[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <202410231427.633734b3-lkp@intel.com>
Date: Wed, 23 Oct 2024 15:02:51 +0800
From: kernel test robot <oliver.sang@...el.com>
To: Ignat Korchagin <ignat@...udflare.com>
CC: <oe-lkp@...ts.linux.dev>, <lkp@...el.com>, Jakub Kicinski
<kuba@...nel.org>, Kuniyuki Iwashima <kuniyu@...zon.com>, Eric Dumazet
<edumazet@...gle.com>, <netdev@...r.kernel.org>, <oliver.sang@...el.com>
Subject: [linux-next:master] [net] 18429e6e0c:
WARNING:at_net/socket.c:#__sock_create
Hello,
kernel test robot noticed "WARNING:at_net/socket.c:#__sock_create" on:
commit: 18429e6e0c2ad26250862a786964d8c73400d9a0 ("Revert "net: do not leave a dangling sk pointer, when socket creation fails"")
https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git master
[test failed on linux-next/master f2493655d2d3d5c6958ed996b043c821c23ae8d3]
in testcase: trinity
version:
with following parameters:
runtime: 600s
config: x86_64-randconfig-072-20241019
compiler: gcc-12
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G
(please refer to attached dmesg/kmsg for entire log/backtrace)
+------------------------------------------------+------------+------------+
| | 48156296a0 | 18429e6e0c |
+------------------------------------------------+------------+------------+
| WARNING:at_net/socket.c:#__sock_create | 0 | 23 |
| RIP:__sock_create | 0 | 23 |
+------------------------------------------------+------------+------------+
If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@...el.com>
| Closes: https://lore.kernel.org/oe-lkp/202410231427.633734b3-lkp@intel.com
[ 81.874092][ T849] ------------[ cut here ]------------
[ 81.874427][ T849] WARNING: CPU: 0 PID: 849 at net/socket.c:1581 __sock_create (net/socket.c:1581 (discriminator 1))
[ 81.874997][ T849] Modules linked in:
[ 81.875214][ T849] CPU: 0 UID: 8192 PID: 849 Comm: trinity-c5 Not tainted 6.12.0-rc2-00650-g18429e6e0c2a #1
[ 81.875701][ T849] RIP: 0010:__sock_create (net/socket.c:1581 (discriminator 1))
[ 81.876000][ T849] Code: e9 19 fd ff ff e8 a3 16 d7 fd e9 4f f9 ff ff 41 bd 9f ff ff ff e9 b8 fa ff ff 41 bd ea ff ff ff e9 ad fa ff ff e8 83 95 9c fd <0f> 0b e9 72 ff ff ff e8 77 95 9c fd e8 62 72 12 00 31 ff 89 c3 89
All code
========
0: e9 19 fd ff ff jmp 0xfffffffffffffd1e
5: e8 a3 16 d7 fd call 0xfffffffffdd716ad
a: e9 4f f9 ff ff jmp 0xfffffffffffff95e
f: 41 bd 9f ff ff ff mov $0xffffff9f,%r13d
15: e9 b8 fa ff ff jmp 0xfffffffffffffad2
1a: 41 bd ea ff ff ff mov $0xffffffea,%r13d
20: e9 ad fa ff ff jmp 0xfffffffffffffad2
25: e8 83 95 9c fd call 0xfffffffffd9c95ad
2a:* 0f 0b ud2 <-- trapping instruction
2c: e9 72 ff ff ff jmp 0xffffffffffffffa3
31: e8 77 95 9c fd call 0xfffffffffd9c95ad
36: e8 62 72 12 00 call 0x12729d
3b: 31 ff xor %edi,%edi
3d: 89 c3 mov %eax,%ebx
3f: 89 .byte 0x89
Code starting with the faulting instruction
===========================================
0: 0f 0b ud2
2: e9 72 ff ff ff jmp 0xffffffffffffff79
7: e8 77 95 9c fd call 0xfffffffffd9c9583
c: e8 62 72 12 00 call 0x127273
11: 31 ff xor %edi,%edi
13: 89 c3 mov %eax,%ebx
15: 89 .byte 0x89
[ 81.876952][ T849] RSP: 0018:ffffc9000258fe30 EFLAGS: 00010246
[ 81.877269][ T849] RAX: 0000000000000000 RBX: ffffffffa5f74260 RCX: 0000000000000000
[ 81.877658][ T849] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 81.878082][ T849] RBP: ffff88819ba2db40 R08: 0000000000000000 R09: 0000000000000000
[ 81.878476][ T849] R10: 0000000000000000 R11: 0000000000000000 R12: ffffffffa5f74270
[ 81.878891][ T849] R13: 00000000ffffff9f R14: 0000000000000001 R15: ffff8881be116040
[ 81.879282][ T849] FS: 000000002fd71880(0000) GS:ffff8883a4800000(0000) knlGS:0000000000000000
[ 81.879717][ T849] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 81.880065][ T849] CR2: 0000000030013f60 CR3: 00000001be0e0000 CR4: 00000000000406b0
[ 81.880459][ T849] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 81.880901][ T849] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 81.881295][ T849] Call Trace:
[ 81.881474][ T849] <TASK>
[ 81.881634][ T849] ? __sock_create (net/socket.c:1581 (discriminator 1))
[ 81.881908][ T849] ? __warn (kernel/panic.c:748)
[ 81.882130][ T849] ? __sock_create (net/socket.c:1581 (discriminator 1))
[ 81.882395][ T849] ? report_bug (lib/bug.c:180 lib/bug.c:219)
[ 81.882655][ T849] ? handle_bug (arch/x86/kernel/traps.c:285)
[ 81.882910][ T849] ? exc_invalid_op (arch/x86/kernel/traps.c:309 (discriminator 1))
[ 81.883164][ T849] ? asm_exc_invalid_op (arch/x86/include/asm/idtentry.h:621)
[ 81.883446][ T849] ? __sock_create (net/socket.c:1581 (discriminator 1))
[ 81.883725][ T849] __sys_socket (net/socket.c:1670 net/socket.c:1716)
[ 81.883995][ T849] ? update_socket_protocol+0x20/0x20
[ 81.884432][ T849] ? ftrace_likely_update (arch/x86/include/asm/smap.h:56 kernel/trace/trace_branch.c:229)
[ 81.885031][ T849] ? tracer_hardirqs_on (kernel/trace/trace_irqsoff.c:57 kernel/trace/trace_irqsoff.c:613)
[ 81.885310][ T849] __ia32_sys_socket (net/socket.c:1728)
[ 81.885863][ T849] do_int80_emulation (arch/x86/entry/common.c:165 arch/x86/entry/common.c:253)
[ 81.886413][ T849] asm_int80_emulation (arch/x86/include/asm/idtentry.h:626)
[ 81.886672][ T849] RIP: 0033:0x407ebc
[ 81.886895][ T849] Code: 83 c0 01 41 89 80 40 30 00 00 8b 44 24 04 4c 89 d1 48 8b 54 24 08 4c 89 de 4c 89 e7 55 41 50 41 51 41 52 41 53 4c 89 cd cd 80 <41> 5b 41 5a 41 59 41 58 5d 48 3d 7a ff ff ff 49 89 c4 0f 87 5c 01
All code
========
0: 83 c0 01 add $0x1,%eax
3: 41 89 80 40 30 00 00 mov %eax,0x3040(%r8)
a: 8b 44 24 04 mov 0x4(%rsp),%eax
e: 4c 89 d1 mov %r10,%rcx
11: 48 8b 54 24 08 mov 0x8(%rsp),%rdx
16: 4c 89 de mov %r11,%rsi
19: 4c 89 e7 mov %r12,%rdi
1c: 55 push %rbp
1d: 41 50 push %r8
1f: 41 51 push %r9
21: 41 52 push %r10
23: 41 53 push %r11
25: 4c 89 cd mov %r9,%rbp
28: cd 80 int $0x80
2a:* 41 5b pop %r11 <-- trapping instruction
2c: 41 5a pop %r10
2e: 41 59 pop %r9
30: 41 58 pop %r8
32: 5d pop %rbp
33: 48 3d 7a ff ff ff cmp $0xffffffffffffff7a,%rax
39: 49 89 c4 mov %rax,%r12
3c: 0f .byte 0xf
3d: 87 .byte 0x87
3e: 5c pop %rsp
3f: 01 .byte 0x1
Code starting with the faulting instruction
===========================================
0: 41 5b pop %r11
2: 41 5a pop %r10
4: 41 59 pop %r9
6: 41 58 pop %r8
8: 5d pop %rbp
9: 48 3d 7a ff ff ff cmp $0xffffffffffffff7a,%rax
f: 49 89 c4 mov %rax,%r12
12: 0f .byte 0xf
13: 87 .byte 0x87
14: 5c pop %rsp
15: 01 .byte 0x1
[ 81.887825][ T849] RSP: 002b:00007ffe58347588 EFLAGS: 00000202 ORIG_RAX: 0000000000000167
[ 81.888240][ T849] RAX: ffffffffffffffda RBX: 000000000000002b RCX: 0000000000080801
[ 81.888635][ T849] RDX: 0000000000000001 RSI: 000000000000090f RDI: ffffffffffffffff
[ 81.889192][ T849] RBP: fffffffffffffffc R08: 00007f033ef64000 R09: fffffffffffffffc
[ 81.890059][ T849] R10: 0000000000080801 R11: 000000000000090f R12: ffffffffffffffff
[ 81.890776][ T849] R13: 00007f033ec4a058 R14: 000000002fd71850 R15: 00007f033ec4a000
[ 81.891191][ T849] </TASK>
[ 81.891352][ T849] irq event stamp: 158255
[ 81.891568][ T849] hardirqs last enabled at (158263): __up_console_sem (kernel/printk/printk.c:344 (discriminator 1))
[ 81.892047][ T849] hardirqs last disabled at (158272): __up_console_sem (kernel/printk/printk.c:342 (discriminator 1))
[ 81.892515][ T849] softirqs last enabled at (157948): handle_softirqs (kernel/softirq.c:401 kernel/softirq.c:582)
[ 81.893166][ T849] softirqs last disabled at (157939): irq_exit_rcu (kernel/softirq.c:589 kernel/softirq.c:428 kernel/softirq.c:637 kernel/softirq.c:649)
[ 81.894135][ T849] ---[ end trace 0000000000000000 ]---
The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20241023/202410231427.633734b3-lkp@intel.com
--
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki
Powered by blists - more mailing lists