[fs/ocfs2] 32e1a3dbeb: kernel_BUG_at_fs/ocfs2/uptodate.c
by kernel test robot
Greeting,
FYI, we noticed the following commit (built with gcc-9):
commit: 32e1a3dbeb6b569a29d843426cb163b5fd27a348 ("[PATCH] fs/ocfs2: remove redundant ret variable")
url: https://github.com/0day-ci/linux/commits/cgel-zte-gmail-com/fs-ocfs2-remo...
base: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git daadb3bd0e8d3e317e36bc2c1542e86c528665e5
patch link: https://lore.kernel.org/lkml/[email protected]
in testcase: ocfs2test
version: ocfs2test-x86_64-d802bf7-1_20210827
with following parameters:
disk: 1HDD
test: test-aiostress
ucode: 0x28
on test machine: 8 threads 1 sockets Intel(R) Core(TM) i7-4790T CPU @ 2.70GHz with 16G memory
caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):
If you fix the issue, kindly add following tag
Reported-by: kernel test robot <oliver.sang(a)intel.com>
[ 56.620204][ T970] kernel BUG at fs/ocfs2/uptodate.c:65!
[ 56.625708][ T970] invalid opcode: 0000 [#1] SMP KASAN PTI
[ 56.631301][ T970] CPU: 2 PID: 970 Comm: aio-stress Not tainted 5.16.0-06519-g32e1a3dbeb6b #1
[ 56.639940][ T970] Hardware name: Gigabyte Technology Co., Ltd. Z97X-UD5H/Z97X-UD5H, BIOS F9 04/21/2015
[ 56.649465][ T970] RIP: 0010:ocfs2_metadata_cache_get_super (fs/ocfs2/uptodate.c:65 fs/ocfs2/uptodate.c:63) ocfs2
[ 56.656764][ T970] Code: 29 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 08 48 89 fa 48 c1 ea 03 80 3c 02 00 75 17 48 8b 43 08 48 89 ef 5b 5d e9 08 01 ae c1 <0f> 0b e8 21 e1 b8 bf eb c5 e8 1a e1 b8 bf eb e2 66 66 2e 0f 1f 84
All code
========
0: 29 48 b8 sub %ecx,-0x48(%rax)
3: 00 00 add %al,(%rax)
5: 00 00 add %al,(%rax)
7: 00 fc add %bh,%ah
9: ff (bad)
a: df 48 8d fisttps -0x73(%rax)
d: 7b 08 jnp 0x17
f: 48 89 fa mov %rdi,%rdx
12: 48 c1 ea 03 shr $0x3,%rdx
16: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1)
1a: 75 17 jne 0x33
1c: 48 8b 43 08 mov 0x8(%rbx),%rax
20: 48 89 ef mov %rbp,%rdi
23: 5b pop %rbx
24: 5d pop %rbp
25: e9 08 01 ae c1 jmpq 0xffffffffc1ae0132
2a:* 0f 0b ud2 <-- trapping instruction
2c: e8 21 e1 b8 bf callq 0xffffffffbfb8e152
31: eb c5 jmp 0xfffffffffffffff8
33: e8 1a e1 b8 bf callq 0xffffffffbfb8e152
38: eb e2 jmp 0x1c
3a: 66 data16
3b: 66 data16
3c: 2e cs
3d: 0f .byte 0xf
3e: 1f (bad)
3f: 84 .byte 0x84
Code starting with the faulting instruction
===========================================
0: 0f 0b ud2
2: e8 21 e1 b8 bf callq 0xffffffffbfb8e128
7: eb c5 jmp 0xffffffffffffffce
9: e8 1a e1 b8 bf callq 0xffffffffbfb8e128
e: eb e2 jmp 0xfffffffffffffff2
10: 66 data16
11: 66 data16
12: 2e cs
13: 0f .byte 0xf
14: 1f (bad)
15: 84 .byte 0x84
[ 56.676290][ T970] RSP: 0018:ffffc90001b3ecd0 EFLAGS: 00010246
[ 56.682346][ T970] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000001
[ 56.690196][ T970] RDX: 1ffff110833fee09 RSI: ffffc90001b3ee20 RDI: ffff888419ff704c
[ 56.698067][ T970] RBP: ffff888419ff704c R08: 0000000000000001 R09: ffff888183cc8800
[ 56.705937][ T970] R10: dffffc0000000000 R11: 0000000000000000 R12: ffffc90001b3ee20
[ 56.713797][ T970] R13: 0000000000000000 R14: 0000000000000000 R15: ffffc90001b3ee38
[ 56.721631][ T970] FS: 00007f70925db700(0000) GS:ffff8883a7300000(0000) knlGS:0000000000000000
[ 56.730464][ T970] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 56.736935][ T970] CR2: 00007f70915c8000 CR3: 0000000418668005 CR4: 00000000001706e0
[ 56.744806][ T970] Call Trace:
[ 56.747978][ T970] <TASK>
[ 56.750803][ T970] ocfs2_add_clusters_in_btree (fs/ocfs2/alloc.c:4785) ocfs2
[ 56.757167][ T970] ? kasan_save_stack (mm/kasan/common.c:38)
[ 56.761895][ T970] ? __kasan_slab_alloc (mm/kasan/common.c:46 mm/kasan/common.c:437 mm/kasan/common.c:470)
[ 56.766984][ T970] ? kmem_cache_alloc (mm/slab.h:739 mm/slub.c:3230 mm/slub.c:3238 mm/slub.c:3243)
[ 56.771898][ T970] ? jbd2__journal_start (include/linux/slab.h:706 include/linux/jbd2.h:1603 fs/jbd2/transaction.c:481 fs/jbd2/transaction.c:508 fs/jbd2/transaction.c:490)
[ 56.777072][ T970] ? ocfs2_insert_extent (fs/ocfs2/alloc.c:4777) ocfs2
[ 56.782983][ T970] ? ocfs2_direct_IO (fs/ocfs2/aops.c:2450) ocfs2
[ 56.788537][ T970] ? generic_file_direct_write (mm/filemap.c:3678)
[ 56.794239][ T970] ? __generic_file_write_iter (mm/filemap.c:3838)
[ 56.799934][ T970] ? ocfs2_file_write_iter (fs/ocfs2/file.c:2447) ocfs2
[ 56.806018][ T970] ? __jbd2_journal_unfile_buffer (fs/jbd2/transaction.c:235)
[ 56.811791][ T970] ? __x64_sys_io_submit (fs/aio.c:2056 fs/aio.c:2026 fs/aio.c:2026)
[ 56.816982][ T970] ? do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80)
[ 56.821445][ T970] ? entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:113)
[ 56.827416][ T970] ocfs2_add_inode_data (fs/ocfs2/file.c:545) ocfs2
[ 56.833051][ T970] ? ocfs2_truncate_file (fs/ocfs2/file.c:542) ocfs2
[ 56.839109][ T970] ? start_this_handle (arch/x86/include/asm/atomic.h:165 arch/x86/include/asm/atomic.h:178 include/linux/atomic/atomic-instrumented.h:147 include/asm-generic/qrwlock.h:109 include/linux/rwlock_api_smp.h:224 fs/jbd2/transaction.c:465)
[ 56.844195][ T970] ocfs2_write_cluster+0xb16/0x13c0 ocfs2
[ 56.850617][ T970] ? kasan_unpoison (mm/kasan/shadow.c:108 mm/kasan/shadow.c:142)
[ 56.855150][ T970] ? ocfs2_map_page_blocks (fs/ocfs2/aops.c:1115) ocfs2
[ 56.861243][ T970] ? mutex_unlock (arch/x86/include/asm/atomic64_64.h:190 include/linux/atomic/atomic-long.h:449 include/linux/atomic/atomic-instrumented.h:1790 kernel/locking/mutex.c:178 kernel/locking/mutex.c:537)
[ 56.865722][ T970] ? jbd2_journal_get_write_access (fs/jbd2/transaction.c:1226)
[ 56.871678][ T970] ? __ocfs2_journal_access (fs/ocfs2/journal.c:703) ocfs2
[ 56.877849][ T970] ? ocfs2_complete_recovery (fs/ocfs2/journal.c:638) ocfs2
[ 56.884105][ T970] ? _raw_spin_lock (arch/x86/include/asm/atomic.h:202 include/linux/atomic/atomic-instrumented.h:543 include/asm-generic/qspinlock.h:82 include/linux/spinlock.h:185 include/linux/spinlock_api_smp.h:134 kernel/locking/spinlock.c:154)
[ 56.888723][ T970] ocfs2_write_begin_nolock (fs/ocfs2/aops.c:1249 fs/ocfs2/aops.c:1819) ocfs2
[ 56.895063][ T970] ? ocfs2_size_fits_inline_data (fs/ocfs2/aops.c:1651) ocfs2
[ 56.901458][ T970] ? ocfs2_read_inode_block_full (fs/ocfs2/inode.c:1597) ocfs2
[ 56.907975][ T970] ? ocfs2_refresh_inode (fs/ocfs2/inode.c:1589) ocfs2
[ 56.913877][ T970] ? __raw_callee_save___native_queued_spin_unlock (??:?)
[ 56.921140][ T970] ? ocfs2_inode_lock_full_nested (fs/ocfs2/dlmglue.c:2412 fs/ocfs2/dlmglue.c:2507) ocfs2
[ 56.927847][ T970] ? ocfs2_allocate_extend_trans (fs/ocfs2/journal.c:712) ocfs2
[ 56.934787][ T970] ? down_write_killable (kernel/locking/rwsem.c:1512)
[ 56.939927][ T970] ocfs2_dio_wr_get_block (fs/ocfs2/aops.c:2229) ocfs2
[ 56.946011][ T970] ? iov_iter_get_pages (lib/iov_iter.c:1543)
[ 56.951063][ T970] ? ocfs2_write_end_nolock (fs/ocfs2/aops.c:2130) ocfs2
[ 56.957409][ T970] ? iov_iter_get_pages_alloc (lib/iov_iter.c:1521)
[ 56.963162][ T970] ? __kasan_init_slab_obj (mm/kasan/common.c:327)
[ 56.968329][ T970] ? allocate_slab (mm/slub.c:376 mm/slub.c:1904 mm/slub.c:1970)
[ 56.972967][ T970] do_direct_IO (fs/direct-io.c:673 fs/direct-io.c:955)
[ 56.977446][ T970] ? _raw_write_lock_irq (kernel/locking/spinlock.c:153)
[ 56.982584][ T970] ? kasan_unpoison (mm/kasan/shadow.c:108 mm/kasan/shadow.c:142)
[ 56.987139][ T970] ? do_blockdev_direct_IO (fs/direct-io.c:1152)
[ 56.992542][ T970] do_blockdev_direct_IO (fs/direct-io.c:1270)
[ 56.997794][ T970] ? ocfs2_dio_end_io_write (fs/ocfs2/aops.c:2400) ocfs2
[ 57.003931][ T970] ? do_direct_IO (fs/direct-io.c:1129)
[ 57.008655][ T970] ? native_queued_spin_lock_slowpath (arch/x86/include/asm/atomic.h:29 include/linux/atomic/atomic-instrumented.h:28 arch/x86/include/asm/qspinlock.h:25 kernel/locking/qspinlock.c:352)
[ 57.014963][ T970] ? ocfs2_read_blocks_sync (fs/ocfs2/buffer_head_io.c:197) ocfs2
[ 57.021110][ T970] ? .slowpath (kernel/locking/qspinlock.c:316)
[ 57.025060][ T970] ? truncate_pagecache_range (mm/truncate.c:625)
[ 57.030493][ T970] ? _raw_spin_lock (arch/x86/include/asm/paravirt.h:591 arch/x86/include/asm/qspinlock.h:51 include/asm-generic/qspinlock.h:85 include/linux/spinlock.h:185 include/linux/spinlock_api_smp.h:134 kernel/locking/spinlock.c:154)
[ 57.035115][ T970] ? _raw_write_lock_irq (kernel/locking/spinlock.c:153)
[ 57.040278][ T970] ? ocfs2_write_end_nolock (fs/ocfs2/aops.c:2130) ocfs2
[ 57.046615][ T970] ? filemap_fdatawait_keep_errors (mm/filemap.c:714)
[ 57.052455][ T970] ? __mark_inode_dirty (include/linux/spinlock.h:202 include/linux/spinlock_api_smp.h:142 include/linux/spinlock.h:389 fs/fs-writeback.c:2480)
[ 57.057533][ T970] ? generic_update_time (fs/inode.c:1784)
[ 57.062673][ T970] ocfs2_direct_IO (fs/ocfs2/aops.c:2450) ocfs2
[ 57.068057][ T970] generic_file_direct_write (mm/filemap.c:3678)
[ 57.073584][ T970] __generic_file_write_iter (mm/filemap.c:3838)
[ 57.079089][ T970] ocfs2_file_write_iter (fs/ocfs2/file.c:2447) ocfs2
[ 57.085018][ T970] ? ocfs2_prepare_inode_for_write+0x880/0x880 ocfs2
[ 57.092410][ T970] ? stack_trace_save (kernel/stacktrace.c:123)
[ 57.097141][ T970] aio_write (fs/aio.c:1497 fs/aio.c:1578)
[ 57.101265][ T970] ? aio_prep_rw (fs/aio.c:1545)
[ 57.105713][ T970] ? kasan_save_stack (mm/kasan/common.c:41)
[ 57.110444][ T970] ? kasan_save_stack (mm/kasan/common.c:38)
[ 57.115159][ T970] ? __kasan_slab_alloc (mm/kasan/common.c:46 mm/kasan/common.c:437 mm/kasan/common.c:470)
[ 57.120054][ T970] ? io_submit_one (fs/aio.c:1029 fs/aio.c:1993)
[ 57.124673][ T970] ? __x64_sys_io_submit (fs/aio.c:2056 fs/aio.c:2026 fs/aio.c:2026)
[ 57.129848][ T970] ? do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80)
[ 57.134330][ T970] ? tcp_mtu_probe (include/linux/skbuff.h:1464 net/ipv4/tcp_output.c:2393)
[ 57.139148][ T970] ? _raw_spin_lock_irqsave (arch/x86/include/asm/atomic.h:202 include/linux/atomic/atomic-instrumented.h:543 include/asm-generic/qspinlock.h:82 include/linux/spinlock.h:185 include/linux/spinlock_api_smp.h:111 kernel/locking/spinlock.c:162)
[ 57.144496][ T970] ? get_random_u32 (drivers/char/random.c:2219)
[ 57.149150][ T970] ? __kasan_init_slab_obj (mm/kasan/common.c:327)
[ 57.154324][ T970] ? setup_object+0x17/0xc0
[ 57.159307][ T970] ? __io_submit_one+0xa7d/0x1040
[ 57.165233][ T970] __io_submit_one+0xa7d/0x1040
[ 57.170982][ T970] ? aio_poll_complete_work (fs/aio.c:1913)
[ 57.176587][ T970] ? kasan_unpoison (mm/kasan/shadow.c:108 mm/kasan/shadow.c:142)
[ 57.181138][ T970] ? __kasan_slab_alloc (mm/kasan/common.c:46 mm/kasan/common.c:437 mm/kasan/common.c:470)
[ 57.186018][ T970] ? __get_reqs_available (arch/x86/include/asm/atomic.h:196 include/linux/atomic/atomic-instrumented.h:504 fs/aio.c:934)
[ 57.191270][ T970] io_submit_one (include/linux/instrumented.h:101 include/linux/atomic/atomic-instrumented.h:176 include/linux/refcount.h:272 include/linux/refcount.h:315 include/linux/refcount.h:333 fs/aio.c:1162 fs/aio.c:2000)
[ 57.195803][ T970] ? exc_page_fault (arch/x86/include/asm/irqflags.h:40 arch/x86/include/asm/irqflags.h:75 arch/x86/mm/fault.c:1493 arch/x86/mm/fault.c:1541)
[ 57.200361][ T970] ? asm_exc_page_fault (arch/x86/include/asm/idtentry.h:568)
[ 57.205241][ T970] ? __io_submit_one+0x1040/0x1040
[ 57.211282][ T970] ? __get_user_4 (arch/x86/lib/getuser.S:85)
[ 57.215676][ T970] __x64_sys_io_submit (fs/aio.c:2056 fs/aio.c:2026 fs/aio.c:2026)
[ 57.220676][ T970] ? __ia32_compat_sys_io_submit (fs/aio.c:2026)
[ 57.226533][ T970] ? switch_fpu_return (arch/x86/include/asm/bitops.h:75 include/asm-generic/bitops/instrumented-atomic.h:42 include/linux/thread_info.h:94 arch/x86/kernel/fpu/context.h:80 arch/x86/kernel/fpu/core.c:664)
[ 57.231414][ T970] ? exit_to_user_mode_prepare (arch/x86/include/asm/entry-common.h:58 kernel/entry/common.c:209)
[ 57.237108][ T970] do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80)
To reproduce:
git clone https://github.com/intel/lkp-tests.git
cd lkp-tests
sudo bin/lkp install job.yaml # job file is attached in this email
bin/lkp split-job --compatible job.yaml # generate the yaml file for lkp run
sudo bin/lkp run generated-yaml-file
# if come across any failure that blocks the test,
# please remove ~/.lkp and /lkp dir to run from a clean state.
---
0DAY/LKP+ Test Infrastructure Open Source Technology Center
https://lists.01.org/hyperkitty/list/[email protected] Intel Corporation
Thanks,
Oliver Sang
6 months, 2 weeks
[drm/i915/rpm] 527bab0473: assertion_failure
by kernel test robot
Greeting,
FYI, we noticed the following commit (built with gcc-9):
commit: 527bab0473f28236e4587c7870586275c1ef5516 ("drm/i915/rpm: Enable runtime pm autosuspend by default")
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master
in testcase: igt
version: igt-x86_64-0d559158-1_20220115
with following parameters:
group: group-00
ucode: 0x28
on test machine: 8 threads 1 sockets Intel(R) Core(TM) i7-4770 CPU @ 3.40GHz with 8G memory
caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):
If you fix the issue, kindly add following tag
Reported-by: kernel test robot <oliver.sang(a)intel.com>
user :notice: [ 41.226797] IGT-Version: 1.26-g0d559158 (x86_64) (Linux: 5.15.0-rc7-01400-g527bab0473f2 x86_64)
user :notice: [ 41.239093] Starting subtest: min-max-config-idle
user :notice: [ 42.865887] (i915_pm_rps:1379) CRITICAL: Test assertion failure function idle_check, file ../tests/i915/i915_pm_rps.c:491:
user :info : [ 42.866257] [IGT] i915_pm_rps: exiting, ret=98
user :notice: [ 42.879114] (i915_pm_rps:1379) CRITICAL: Failed assertion: freqs[ACT] == freqs[RPn]
user :notice: [ 42.886398] (i915_pm_rps:1379) CRITICAL: Last errno: 2, No such file or directory
To reproduce:
git clone https://github.com/intel/lkp-tests.git
cd lkp-tests
sudo bin/lkp install job.yaml # job file is attached in this email
bin/lkp split-job --compatible job.yaml # generate the yaml file for lkp run
sudo bin/lkp run generated-yaml-file
# if come across any failure that blocks the test,
# please remove ~/.lkp and /lkp dir to run from a clean state.
---
0DAY/LKP+ Test Infrastructure Open Source Technology Center
https://lists.01.org/hyperkitty/list/[email protected] Intel Corporation
Thanks,
Oliver Sang
6 months, 2 weeks
[netfilter] 7197743776: BUG:KASAN:use-after-free_in_nft_ct_set_zone_eval
by kernel test robot
Greeting,
FYI, we noticed the following commit (built with gcc-9):
commit: 719774377622bc4025d2a74f551b5dc2158c6c30 ("netfilter: conntrack: convert to refcount_t api")
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master
in testcase: kernel-selftests
version: kernel-selftests-x86_64-db530529-1_20220114
with following parameters:
group: netfilter
ucode: 0xe2
test-description: The kernel contains a set of "self tests" under the tools/testing/selftests/ directory. These are intended to be small unit tests to exercise individual code paths in the kernel.
test-url: https://www.kernel.org/doc/Documentation/kselftest.txt
on test machine: 8 threads Intel(R) Core(TM) i7-6770HQ CPU @ 2.60GHz with 32G memory
caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):
If you fix the issue, kindly add following tag
Reported-by: kernel test robot <oliver.sang(a)intel.com>
[ 934.186149][ C2] ==================================================================
[ 934.194459][ C2] BUG: KASAN: use-after-free in nft_ct_set_zone_eval+0x183/0x500 [nft_ct]
[ 934.203087][ C2] Read of size 4 at addr ffff88810b4c2c00 by task ping/18706
[ 934.210516][ C2]
[ 934.212796][ C2] CPU: 2 PID: 18706 Comm: ping Tainted: G I 5.16.0-rc4-01319-g719774377622 #1
[ 934.223135][ C2] Hardware name: /NUC6i7KYB, BIOS KYSKLi70.86A.0041.2016.0817.1130 08/17/2016
[ 934.232199][ C2] Call Trace:
[ 934.235467][ C2] <IRQ>
[ 934.238280][ C2] dump_stack_lvl+0x45/0x59
[ 934.243211][ C2] print_address_description+0x21/0x140
[ 934.249863][ C2] ? nft_ct_set_zone_eval+0x183/0x500 [nft_ct]
[ 934.256060][ C2] ? nft_ct_set_zone_eval+0x183/0x500 [nft_ct]
[ 934.262242][ C2] kasan_report.cold+0x7f/0x11b
[ 934.267106][ C2] ? nft_ct_set_zone_eval+0x183/0x500 [nft_ct]
[ 934.273386][ C2] kasan_check_range+0x14d/0x200
[ 934.278311][ C2] nft_ct_set_zone_eval+0x183/0x500 [nft_ct]
[ 934.284344][ C2] ? nft_ct_get_dump+0x240/0x240 [nft_ct]
[ 934.290111][ C2] ? lockdep_hardirqs_on_prepare+0x129/0x400
[ 934.296154][ C2] ? __local_bh_enable_ip+0xa2/0x100
[ 934.301469][ C2] nft_do_chain+0x2dc/0x1200 [nf_tables]
[ 934.307176][ C2] ? __alloc_skb+0xd1/0x2c0
[ 934.311633][ C2] ? rcu_read_lock_sched_held+0xa1/0x100
[ 934.317248][ C2] ? nft_update_chain_stats+0x140/0x140 [nf_tables]
[ 934.324516][ C2] ? mark_lock+0xca/0x13c0
[ 934.329631][ C2] ? mark_lock_irq+0x1240/0x1240
[ 934.334605][ C2] ? mark_lock_irq+0x1240/0x1240
[ 934.339965][ C2] ? kmalloc_reserve+0xc0/0xc0
[ 934.344786][ C2] ? __lock_acquire+0xc06/0x3440
[ 934.349745][ C2] ? lockdep_hardirqs_on_prepare+0x400/0x400
[ 934.355781][ C2] ? lock_is_held_type+0x98/0x140
[ 934.360792][ C2] ? rcu_read_lock_sched_held+0xa1/0x100
[ 934.366493][ C2] nft_do_chain_ipv4+0x17e/0x200 [nf_tables]
[ 934.372633][ C2] ? nft_do_chain_arp+0xc0/0xc0 [nf_tables]
[ 934.378565][ C2] ? rcu_read_unlock+0x40/0x40
[ 934.383364][ C2] nf_hook_slow+0xa7/0x180
[ 934.387813][ C2] vrf_l3_out+0xb0f/0x1080
[ 934.392264][ C2] ? vrf_l3_rcv+0x1200/0x1200
[ 934.396942][ C2] ? lock_is_held_type+0x98/0x140
[ 934.401940][ C2] ? vrf_ip_local_out+0x780/0x780
[ 934.407024][ C2] ? netdev_lower_get_first_private_rcu+0x100/0x100
[ 934.413694][ C2] __ip_local_out+0x42e/0x6c0
[ 934.418336][ C2] ? dst_output+0x380/0x380
[ 934.422875][ C2] ? kfree+0x202/0x400
[ 934.426889][ C2] ? __ip_make_skb+0xf29/0x1f00
[ 934.431731][ C2] ip_local_out+0x21/0x3c0
[ 934.436170][ C2] ip_send_skb+0x37/0xc0
[ 934.440473][ C2] icmp_reply+0x8b1/0xa00
[ 934.444866][ C2] ? icmpv4_xrlim_allow+0x3c0/0x3c0
[ 934.450721][ C2] ? lock_release+0x1df/0x680
[ 934.455480][ C2] ? lock_is_held_type+0x98/0x140
[ 934.460520][ C2] ? raw_local_deliver+0x7a7/0xd40
[ 934.465639][ C2] ? find_held_lock+0x2c/0x140
[ 934.470413][ C2] ? raw_local_deliver+0x7a7/0xd40
[ 934.475561][ C2] ? icmp_echo+0x174/0x200
[ 934.480601][ C2] icmp_echo+0x174/0x200
[ 934.485508][ C2] ? icmp_timestamp+0x1c0/0x1c0
[ 934.490377][ C2] ? rcu_read_lock_held+0xa1/0xc0
[ 934.495393][ C2] ? lock_is_held_type+0x98/0x140
[ 934.500578][ C2] ? rcu_read_lock_held+0xa1/0xc0
[ 934.505736][ C2] ? rcu_read_lock_sched_held+0x100/0x100
[ 934.511457][ C2] ? rcu_read_lock_held+0xa1/0xc0
[ 934.516500][ C2] ? rcu_read_lock_sched_held+0x100/0x100
[ 934.522274][ C2] icmp_echo+0xb9/0x180
[ 934.527003][ C2] icmp_rcv+0xae1/0x1a40
[ 934.531163][ C2] ? rcu_read_lock_sched_held+0x100/0x100
[ 934.536981][ C2] ? lock_release+0x1df/0x680
[ 934.541768][ C2] ip_protocol_deliver_rcu+0x7a5/0xb00
[ 934.547268][ C2] ip_local_deliver_finish+0x1df/0x300
[ 934.552809][ C2] ip_local_deliver+0x2da/0x440
[ 934.557746][ C2] ? ip_local_deliver_finish+0x300/0x300
[ 934.563524][ C2] ? rcu_read_lock_held+0xa1/0xc0
[ 934.568522][ C2] ? ip_protocol_deliver_rcu+0xb00/0xb00
[ 934.574251][ C2] ip_rcv+0x1fb/0x300
[ 934.578217][ C2] ? ip_sublist_rcv+0x800/0x800
[ 934.583044][ C2] ? rcu_read_lock_sched_held+0xa1/0x100
[ 934.588754][ C2] ? ip_local_deliver+0x440/0x440
[ 934.593818][ C2] ? lock_acquire+0x194/0x4c0
[ 934.598554][ C2] ? ip_sublist_rcv+0x800/0x800
[ 934.603454][ C2] __netif_receive_skb_one_core+0x162/0x1c0
[ 934.609466][ C2] ? __netif_receive_skb_core+0x3580/0x3580
[ 934.615505][ C2] ? mark_held_locks+0x9e/0x100
[ 934.620388][ C2] process_backlog+0x1cc/0x700
[ 934.625142][ C2] ? mark_held_locks+0x9e/0x100
[ 934.630030][ C2] __napi_poll+0xa1/0x500
[ 934.634394][ C2] net_rx_action+0x6f9/0xa80
[ 934.638951][ C2] ? napi_threaded_poll+0x480/0x480
[ 934.644169][ C2] ? lock_is_held_type+0x98/0x140
[ 934.649225][ C2] ? rcu_read_lock_bh_held+0xc0/0xc0
[ 934.654571][ C2] __do_softirq+0x1cb/0x860
[ 934.659072][ C2] ? ip_finish_output2+0x632/0x1d80
[ 934.664220][ C2] do_softirq+0x72/0xc0
[ 934.668398][ C2] </IRQ>
[ 934.671277][ C2] <TASK>
[ 934.674220][ C2] __local_bh_enable_ip+0xd8/0x100
[ 934.679376][ C2] ip_finish_output2+0x656/0x1d80
[ 934.684381][ C2] ? ip_frag_next+0x9c0/0x9c0
[ 934.689082][ C2] ? ip_output+0x35e/0x4c0
[ 934.693548][ C2] __ip_finish_output+0x821/0x1380
[ 934.698644][ C2] ? ip_output+0x4c0/0x4c0
[ 934.703050][ C2] ip_output+0x1c9/0x4c0
[ 934.707312][ C2] ? ip_fragment+0x240/0x240
[ 934.713006][ C2] ? __ip_make_skb+0xf29/0x1f00
[ 934.717945][ C2] ? ip_local_out+0x21/0x3c0
[ 934.722564][ C2] ip_send_skb+0x37/0xc0
[ 934.726736][ C2] raw_sendmsg+0xee0/0x16c0
[ 934.731183][ C2] ? dst_output+0x380/0x380
[ 934.735645][ C2] ? lockdep_hardirqs_on_prepare+0x400/0x400
[ 934.741652][ C2] ? __might_fault+0xb8/0x180
[ 934.746369][ C2] ? find_held_lock+0x2c/0x140
[ 934.751126][ C2] ? gup_pgd_range+0xcc8/0x1400
[ 934.755986][ C2] ? lock_release+0x1df/0x680
[ 934.760721][ C2] ? lock_downgrade+0x700/0x700
[ 934.765611][ C2] ? inet_send_prepare+0x3c0/0x3c0
[ 934.770690][ C2] ? sock_sendmsg+0xdd/0x140
[ 934.775381][ C2] ? dst_output+0x380/0x380
[ 934.779937][ C2] sock_sendmsg+0xdd/0x140
[ 934.784400][ C2] __sys_sendto+0x1a6/0x280
[ 934.788979][ C2] ? __ia32_sys_getpeername+0xc0/0xc0
[ 934.794364][ C2] ? __x64_sys_rt_sigsuspend+0x140/0x140
[ 934.800069][ C2] ? syscall_exit_to_user_mode+0x1e/0x80
[ 934.805734][ C2] ? syscall_exit_to_user_mode+0x1e/0x80
[ 934.811379][ C2] ? syscall_enter_from_user_mode+0x1c/0x80
[ 934.817325][ C2] ? rcu_read_lock_sched_held+0xa1/0x100
[ 934.823036][ C2] ? rcu_read_lock_bh_held+0xc0/0xc0
[ 934.828390][ C2] __x64_sys_sendto+0xdd/0x1c0
[ 934.833165][ C2] ? syscall_enter_from_user_mode+0x21/0x80
[ 934.839149][ C2] do_syscall_64+0x5c/0x80
[ 934.843553][ C2] ? do_syscall_64+0x69/0x80
[ 934.848172][ C2] ? lockdep_hardirqs_on_prepare+0x273/0x400
[ 934.854195][ C2] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 934.860179][ C2] RIP: 0033:0x7f7662be49b7
[ 934.864680][ C2] Code: 64 89 02 48 c7 c0 ff ff ff ff eb b6 0f 1f 80 00 00 00 00 48 8d 05 49 5d 0c 00 41 89 ca 8b 00 85 c0 75 10 b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 71 c3 41 57 4d 89 c7 41 56 41 89 ce 41 55 49
[ 934.885487][ C2] RSP: 002b:00007ffc60016c18 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
[ 934.894237][ C2] RAX: ffffffffffffffda RBX: 0000556977276a20 RCX: 00007f7662be49b7
[ 934.902495][ C2] RDX: 0000000000000040 RSI: 0000556977276a20 RDI: 0000000000000005
[ 934.911820][ C2] RBP: 0000000000000040 R08: 0000556977273800 R09: 0000000000000010
[ 934.920071][ C2] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffc60018340
[ 934.928373][ C2] R13: 00007ffc60016c20 R14: 00007ffc60016d10 R15: 00005569772723a0
[ 934.936587][ C2] </TASK>
[ 934.939625][ C2]
[ 934.941972][ C2] Allocated by task 18705:
[ 934.946441][ C2] kasan_save_stack+0x1e/0x80
[ 934.951248][ C2] __kasan_kmalloc+0x81/0xc0
[ 934.955875][ C2] nf_ct_tmpl_alloc+0x8c/0x300 [nf_conntrack]
[ 934.962075][ C2] nft_ct_set_init+0x435/0x680 [nft_ct]
[ 934.967741][ C2] nf_tables_newrule+0xb95/0x2780 [nf_tables]
[ 934.973968][ C2] nfnetlink_rcv_batch+0xd08/0x1980 [nfnetlink]
[ 934.980406][ C2] nfnetlink_rcv+0x2c1/0x340 [nfnetlink]
[ 934.986167][ C2] netlink_unicast+0x430/0x680
[ 934.990982][ C2] netlink_sendmsg+0x77a/0xc40
[ 934.995899][ C2] sock_sendmsg+0xe4/0x140
[ 935.000340][ C2] ____sys_sendmsg+0x54f/0x7c0
[ 935.005237][ C2] ___sys_sendmsg+0xe9/0x180
[ 935.009882][ C2] __sys_sendmsg+0xb7/0x140
[ 935.014434][ C2] do_syscall_64+0x5c/0x80
[ 935.018948][ C2] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 935.024933][ C2]
[ 935.027243][ C2] Freed by task 18706:
[ 935.031347][ C2] kasan_save_stack+0x1e/0x80
[ 935.036154][ C2] kasan_set_track+0x21/0x40
[ 935.040787][ C2] kasan_set_free_info+0x20/0x40
[ 935.045809][ C2] __kasan_slab_free+0xea/0x140
[ 935.050790][ C2] kfree+0xd0/0x400
[ 935.054599][ C2] nf_conntrack_destroy+0x83/0x180
[ 935.056340][T18663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 935.059834][ C2] nf_conntrack_in+0x1023/0x1440 [nf_conntrack]
[ 935.073886][ C2] nf_hook_slow+0xa7/0x180
[ 935.078545][ C2] ip_rcv+0x1be/0x300
[ 935.082691][ C2] __netif_receive_skb_one_core+0x162/0x1c0
[ 935.088698][ C2] process_backlog+0x1cc/0x700
[ 935.093454][ C2] __napi_poll+0xa1/0x500
[ 935.097804][ C2] net_rx_action+0x6f9/0xa80
[ 935.102399][ C2] __do_softirq+0x1cb/0x860
[ 935.106979][ C2]
[ 935.109295][ C2] The buggy address belongs to the object at ffff88810b4c2c00
[ 935.109295][ C2] which belongs to the cache kmalloc-512 of size 512
[ 935.123767][ C2] The buggy address is located 0 bytes inside of
[ 935.123767][ C2] 512-byte region [ffff88810b4c2c00, ffff88810b4c2e00)
[ 935.137280][ C2] The buggy address belongs to the page:
[ 935.143076][ C2] page:00000000196a0aed refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10b4c0
[ 935.153730][ C2] head:00000000196a0aed order:3 compound_mapcount:0 compound_pincount:0
[ 935.162199][ C2] flags: 0x17ffffc0010200(slab|head|node=0|zone=2|lastcpupid=0x1fffff)
[ 935.170718][ C2] raw: 0017ffffc0010200 dead000000000100 dead000000000122 ffff888100042c80
[ 935.179551][ C2] raw: 0000000000000000 0000000000200020 00000001ffffffff 0000000000000000
[ 935.188262][ C2] page dumped because: kasan: bad access detected
[ 935.194823][ C2]
[ 935.197145][ C2] Memory state around the buggy address:
[ 935.202878][ C2] ffff88810b4c2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 935.211159][ C2] ffff88810b4c2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 935.219417][ C2] >ffff88810b4c2c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 935.227736][ C2] ^
[ 935.231898][ C2] ffff88810b4c2c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 935.240179][ C2] ffff88810b4c2d00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 935.248437][ C2] ==================================================================
[ 935.256767][ C2] Disabling lock debugging due to kernel taint
[ 935.300943][ T429] # PASS: entry found in conntrack zone 1
[ 935.300956][ T429]
[ 935.333644][T12286] ------------[ cut here ]------------
[ 935.339289][T12286] refcount_t: underflow; use-after-free.
[ 935.345231][T12286] WARNING: CPU: 4 PID: 12286 at lib/refcount.c:28 refcount_warn_saturate+0xaa/0x140
[ 935.355000][T12286] Modules linked in: xt_state xt_conntrack xt_nat nft_compat nft_limit nfnetlink_queue nft_queue nf_conntrack_ftp ip_vs_rr ip_vs authenc echainiv esp4 nft_flow_offload nf_flow_table_inet nf_flow_table ebtable_filter ebt_redirect ebt_ip ebtable_broute ebtables nft_ct nf_conntrack_netlink nft_redir nft_masq nft_nat nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nft_objref nf_log_syslog nft_log nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nf_tables nfnetlink netconsole btrfs blake2b_generic intel_rapl_msr xor intel_rapl_common raid6_pq zstd_compress libcrc32c sd_mod t10_pi sg ipmi_devintf i915 ipmi_msghandler x86_pkg_temp_thermal intel_powerclamp coretemp crct10dif_pclmul intel_wmi_thunderbolt crc32_pclmul intel_gtt crc32c_intel ttm ghash_clmulni_intel drm_kms_helper sdhci_pci rapl cqhci ahci syscopyarea intel_cstate sysfillrect sdhci libahci mei_me sysimgblt mmc_core i2c_i801 intel_uncore mei i2c_smbus libata intel_pch_thermal fb_sys_fops
[ 935.355219][T12286] ir_rc6_decoder wmi rc_rc6_mce nuvoton_cir rc_core video acpi_pad intel_pmc_core ip_tables
[ 935.456890][T12286] CPU: 4 PID: 12286 Comm: kworker/4:1 Tainted: G B I 5.16.0-rc4-01319-g719774377622 #1
[ 935.468165][T12286] Hardware name: /NUC6i7KYB, BIOS KYSKLi70.86A.0041.2016.0817.1130 08/17/2016
[ 935.477576][T12286] Workqueue: events nf_tables_trans_destroy_work [nf_tables]
[ 935.485327][T12286] RIP: 0010:refcount_warn_saturate+0xaa/0x140
[ 935.491632][T12286] Code: fa be bc 03 01 e8 59 4a 6c 01 0f 0b eb d5 80 3d e8 be bc 03 00 75 cc 48 c7 c7 a0 f5 27 84 c6 05 d8 be bc 03 01 e8 39 4a 6c 01 <0f> 0b eb b5 80 3d c6 be bc 03 00 75 ac 48 c7 c7 60 f6 27 84 c6 05
[ 935.512113][T12286] RSP: 0018:ffffc90007cefba8 EFLAGS: 00010286
[ 935.518393][T12286] RAX: 0000000000000000 RBX: ffff88810b4c2c00 RCX: 0000000000000000
[ 935.526773][T12286] RDX: 0000000000000004 RSI: 0000000000000008 RDI: fffff52000f9df67
[ 935.534989][T12286] RBP: 0000000000000003 R08: 0000000000000001 R09: ffffed1101f868e1
[ 935.543360][T12286] R10: ffff88880fc34707 R11: ffffed1101f868e0 R12: ffffffff8492b8b0
[ 935.551694][T12286] R13: 000000000003b150 R14: 0000000000000002 R15: 0000000000000002
[ 935.560086][T12286] FS: 0000000000000000(0000) GS:ffff88880fc00000(0000) knlGS:0000000000000000
[ 935.569373][T12286] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 935.576078][T12286] CR2: 00007f07dbc083b8 CR3: 00000008bc42a001 CR4: 00000000003706e0
[ 935.584172][T12286] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 935.592284][T12286] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 935.600458][T12286] Call Trace:
[ 935.603802][T12286] <TASK>
[ 935.606757][T12286] nft_ct_tmpl_put_pcpu+0x158/0x200 [nft_ct]
[ 935.612990][T12286] __nft_ct_set_destroy+0x2d/0x40 [nft_ct]
[ 935.620176][T12286] nft_ct_set_destroy+0x4c/0x100 [nft_ct]
[ 935.626035][T12286] nf_tables_expr_destroy+0x7d/0x100 [nf_tables]
[ 935.632544][T12286] ? module_put+0x137/0x1c0
[ 935.637807][T12286] nf_tables_rule_destroy+0xa7/0x140 [nf_tables]
[ 935.644375][T12286] nf_tables_trans_destroy_work+0x335/0x680 [nf_tables]
[ 935.651419][T12286] ? lock_downgrade+0x700/0x700
[ 935.656386][T12286] ? nf_tables_destroy_set+0xc0/0xc0 [nf_tables]
[ 935.662824][T12286] ? rcu_read_lock_bh_held+0xc0/0xc0
[ 935.668279][T12286] process_one_work+0x817/0x1380
[ 935.673415][T12286] ? rcu_read_unlock+0x40/0x40
[ 935.678204][T12286] ? pwq_dec_nr_in_flight+0x280/0x280
[ 935.683678][T12286] ? rwlock_bug+0xc0/0xc0
[ 935.688781][T12286] worker_thread+0x8b/0xd80
[ 935.693375][T12286] ? __kthread_parkme+0xd9/0x200
[ 935.698514][T12286] ? schedule+0xf5/0x280
[ 935.702904][T12286] ? process_one_work+0x1380/0x1380
[ 935.708386][T12286] ? process_one_work+0x1380/0x1380
[ 935.713715][T12286] kthread+0x3a4/0x480
[ 935.717813][T12286] ? _raw_spin_unlock_irq+0x24/0x40
[ 935.723075][T12286] ? set_kthread_struct+0x100/0x100
[ 935.728294][T12286] ret_from_fork+0x22/0x30
[ 935.732760][T12286] </TASK>
[ 935.735812][T12286] irq event stamp: 34520
[ 935.740077][T12286] hardirqs last enabled at (34519): [<ffffffff83bb9fa4>] _raw_spin_unlock_irq+0x24/0x40
[ 935.750267][T12286] hardirqs last disabled at (34520): [<ffffffff83ba1f45>] __schedule+0x1405/0x2500
[ 935.759910][T12286] softirqs last enabled at (33626): [<ffffffff83e00527>] __do_softirq+0x527/0x860
[ 935.769465][T12286] softirqs last disabled at (33621): [<ffffffff813ce6e3>] irq_exit_rcu+0x163/0x1c0
[ 935.779030][T12286] ---[ end trace 6838ac6b830f7e2f ]---
To reproduce:
git clone https://github.com/intel/lkp-tests.git
cd lkp-tests
sudo bin/lkp install job.yaml # job file is attached in this email
bin/lkp split-job --compatible job.yaml # generate the yaml file for lkp run
sudo bin/lkp run generated-yaml-file
# if come across any failure that blocks the test,
# please remove ~/.lkp and /lkp dir to run from a clean state.
---
0DAY/LKP+ Test Infrastructure Open Source Technology Center
https://lists.01.org/hyperkitty/list/[email protected] Intel Corporation
Thanks,
Oliver Sang
6 months, 2 weeks
[block] 0b23f6c247: BUG:kernel_NULL_pointer_dereference,address
by kernel test robot
Greeting,
FYI, we noticed the following commit (built with gcc-9):
commit: 0b23f6c247f70977d8a0920cbed46fc342a0ac18 ("block: pass a block_device and opf to bio_alloc_bioset")
https://github.com/ammarfaizi2/linux-block axboe/linux-block/perf-wip
in testcase: unixbench
version: unixbench-x86_64-070030e-1_20220113
with following parameters:
runtime: 300s
nr_task: 1
test: execl
cpufreq_governor: performance
ucode: 0xd000280
test-description: UnixBench is the original BYTE UNIX benchmark suite aims to test performance of Unix-like system.
test-url: https://github.com/kdlucas/byte-unixbench
on test machine: 128 threads 2 sockets Intel(R) Xeon(R) Platinum 8358 CPU @ 2.60GHz with 128G memory
caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):
If you fix the issue, kindly add following tag
Reported-by: kernel test robot <oliver.sang(a)intel.com>
[ 19.657541][ T684] BUG: kernel NULL pointer dereference, address: 0000000000000348
[ 19.657543][ T684] #PF: supervisor read access in kernel mode
[ 19.657544][ T684] #PF: error_code(0x0000) - not-present page
[ 19.657545][ T684] PGD 1c77fe067 P4D 0
[ 19.657547][ T684] Oops: 0000 [#1] SMP NOPTI
[ 19.657548][ T684] CPU: 31 PID: 684 Comm: kworker/u257:29 Not tainted 5.16.0-10683-g0b23f6c247f7 #1
[ 19.657550][ T684] Workqueue: events_unbound async_run_entry_fn
[ 19.657556][ T684] RIP: 0010:bio_associate_blkg_from_css (block/blk-cgroup.c:1852)
[ 19.657562][ T684] Code: 0d 47 2d a1 7e 65 ff 0d 40 2d a1 7e 49 89 5e 48 48 83 c4 10 5b 5d 41 5c 41 5d 41 5e 41 5f c3 49 8b 46 08 65 ff 05 22 2d a1 7e <48> 8b 80 48 03 00 00 48 8b 90 80 01 00 00 48 8b 42 38 a8 03 0f 85
All code
========
0: 0d 47 2d a1 7e or $0x7ea12d47,%eax
5: 65 ff 0d 40 2d a1 7e decl %gs:0x7ea12d40(%rip) # 0x7ea12d4c
c: 49 89 5e 48 mov %rbx,0x48(%r14)
10: 48 83 c4 10 add $0x10,%rsp
14: 5b pop %rbx
15: 5d pop %rbp
16: 41 5c pop %r12
18: 41 5d pop %r13
1a: 41 5e pop %r14
1c: 41 5f pop %r15
1e: c3 retq
1f: 49 8b 46 08 mov 0x8(%r14),%rax
23: 65 ff 05 22 2d a1 7e incl %gs:0x7ea12d22(%rip) # 0x7ea12d4c
2a:* 48 8b 80 48 03 00 00 mov 0x348(%rax),%rax <-- trapping instruction
31: 48 8b 90 80 01 00 00 mov 0x180(%rax),%rdx
38: 48 8b 42 38 mov 0x38(%rdx),%rax
3c: a8 03 test $0x3,%al
3e: 0f .byte 0xf
3f: 85 .byte 0x85
Code starting with the faulting instruction
===========================================
0: 48 8b 80 48 03 00 00 mov 0x348(%rax),%rax
7: 48 8b 90 80 01 00 00 mov 0x180(%rax),%rdx
e: 48 8b 42 38 mov 0x38(%rdx),%rax
12: a8 03 test $0x3,%al
14: 0f .byte 0xf
15: 85 .byte 0x85
[ 19.657563][ T684] RSP: 0018:ffa000000820b818 EFLAGS: 00010282
[ 19.657565][ T684] RAX: 0000000000000000 RBX: ffffffff8376de40 RCX: 0000000000000004
[ 19.657566][ T684] RDX: ff1100010585c000 RSI: ffffffff8376e8a0 RDI: ff11000241b18f00
[ 19.657566][ T684] RBP: ff11000241b18f00 R08: 00000000000000c0 R09: ff11000241b18000
[ 19.657567][ T684] R10: 00000000000304e0 R11: 0000000000092800 R12: ffffffff8376e8a0
[ 19.657568][ T684] R13: 0000000000000c00 R14: ff11000241b18f00 R15: ffffffff8376de58
[ 19.657569][ T684] FS: 0000000000000000(0000) GS:ff1100103f9c0000(0000) knlGS:0000000000000000
[ 19.657570][ T684] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 19.657571][ T684] CR2: 0000000000000348 CR3: 00000001c77a8006 CR4: 0000000000771ee0
[ 19.657572][ T684] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 19.657572][ T684] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 19.657573][ T684] PKRU: 55555554
[ 19.657574][ T684] Call Trace:
[ 19.657575][ T684] <TASK>
[ 19.657577][ T684] bio_associate_blkg (arch/x86/include/asm/preempt.h:85 include/linux/rcupdate.h:73 include/linux/rcupdate.h:726 block/blk-cgroup.c:1880)
[ 19.657579][ T684] bio_alloc_bioset (block/bio.c:519)
[ 19.657583][ T684] ? alloc_buffer_head (include/linux/slab.h:706 fs/buffer.c:3310)
[ 19.657588][ T684] submit_bh_wbc (include/linux/bio.h:423 fs/buffer.c:3027)
[ 19.657590][ T684] block_read_full_page (fs/buffer.c:2335)
[ 19.657592][ T684] ? blkdev_write_begin (block/fops.c:28)
[ 19.657595][ T684] ? scan_shadow_nodes (mm/workingset.c:435)
[ 19.657599][ T684] ? folio_add_lru (mm/swap.c:468)
[ 19.657602][ T684] do_read_cache_folio (mm/filemap.c:3410)
[ 19.657605][ T684] ? set_next_entity (kernel/sched/fair.c:4437)
[ 19.657607][ T684] ? __switch_to_asm (arch/x86/entry/entry_64.S:254)
[ 19.657611][ T684] read_cache_page (mm/filemap.c:3489 mm/filemap.c:3498)
[ 19.657613][ T684] read_part_sector (block/partitions/core.c:726)
[ 19.657615][ T684] read_lba (block/partitions/efi.c:249)
[ 19.657616][ T684] ? kmem_cache_alloc_trace (arch/x86/include/asm/jump_label.h:55 include/linux/memcontrol.h:1688 mm/slab.h:514 mm/slab.h:745 mm/slub.c:3230 mm/slub.c:3238 mm/slub.c:3255)
[ 19.657619][ T684] find_valid_gpt (block/partitions/efi.c:177 block/partitions/efi.c:604)
[ 19.657622][ T684] efi_partition (block/partitions/efi.c:720)
[ 19.657623][ T684] ? snprintf (lib/vsprintf.c:2942)
[ 19.657627][ T684] ? find_valid_gpt (block/partitions/efi.c:714)
[ 19.657628][ T684] check_partition (block/partitions/core.c:148)
[ 19.657630][ T684] bdev_disk_changed (block/partitions/core.c:609 block/partitions/core.c:695 block/partitions/core.c:662)
[ 19.657631][ T684] blkdev_get_whole (block/bdev.c:684)
[ 19.657634][ T684] blkdev_get_by_dev (block/bdev.c:821 block/bdev.c:785)
[ 19.657636][ T684] disk_scan_partitions (block/genhd.c:391)
[ 19.657638][ T684] device_add_disk (block/genhd.c:518)
[ 19.657640][ T684] sd_probe (drivers/scsi/sd.c:3580) sd_mod
[ 19.657644][ T684] really_probe (arch/x86/include/asm/jump_label.h:27 drivers/base/dd.c:741)
[ 19.657647][ T684] __driver_probe_device (drivers/base/dd.c:752)
[ 19.657649][ T684] driver_probe_device (drivers/base/dd.c:782)
[ 19.657650][ T684] __driver_attach_async_helper (drivers/base/dd.c:1086)
[ 19.657651][ T684] async_run_entry_fn (kernel/async.c:127)
[ 19.657653][ T684] process_one_work (kernel/workqueue.c:2307)
[ 19.657656][ T684] worker_thread (include/linux/list.h:284 kernel/workqueue.c:2455)
[ 19.657658][ T684] ? process_one_work (kernel/workqueue.c:2397)
[ 19.657659][ T684] kthread (kernel/kthread.c:359)
[ 19.657661][ T684] ? kthread_complete_and_exit (kernel/kthread.c:314)
[ 19.657663][ T684] ret_from_fork (arch/x86/entry/entry_64.S:295)
[ 19.657665][ T684] </TASK>
[ 19.657665][ T684] Modules linked in: sd_mod t10_pi sg acpi_cpufreq(-) intel_rapl_msr intel_rapl_common x86_pkg_temp_thermal ast intel_powerclamp drm_vram_helper coretemp drm_ttm_helper crct10dif_pclmul crc32_pclmul ttm crc32c_intel ipmi_ssif drm_kms_helper ghash_clmulni_intel mei_me ahci libahci rapl syscopyarea sysfillrect sysimgblt fb_sys_fops acpi_ipmi intel_cstate ioatdma drm libata ipmi_si joydev mei intel_pch_thermal intel_uncore dca wmi ipmi_devintf ipmi_msghandler acpi_pad acpi_power_meter ip_tables
[ 19.657680][ T684] CR2: 0000000000000348
[ 19.657682][ T684] ---[ end trace 91b30e9f1a05fc47 ]---
To reproduce:
git clone https://github.com/intel/lkp-tests.git
cd lkp-tests
sudo bin/lkp install job.yaml # job file is attached in this email
bin/lkp split-job --compatible job.yaml # generate the yaml file for lkp run
sudo bin/lkp run generated-yaml-file
# if come across any failure that blocks the test,
# please remove ~/.lkp and /lkp dir to run from a clean state.
---
0DAY/LKP+ Test Infrastructure Open Source Technology Center
https://lists.01.org/hyperkitty/list/[email protected] Intel Corporation
Thanks,
Oliver Sang
6 months, 2 weeks
[net] 98ccce2328: WARNING:suspicious_RCU_usage
by kernel test robot
Greeting,
FYI, we noticed the following commit (built with clang-14):
commit: 98ccce23287c6bc2abd5e40992146fbd795a27d6 ("[wpan-next v2 1/9] net: ieee802154: hwsim: Ensure proper channel selection at probe time")
url: https://github.com/0day-ci/linux/commits/Miquel-Raynal/ieee802154-A-bunch...
base: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git 1d1df41c5a33359a00e919d54eaebfb789711fdc
patch link: https://lore.kernel.org/linux-wpan/[email protected]
in testcase: boot
on test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G
caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):
+---------------------------------------------------------------------------------------+------------+------------+
| | 1d1df41c5a | 98ccce2328 |
+---------------------------------------------------------------------------------------+------------+------------+
| boot_successes | 11 | 0 |
| WARNING:suspicious_RCU_usage | 0 | 14 |
| drivers/net/ieee802154/mac802154_hwsim.c:#suspicious_rcu_dereference_protected()usage | 0 | 14 |
+---------------------------------------------------------------------------------------+------------+------------+
If you fix the issue, kindly add following tag
Reported-by: kernel test robot <oliver.sang(a)intel.com>
[ 125.631089][ T1] WARNING: suspicious RCU usage
[ 125.632380][ T1] 5.16.0-11201-g98ccce23287c #1 Not tainted
[ 125.633728][ T1] -----------------------------
[ 125.634782][ T1] drivers/net/ieee802154/mac802154_hwsim.c:103 suspicious rcu_dereference_protected() usage!
[ 125.637107][ T1]
[ 125.637107][ T1] other info that might help us debug this:
[ 125.637107][ T1]
[ 125.639290][ T1]
[ 125.639290][ T1] rcu_scheduler_active = 2, debug_locks = 1
[ 125.641218][ T1] 1 lock held by swapper/0/1:
[ 125.642313][ T1] #0: ffff8881709ac188 (&dev->mutex){....}-{3:3}, at: __driver_attach (drivers/base/dd.c:1141)
[ 125.644487][ T1]
[ 125.644487][ T1] stack backtrace:
[ 125.646112][ T1] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 5.16.0-11201-g98ccce23287c #1 2e4e82a5ad58a18340e5b3bf7e4ce54853ca765f
[ 125.648776][ T1] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 125.649379][ T1] Call Trace:
[ 125.649379][ T1] <TASK>
[ 125.649379][ T1] dump_stack_lvl (lib/dump_stack.c:107)
[ 125.649379][ T1] hwsim_hw_channel (drivers/net/ieee802154/mac802154_hwsim.c:103)
[ 125.649379][ T1] hwsim_add_one (drivers/net/ieee802154/mac802154_hwsim.c:?)
[ 125.649379][ T1] hwsim_probe (drivers/net/ieee802154/mac802154_hwsim.c:846)
[ 125.649379][ T1] platform_probe (drivers/base/platform.c:1417)
[ 125.649379][ T1] really_probe (drivers/base/dd.c:? drivers/base/dd.c:596)
[ 125.649379][ T1] __driver_probe_device (drivers/base/dd.c:752)
[ 125.649379][ T1] driver_probe_device (drivers/base/dd.c:782)
[ 125.649379][ T1] __driver_attach (drivers/base/dd.c:1142)
[ 125.649379][ T1] ? driver_attach (drivers/base/dd.c:1094)
[ 125.649379][ T1] bus_for_each_dev (drivers/base/bus.c:300)
[ 125.649379][ T1] bus_add_driver (drivers/base/bus.c:618)
[ 125.649379][ T1] driver_register (drivers/base/driver.c:171)
[ 125.649379][ T1] hwsim_init_module (drivers/net/ieee802154/mac802154_hwsim.c:897)
[ 125.649379][ T1] do_one_initcall (include/linux/instrumented.h:71 include/linux/atomic/atomic-instrumented.h:27 include/linux/jump_label.h:266 include/linux/jump_label.h:276 include/trace/events/initcall.h:48 init/main.c:1298)
[ 125.649379][ T1] ? mcr20a_driver_init (drivers/net/ieee802154/mac802154_hwsim.c:882)
[ 125.649379][ T1] ? rcu_read_lock_sched_held (include/linux/lockdep.h:? kernel/rcu/update.c:125)
[ 125.649379][ T1] do_initcall_level (init/main.c:1369)
[ 125.649379][ T1] do_initcalls (init/main.c:1383)
[ 125.649379][ T1] kernel_init_freeable (init/main.c:1612)
[ 125.649379][ T1] ? rest_init (init/main.c:1491)
[ 125.649379][ T1] kernel_init (init/main.c:1501)
[ 125.649379][ T1] ? rest_init (init/main.c:1491)
[ 125.649379][ T1] ret_from_fork (??:?)
[ 125.649379][ T1] </TASK>
[ 125.687993][ T1] mac802154_hwsim mac802154_hwsim: Added 2 mac802154 hwsim hardware radios
[ 125.690601][ T1] VMware vmxnet3 virtual NIC driver - version 1.6.0.0-k-NAPI
[ 125.692817][ T1] usbcore: registered new interface driver catc
[ 125.694198][ T1] pegasus: Pegasus/Pegasus II USB Ethernet driver
[ 125.696020][ T1] usbcore: registered new interface driver pegasus
[ 125.699113][ T1] usbcore: registered new interface driver rtl8150
[ 125.700638][ T1] hso: drivers/net/usb/hso.c: Option Wireless
[ 125.702431][ T1] usbcore: registered new interface driver hso
[ 125.703921][ T1] usbcore: registered new interface driver lan78xx
[ 125.705783][ T1] usbcore: registered new interface driver asix
[ 125.707474][ T1] usbcore: registered new interface driver ax88179_178a
[ 125.709348][ T1] usbcore: registered new interface driver cdc_ether
[ 125.710834][ T1] usbcore: registered new interface driver sr9700
[ 125.712638][ T1] usbcore: registered new interface driver smsc75xx
[ 125.714478][ T1] usbcore: registered new interface driver smsc95xx
[ 125.716294][ T1] usbcore: registered new interface driver gl620a
[ 125.717997][ T1] usbcore: registered new interface driver plusb
[ 125.719663][ T1] usbcore: registered new interface driver rndis_host
[ 125.721363][ T1] usbcore: registered new interface driver zaurus
[ 125.723177][ T1] usbcore: registered new interface driver int51x1
[ 125.724871][ T1] usbcore: registered new interface driver cdc_phonet
[ 125.726603][ T1] usbcore: registered new interface driver ipheth
[ 125.728344][ T1] usbcore: registered new interface driver sierra_net
[ 125.730163][ T1] usbcore: registered new interface driver cx82310_eth
[ 125.731980][ T1] usbcore: registered new interface driver cdc_ncm
[ 125.733751][ T1] usbcore: registered new interface driver huawei_cdc_ncm
[ 125.735587][ T1] usbcore: registered new interface driver lg-vl600
[ 125.737320][ T1] usbcore: registered new interface driver cdc_mbim
[ 125.739070][ T1] usbcore: registered new interface driver ch9200
[ 125.741018][ T1] Fusion MPT base driver 3.04.20
[ 125.742335][ T1] Copyright (c) 1999-2008 LSI Corporation
[ 125.743734][ T1] Fusion MPT SPI Host driver 3.04.20
[ 125.745365][ T1] Fusion MPT SAS Host driver 3.04.20
[ 125.746920][ T1] Fusion MPT misc device (ioctl) driver 3.04.20
[ 125.748844][ T1] mptctl: Registered with Fusion MPT base driver
[ 125.750192][ T1] mptctl: /dev/mptctl @ (major,minor=10,220)
[ 125.761147][ T1] uhci_hcd: USB Universal Host Controller Interface driver
[ 125.764406][ T1] driver u132_hcd
[ 125.766705][ T1] fotg210_hcd: FOTG210 Host Controller (EHCI) Driver
[ 125.768277][ T1] Warning! fotg210_hcd should always be loaded before uhci_hcd and ohci_hcd, not after
[ 125.771294][ T1] usbcore: registered new interface driver cdc_acm
[ 125.772933][ T1] cdc_acm: USB Abstract Control Model driver for USB modems and ISDN adapters
[ 125.777124][ T1] usbcore: registered new interface driver cdc_wdm
[ 125.778822][ T1] usbcore: registered new interface driver usbtmc
[ 125.781162][ T1] usbcore: registered new interface driver uas
[ 125.783087][ T1] usbcore: registered new interface driver usb-storage
[ 125.784949][ T1] usbcore: registered new interface driver ums-datafab
[ 125.786607][ T1] usbcore: registered new interface driver ums-freecom
[ 125.788273][ T1] usbcore: registered new interface driver ums-jumpshot
[ 125.790014][ T1] usbcore: registered new interface driver ums-karma
[ 125.791755][ T1] usbcore: registered new interface driver ums-onetouch
[ 125.793556][ T1] usbcore: registered new interface driver ums-sddr09
[ 125.795264][ T1] usbcore: registered new interface driver ums-sddr55
[ 125.796911][ T1] usbcore: registered new interface driver microtekX6
[ 125.798914][ T1] usbcore: registered new interface driver usbserial_generic
[ 125.800876][ T1] usbserial: USB Serial support registered for generic
[ 125.802814][ T1] usbcore: registered new interface driver aircable
[ 125.804535][ T1] usbserial: USB Serial support registered for aircable
[ 125.806275][ T1] usbcore: registered new interface driver ark3116
To reproduce:
# build kernel
cd linux
cp config-5.16.0-11201-g98ccce23287c .config
make HOSTCC=clang-14 CC=clang-14 ARCH=x86_64 olddefconfig prepare modules_prepare bzImage modules
make HOSTCC=clang-14 CC=clang-14 ARCH=x86_64 INSTALL_MOD_PATH=<mod-install-dir> modules_install
cd <mod-install-dir>
find lib/ | cpio -o -H newc --quiet | gzip > modules.cgz
git clone https://github.com/intel/lkp-tests.git
cd lkp-tests
bin/lkp qemu -k <bzImage> -m modules.cgz job-script # job-script is attached in this email
# if come across any failure that blocks the test,
# please remove ~/.lkp and /lkp dir to run from a clean state.
---
0DAY/LKP+ Test Infrastructure Open Source Technology Center
https://lists.01.org/hyperkitty/list/[email protected] Intel Corporation
Thanks,
Oliver Sang
6 months, 2 weeks
[inet] 1b84613d30: WARNING:at_kernel/softirq.c:#__local_bh_enable_ip
by kernel test robot
Greeting,
FYI, we noticed the following commit (built with gcc-9):
commit: 1b84613d303e1496ea759aa171b7b36dfd8f26c3 ("[PATCH] inet: missing lock releases in udp.c")
url: https://github.com/0day-ci/linux/commits/ycaibb/inet-missing-lock-release...
base: https://git.kernel.org/cgit/linux/kernel/git/davem/net-next.git 8aaaf2f3af2ae212428f4db1af34214225f5cec3
patch link: https://lore.kernel.org/netdev/[email protected]
in testcase: trinity
version: trinity-i386-4d2343bd-1_20200320
with following parameters:
runtime: 300s
group: group-03
test-description: Trinity is a linux system call fuzz tester.
test-url: http://codemonkey.org.uk/projects/trinity/
on test machine: qemu-system-i386 -enable-kvm -cpu SandyBridge -smp 2 -m 4G
caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):
If you fix the issue, kindly add following tag
Reported-by: kernel test robot <oliver.sang(a)intel.com>
[ 205.786467][ C1] WARNING: CPU: 1 PID: 4066 at kernel/softirq.c:362 __local_bh_enable_ip (kernel/softirq.c:362 (discriminator 1))
[ 205.786560][ C1] Modules linked in: af_alg(E) fcrypt(E) pcbc(E) rxrpc(E) crypto_user(E) scsi_transport_iscsi(E) xfrm_user(E) xfrm_algo(E) llc2(E) llc(E) sctp(E) ip6_udp_tunnel(E) udp_tunnel(E) libcrc32c(E) crc32c_generic(E) intel_rapl_msr(E) intel_rapl_common(E) crc32_pclmul(E) crc32c_intel(E) bochs(E) drm_vram_helper(E) drm_ttm_helper(E) ppdev(E) ttm(E) drm_kms_helper(E) aesni_intel(E) crypto_simd(E) cryptd(E) rapl(E) syscopyarea(E) sysfillrect(E) sysimgblt(E) fb_sys_fops(E) cec(E) drm(E) ata_generic(E) ata_piix(E) psmouse(E) evdev(E) serio_raw(E) libata(E) parport_pc(E) floppy(E) i2c_piix4(E) parport(E) qemu_fw_cfg(E) button(E) autofs4(E)
[ 205.786814][ C1] CPU: 1 PID: 4066 Comm: trinity-c7 Tainted: G E 5.16.0-rc8-02291-g1b84613d303e #1
[ 205.786817][ C1] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 205.786823][ C1] EIP: __local_bh_enable_ip (kernel/softirq.c:362 (discriminator 1))
[ 205.786826][ C1] Code: ea 01 f7 da 64 01 15 d4 d6 20 d5 64 a1 d4 d6 20 d5 a9 00 ff ff 00 74 1a 5d 64 ff 0d d4 d6 20 d5 c3 8d b4 26 00 00 00 00 66 90 <0f> 0b eb d1 8d 74 26 00 64 66 a1 c0 64 21 d5 66 85 c0 74 da e8 27
All code
========
0: ea (bad)
1: 01 f7 add %esi,%edi
3: da 64 01 15 fisubl 0x15(%rcx,%rax,1)
7: d4 (bad)
8: d6 (bad)
9: 20 d5 and %dl,%ch
b: 64 a1 d4 d6 20 d5 a9 movabs %fs:0xffff00a9d520d6d4,%eax
12: 00 ff ff
15: 00 74 1a 5d add %dh,0x5d(%rdx,%rbx,1)
19: 64 ff 0d d4 d6 20 d5 decl %fs:-0x2adf292c(%rip) # 0xffffffffd520d6f4
20: c3 retq
21: 8d b4 26 00 00 00 00 lea 0x0(%rsi,%riz,1),%esi
28: 66 90 xchg %ax,%ax
2a:* 0f 0b ud2 <-- trapping instruction
2c: eb d1 jmp 0xffffffffffffffff
2e: 8d 74 26 00 lea 0x0(%rsi,%riz,1),%esi
32: 64 66 a1 c0 64 21 d5 movabs %fs:0x74c08566d52164c0,%ax
39: 66 85 c0 74
3d: da e8 (bad)
3f: 27 (bad)
Code starting with the faulting instruction
===========================================
0: 0f 0b ud2
2: eb d1 jmp 0xffffffffffffffd5
4: 8d 74 26 00 lea 0x0(%rsi,%riz,1),%esi
8: 64 66 a1 c0 64 21 d5 movabs %fs:0x74c08566d52164c0,%ax
f: 66 85 c0 74
13: da e8 (bad)
15: 27 (bad)
[ 205.786829][ C1] EAX: 7ffffdff EBX: d50ccb40 ECX: d50d9df8 EDX: 00000201
[ 205.786851][ C1] ESI: c113af40 EDI: 0000000a EBP: f0c59e08 ESP: f0c59e08
[ 205.786853][ C1] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 00010206
[ 205.786858][ C1] CR0: 80050033 CR2: 00000004 CR3: 30c5a000 CR4: 000406f0
[ 205.786864][ C1] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[ 205.786866][ C1] DR6: fffe0ff0 DR7: 00000400
[ 205.786867][ C1] Call Trace:
[ 205.786894][ C1] _raw_spin_unlock_bh (kernel/locking/spinlock.c:211)
[ 205.786936][ C1] udp_get_next (include/linux/spinlock.h:394 net/ipv4/udp.c:3007)
[ 205.786980][ C1] ? udp_seq_start (net/ipv4/udp.c:3033)
[ 205.786983][ C1] udp_seq_next (net/ipv4/udp.c:3041)
[ 205.786987][ C1] seq_read_iter (fs/seq_file.c:263)
[ 205.787023][ C1] ? udp_seq_start (net/ipv4/udp.c:3033)
[ 205.787027][ C1] seq_read (fs/seq_file.c:163)
[ 205.787031][ C1] ? seq_read_iter (fs/seq_file.c:152)
[ 205.787034][ C1] proc_reg_read (fs/proc/inode.c:311 fs/proc/inode.c:323)
[ 205.787070][ C1] ? proc_reg_unlocked_ioctl (fs/proc/inode.c:316)
[ 205.787073][ C1] vfs_read (fs/read_write.c:479)
[ 205.787081][ C1] ? common_mmap+0x40/0x80
[ 205.787111][ C1] ? common_mmap+0x80/0x80
[ 205.787113][ C1] ? __might_sleep (kernel/sched/core.c:9468 (discriminator 14))
[ 205.787133][ C1] ? __cond_resched (kernel/sched/core.c:8149)
[ 205.787136][ C1] ksys_read (fs/read_write.c:620)
[ 205.787140][ C1] __ia32_sys_read (fs/read_write.c:627)
[ 205.787143][ C1] __do_fast_syscall_32 (arch/x86/entry/common.c:112 arch/x86/entry/common.c:178)
[ 205.787156][ C1] do_fast_syscall_32 (arch/x86/entry/common.c:203)
[ 205.787160][ C1] do_SYSENTER_32 (arch/x86/entry/common.c:247)
[ 205.787163][ C1] entry_SYSENTER_32 (arch/x86/entry/entry_32.S:872)
[ 205.787166][ C1] EIP: 0xb7f02589
[ 205.787175][ C1] Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d 76 00 58 b8 77 00 00 00 cd 80 90 8d 76
All code
========
...
20: 00 51 52 add %dl,0x52(%rcx)
23: 55 push %rbp
24: 89 e5 mov %esp,%ebp
26: 0f 34 sysenter
28: cd 80 int $0x80
2a:* 5d pop %rbp <-- trapping instruction
2b: 5a pop %rdx
2c: 59 pop %rcx
2d: c3 retq
2e: 90 nop
2f: 90 nop
30: 90 nop
31: 90 nop
32: 8d 76 00 lea 0x0(%rsi),%esi
35: 58 pop %rax
36: b8 77 00 00 00 mov $0x77,%eax
3b: cd 80 int $0x80
3d: 90 nop
3e: 8d .byte 0x8d
3f: 76 .byte 0x76
Code starting with the faulting instruction
===========================================
0: 5d pop %rbp
1: 5a pop %rdx
2: 59 pop %rcx
3: c3 retq
4: 90 nop
5: 90 nop
6: 90 nop
7: 90 nop
8: 8d 76 00 lea 0x0(%rsi),%esi
b: 58 pop %rax
c: b8 77 00 00 00 mov $0x77,%eax
11: cd 80 int $0x80
13: 90 nop
14: 8d .byte 0x8d
15: 76 .byte 0x76
[ 205.787177][ C1] EAX: ffffffda EBX: 000000dd ECX: b6975000 EDX: 00000591
[ 205.787178][ C1] ESI: 00000000 EDI: 00000089 EBP: 000000ef ESP: bfabca5c
[ 205.787180][ C1] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b EFLAGS: 00000296
[ 205.787193][ C1] ---[ end trace 5d00563d8897f1ee ]---
To reproduce:
# build kernel
cd linux
cp config-5.16.0-rc8-02291-g1b84613d303e .config
make HOSTCC=gcc-9 CC=gcc-9 ARCH=i386 olddefconfig prepare modules_prepare bzImage modules
make HOSTCC=gcc-9 CC=gcc-9 ARCH=i386 INSTALL_MOD_PATH=<mod-install-dir> modules_install
cd <mod-install-dir>
find lib/ | cpio -o -H newc --quiet | gzip > modules.cgz
git clone https://github.com/intel/lkp-tests.git
cd lkp-tests
bin/lkp qemu -k <bzImage> -m modules.cgz job-script # job-script is attached in this email
# if come across any failure that blocks the test,
# please remove ~/.lkp and /lkp dir to run from a clean state.
---
0DAY/LKP+ Test Infrastructure Open Source Technology Center
https://lists.01.org/hyperkitty/list/[email protected] Intel Corporation
Thanks,
Oliver Sang
6 months, 2 weeks
[printk] 5e83b47428: BUG:kernel_reboot-without-warning_in_test_stage
by kernel test robot
Greeting,
FYI, we noticed the following commit (built with gcc-9):
commit: 5e83b474282c88463251fc73fba5ae04623b356d ("printk: add kthread console printers")
https://git.kernel.org/cgit/linux/kernel/git/rt/linux-rt-devel.git linux-5.16.y-rt-rebase
in testcase: boot
on test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G
caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):
+-------------------------------------------------+------------+------------+
| | 6965ac824d | 5e83b47428 |
+-------------------------------------------------+------------+------------+
| boot_successes | 100 | 0 |
| boot_failures | 0 | 98 |
| BUG:kernel_hang_in_boot_stage | 0 | 96 |
| BUG:kernel_reboot-without-warning_in_test_stage | 0 | 2 |
+-------------------------------------------------+------------+------------+
If you fix the issue, kindly add following tag
Reported-by: kernel test robot <oliver.sang(a)intel.com>
[ 18.975106][ T279]
[ 18.976760][ T279] Setting up gawk (1:4.1.4+dfsg-1) ...
[ 18.976765][ T279]
[ 18.977892][ T279] /lkp/lkp/src/bin/run-lkp
[ 18.977896][ T279]
BUG: kernel reboot-without-warning in test stage
Kboot worker: lkp-worker55
Elapsed time: 60
kvm=(
To reproduce:
# build kernel
cd linux
cp config-5.16.2-00011-g5e83b474282c .config
make HOSTCC=gcc-9 CC=gcc-9 ARCH=x86_64 olddefconfig prepare modules_prepare bzImage modules
make HOSTCC=gcc-9 CC=gcc-9 ARCH=x86_64 INSTALL_MOD_PATH=<mod-install-dir> modules_install
cd <mod-install-dir>
find lib/ | cpio -o -H newc --quiet | gzip > modules.cgz
git clone https://github.com/intel/lkp-tests.git
cd lkp-tests
bin/lkp qemu -k <bzImage> -m modules.cgz job-script # job-script is attached in this email
# if come across any failure that blocks the test,
# please remove ~/.lkp and /lkp dir to run from a clean state.
---
0DAY/LKP+ Test Infrastructure Open Source Technology Center
https://lists.01.org/hyperkitty/list/[email protected] Intel Corporation
Thanks,
Oliver Sang
6 months, 2 weeks
[ipv4] 604258c8f5: BUG:sleeping_function_called_from_invalid_context_at_lib/iov_iter.c
by kernel test robot
Greeting,
FYI, we noticed the following commit (built with gcc-9):
commit: 604258c8f5a9792828f54e55769ca1673c4a34ee ("[PATCH] ipv4: fix lock leaks")
url: https://github.com/0day-ci/linux/commits/ycaibb/ipv4-fix-lock-leaks/20220...
base: https://git.kernel.org/cgit/linux/kernel/git/davem/net-next.git 8aaaf2f3af2ae212428f4db1af34214225f5cec3
patch link: https://lore.kernel.org/netdev/[email protected]
in testcase: boot
on test machine: qemu-system-x86_64 -enable-kvm -cpu Icelake-Server -smp 4 -m 16G
caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):
+---------------------------------------------------------------------+------------+------------+
| | 8aaaf2f3af | 604258c8f5 |
+---------------------------------------------------------------------+------------+------------+
| BUG:sleeping_function_called_from_invalid_context_at_lib/iov_iter.c | 0 | 9 |
| WARNING:at_lib/iov_iter.c:#copyout | 0 | 9 |
| EIP:copyout | 0 | 9 |
| WARNING:at_lib/usercopy.c:#_copy_from_user | 0 | 9 |
| EIP:_copy_from_user | 0 | 9 |
| WARNING:at_lib/usercopy.c:#_copy_to_user | 0 | 9 |
| EIP:_copy_to_user | 0 | 9 |
| WARNING:at_fs/read_write.c:#vfs_read | 0 | 9 |
| EIP:vfs_read | 0 | 9 |
| WARNING:at_arch/x86/include/asm/uaccess.h:#strncpy_from_user | 0 | 9 |
| EIP:strncpy_from_user | 0 | 9 |
| Kernel_panic-not_syncing:Aiee,killing_interrupt_handler | 0 | 9 |
+---------------------------------------------------------------------+------------+------------+
If you fix the issue, kindly add following tag
Reported-by: kernel test robot <oliver.sang(a)intel.com>
[ 13.500024][ C1] BUG: sleeping function called from invalid context at lib/iov_iter.c:666
[ 13.500030][ C1] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 335, name: dropbearkey
[ 13.500032][ C1] preempt_count: 7ffffffe, expected: 0
[ 13.500035][ C1] CPU: 1 PID: 335 Comm: dropbearkey Not tainted 5.16.0-rc8-02291-g604258c8f5a9 #1
[ 13.500038][ C1] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 13.500040][ C1] Call Trace:
[ 13.500045][ C1] dump_stack_lvl (lib/dump_stack.c:107)
[ 13.500053][ C1] dump_stack (lib/dump_stack.c:114)
[ 13.500056][ C1] __might_resched.cold (kernel/sched/core.c:9539 kernel/sched/core.c:9492)
[ 13.500063][ C1] __might_sleep (kernel/sched/core.c:9468 (discriminator 14))
[ 13.500070][ C1] __might_fault (mm/memory.c:5255)
[ 13.500076][ C1] _copy_to_iter (lib/iov_iter.c:667)
[ 13.500081][ C1] ? __check_heap_object (mm/slub.c:4508)
[ 13.500087][ C1] ? __check_object_size (mm/usercopy.c:240 mm/usercopy.c:286 mm/usercopy.c:256)
[ 13.500092][ C1] seq_read_iter (include/linux/uio.h:155 fs/seq_file.c:281)
[ 13.500099][ C1] seq_read (fs/seq_file.c:163)
[ 13.500104][ C1] ? seq_read_iter (fs/seq_file.c:152)
[ 13.500108][ C1] proc_reg_read (fs/proc/inode.c:311 fs/proc/inode.c:323)
[ 13.500114][ C1] ? proc_reg_unlocked_ioctl (fs/proc/inode.c:316)
[ 13.500117][ C1] vfs_read (fs/read_write.c:479)
[ 13.500123][ C1] ? kern_select (fs/select.c:720)
[ 13.500128][ C1] ksys_read (fs/read_write.c:620)
[ 13.500132][ C1] __ia32_sys_read (fs/read_write.c:627)
[ 13.500135][ C1] do_int80_syscall_32 (arch/x86/entry/common.c:112 arch/x86/entry/common.c:132)
[ 13.500144][ C1] entry_INT80_32 (arch/x86/entry/entry_32.S:981)
[ 13.500148][ C1] EIP: 0xb7f3e07f
[ 13.500152][ C1] Code: 24 04 53 56 57 55 8b 01 85 c0 75 23 8b 44 24 18 8b 5c 24 1c 8b 4c 24 20 8b 54 24 24 8b 74 24 28 8b 7c 24 2c 8b 6c 24 30 cd 80 <5d> 5f 5e 5b c3 5d 5f 5e 5b e9 30 09 00 00 65 8b 15 04 00 00 00 8b
All code
========
0: 24 04 and $0x4,%al
2: 53 push %rbx
3: 56 push %rsi
4: 57 push %rdi
5: 55 push %rbp
6: 8b 01 mov (%rcx),%eax
8: 85 c0 test %eax,%eax
a: 75 23 jne 0x2f
c: 8b 44 24 18 mov 0x18(%rsp),%eax
10: 8b 5c 24 1c mov 0x1c(%rsp),%ebx
14: 8b 4c 24 20 mov 0x20(%rsp),%ecx
18: 8b 54 24 24 mov 0x24(%rsp),%edx
1c: 8b 74 24 28 mov 0x28(%rsp),%esi
20: 8b 7c 24 2c mov 0x2c(%rsp),%edi
24: 8b 6c 24 30 mov 0x30(%rsp),%ebp
28: cd 80 int $0x80
2a:* 5d pop %rbp <-- trapping instruction
2b: 5f pop %rdi
2c: 5e pop %rsi
2d: 5b pop %rbx
2e: c3 retq
2f: 5d pop %rbp
30: 5f pop %rdi
31: 5e pop %rsi
32: 5b pop %rbx
33: e9 30 09 00 00 jmpq 0x968
38: 65 8b 15 04 00 00 00 mov %gs:0x4(%rip),%edx # 0x43
3f: 8b .byte 0x8b
Code starting with the faulting instruction
===========================================
0: 5d pop %rbp
1: 5f pop %rdi
2: 5e pop %rsi
3: 5b pop %rbx
4: c3 retq
5: 5d pop %rbp
6: 5f pop %rdi
7: 5e pop %rsi
8: 5b pop %rbx
9: e9 30 09 00 00 jmpq 0x93e
e: 65 8b 15 04 00 00 00 mov %gs:0x4(%rip),%edx # 0x19
15: 8b .byte 0x8b
[ 13.500155][ C1] EAX: ffffffda EBX: 00000001 ECX: bfde6b0c EDX: 00001000
[ 13.500158][ C1] ESI: 00000000 EDI: 00000000 EBP: 00000000 ESP: bfde69bc
[ 13.500160][ C1] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b EFLAGS: 00000246
[ 13.500197][ C1] ------------[ cut here ]------------
[ 13.500198][ C1] WARNING: CPU: 1 PID: 335 at lib/iov_iter.c:155 copyout (lib/iov_iter.c:155)
[ 13.500206][ C1] Modules linked in:
[ 13.500209][ C1] CPU: 1 PID: 335 Comm: dropbearkey Tainted: G W 5.16.0-rc8-02291-g604258c8f5a9 #1
[ 13.500212][ C1] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 13.500213][ C1] EIP: copyout (lib/iov_iter.c:155)
[ 13.500216][ C1] Code: 8b 89 a8 0f 00 00 85 c9 74 20 89 c1 01 d9 72 11 81 f9 00 00 00 c0 77 09 89 c1 89 d8 e8 41 d2 05 00 5b 5d c3 8d b6 00 00 00 00 <0f> 0b eb dc eb 32 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 8d b4
All code
========
0: 8b 89 a8 0f 00 00 mov 0xfa8(%rcx),%ecx
6: 85 c9 test %ecx,%ecx
8: 74 20 je 0x2a
a: 89 c1 mov %eax,%ecx
c: 01 d9 add %ebx,%ecx
e: 72 11 jb 0x21
10: 81 f9 00 00 00 c0 cmp $0xc0000000,%ecx
16: 77 09 ja 0x21
18: 89 c1 mov %eax,%ecx
1a: 89 d8 mov %ebx,%eax
1c: e8 41 d2 05 00 callq 0x5d262
21: 5b pop %rbx
22: 5d pop %rbp
23: c3 retq
24: 8d b6 00 00 00 00 lea 0x0(%rsi),%esi
2a:* 0f 0b ud2 <-- trapping instruction
2c: eb dc jmp 0xa
2e: eb 32 jmp 0x62
30: 8d b4 26 00 00 00 00 lea 0x0(%rsi,%riz,1),%esi
37: 8d b4 26 00 00 00 00 lea 0x0(%rsi,%riz,1),%esi
3e: 8d .byte 0x8d
3f: b4 .byte 0xb4
Code starting with the faulting instruction
===========================================
0: 0f 0b ud2
2: eb dc jmp 0xffffffffffffffe0
4: eb 32 jmp 0x38
6: 8d b4 26 00 00 00 00 lea 0x0(%rsi,%riz,1),%esi
d: 8d b4 26 00 00 00 00 lea 0x0(%rsi,%riz,1),%esi
14: 8d .byte 0x8d
15: b4 .byte 0xb4
[ 13.500219][ C1] EAX: 00000384 EBX: bfde6b0c ECX: 00000000 EDX: f544b000
[ 13.500221][ C1] ESI: 00000000 EDI: 00000384 EBP: f5623dfc ESP: f5623df8
[ 13.500223][ C1] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 00010246
[ 13.500230][ C1] CR0: 80050033 CR2: 0805fff1 CR3: 3561a000 CR4: 00350ef0
[ 13.500233][ C1] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[ 13.500235][ C1] DR6: fffe0ff0 DR7: 00000400
[ 13.500237][ C1] Call Trace:
[ 13.500239][ C1] _copy_to_iter (lib/iov_iter.c:667 (discriminator 8))
[ 13.500242][ C1] ? __check_heap_object (mm/slub.c:4508)
[ 13.500246][ C1] ? __check_object_size (mm/usercopy.c:240 mm/usercopy.c:286 mm/usercopy.c:256)
[ 13.500249][ C1] seq_read_iter (include/linux/uio.h:155 fs/seq_file.c:281)
[ 13.500253][ C1] seq_read (fs/seq_file.c:163)
[ 13.500257][ C1] ? seq_read_iter (fs/seq_file.c:152)
[ 13.500261][ C1] proc_reg_read (fs/proc/inode.c:311 fs/proc/inode.c:323)
[ 13.500264][ C1] ? proc_reg_unlocked_ioctl (fs/proc/inode.c:316)
[ 13.500268][ C1] vfs_read (fs/read_write.c:479)
[ 13.500272][ C1] ? kern_select (fs/select.c:720)
[ 13.500275][ C1] ksys_read (fs/read_write.c:620)
[ 13.500279][ C1] __ia32_sys_read (fs/read_write.c:627)
[ 13.500283][ C1] do_int80_syscall_32 (arch/x86/entry/common.c:112 arch/x86/entry/common.c:132)
[ 13.500287][ C1] entry_INT80_32 (arch/x86/entry/entry_32.S:981)
[ 13.500290][ C1] EIP: 0xb7f3e07f
[ 13.500292][ C1] Code: 24 04 53 56 57 55 8b 01 85 c0 75 23 8b 44 24 18 8b 5c 24 1c 8b 4c 24 20 8b 54 24 24 8b 74 24 28 8b 7c 24 2c 8b 6c 24 30 cd 80 <5d> 5f 5e 5b c3 5d 5f 5e 5b e9 30 09 00 00 65 8b 15 04 00 00 00 8b
All code
========
0: 24 04 and $0x4,%al
2: 53 push %rbx
3: 56 push %rsi
4: 57 push %rdi
5: 55 push %rbp
6: 8b 01 mov (%rcx),%eax
8: 85 c0 test %eax,%eax
a: 75 23 jne 0x2f
c: 8b 44 24 18 mov 0x18(%rsp),%eax
10: 8b 5c 24 1c mov 0x1c(%rsp),%ebx
14: 8b 4c 24 20 mov 0x20(%rsp),%ecx
18: 8b 54 24 24 mov 0x24(%rsp),%edx
1c: 8b 74 24 28 mov 0x28(%rsp),%esi
20: 8b 7c 24 2c mov 0x2c(%rsp),%edi
24: 8b 6c 24 30 mov 0x30(%rsp),%ebp
28: cd 80 int $0x80
2a:* 5d pop %rbp <-- trapping instruction
2b: 5f pop %rdi
2c: 5e pop %rsi
2d: 5b pop %rbx
2e: c3 retq
2f: 5d pop %rbp
30: 5f pop %rdi
31: 5e pop %rsi
32: 5b pop %rbx
33: e9 30 09 00 00 jmpq 0x968
38: 65 8b 15 04 00 00 00 mov %gs:0x4(%rip),%edx # 0x43
3f: 8b .byte 0x8b
Code starting with the faulting instruction
===========================================
0: 5d pop %rbp
1: 5f pop %rdi
2: 5e pop %rsi
3: 5b pop %rbx
4: c3 retq
5: 5d pop %rbp
6: 5f pop %rdi
7: 5e pop %rsi
8: 5b pop %rbx
9: e9 30 09 00 00 jmpq 0x93e
e: 65 8b 15 04 00 00 00 mov %gs:0x4(%rip),%edx # 0x19
15: 8b .byte 0x8b
[ 13.500295][ C1] EAX: ffffffda EBX: 00000001 ECX: bfde6b0c EDX: 00001000
[ 13.500297][ C1] ESI: 00000000 EDI: 00000000 EBP: 00000000 ESP: bfde69bc
[ 13.500299][ C1] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b EFLAGS: 00000246
[ 13.500303][ C1] ---[ end trace b04bb3a5693a52f3 ]---
[ 13.500330][ C1] ------------[ cut here ]------------
To reproduce:
# build kernel
cd linux
cp config-5.16.0-rc8-02291-g604258c8f5a9 .config
make HOSTCC=gcc-9 CC=gcc-9 ARCH=i386 olddefconfig prepare modules_prepare bzImage modules
make HOSTCC=gcc-9 CC=gcc-9 ARCH=i386 INSTALL_MOD_PATH=<mod-install-dir> modules_install
cd <mod-install-dir>
find lib/ | cpio -o -H newc --quiet | gzip > modules.cgz
git clone https://github.com/intel/lkp-tests.git
cd lkp-tests
bin/lkp qemu -k <bzImage> -m modules.cgz job-script # job-script is attached in this email
# if come across any failure that blocks the test,
# please remove ~/.lkp and /lkp dir to run from a clean state.
---
0DAY/LKP+ Test Infrastructure Open Source Technology Center
https://lists.01.org/hyperkitty/list/[email protected] Intel Corporation
Thanks,
Oliver Sang
6 months, 2 weeks
[PATCH net] selftests: net: ioam: Fixes b63c5478e9
by Justin Iurman
The IOAM queue-depth data field was added a few weeks ago, but the test unit
was not updated accordingly. Here is the fix, thanks for the report.
Reported-by: kernel test robot <oliver.sang(a)intel.com>
Signed-off-by: Justin Iurman <justin.iurman(a)uliege.be>
---
tools/testing/selftests/net/ioam6_parser.c | 5 +----
1 file changed, 1 insertion(+), 4 deletions(-)
diff --git a/tools/testing/selftests/net/ioam6_parser.c b/tools/testing/selftests/net/ioam6_parser.c
index 8f6997d35816..d9d1d4190126 100644
--- a/tools/testing/selftests/net/ioam6_parser.c
+++ b/tools/testing/selftests/net/ioam6_parser.c
@@ -240,11 +240,8 @@ static int check_ioam6_data(__u8 **p, struct ioam6_trace_hdr *ioam6h,
*p += sizeof(__u32);
}
- if (ioam6h->type.bit6) {
- if (__be32_to_cpu(*((__u32 *)*p)) != 0xffffffff)
- return 1;
+ if (ioam6h->type.bit6)
*p += sizeof(__u32);
- }
if (ioam6h->type.bit7) {
if (__be32_to_cpu(*((__u32 *)*p)) != 0xffffffff)
--
2.25.1
6 months, 2 weeks
[ipv6] b63c5478e9: kernel-selftests.net.ioam6.sh.OUTPUT_tests.Full_supported_trace_inline_mode.fail
by kernel test robot
Greeting,
FYI, we noticed the following commit (built with gcc-9):
commit: b63c5478e9cb1d1504eb02d9dac827ad24612b32 ("ipv6: ioam: Support for Queue depth data field")
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master
in testcase: kernel-selftests
version: kernel-selftests-x86_64-db530529-1_20220114
with following parameters:
group: net
ucode: 0xe2
test-description: The kernel contains a set of "self tests" under the tools/testing/selftests/ directory. These are intended to be small unit tests to exercise individual code paths in the kernel.
test-url: https://www.kernel.org/doc/Documentation/kselftest.txt
on test machine: 4 threads Intel(R) Xeon(R) CPU E3-1225 v5 @ 3.30GHz with 16G memory
caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):
If you fix the issue, kindly add following tag
Reported-by: kernel test robot <oliver.sang(a)intel.com>
# selftests: net: ioam6.sh
#
# --------------------------------------------------------------------------
# OUTPUT tests
# --------------------------------------------------------------------------
# TEST: Unknown IOAM namespace (inline mode) [ OK ]
# TEST: Unknown IOAM namespace (encap mode) [ OK ]
# TEST: Missing trace room (inline mode) [ OK ]
# TEST: Missing trace room (encap mode) [ OK ]
# TEST: Trace type with bit 0 only (inline mode) [ OK ]
# TEST: Trace type with bit 1 only (inline mode) [ OK ]
# TEST: Trace type with bit 2 only (inline mode) [ OK ]
# TEST: Trace type with bit 3 only (inline mode) [ OK ]
# TEST: Trace type with bit 4 only (inline mode) [ OK ]
# TEST: Trace type with bit 5 only (inline mode) [ OK ]
# TEST: Trace type with bit 6 only (inline mode) [FAIL]
# TEST: Trace type with bit 7 only (inline mode) [ OK ]
# TEST: Trace type with bit 8 only (inline mode) [ OK ]
# TEST: Trace type with bit 9 only (inline mode) [ OK ]
# TEST: Trace type with bit 10 only (inline mode) [ OK ]
# TEST: Trace type with bit 11 only (inline mode) [ OK ]
# TEST: Trace type with bit 12 only [ OK ]
# TEST: Trace type with bit 13 only [ OK ]
# TEST: Trace type with bit 14 only [ OK ]
# TEST: Trace type with bit 15 only [ OK ]
# TEST: Trace type with bit 16 only [ OK ]
# TEST: Trace type with bit 17 only [ OK ]
# TEST: Trace type with bit 18 only [ OK ]
# TEST: Trace type with bit 19 only [ OK ]
# TEST: Trace type with bit 20 only [ OK ]
# TEST: Trace type with bit 21 only [ OK ]
# TEST: Trace type with bit 22 only (inline mode) [ OK ]
# TEST: Trace type with bit 0 only (encap mode) [ OK ]
# TEST: Trace type with bit 1 only (encap mode) [ OK ]
# TEST: Trace type with bit 2 only (encap mode) [ OK ]
# TEST: Trace type with bit 3 only (encap mode) [ OK ]
# TEST: Trace type with bit 4 only (encap mode) [ OK ]
# TEST: Trace type with bit 5 only (encap mode) [ OK ]
# TEST: Trace type with bit 6 only (encap mode) [FAIL]
# TEST: Trace type with bit 7 only (encap mode) [ OK ]
# TEST: Trace type with bit 8 only (encap mode) [ OK ]
# TEST: Trace type with bit 9 only (encap mode) [ OK ]
# TEST: Trace type with bit 10 only (encap mode) [ OK ]
# TEST: Trace type with bit 11 only (encap mode) [ OK ]
# TEST: Trace type with bit 12 only [ OK ]
# TEST: Trace type with bit 13 only [ OK ]
# TEST: Trace type with bit 14 only [ OK ]
# TEST: Trace type with bit 15 only [ OK ]
# TEST: Trace type with bit 16 only [ OK ]
# TEST: Trace type with bit 17 only [ OK ]
# TEST: Trace type with bit 18 only [ OK ]
# TEST: Trace type with bit 19 only [ OK ]
# TEST: Trace type with bit 20 only [ OK ]
# TEST: Trace type with bit 21 only [ OK ]
# TEST: Trace type with bit 22 only (encap mode) [ OK ]
# TEST: Full supported trace (inline mode) [FAIL]
# TEST: Full supported trace (encap mode) [FAIL]
#
To reproduce:
git clone https://github.com/intel/lkp-tests.git
cd lkp-tests
sudo bin/lkp install job.yaml # job file is attached in this email
bin/lkp split-job --compatible job.yaml # generate the yaml file for lkp run
sudo bin/lkp run generated-yaml-file
# if come across any failure that blocks the test,
# please remove ~/.lkp and /lkp dir to run from a clean state.
---
0DAY/LKP+ Test Infrastructure Open Source Technology Center
https://lists.01.org/hyperkitty/list/[email protected] Intel Corporation
Thanks,
Oliver Sang
6 months, 3 weeks