lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <202411291603.52f83cd4-lkp@intel.com>
Date: Fri, 29 Nov 2024 16:53:33 +0800
From: kernel test robot <oliver.sang@...el.com>
To: "Paul E. McKenney" <paulmck@...nel.org>
CC: <oe-lkp@...ts.linux.dev>, <lkp@...el.com>, Frederic Weisbecker
	<frederic@...nel.org>, kernel test robot <oliver.sang@...el.com>,
	<rcu@...r.kernel.org>, <linux-kernel@...r.kernel.org>
Subject: [paulmckrcu:dev.2024.11.11a] [rcutorture]  d26acb0256:
 WARNING:at_kernel/rcu/rcutorture.c:#rcutorture_one_extend_check[rcutorture]



Hello,

we noticed there is same commit in newer branch such like dev.2024.11.14a
and dev.2024.11.17a.

if this is out-of-date version, please just ignore.

we also noticed the WARN added in this commit hit. so just FYI.


kernel test robot noticed "WARNING:at_kernel/rcu/rcutorture.c:#rcutorture_one_extend_check[rcutorture]" on:

commit: d26acb0256b36db3370238cc5c32210f31e9dfd6 ("rcutorture: Make rcutorture_one_extend() check reader state")
https://github.com/paulmckrcu/linux dev.2024.11.11a

in testcase: rcutorture
version: 
with following parameters:

	runtime: 300s
	test: cpuhotplug
	torture_type: srcu



config: i386-randconfig-053-20241111
compiler: clang-19
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G

(please refer to attached dmesg/kmsg for entire log/backtrace)


+------------------------------------------------------------------------------+------------+------------+
|                                                                              | 43b1ae045d | d26acb0256 |
+------------------------------------------------------------------------------+------------+------------+
| WARNING:at_kernel/rcu/rcutorture.c:#rcutorture_one_extend_check[rcutorture]  | 0          | 12         |
| EIP:rcutorture_one_extend_check                                              | 0          | 12         |
+------------------------------------------------------------------------------+------------+------------+


If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@...el.com>
| Closes: https://lore.kernel.org/oe-lkp/202411291603.52f83cd4-lkp@intel.com


The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20241129/202411291603.52f83cd4-lkp@intel.com


[   62.709400][  T404] ------------[ cut here ]------------
[   62.709782][  T404] rcutorture_one_extend_check during change: Current 0x20  To add 0x20  To remove 0x0
[   62.710433][  T404] WARNING: CPU: 0 PID: 404 at kernel/rcu/rcutorture.c:1892 rcutorture_one_extend_check+0x3f8/0x700 [rcutorture]
[   62.711255][  T404] Modules linked in: rcutorture(+) torture ppdev parport_pc parport ip_tables x_tables autofs4
[   62.712010][  T404] CPU: 0 UID: 0 PID: 404 Comm: rcu_torture_rea Not tainted 6.12.0-rc2-00092-gd26acb0256b3 #1 f6e892f24717504acbaf436db6a55201e01d506b
[   62.712960][  T404] EIP: rcutorture_one_extend_check+0x3f8/0x700 [rcutorture]
[   62.713491][  T404] Code: c9 6a 01 e8 2a 3a 51 ce 83 c4 04 ff 75 0c ff 75 08 8b 5d e4 53 ff 75 e0 68 a9 f7 cb f2 68 5e 03 cc f2 e8 7b 9c 3c ce 83 c4 18 <0f> 0b b8 30 dd d1 f2 ba 01 00 00 00 31 c9 6a 01 e8 f3 39 51 ce 83
[   62.715104][  T404] EAX: 00000000 EBX: 00000020 ECX: 00000000 EDX: 00000000
[   62.715608][  T404] ESI: ee0f4f01 EDI: 00000001 EBP: ee331d84 ESP: ee331d64
[   62.716116][  T404] DS: 007b ES: 007b FS: 0000 GS: 0000 SS: 0068 EFLAGS: 00010292
[   62.716661][  T404] CR0: 80050033 CR2: b6b2c000 CR3: 0013cda0 CR4: 000406f0
[   62.717181][  T404] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[   62.717696][  T404] DR6: fffe0ff0 DR7: 00000400
[   62.718038][  T404] Call Trace:
[   62.718290][  T404]  ? show_regs+0x62/0x70
[   62.718611][  T404]  ? __warn+0xb1/0x2c0
[   62.718919][  T404]  ? report_bug+0xaf/0x190
[   62.719244][  T404]  ? rcutorture_one_extend_check+0x3f8/0x700 [rcutorture 7a599467fd2675a29242fe514bf39d6557afa4d3]
[   62.720021][  T404]  ? exc_overflow+0x3c/0x3c
[   62.720345][  T404]  ? handle_bug+0x49/0x6c
[   62.720657][  T404]  ? exc_invalid_op+0x24/0x4c
[   62.720994][  T404]  ? handle_exception+0x164/0x164
[   62.721375][  T404]  ? exc_overflow+0x3c/0x3c
[   62.721707][  T404]  ? rcutorture_one_extend_check+0x3f8/0x700 [rcutorture 7a599467fd2675a29242fe514bf39d6557afa4d3]
[   62.722454][  T404]  ? exc_overflow+0x3c/0x3c
[   62.722791][  T404]  ? rcutorture_one_extend_check+0x3f8/0x700 [rcutorture 7a599467fd2675a29242fe514bf39d6557afa4d3]
[   62.723542][  T404]  rcutorture_one_extend+0x1ff/0x5d0 [rcutorture 7a599467fd2675a29242fe514bf39d6557afa4d3]
[   62.724694][  T404]  rcu_torture_one_read+0xb2/0xa10 [rcutorture 7a599467fd2675a29242fe514bf39d6557afa4d3]
[   62.725459][  T404]  rcu_torture_reader+0xe9/0x1d0 [rcutorture 7a599467fd2675a29242fe514bf39d6557afa4d3]
[   62.726154][  T404]  ? rcu_torture_pipe_update+0x150/0x150 [rcutorture 7a599467fd2675a29242fe514bf39d6557afa4d3]
[   62.726904][  T404]  kthread+0x163/0x170
[   62.727185][  T404]  ? rcu_torture_fakewriter+0x4b0/0x4b0 [rcutorture 7a599467fd2675a29242fe514bf39d6557afa4d3]
[   62.727902][  T404]  ? kthread_blkcg+0x60/0x60
[   62.728212][  T404]  ? kthread_blkcg+0x60/0x60
[   62.728538][  T404]  ret_from_fork+0x38/0x50
[   62.728864][  T404]  ret_from_fork_asm+0x12/0x18
[   62.729196][  T404]  entry_INT80_32+0x124/0x124
[   62.729552][  T404] irq event stamp: 525
[   62.729849][  T404] hardirqs last  enabled at (535): [<c10fc27d>] __console_unlock+0x6d/0xc0
[   62.730478][  T404] hardirqs last disabled at (544): [<c10fc264>] __console_unlock+0x54/0xc0
[   62.731122][  T404] softirqs last  enabled at (420): [<c1087c8d>] handle_softirqs+0x5cd/0x670
[   62.731735][  T404] softirqs last disabled at (397): [<c1e73fb3>] __do_softirq+0xf/0x13
[   62.732315][  T404] ---[ end trace 0000000000000000 ]---

-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ