arch/x86/entry/entry_64.S:257) 
> kern  :warn  : [  402.664326]  </TASK>
> kern  :warn  : [  402.665053] ---[ end trace 0000000000000000 ]---
> kern  :info  : [  402.666287]     ok 5 test_leak_destroy
> kern  :info  : [  402.666297] # slub_test: pass:5 fail:0 skip:0 total:5
> kern  :info  : [  402.667126] # Totals: pass:5 fail:0 skip:0 total:5
> kern  :info  : [  402.668029] ok 1 slub_test
> 
> 
> 
> The kernel config and materials to reproduce are available at:
> https://download.01.org/0day-ci/archive/20240825/202408251723.42f3d902-oliver.sang@intel.com
> 
> 
> 


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ