2022-04-13 05:31:39

by kernel test robot

[permalink] [raw]
Subject: [sched/fair] 9099a14708: WARNING:at_kernel/sched/fair.c:#select_idle_sibling



Greeting,

FYI, we noticed the following commit (built with gcc-11):

commit: 9099a14708ce1dfecb6002605594a0daa319b555 ("sched/fair: Add a few assertions")
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master

in testcase: boot

on test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):


please be noted the issue is random, but warning reported from the new line in
patch, and we still observed similar issue on mainline, so still report at
least for information, regardingless the commit is quite old.

0cd7c741f01de13d 9099a14708ce1dfecb600260559
---------------- ---------------------------
fail:runs %reproduction fail:runs
| | |
:60 15% 9:60 dmesg.RIP:select_idle_sibling
:60 15% 9:60 dmesg.WARNING:at_kernel/sched/fair.c:#select_idle_sibling


If you fix the issue, kindly add following tag
Reported-by: kernel test robot <[email protected]>


[ 61.202318][ C1] ------------[ cut here ]------------
[ 61.202335][ C1] WARNING: CPU: 1 PID: 379 at kernel/sched/fair.c:6294 select_idle_sibling (fair.c:?)
[ 61.202352][ C1] Modules linked in:
[ 61.202390][ C1] CPU: 1 PID: 379 Comm: lkp-setup-rootf Not tainted 5.13.0-rc1-00089-g9099a14708ce #1
[ 61.202407][ C1] RIP: 0010:select_idle_sibling (fair.c:?)
[ 61.202425][ C1] Code: 04 85 c0 0f 8f 05 02 00 00 41 89 d8 48 83 c4 20 44 89 c0 5b 41 5c 41 5d 41 5e 41 5f 5d c3 65 8b 05 0b b1 28 52 85 c0 74 c7 90 <0f> 0b 90 89 df e8 10 50 ff ff 85 c0 75 c3 48 c7 c0 80 f1 1e 00 4c
All code
========
0: 04 85 add $0x85,%al
2: c0 0f 8f rorb $0x8f,(%rdi)
5: 05 02 00 00 41 add $0x41000002,%eax
a: 89 d8 mov %ebx,%eax
c: 48 83 c4 20 add $0x20,%rsp
10: 44 89 c0 mov %r8d,%eax
13: 5b pop %rbx
14: 41 5c pop %r12
16: 41 5d pop %r13
18: 41 5e pop %r14
1a: 41 5f pop %r15
1c: 5d pop %rbp
1d: c3 retq
1e: 65 8b 05 0b b1 28 52 mov %gs:0x5228b10b(%rip),%eax # 0x5228b130
25: 85 c0 test %eax,%eax
27: 74 c7 je 0xfffffffffffffff0
29: 90 nop
2a:* 0f 0b ud2 <-- trapping instruction
2c: 90 nop
2d: 89 df mov %ebx,%edi
2f: e8 10 50 ff ff callq 0xffffffffffff5044
34: 85 c0 test %eax,%eax
36: 75 c3 jne 0xfffffffffffffffb
38: 48 c7 c0 80 f1 1e 00 mov $0x1ef180,%rax
3f: 4c rex.WR

Code starting with the faulting instruction
===========================================
0: 0f 0b ud2
2: 90 nop
3: 89 df mov %ebx,%edi
5: e8 10 50 ff ff callq 0xffffffffffff501a
a: 85 c0 test %eax,%eax
c: 75 c3 jne 0xffffffffffffffd1
e: 48 c7 c0 80 f1 1e 00 mov $0x1ef180,%rax
15: 4c rex.WR
[ 61.202454][ C1] RSP: 0018:ffff8f540ec330b8 EFLAGS: 00010002
[ 61.202486][ C1] RAX: 0000000000000001 RBX: 0000000000000000 RCX: ffffffffadd8ff64
[ 61.202505][ C1] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8f540ec5c000
[ 61.202520][ C1] RBP: ffff8f540ec33100 R08: 0000000000000000 R09: ffff8f5400503258
[ 61.202536][ C1] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8f540ec5c000
[ 61.202549][ C1] R13: 0000000000000000 R14: 0000000000000008 R15: 0000000000000001
[ 61.202565][ C1] FS: 0000000000000000(0000) GS:ffff8f572fc00000(0000) knlGS:0000000000000000
[ 61.202580][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 61.202592][ C1] CR2: 00007f6ff1dc0c39 CR3: 000000010cc7c000 CR4: 00000000000406a0
[ 61.202608][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 61.202652][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 61.202679][ C1] Call Trace:
[ 61.202687][ C1] ? desc_read (printk_ringbuffer.c:?)
[ 61.202695][ C1] select_task_rq_fair (fair.c:?)
[ 61.202704][ C1] try_to_wake_up (core.c:?)
[ 61.202715][ C1] ? _prb_read_valid (printk_ringbuffer.c:?)
[ 61.202723][ C1] ? memchr (??:?)
[ 61.202731][ C1] wake_up_process (??:?)
[ 61.202740][ C1] __up+0x95/0xa0
[ 61.202747][ C1] up (??:?)
[ 61.202754][ C1] ? vprintk_emit (??:?)
[ 61.202763][ C1] __up_console_sem (printk.c:?)
[ 61.202775][ C1] console_unlock (??:?)
[ 61.202784][ C1] vprintk_emit (??:?)
[ 61.202793][ C1] vprintk_default (??:?)
[ 61.202802][ C1] vprintk (??:?)
[ 61.202810][ C1] printk (??:?)
[ 61.202817][ C1] print_report.cold (report.c:?)
[ 61.202827][ C1] ? trace_hardirqs_off (??:?)
[ 61.202836][ C1] ? __tsan_read8 (??:?)
[ 61.202844][ C1] ? tracer_hardirqs_off (??:?)
[ 61.202853][ C1] ? trace_hardirqs_off (??:?)
[ 61.202863][ C1] ? lock_page_memcg (??:?)
[ 61.202894][ C1] ? kcsan_report (??:?)
[ 61.202903][ C1] ? kcsan_setup_watchpoint (core.c:?)
[ 61.202912][ C1] ? __tsan_read8 (??:?)
[ 61.202921][ C1] ? trace_hardirqs_off (??:?)
[ 61.202930][ C1] ? lock_page_memcg (??:?)
[ 61.202940][ C1] ? page_remove_rmap (??:?)
[ 61.202951][ C1] ? zap_pte_range (memory.c:?)
[ 61.202960][ C1] ? zap_p4d_range (memory.c:?)
[ 61.202969][ C1] ? unmap_page_range (??:?)
[ 61.202980][ C1] ? unmap_vmas (??:?)
[ 61.202988][ C1] ? exit_mmap (??:?)
[ 61.202998][ C1] ? mmput (??:?)
[ 61.203005][ C1] ? exec_mmap (exec.c:?)
[ 61.203013][ C1] ? begin_new_exec (??:?)
[ 61.203024][ C1] ? load_elf_binary (binfmt_elf.c:?)
[ 61.203034][ C1] ? search_binary_handler (exec.c:?)
[ 61.203045][ C1] ? exec_binprm (exec.c:?)
[ 61.203055][ C1] ? bprm_execve (exec.c:?)
[ 61.203064][ C1] ? do_execveat_common (exec.c:?)
[ 61.203075][ C1] ? __x64_sys_execve (??:?)
[ 61.203096][ C1] ? do_syscall_64 (??:?)
[ 61.203106][ C1] ? entry_SYSCALL_64_after_hwframe (??:?)
[ 61.203117][ C1] kcsan_report (??:?)
[ 61.203144][ C1] kcsan_setup_watchpoint (core.c:?)
[ 61.203155][ C1] __tsan_read8 (??:?)
[ 61.203164][ C1] trace_hardirqs_off (??:?)
[ 61.203178][ C1] lock_page_memcg (??:?)
[ 61.203188][ C1] page_remove_rmap (??:?)
[ 61.203198][ C1] ? mark_page_accessed (??:?)
[ 61.203209][ C1] zap_pte_range (memory.c:?)
[ 61.203219][ C1] zap_p4d_range (memory.c:?)
[ 61.203228][ C1] unmap_page_range (??:?)
[ 61.203238][ C1] unmap_vmas (??:?)
[ 61.203247][ C1] exit_mmap (??:?)
[ 61.203255][ C1] mmput (??:?)
[ 61.203265][ C1] exec_mmap (exec.c:?)
[ 61.203273][ C1] begin_new_exec (??:?)
[ 61.203282][ C1] ? write_comp_data (kcov.c:?)
[ 61.203291][ C1] ? __sanitizer_cov_trace_cmp8 (??:?)
[ 61.203302][ C1] load_elf_binary (binfmt_elf.c:?)
[ 61.203311][ C1] ? search_binary_handler (exec.c:?)
[ 61.203321][ C1] ? kvm_sched_clock_read (kvmclock.c:?)
[ 61.203330][ C1] ? sched_clock (??:?)
[ 61.203340][ C1] ? sched_clock_cpu (??:?)
[ 61.203348][ C1] ? search_binary_handler (exec.c:?)
[ 61.203358][ C1] search_binary_handler (exec.c:?)
[ 61.203369][ C1] exec_binprm (exec.c:?)
[ 61.203381][ C1] bprm_execve (exec.c:?)
[ 61.203409][ C1] do_execveat_common (exec.c:?)
[ 61.203418][ C1] __x64_sys_execve (??:?)
[ 61.203428][ C1] do_syscall_64 (??:?)
[ 61.203437][ C1] ? vtime_user_enter (??:?)
[ 61.203447][ C1] ? __context_tracking_enter (??:?)
[ 61.203457][ C1] ? irqentry_exit_to_user_mode (??:?)
[ 61.203469][ C1] ? static_key_count (common.c:?)
[ 61.203480][ C1] ? do_syscall_64 (??:?)
[ 61.203490][ C1] entry_SYSCALL_64_after_hwframe (??:?)
[ 61.203500][ C1] RIP: 0033:0x7f6ff1e6b427
[ 61.203510][ C1] Code: Unable to access opcode bytes at RIP 0x7f6ff1e6b3fd.

Code starting with the faulting instruction
===========================================


To reproduce:

# build kernel
cd linux
cp config-5.13.0-rc1-00089-g9099a14708ce .config
make HOSTCC=gcc-11 CC=gcc-11 ARCH=x86_64 olddefconfig prepare modules_prepare bzImage modules
make HOSTCC=gcc-11 CC=gcc-11 ARCH=x86_64 INSTALL_MOD_PATH=<mod-install-dir> modules_install
cd <mod-install-dir>
find lib/ | cpio -o -H newc --quiet | gzip > modules.cgz


git clone https://github.com/intel/lkp-tests.git
cd lkp-tests
bin/lkp qemu -k <bzImage> -m modules.cgz job-script # job-script is attached in this email

# if come across any failure that blocks the test,
# please remove ~/.lkp and /lkp dir to run from a clean state.



--
0-DAY CI Kernel Test Service
https://01.org/lkp



Attachments:
(No filename) (8.73 kB)
config-5.13.0-rc1-00089-g9099a14708ce (144.64 kB)
job-script (4.69 kB)
dmesg.xz (118.19 kB)
Download all attachments