Source: linux
Version: 4.19.118-2+deb10u1
Severity: serious

Hi folks,

Trying to reproduce #963462 on my Thinkpad T470, I'm repeatedly
getting a hard lockup running the strace testsuite. I've done this 4
times to be sure. Each time it seems to have failed in a slightly
different place in the testsuite (suggesting it's not one particular
syscall test that's triggering the failure). Only one of the 4 lockups
left eny evidence in the logs (reproduced below), so I'm not sure if
the error here is actually the root of the problem or not. :-/

The machine is not noticeably running hot or anything while doing
these tests.

Rebooting back to 4.19.0-8-amd64 (aka 4.9.98+1+deb10u1), I've just run
the same testsuite twice in a row and it ran to completion with no
lockup.

Here's the one bit of log that I did get, in case it's useful.

Jun 22 11:36:49 tack kernel: [  318.195906] futex_wake_op: futex tries to shift 
op by -849; fix this program
Jun 22 11:36:49 tack kernel: [  318.195910] futex_wake_op: futex tries to shift 
op by -849; fix this program
Jun 22 11:36:49 tack kernel: [  318.195971] futex_wake_op: futex tries to shift 
op by -518; fix this program
Jun 22 11:36:49 tack kernel: [  318.195974] futex_wake_op: futex tries to shift 
op by -518; fix this program
Jun 22 11:36:49 tack kernel: [  318.195977] futex_wake_op: futex tries to shift 
op by -1; fix this program
Jun 22 11:36:49 tack kernel: [  318.195979] futex_wake_op: futex tries to shift 
op by -1; fix this program
Jun 22 11:36:49 tack kernel: [  318.199661] futex_wake_op: futex tries to shift 
op by -849; fix this program
Jun 22 11:36:49 tack kernel: [  318.199674] futex_wake_op: futex tries to shift 
op by -849; fix this program
Jun 22 11:36:49 tack kernel: [  318.199917] futex_wake_op: futex tries to shift 
op by -518; fix this program
Jun 22 11:36:49 tack kernel: [  318.199982] futex_wake_op: futex tries to shift 
op by -518; fix this program
Jun 22 11:36:49 tack kernel: [  318.398755] L1TF CPU bug present and SMT on, 
data leak possible. See CVE-2018-3646 and 
https://www.kernel.org/doc/html/latest/admin-gui
de/hw-vuln/l1tf.html for details.
Jun 22 11:36:49 tack kernel: [  318.587324] WARNING: CPU: 2 PID: 32174 at 
mm/page_alloc.c:4385 __alloc_pages_nodemask+0x241/0x2b0
Jun 22 11:36:49 tack kernel: [  318.587326] Modules linked in: acpi_call(OE) 
ipt_MASQUERADE nf_conntrack_netlink xfrm_user xfrm_algo nft_counter 
nft_chain_nat_ipv4 nf_
nat_ipv4 xt_addrtype nft_compat xt_conntrack nf_nat nf_conntrack nf_defrag_ipv6 
nf_defrag_ipv4 br_netfilter bridge stp overlay devlink cpufreq_userspace 
cpufreq_conser
vative cpufreq_powersave ipmi_devintf ipmi_msghandler nf_tables nfnetlink 
appletalk psnap llc ax25 pci_stub vboxpci(OE) vboxnetadp(OE) vboxnetflt(OE) 
vboxdrv(OE) cmac 
bnep fuse binfmt_misc pktcdvd snd_hda_codec_hdmi btusb btrtl btbcm btintel 
bluetooth uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 
videobuf2_common snd_hd
a_codec_realtek snd_hda_codec_generic videodev media drbg ansi_cprng 
ecdh_generic nls_ascii nls_cp437 vfat fat arc4 intel_rapl snd_soc_skl msr 
snd_soc_skl_ipc snd_soc_
sst_ipc
Jun 22 11:36:49 tack kernel: [  318.587344]  snd_soc_sst_dsp 
x86_pkg_temp_thermal intel_powerclamp snd_hda_ext_core coretemp 
snd_soc_acpi_intel_match iwlmvm snd_soc_ac
pi kvm_intel snd_soc_core mac80211 snd_compress wmi_bmof i915 snd_hda_intel 
iwlwifi kvm snd_hda_codec snd_h
da_core irqbypass snd_hwdep evdev intel_cstate joydev snd_pcm_oss 
drm_kms_helper intel_uncore serio_raw intel_rapl_perf mei_me snd_mixer_oss 
cfg80211 sg efi_pstore drm pcspkr mei efivars snd_pcm ucsi_acpi snd_timer 
typec_ucsi i2c_algo_bit iTCO_wdt iTCO_vendor_support intel_pch_thermal typec 
thinkpad_acpi tpm_crb wmi nvram snd soundcore tpm_tis rfkill video tpm_tis_core 
battery pcc_cpufreq ac tpm rng_core acpi_pad button parport_pc nfsd ppdev 
auth_rpcgss lp nfs_acl lockd grace sunrpc parport efivarfs ip_tables x_tables 
autofs4 ext4 crc16 mbcache jbd2 crc32c_generic
Jun 22 11:36:49 tack kernel: [  318.587362]  fscrypto ecb btrfs zstd_decompress 
zstd_compress xxhash algif_skcipher af_alg sr_mod cdrom uas usb_storage 
dm_crypt dm_mod raid10 raid456 async_raid6_recov async_memcpy async_pq 
async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear md_mod 
sd_mod crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel pcbc ahci 
aesni_intel libahci aes_x86_64 crypto_simd libata cryptd xhci_pci glue_helper 
xhci_hcd e1000e psmouse scsi_mod usbcore i2c_i801 thermal usb_common
Jun 22 11:36:49 tack kernel: [  318.587375] CPU: 2 PID: 32174 Comm: keyctl 
Tainted: G           OE     4.19.0-9-amd64 #1 Debian 4.19.118-2+deb10u1
Jun 22 11:36:49 tack kernel: [  318.587376] Hardware name: LENOVO 
20HD000EUK/20HD000EUK, BIOS N1QET67W (1.42 ) 10/03/2017
Jun 22 11:36:49 tack kernel: [  318.587377] RIP: 
0010:__alloc_pages_nodemask+0x241/0x2b0
Jun 22 11:36:49 tack kernel: [  318.587379] Code: 89 f7 89 ee 45 31 f6 e8 4d d5 
ff ff e9 fb fe ff ff e8 73 ae 01 00 e9 cb fe ff ff 45 31 f6 81 e7 00 02 00 00 
0f 85 e7 fe ff ff <0f> 0b e9 e0 fe ff ff 31 c0 e9 6a fe ff ff 65 48 8b 04 25 40 
5c 01
Jun 22 11:36:49 tack kernel: [  318.587379] RSP: 0018:ffffb7e68ac2fe70 EFLAGS: 
00010246
Jun 22 11:36:49 tack kernel: [  318.587381] RAX: 0000000000000000 RBX: 
fffffffffffffff4 RCX: 0000000000000000
Jun 22 11:36:49 tack kernel: [  318.587381] RDX: 0000000000000000 RSI: 
0000000000000034 RDI: 0000000000000000
Jun 22 11:36:49 tack kernel: [  318.587382] RBP: fffffffffffffffc R08: 
0000000000000000 R09: 0000000000000000
Jun 22 11:36:49 tack kernel: [  318.587383] R10: 0000000000000000 R11: 
0000000000000000 R12: 00000000006000c0
Jun 22 11:36:49 tack kernel: [  318.587383] R13: 00007efdd17ecf00 R14: 
0000000000000000 R15: 0000000000000000
Jun 22 11:36:49 tack kernel: [  318.587385] FS:  00007efdd19fc580(0000) 
GS:ffff9dc6a2500000(0000) knlGS:0000000000000000
Jun 22 11:36:49 tack kernel: [  318.587386] CS:  0010 DS: 0000 ES: 0000 CR0: 
0000000080050033
Jun 22 11:36:49 tack kernel: [  318.587386] CR2: 00007efdd1829000 CR3: 
0000000816ce8001 CR4: 00000000003606e0
Jun 22 11:36:49 tack kernel: [  318.587387] Call Trace:
Jun 22 11:36:49 tack kernel: [  318.587391]  kmalloc_order+0x14/0x30
Jun 22 11:36:49 tack kernel: [  318.587393]  kmalloc_order_trace+0x1d/0xa0
Jun 22 11:36:49 tack kernel: [  318.587395]  keyctl_read_key+0xb3/0x130
Jun 22 11:36:49 tack kernel: [  318.587397]  do_syscall_64+0x53/0x110
Jun 22 11:36:49 tack kernel: [  318.587399]  
entry_SYSCALL_64_after_hwframe+0x44/0xa9
Jun 22 11:36:49 tack kernel: [  318.587401] RIP: 0033:0x7efdd192ff79
Jun 22 11:36:49 tack kernel: [  318.587402] Code: 00 c3 66 2e 0f 1f 84 00 00 00 
00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 
8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d e7 3e 0c 00 f7 d8 64 89 
01 48
Jun 22 11:36:49 tack kernel: [  318.587403] RSP: 002b:00007ffe112d1798 EFLAGS: 
00000246 ORIG_RAX: 00000000000000fa
Jun 22 11:36:49 tack kernel: [  318.587404] RAX: ffffffffffffffda RBX: 
00007ffe112d17f0 RCX: 00007efdd192ff79
Jun 22 11:36:49 tack kernel: [  318.587404] RDX: 00007efdd17ecf00 RSI: 
00000000ffffffff RDI: 000000000000000b
Jun 22 11:36:49 tack kernel: [  318.587405] RBP: 00007ffe112d17d0 R08: 
deadfee4badc0de8 R09: 00005612c7c8c141
Jun 22 11:36:49 tack kernel: [  318.587406] R10: fffffffffffffffc R11: 
0000000000000246 R12: 0000000000000003
Jun 22 11:36:49 tack kernel: [  318.587407] R13: 00007ffe112d1830 R14: 
0000000000000001 R15: 00005612c7c8c116
Jun 22 11:36:49 tack kernel: [  318.587408] ---[ end trace e512ea2af2666eea ]---

As I can reproduce this quite easily, I'm happy to help with whatever
debugging might be useful.

-- System Information:
Debian Release: 10.4
  APT prefers stable-debug
  APT policy: (500, 'stable-debug'), (500, 'stable'), (500, 'oldstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-8-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_GB:en (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Reply via email to