lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <202410281436.8246527d-lkp@intel.com>
Date: Mon, 28 Oct 2024 14:34:00 +0800
From: kernel test robot <oliver.sang@...el.com>
To: Lucas De Marchi <lucas.demarchi@...el.com>
CC: <oe-lkp@...ts.linux.dev>, <lkp@...el.com>,
	<linux-fsdevel@...r.kernel.org>, <linux-perf-users@...r.kernel.org>,
	<linux-kernel@...r.kernel.org>, <intel-gfx@...ts.freedesktop.org>, "Lucas De
 Marchi" <lucas.demarchi@...el.com>, <oliver.sang@...el.com>
Subject: Re: [CI] pmu changes



Hello,

kernel test robot noticed "kernel_BUG_at_lib/list_debug.c" on:

commit: c8b7f59b7abb8ef22fba5438b4cb2cd4c28fad0e ("[CI] pmu changes")
url: https://github.com/intel-lab-lkp/linux/commits/Lucas-De-Marchi/pmu-changes/20241023-225141
base: https://git.kernel.org/cgit/linux/kernel/git/perf/perf-tools-next.git perf-tools-next
patch link: https://lore.kernel.org/all/20241023144759.3140161-1-lucas.demarchi@intel.com/
patch subject: [CI] pmu changes

in testcase: trinity
version: trinity-x86_64-ba2360ed-1_20240923
with following parameters:

	runtime: 300s
	group: group-03
	nr_groups: 5



config: x86_64-randconfig-005-20241024
compiler: gcc-12
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G

(please refer to attached dmesg/kmsg for entire log/backtrace)



If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@...el.com>
| Closes: https://lore.kernel.org/oe-lkp/202410281436.8246527d-lkp@intel.com


[  398.827949][ T3983] ------------[ cut here ]------------
[  398.828239][ T3983] kernel BUG at lib/list_debug.c:52!
[  398.828549][ T3983] Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI
[  398.829680][ T3983] CPU: 1 UID: 65534 PID: 3983 Comm: trinity-c2 Not tainted 6.12.0-rc3-00121-gc8b7f59b7abb #1
[  398.830194][ T3983] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
[ 398.830712][ T3983] RIP: 0010:__list_del_entry_valid_or_report (lib/list_debug.c:52 (discriminator 3)) 
[ 398.831079][ T3983] Code: 0f 85 ae 00 00 00 48 8b 42 08 48 39 f0 75 5f b8 01 00 00 00 48 83 c4 18 c3 cc cc cc cc 48 c7 c7 e0 bf 39 88 e8 57 60 7a fe 90 <0f> 0b 48 c7 c7 40 c0 39 88 e8 48 60 7a fe 90 0f 0b 48 c7 c7 a0 c0
All code
========
   0:	0f 85 ae 00 00 00    	jne    0xb4
   6:	48 8b 42 08          	mov    0x8(%rdx),%rax
   a:	48 39 f0             	cmp    %rsi,%rax
   d:	75 5f                	jne    0x6e
   f:	b8 01 00 00 00       	mov    $0x1,%eax
  14:	48 83 c4 18          	add    $0x18,%rsp
  18:	c3                   	ret
  19:	cc                   	int3
  1a:	cc                   	int3
  1b:	cc                   	int3
  1c:	cc                   	int3
  1d:	48 c7 c7 e0 bf 39 88 	mov    $0xffffffff8839bfe0,%rdi
  24:	e8 57 60 7a fe       	call   0xfffffffffe7a6080
  29:	90                   	nop
  2a:*	0f 0b                	ud2		<-- trapping instruction
  2c:	48 c7 c7 40 c0 39 88 	mov    $0xffffffff8839c040,%rdi
  33:	e8 48 60 7a fe       	call   0xfffffffffe7a6080
  38:	90                   	nop
  39:	0f 0b                	ud2
  3b:	48                   	rex.W
  3c:	c7                   	.byte 0xc7
  3d:	c7                   	(bad)
  3e:	a0                   	.byte 0xa0
  3f:	c0                   	.byte 0xc0

Code starting with the faulting instruction
===========================================
   0:	0f 0b                	ud2
   2:	48 c7 c7 40 c0 39 88 	mov    $0xffffffff8839c040,%rdi
   9:	e8 48 60 7a fe       	call   0xfffffffffe7a6056
   e:	90                   	nop
   f:	0f 0b                	ud2
  11:	48                   	rex.W
  12:	c7                   	.byte 0xc7
  13:	c7                   	(bad)
  14:	a0                   	.byte 0xa0
  15:	c0                   	.byte 0xc0
[  398.832041][ T3983] RSP: 0018:ffffc90001ba7cc8 EFLAGS: 00010246
[  398.832350][ T3983] RAX: 0000000000000033 RBX: ffff8881937bd940 RCX: ffffffff82b5feae
[  398.832749][ T3983] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff8883ae33b620
[  398.833159][ T3983] RBP: ffffffff8a2e6e10 R08: 0000000000000001 R09: fffff52000374f56
[  398.833557][ T3983] R10: ffffc90001ba7ab7 R11: 0000000000000001 R12: ffffffff8a2e6e00
[  398.833953][ T3983] R13: ffff8881937bdf08 R14: ffff8881937bdf10 R15: ffff8881937bdc30
[  398.834351][ T3983] FS:  00007fe01c90d740(0000) GS:ffff8883ae300000(0000) knlGS:0000000000000000
[  398.834797][ T3983] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  398.835130][ T3983] CR2: 0000000000000000 CR3: 000000011a420000 CR4: 00000000000406b0
[  398.835529][ T3983] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  398.835925][ T3983] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  398.836322][ T3983] Call Trace:
[  398.836493][ T3983]  <TASK>
[ 398.836646][ T3983] ? die (arch/x86/kernel/dumpstack.c:421 arch/x86/kernel/dumpstack.c:434 arch/x86/kernel/dumpstack.c:447) 
[ 398.836850][ T3983] ? do_trap (arch/x86/kernel/traps.c:156 arch/x86/kernel/traps.c:197) 
[ 398.837070][ T3983] ? __list_del_entry_valid_or_report (lib/list_debug.c:52 (discriminator 3)) 
[ 398.837391][ T3983] ? __list_del_entry_valid_or_report (lib/list_debug.c:52 (discriminator 3)) 
[ 398.837709][ T3983] ? do_error_trap (arch/x86/include/asm/traps.h:58 arch/x86/kernel/traps.c:218) 
[ 398.837947][ T3983] ? __list_del_entry_valid_or_report (lib/list_debug.c:52 (discriminator 3)) 
[ 398.838268][ T3983] ? handle_invalid_op (arch/x86/kernel/traps.c:256) 
[ 398.838519][ T3983] ? __list_del_entry_valid_or_report (lib/list_debug.c:52 (discriminator 3)) 
[ 398.838839][ T3983] ? exc_invalid_op (arch/x86/kernel/traps.c:315) 
[ 398.839089][ T3983] ? asm_exc_invalid_op (arch/x86/include/asm/idtentry.h:621) 
[ 398.839348][ T3983] ? llist_add_batch (lib/llist.c:33 (discriminator 14)) 
[ 398.839597][ T3983] ? __list_del_entry_valid_or_report (lib/list_debug.c:52 (discriminator 3)) 
[ 398.839918][ T3983] ? __list_del_entry_valid_or_report (lib/list_debug.c:52 (discriminator 3)) 
[ 398.840238][ T3983] __free_event (include/linux/list.h:215 (discriminator 5) include/linux/list.h:229 (discriminator 5) kernel/events/core.c:5395 (discriminator 5)) 
[ 398.840474][ T3983] perf_event_alloc (kernel/events/core.c:5403 kernel/events/core.c:12375) 
[ 398.840728][ T3983] __do_sys_perf_event_open (kernel/events/core.c:12980) 
[ 398.841036][ T3983] ? __pfx___do_sys_perf_event_open (kernel/events/core.c:12868) 
[ 398.841347][ T3983] ? rseq_get_rseq_cs (kernel/rseq.c:201) 
[ 398.841603][ T3983] ? __task_pid_nr_ns (include/linux/rcupdate.h:347 include/linux/rcupdate.h:880 kernel/pid.c:514) 
[ 398.841861][ T3983] do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) 
[ 398.842094][ T3983] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) 
[  398.842393][ T3983] RIP: 0033:0x7fe01ca11719
[ 398.842622][ T3983] Code: 08 89 e8 5b 5d c3 66 2e 0f 1f 84 00 00 00 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d b7 06 0d 00 f7 d8 64 89 01 48
All code
========
   0:	08 89 e8 5b 5d c3    	or     %cl,-0x3ca2a418(%rcx)
   6:	66 2e 0f 1f 84 00 00 	cs nopw 0x0(%rax,%rax,1)
   d:	00 00 00 
  10:	90                   	nop
  11:	48 89 f8             	mov    %rdi,%rax
  14:	48 89 f7             	mov    %rsi,%rdi
  17:	48 89 d6             	mov    %rdx,%rsi
  1a:	48 89 ca             	mov    %rcx,%rdx
  1d:	4d 89 c2             	mov    %r8,%r10
  20:	4d 89 c8             	mov    %r9,%r8
  23:	4c 8b 4c 24 08       	mov    0x8(%rsp),%r9
  28:	0f 05                	syscall
  2a:*	48 3d 01 f0 ff ff    	cmp    $0xfffffffffffff001,%rax		<-- trapping instruction
  30:	73 01                	jae    0x33
  32:	c3                   	ret
  33:	48 8b 0d b7 06 0d 00 	mov    0xd06b7(%rip),%rcx        # 0xd06f1
  3a:	f7 d8                	neg    %eax
  3c:	64 89 01             	mov    %eax,%fs:(%rcx)
  3f:	48                   	rex.W

Code starting with the faulting instruction
===========================================
   0:	48 3d 01 f0 ff ff    	cmp    $0xfffffffffffff001,%rax
   6:	73 01                	jae    0x9
   8:	c3                   	ret
   9:	48 8b 0d b7 06 0d 00 	mov    0xd06b7(%rip),%rcx        # 0xd06c7
  10:	f7 d8                	neg    %eax
  12:	64 89 01             	mov    %eax,%fs:(%rcx)
  15:	48                   	rex.W


The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20241028/202410281436.8246527d-lkp@intel.com



-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ