On Fri, Mar 28, 2025 at 05:26:32PM +0800, Oliver Sang wrote: > hi, Mickaël Salaün, > > On Fri, Mar 28, 2025 at 09:31:15AM +0100, Mickaël Salaün wrote: > > On Fri, Mar 28, 2025 at 02:05:59PM +0800, Oliver Sang wrote: > > > hi, Mickaël Salaün, > > > > > > On Fri, Mar 28, 2025 at 11:00:37AM +0800, Oliver Sang wrote: > > > > hi, Mickaël Salaün, > > > > > > > > On Thu, Mar 27, 2025 at 07:41:08PM +0100, Mickaël Salaün wrote: > > > > > Hi Olivier, > > > > > > > > > > I pushed an updated yesterday in linux-next that should fix this issue > > > > > and this other issue too: > > > > > https://lore.kernel.org/all/20250326.yee0ba6Yai3m@xxxxxxxxxxx/ > > > > > > > > > > Could you please confirm that these issues are really fixed? Or > > > > > otherwise, please let me know when I should expect (or not) an email > > > > > from kernel test robot. :) > > > > > > > > ok, we've started the tests for both issues. upon the commit: > > > > db8da9da41bce (tag: next-20250327, linux-next/master) Add linux-next specific files for 20250327 > > > > > > sorry that due to unknown reason, we cannot build sucessfully upon db8da9da41bce > > > for both tests (which are using randconfig). could you give us the commit-id > > > of your fix? we could try test upon that fix commit again. > > > > The new commit is 18eb75f3af40 ("landlock: Always allow signals between > > threads of the same process"). > > it turned out the build failure is due to my typo. shamed... > > we finished tests still upon db8da9da41bce, for the WARNING:suspicious_RCU_usage > issue in this report, we run the tests 20 times, cannot reproduce now. > > for the random issues we reported in > https://lore.kernel.org/all/202503261534.22d970e8-lkp@xxxxxxxxx/ > now we cannot reproduce it with db8da9da41bce by 500 runs. Yes, that makes sense with my fix. > > we think both issues are solved. > > and since db8da9da41bce includes the 18eb75f3af40, we won't test again upon > 18eb75f3af40. thanks! Thanks for the confirmation! > > > > > > > > > > > > > > > if this is not the correct commit to check, please let us know. thanks! > > > > > > > > > > > > > > Regards, > > > > > Mickaël > > > > > > > > > > On Wed, Mar 26, 2025 at 04:00:12PM +0800, kernel test robot wrote: > > > > > > > > > > > > hi, Mickaël Salaün, > > > > > > > > > > > > we just reported a random > > > > > > "Oops:general_protection_fault,probably_for_non-canonical_address#:#[##]SMP_KASAN" > > > > > > issue in > > > > > > https://lore.kernel.org/all/202503261534.22d970e8-lkp@xxxxxxxxx/ > > > > > > > > > > > > now we noticed this commit is also in linux-next/master. > > > > > > > > > > > > we don't have enough knowledge to check the difference, but we found a > > > > > > persistent issue for this commit. > > > > > > > > > > > > 6d9ac5e4d70eba3e 9d65581539252fdb1666917a095 > > > > > > ---------------- --------------------------- > > > > > > fail:runs %reproduction fail:runs > > > > > > | | | > > > > > > :6 100% 6:6 dmesg.WARNING:suspicious_RCU_usage > > > > > > :6 100% 6:6 dmesg.boot_failures > > > > > > :6 100% 6:6 dmesg.kernel/pid.c:#suspicious_rcu_dereference_check()usage > > > > > > > > > > > > below full report FYI. > > > > > > > > > > > > > > > > > > Hello, > > > > > > > > > > > > kernel test robot noticed "WARNING:suspicious_RCU_usage" on: > > > > > > > > > > > > commit: 9d65581539252fdb1666917a09549c13090fe9e5 ("landlock: Always allow signals between threads of the same process") > > > > > > https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git master > > > > > > > > > > > > [test failed on linux-next/master eb4bc4b07f66f01618d9cb1aa4eaef59b1188415] > > > > > > > > > > > > in testcase: trinity > > > > > > version: trinity-x86_64-ba2360ed-1_20241228 > > > > > > with following parameters: > > > > > > > > > > > > runtime: 300s > > > > > > group: group-00 > > > > > > nr_groups: 5 > > > > > > > > > > > > > > > > > > > > > > > > config: x86_64-randconfig-101-20250325 > > > > > > compiler: gcc-12 > > > > > > test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G > > > > > > > > > > > > (please refer to attached dmesg/kmsg for entire log/backtrace) > > > > > > > > > > > > > > > > > > > > > > > > If you fix the issue in a separate patch/commit (i.e. not just a new version of > > > > > > the same patch/commit), kindly add following tags > > > > > > | Reported-by: kernel test robot <oliver.sang@xxxxxxxxx> > > > > > > | Closes: https://lore.kernel.org/oe-lkp/202503261510.f9652c11-lkp@xxxxxxxxx > > > > > > > > > > > > > > > > > > [ 166.893101][ T3747] WARNING: suspicious RCU usage > > > > > > [ 166.893462][ T3747] 6.14.0-rc5-00006-g9d6558153925 #1 Not tainted > > > > > > [ 166.893895][ T3747] ----------------------------- > > > > > > [ 166.894239][ T3747] kernel/pid.c:414 suspicious rcu_dereference_check() usage! > > > > > > [ 166.894747][ T3747] > > > > > > [ 166.894747][ T3747] other info that might help us debug this: > > > > > > [ 166.894747][ T3747] > > > > > > [ 166.895450][ T3747] > > > > > > [ 166.895450][ T3747] rcu_scheduler_active = 2, debug_locks = 1 > > > > > > [ 166.896030][ T3747] 3 locks held by trinity-c2/3747: > > > > > > [ 166.896415][ T3747] #0: ffff888114a5a930 (&group->mark_mutex){+.+.}-{4:4}, at: fcntl_dirnotify (include/linux/sched/mm.h:332 include/linux/sched/mm.h:386 include/linux/fsnotify_backend.h:279 fs/notify/dnotify/dnotify.c:329) > > > > > > [ 166.897165][ T3747] #1: ffff888148bbea60 (&mark->lock){+.+.}-{3:3}, at: fcntl_dirnotify (fs/notify/dnotify/dnotify.c:349) > > > > > > [ 166.897831][ T3747] #2: ffff888108a53220 (&f_owner->lock){....}-{3:3}, at: __f_setown (fs/fcntl.c:137) > > > > > > [ 166.898481][ T3747] > > > > > > [ 166.898481][ T3747] stack backtrace: > > > > > > [ 166.898901][ T3747] CPU: 0 UID: 65534 PID: 3747 Comm: trinity-c2 Not tainted 6.14.0-rc5-00006-g9d6558153925 #1 > > > > > > [ 166.898908][ T3747] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 > > > > > > [ 166.898912][ T3747] Call Trace: > > > > > > [ 166.898916][ T3747] <TASK> > > > > > > [ 166.898921][ T3747] dump_stack_lvl (lib/dump_stack.c:123) > > > > > > [ 166.898932][ T3747] lockdep_rcu_suspicious (kernel/locking/lockdep.c:6848) > > > > > > [ 166.898945][ T3747] pid_task (kernel/pid.c:414 (discriminator 11)) > > > > > > [ 166.898954][ T3747] hook_file_set_fowner (security/landlock/fs.c:1651 (discriminator 9)) > > > > > > [ 166.898963][ T3747] security_file_set_fowner (arch/x86/include/asm/atomic.h:23 (discriminator 4) include/linux/atomic/atomic-arch-fallback.h:457 (discriminator 4) include/linux/jump_label.h:262 (discriminator 4) security/security.c:3062 (discriminator 4)) > > > > > > [ 166.898969][ T3747] __f_setown (fs/fcntl.c:145) > > > > > > [ 166.898980][ T3747] fcntl_dirnotify (fs/notify/dnotify/dnotify.c:233 fs/notify/dnotify/dnotify.c:371) > > > > > > [ 166.898996][ T3747] do_fcntl (fs/fcntl.c:539) > > > > > > [ 166.899002][ T3747] ? f_getown (fs/fcntl.c:448) > > > > > > [ 166.899007][ T3747] ? check_prev_add (kernel/locking/lockdep.c:3862) > > > > > > [ 166.899011][ T3747] ? do_syscall_64 (arch/x86/entry/common.c:102) > > > > > > [ 166.899023][ T3747] ? syscall_exit_to_user_mode (include/linux/entry-common.h:361 kernel/entry/common.c:220) > > > > > > [ 166.899038][ T3747] __x64_sys_fcntl (fs/fcntl.c:591 fs/fcntl.c:576 fs/fcntl.c:576) > > > > > > [ 166.899050][ T3747] do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) > > > > > > [ 166.899062][ T3747] ? find_held_lock (kernel/locking/lockdep.c:5341) > > > > > > [ 166.899072][ T3747] ? __lock_release+0x10b/0x440 > > > > > > [ 166.899076][ T3747] ? __task_pid_nr_ns (include/linux/rcupdate.h:347 include/linux/rcupdate.h:880 kernel/pid.c:514) > > > > > > [ 166.899082][ T3747] ? reacquire_held_locks (kernel/locking/lockdep.c:5502) > > > > > > [ 166.899087][ T3747] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4470) > > > > > > [ 166.899093][ T3747] ? do_syscall_64 (arch/x86/entry/common.c:102) > > > > > > [ 166.899099][ T3747] ? do_syscall_64 (arch/x86/entry/common.c:102) > > > > > > [ 166.899111][ T3747] ? syscall_exit_to_user_mode (include/linux/entry-common.h:361 kernel/entry/common.c:220) > > > > > > [ 166.899119][ T3747] ? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:469 kernel/locking/lockdep.c:4409) > > > > > > [ 166.899124][ T3747] ? do_syscall_64 (arch/x86/entry/common.c:102) > > > > > > [ 166.899129][ T3747] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4470) > > > > > > [ 166.899134][ T3747] ? do_syscall_64 (arch/x86/entry/common.c:102) > > > > > > [ 166.899139][ T3747] ? do_int80_emulation (arch/x86/include/asm/atomic.h:23 include/linux/atomic/atomic-arch-fallback.h:457 include/linux/jump_label.h:262 arch/x86/entry/common.c:230) > > > > > > [ 166.899149][ T3747] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) > > > > > > [ 166.899155][ T3747] RIP: 0033:0x7f55ad007719 > > > > > > [ 166.899159][ T3747] Code: 08 89 e8 5b 5d c3 66 2e 0f 1f 84 00 00 00 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d b7 06 0d 00 f7 d8 64 89 01 48 > > > > > > All code > > > > > > ======== > > > > > > 0: 08 89 e8 5b 5d c3 or %cl,-0x3ca2a418(%rcx) > > > > > > 6: 66 2e 0f 1f 84 00 00 cs nopw 0x0(%rax,%rax,1) > > > > > > d: 00 00 00 > > > > > > 10: 90 nop > > > > > > 11: 48 89 f8 mov %rdi,%rax > > > > > > 14: 48 89 f7 mov %rsi,%rdi > > > > > > 17: 48 89 d6 mov %rdx,%rsi > > > > > > 1a: 48 89 ca mov %rcx,%rdx > > > > > > 1d: 4d 89 c2 mov %r8,%r10 > > > > > > 20: 4d 89 c8 mov %r9,%r8 > > > > > > 23: 4c 8b 4c 24 08 mov 0x8(%rsp),%r9 > > > > > > 28: 0f 05 syscall > > > > > > 2a:* 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax <-- trapping instruction > > > > > > 30: 73 01 jae 0x33 > > > > > > 32: c3 ret > > > > > > 33: 48 8b 0d b7 06 0d 00 mov 0xd06b7(%rip),%rcx # 0xd06f1 > > > > > > 3a: f7 d8 neg %eax > > > > > > 3c: 64 89 01 mov %eax,%fs:(%rcx) > > > > > > 3f: 48 rex.W > > > > > > > > > > > > Code starting with the faulting instruction > > > > > > =========================================== > > > > > > 0: 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax > > > > > > 6: 73 01 jae 0x9 > > > > > > 8: c3 ret > > > > > > 9: 48 8b 0d b7 06 0d 00 mov 0xd06b7(%rip),%rcx # 0xd06c7 > > > > > > 10: f7 d8 neg %eax > > > > > > 12: 64 89 01 mov %eax,%fs:(%rcx) > > > > > > 15: 48 rex.W > > > > > > [ 166.899164][ T3747] RSP: 002b:00007ffff6eefb48 EFLAGS: 00000246 ORIG_RAX: 0000000000000048 > > > > > > [ 166.899168][ T3747] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f55ad007719 > > > > > > [ 166.899172][ T3747] RDX: 0000000000000027 RSI: 0000000000000402 RDI: 0000000000000043 > > > > > > [ 166.899174][ T3747] RBP: 00007f55ab92f058 R08: 0000000099999999 R09: 00000000377dd000 > > > > > > [ 166.899177][ T3747] R10: 0000000084848484 R11: 0000000000000246 R12: 0000000000000048 > > > > > > [ 166.899180][ T3747] R13: 00007f55acf036c0 R14: 00007f55ab92f058 R15: 00007f55ab92f000 > > > > > > [ 166.899203][ T3747] </TASK> > > > > > > > > > > > > > > > > > > The kernel config and materials to reproduce are available at: > > > > > > https://download.01.org/0day-ci/archive/20250326/202503261510.f9652c11-lkp@xxxxxxxxx > > > > > > > > > > > > > > > > > > > > > > > > -- > > > > > > 0-DAY CI Kernel Test Service > > > > > > https://github.com/intel/lkp-tests/wiki > > > > > > > > > > > >