Re: [BUG REPORT] kernel BUG at lib/dynamic_queue_limits.c:99!

2024-07-16 Thread xiujianfeng
Hi, On 2024/7/13 8:44, Jakub Kicinski wrote: > On Fri, 12 Jul 2024 17:43:21 -0700 Jakub Kicinski wrote: >> CC: virtio_net maintainers and Jiri who added BQL > > Oh, sounds like the fix may be already posted: > https://lore.kernel.org/all/20240712080329.197605-2-jean-phili...@linaro.org/ Thanks,

Re: [BUG REPORT] kernel BUG at lib/dynamic_queue_limits.c:99!

2024-07-12 Thread Jakub Kicinski
On Fri, 12 Jul 2024 17:43:21 -0700 Jakub Kicinski wrote: > CC: virtio_net maintainers and Jiri who added BQL Oh, sounds like the fix may be already posted: https://lore.kernel.org/all/20240712080329.197605-2-jean-phili...@linaro.org/

Re: [BUG REPORT] kernel BUG at lib/dynamic_queue_limits.c:99!

2024-07-12 Thread Jakub Kicinski
x-next.git and > the base commit is f477dd6eede3 > > > > > [ cut here ] > > kernel BUG at lib/dynamic_queue_limits.c:99! > > Oops: invalid opcode: [#1] PREEMPT SMP NOPTI > > CPU: 1 UID: 0 PID: 203 Comm: ip Not tainted > > 6.10.0-rc7-next-

Re: Bug in Kernel 6.8.x, 6.9.x Causing Trace/Panic During Shutdown/Reboot

2024-06-19 Thread Ilkka Naulapää
disabled CONFIG_FORCE_NR_CPUS option for 6.9.5 but the trace + panic still exists. So that one didn't help. I've also been bisecting the trace but have not finished it yet as the last half dozen builds produced non-bootable kernels. Anyway, I will continue it soon(ish) when I have a bit more free

Re: Bug in Kernel 6.8.x, 6.9.x Causing Trace/Panic During Shutdown/Reboot

2024-06-18 Thread Steven Rostedt
On Thu, 13 Jun 2024 10:32:24 +0300 Ilkka Naulapää wrote: > ok, so if you don't have any idea where this bug is after those debug > patches, I'll try to find some time to bisect it as a last resort. > Stay tuned. FYI, I just debugged a strange crash that was caused by my config having something

Re: Bug in Kernel 6.8.x, 6.9.x Causing Trace/Panic During Shutdown/Reboot

2024-06-13 Thread Linux regression tracking (Thorsten Leemhuis)
On 13.06.24 09:32, Ilkka Naulapää wrote: > On Wed, Jun 12, 2024 at 6:56 PM Steven Rostedt wrote: >> On Wed, 12 Jun 2024 15:36:22 +0200 >> "Linux regression tracking (Thorsten Leemhuis)" >> wrote: >>> >>> Ilkka or Steven, what happened to this? This thread looks stalled. I >>> also was

Re: Bug in Kernel 6.8.x, 6.9.x Causing Trace/Panic During Shutdown/Reboot

2024-06-13 Thread Ilkka Naulapää
ok, so if you don't have any idea where this bug is after those debug patches, I'll try to find some time to bisect it as a last resort. Stay tuned. --Ilkka On Wed, Jun 12, 2024 at 6:56 PM Steven Rostedt wrote: > > On Wed, 12 Jun 2024 15:36:22 +0200 > "Linux regression tracking (Thorsten

Re: Bug in Kernel 6.8.x, 6.9.x Causing Trace/Panic During Shutdown/Reboot

2024-06-12 Thread Steven Rostedt
On Wed, 12 Jun 2024 15:36:22 +0200 "Linux regression tracking (Thorsten Leemhuis)" wrote: > Hi, Thorsten here, the Linux kernel's regression tracker. Top-posting > for once, to make this easily accessible to everyone. > > Ilkka or Steven, what happened to this? This thread looks stalled. I >

Re: Bug in Kernel 6.8.x, 6.9.x Causing Trace/Panic During Shutdown/Reboot

2024-06-12 Thread Linux regression tracking (Thorsten Leemhuis)
Hi, Thorsten here, the Linux kernel's regression tracker. Top-posting for once, to make this easily accessible to everyone. Ilkka or Steven, what happened to this? This thread looks stalled. I also was unsuccessful when looking for other threads related to this report or the culprit. Did it fall

Re: Bug in Kernel 6.8.x, 6.9.x Causing Trace/Panic During Shutdown/Reboot

2024-05-30 Thread Steven Rostedt
On Thu, 30 May 2024 16:02:37 +0300 Ilkka Naulapää wrote: > applied your patch and here's the output. > Unfortunately, it doesn't give me any new information. I added one more BUG on, want to try this? Otherwise, I'm pretty much at a lost. :-/ -- Steve diff --git a/fs/tracefs/inode.c

Re: Bug in Kernel 6.8.x, 6.9.x Causing Trace/Panic During Shutdown/Reboot

2024-05-29 Thread Steven Rostedt
On Wed, 29 May 2024 14:47:57 -0400 Steven Rostedt wrote: > Let me make a debug patch (that crashes on this issue) for that kernel, > and perhaps you could bisect it? Can you try this on 6.6-rc1 and see if it gives you any other splats? Hmm, you can switch it to WARN_ON and that way it may not

Re: Bug in Kernel 6.8.x, 6.9.x Causing Trace/Panic During Shutdown/Reboot

2024-05-29 Thread Steven Rostedt
On Wed, 29 May 2024 21:36:08 +0300 Ilkka Naulapää wrote: > applied your patch without others, so trace and panic there. > Screenshot attached. Also tested kernels backward and found out that Bah, it's still in an RCU callback, which doesn't tell us why a normal inode is being sent to the trace

Re: Bug in Kernel 6.8.x, 6.9.x Causing Trace/Panic During Shutdown/Reboot

2024-05-28 Thread Steven Rostedt
On Tue, 28 May 2024 07:51:30 +0300 Ilkka Naulapää wrote: > yeah, the cache_from_obj tracing bug (without panic) has been > displayed quite some time now - maybe even since 6.7.x or so. I could > try checking a few versions back for this and try bisecting it if I > can find when this started. >

Re: Bug in Kernel 6.8.x, 6.9.x Causing Trace/Panic During Shutdown/Reboot

2024-05-27 Thread Ilkka Naulapää
yeah, the cache_from_obj tracing bug (without panic) has been displayed quite some time now - maybe even since 6.7.x or so. I could try checking a few versions back for this and try bisecting it if I can find when this started. --Ilkka On Tue, May 28, 2024 at 1:31 AM Steven Rostedt wrote: > >

Re: Bug in Kernel 6.8.x, 6.9.x Causing Trace/Panic During Shutdown/Reboot

2024-05-27 Thread Ilkka Naulapää
I tried 6.10-rc1 and it still ends up to panic --Ilkka On Tue, May 28, 2024 at 12:44 AM Steven Rostedt wrote: > > On Mon, 27 May 2024 20:14:42 +0200 > Greg KH wrote: > > > On Mon, May 27, 2024 at 07:40:21PM +0300, Ilkka Naulapää wrote: > > > Hi Steven, > > > > > > I took some time and

Re: Bug in Kernel 6.8.x, 6.9.x Causing Trace/Panic During Shutdown/Reboot

2024-05-27 Thread Steven Rostedt
On Fri, 24 May 2024 12:50:08 +0200 "Linux regression tracking (Thorsten Leemhuis)" wrote: > > - Affected Versions: Before kernel version 6.8.10, the bug caused a > > quick display of a kernel trace dump before the shutdown/reboot > > completed. Starting from version 6.8.10 and continuing into

Re: Bug in Kernel 6.8.x, 6.9.x Causing Trace/Panic During Shutdown/Reboot

2024-05-27 Thread Steven Rostedt
On Mon, 27 May 2024 20:14:42 +0200 Greg KH wrote: > On Mon, May 27, 2024 at 07:40:21PM +0300, Ilkka Naulapää wrote: > > Hi Steven, > > > > I took some time and bisected the 6.8.9 - 6.8.10 and git gave the > > panic inducing commit: > > > > 414fb08628143 (tracefs: Reset permissions on remount

Re: Bug in Kernel 6.8.x, 6.9.x Causing Trace/Panic During Shutdown/Reboot

2024-05-27 Thread Greg KH
On Mon, May 27, 2024 at 07:40:21PM +0300, Ilkka Naulapää wrote: > Hi Steven, > > I took some time and bisected the 6.8.9 - 6.8.10 and git gave the > panic inducing commit: > > 414fb08628143 (tracefs: Reset permissions on remount if permissions are > options) > > I reverted that commit to 6.9.2

Re: Bug in Kernel 6.8.x, 6.9.x Causing Trace/Panic During Shutdown/Reboot

2024-05-27 Thread Ilkka Naulapää
Hi Steven, I took some time and bisected the 6.8.9 - 6.8.10 and git gave the panic inducing commit: 414fb08628143 (tracefs: Reset permissions on remount if permissions are options) I reverted that commit to 6.9.2 and now it only serves the trace but the panic is gone. But I can live with it.

Re: Bug in Kernel 6.8.x, 6.9.x Causing Trace/Panic During Shutdown/Reboot

2024-05-24 Thread Steven Rostedt
On Fri, 24 May 2024 12:50:08 +0200 "Linux regression tracking (Thorsten Leemhuis)" wrote: > > - Affected Versions: Before kernel version 6.8.10, the bug caused a > > quick display of a kernel trace dump before the shutdown/reboot > > completed. Starting from version 6.8.10 and continuing into

Re: Bug in Kernel 6.8.x, 6.9.x Causing Trace/Panic During Shutdown/Reboot

2024-05-24 Thread Steven Rostedt
On Fri, 24 May 2024 12:50:08 +0200 "Linux regression tracking (Thorsten Leemhuis)" wrote: > [CCing a few people] > Thanks for the Cc. > On 24.05.24 12:31, Ilkka Naulapää wrote: > > > > I have encountered a critical bug in the Linux vanilla kernel that > > leads to a kernel panic during the

Re: Bug in Kernel 6.8.x, 6.9.x Causing Trace/Panic During Shutdown/Reboot

2024-05-24 Thread Linux regression tracking (Thorsten Leemhuis)
[CCing a few people] On 24.05.24 12:31, Ilkka Naulapää wrote: > > I have encountered a critical bug in the Linux vanilla kernel that > leads to a kernel panic during the shutdown or reboot process. The > issue arises after all services, including `journald`, have been > stopped. As a result, the

RE: v5.10: sched_cpu_dying() hits BUG_ON during hibernation: kernel BUG at kernel/sched/core.c:7596!

2020-12-22 Thread Dexuan Cui
bris...@redhat.com; x...@kernel.org; linux...@vger.kernel.org; > linux-kernel@vger.kernel.org; linux-hyp...@vger.kernel.org; Michael Kelley > > Subject: Re: v5.10: sched_cpu_dying() hits BUG_ON during hibernation: kernel > BUG at kernel/sched/core.c:7596! > > > Hi, >

Re: v5.10: sched_cpu_dying() hits BUG_ON during hibernation: kernel BUG at kernel/sched/core.c:7596!

2020-12-22 Thread Valentin Schneider
Hi, On 22/12/20 09:13, Dexuan Cui wrote: > Hi, > I'm running a Linux VM with the recent mainline (48342fc07272, 12/20/2020) on > Hyper-V. > When I test hibernation, the VM can easily hit the below BUG_ON during the > resume > procedure (I estimate this can repro about 1/5 of the time). BTW,

v5.10: sched_cpu_dying() hits BUG_ON during hibernation: kernel BUG at kernel/sched/core.c:7596!

2020-12-22 Thread Dexuan Cui
71224] smpboot: CPU 37 is now offline [ 11.795089] [ cut here ]---- [ 11.798052] kernel BUG at kernel/sched/core.c:7596! [ 11.798052] invalid opcode: [#1] PREEMPT SMP PTI [ 11.798052] CPU: 38 PID: 202 Comm: migration/38 Tainted: GE 5.10.0+ #6 [ 11.79

Re: [arm64] kernel BUG at kernel/seccomp.c:1309!

2020-11-23 Thread Gabriel Krisman Bertazi
Jann Horn writes: > On Mon, Nov 23, 2020 at 2:45 PM Arnd Bergmann wrote: >> On Mon, Nov 23, 2020 at 12:15 PM Naresh Kamboju >> wrote: >> > >> > While booting arm64 kernel the following kernel BUG noticed on several >> > arm64 >>

Re: [arm64] kernel BUG at kernel/seccomp.c:1309!

2020-11-23 Thread Jann Horn
On Mon, Nov 23, 2020 at 2:45 PM Arnd Bergmann wrote: > On Mon, Nov 23, 2020 at 12:15 PM Naresh Kamboju > wrote: > > > > While booting arm64 kernel the following kernel BUG noticed on several arm64 > > devices running linux next 20201123 tag kernel. > > > > &

Re: [arm64] kernel BUG at kernel/seccomp.c:1309!

2020-11-23 Thread Arnd Bergmann
On Mon, Nov 23, 2020 at 12:15 PM Naresh Kamboju wrote: > > While booting arm64 kernel the following kernel BUG noticed on several arm64 > devices running linux next 20201123 tag kernel. > > > $ git log --oneline next-20201120..next-20201123 -- kernel/seccomp.c > 5c5c5fa055ea

[arm64] kernel BUG at kernel/seccomp.c:1309!

2020-11-23 Thread Naresh Kamboju
While booting arm64 kernel the following kernel BUG noticed on several arm64 devices running linux next 20201123 tag kernel. $ git log --oneline next-20201120..next-20201123 -- kernel/seccomp.c 5c5c5fa055ea Merge remote-tracking branch 'seccomp/for-next/seccomp' bce6a8cba7bf Merge branch 'linus

Re: PPPd Bug with kernel 5.8.5 : task pppd:6009 blocked for more than 122 seconds.

2020-09-01 Thread Martin Zaharinov
false; err = ppp_dev_configure(src_net, dev, ); out_unlock: mutex_unlock(_mutex); out: fput(file); return err; } Need people that under stand this part of kernel code. > On 1 Sep 2020, at 22:36, Martin Zaharinov wrote: > > HI all kernel team > > We

PPPd Bug with kernel 5.8.5 : task pppd:6009 blocked for more than 122 seconds.

2020-09-01 Thread Martin Zaharinov
HI all kernel team We detect bug in kernel with pppd server When disconnect and connect 1000+ users after many time kernel have lock please see debug log : Aug 30 05:34:55 10.20.22.1 [139221.203949][ T817] INFO: task pppd:6009 blocked for more than 122 seconds. Aug 30 05:34:55 10.20.22.1

Re: kernel BUG at kernel/fork.c:LINE!

2020-08-23 Thread Shakeel Butt
> > commit 991e7673859ed41e7ba83c8c4e57afe8cfebe314 > Author: Shakeel Butt > Date: Thu Aug 6 23:21:37 2020 -0700 > > mm: memcontrol: account kernel stack per node > > > since the BUG_ON() at line 390 is removed by this patch. > It's not really removed. T

Re: kernel BUG at kernel/fork.c:LINE!

2020-08-23 Thread Randy Dunlap
l stack per node since the BUG_ON() at line 390 is removed by this patch. > ----[ cut here ] > kernel BUG at kernel/fork.c:390! > invalid opcode: [#1] PREEMPT SMP KASAN > CPU: 0 PID: 5239 Comm: syz-executor.1 Not tainted 5.8.0-syzkaller #0 > Hardware na

kernel BUG at kernel/fork.c:LINE!

2020-08-07 Thread syzbot
...@syzkaller.appspotmail.com [ cut here ] kernel BUG at kernel/fork.c:390! invalid opcode: [#1] PREEMPT SMP KASAN CPU: 0 PID: 5239 Comm: syz-executor.1 Not tainted 5.8.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01

Re: 5.8-rc*: kernel BUG at kernel/signal.c:1917

2020-07-21 Thread Valentin Schneider
On 20/07/20 15:21, Peter Zijlstra wrote: > On Mon, Jul 20, 2020 at 04:02:24PM +0200, Oleg Nesterov wrote: >> I have to admit, I do not understand the usage of prev_state in schedule(), >> it looks really, really subtle... > > Right, so commit dbfb089d360 solved a problem where schedule() re-read

Re: 5.8-rc*: kernel BUG at kernel/signal.c:1917

2020-07-21 Thread peterz
On Tue, Jul 21, 2020 at 12:52:52AM -0400, Paul Gortmaker wrote: > [Re: 5.8-rc*: kernel BUG at kernel/signal.c:1917] On 20/07/2020 (Mon 16:21) > Peter Zijlstra wrote: > > > On Mon, Jul 20, 2020 at 04:02:24PM +0200, Oleg Nesterov wrote: > > > I have to admit, I do

Re: 5.8-rc*: kernel BUG at kernel/signal.c:1917

2020-07-20 Thread Paul Gortmaker
[Re: 5.8-rc*: kernel BUG at kernel/signal.c:1917] On 20/07/2020 (Mon 16:21) Peter Zijlstra wrote: > On Mon, Jul 20, 2020 at 04:02:24PM +0200, Oleg Nesterov wrote: > > I have to admit, I do not understand the usage of prev_state in schedule(), > > it looks really, really subtle...

Re: 5.8-rc*: kernel BUG at kernel/signal.c:1917

2020-07-20 Thread Peter Zijlstra
On Mon, Jul 20, 2020 at 05:35:15PM +0200, Oleg Nesterov wrote: > On 07/20, Oleg Nesterov wrote: > > > > On 07/20, Peter Zijlstra wrote: > > > > > > --- a/kernel/sched/core.c > > > +++ b/kernel/sched/core.c > > > @@ -4193,9 +4193,6 @@ static void __sched notrace __schedule(bool preempt) > > >

Re: 5.8-rc*: kernel BUG at kernel/signal.c:1917

2020-07-20 Thread Oleg Nesterov
On 07/20, Oleg Nesterov wrote: > > On 07/20, Peter Zijlstra wrote: > > > > --- a/kernel/sched/core.c > > +++ b/kernel/sched/core.c > > @@ -4193,9 +4193,6 @@ static void __sched notrace __schedule(bool preempt) > > local_irq_disable(); > > rcu_note_context_switch(preempt); > > > > - /*

Re: 5.8-rc*: kernel BUG at kernel/signal.c:1917

2020-07-20 Thread Oleg Nesterov
On 07/20, Peter Zijlstra wrote: > > --- a/kernel/sched/core.c > +++ b/kernel/sched/core.c > @@ -4193,9 +4193,6 @@ static void __sched notrace __schedule(bool preempt) > local_irq_disable(); > rcu_note_context_switch(preempt); > > - /* See deactivate_task() below. */ > -

Re: 5.8-rc*: kernel BUG at kernel/signal.c:1917

2020-07-20 Thread Valentin Schneider
On 20/07/20 14:17, pet...@infradead.org wrote: > On Mon, Jul 20, 2020 at 01:20:26PM +0100, Valentin Schneider wrote: >> On 20/07/20 12:26, pet...@infradead.org wrote: > >> > + /* >> > + * We must re-load prev->state in case ttwu_remote() changed it >> > + * before we acquired rq->lock. >> >

Re: 5.8-rc*: kernel BUG at kernel/signal.c:1917

2020-07-20 Thread Peter Zijlstra
On Mon, Jul 20, 2020 at 04:02:24PM +0200, Oleg Nesterov wrote: > I have to admit, I do not understand the usage of prev_state in schedule(), > it looks really, really subtle... Right, so commit dbfb089d360 solved a problem where schedule() re-read prev->state vs prev->on_rq = 0. That is,

Re: 5.8-rc*: kernel BUG at kernel/signal.c:1917

2020-07-20 Thread peterz
On Mon, Jul 20, 2020 at 01:26:23PM +0200, pet...@infradead.org wrote: > kernel/sched/core.c | 34 -- > 1 file changed, 28 insertions(+), 6 deletions(-) > > diff --git a/kernel/sched/core.c b/kernel/sched/core.c > index e15543cb84812..b5973d7fa521c 100644 > ---

Re: 5.8-rc*: kernel BUG at kernel/signal.c:1917

2020-07-20 Thread Oleg Nesterov
On 07/20, Peter Zijlstra wrote: > > Also, is there any way to not have ptrace do this? Well, we need to ensure that even SIGKILL can't wake the tracee up while debugger plays with its registers/etc. > How performance > critical is this ptrace path? This is a slow path. We can probably change

Re: 5.8-rc*: kernel BUG at kernel/signal.c:1917

2020-07-20 Thread peterz
On Mon, Jul 20, 2020 at 01:20:26PM +0100, Valentin Schneider wrote: > On 20/07/20 12:26, pet...@infradead.org wrote: > > + /* > > +* We must re-load prev->state in case ttwu_remote() changed it > > +* before we acquired rq->lock. > > +*/ > > + tmp_state = prev->state; > > + if

Re: 5.8-rc*: kernel BUG at kernel/signal.c:1917

2020-07-20 Thread Christian Brauner
On Mon, Jul 20, 2020 at 01:26:23PM +0200, pet...@infradead.org wrote: > On Mon, Jul 20, 2020 at 12:59:24PM +0200, pet...@infradead.org wrote: > > On Mon, Jul 20, 2020 at 10:41:06AM +0200, Peter Zijlstra wrote: > > > On Mon, Jul 20, 2020 at 10:26:58AM +0200, Oleg Nesterov wrote: > > > > Peter, > >

Re: 5.8-rc*: kernel BUG at kernel/signal.c:1917

2020-07-20 Thread Valentin Schneider
On 20/07/20 12:26, pet...@infradead.org wrote: > --- > kernel/sched/core.c | 34 -- > 1 file changed, 28 insertions(+), 6 deletions(-) > > diff --git a/kernel/sched/core.c b/kernel/sched/core.c > index e15543cb84812..b5973d7fa521c 100644 > ---

Re: 5.8-rc*: kernel BUG at kernel/signal.c:1917

2020-07-20 Thread Jiri Slaby
On 20. 07. 20, 13:26, pet...@infradead.org wrote: > On Mon, Jul 20, 2020 at 12:59:24PM +0200, pet...@infradead.org wrote: >> On Mon, Jul 20, 2020 at 10:41:06AM +0200, Peter Zijlstra wrote: >>> On Mon, Jul 20, 2020 at 10:26:58AM +0200, Oleg Nesterov wrote: Peter, Let me add another

Re: 5.8-rc*: kernel BUG at kernel/signal.c:1917

2020-07-20 Thread peterz
On Mon, Jul 20, 2020 at 12:59:24PM +0200, pet...@infradead.org wrote: > On Mon, Jul 20, 2020 at 10:41:06AM +0200, Peter Zijlstra wrote: > > On Mon, Jul 20, 2020 at 10:26:58AM +0200, Oleg Nesterov wrote: > > > Peter, > > > > > > Let me add another note. TASK_TRACED/TASK_STOPPED was always

Re: 5.8-rc*: kernel BUG at kernel/signal.c:1917

2020-07-20 Thread peterz
On Mon, Jul 20, 2020 at 10:41:06AM +0200, Peter Zijlstra wrote: > On Mon, Jul 20, 2020 at 10:26:58AM +0200, Oleg Nesterov wrote: > > Peter, > > > > Let me add another note. TASK_TRACED/TASK_STOPPED was always protected by > > ->siglock. In particular, ttwu(__TASK_TRACED) must be always called

Re: 5.8-rc*: kernel BUG at kernel/signal.c:1917

2020-07-20 Thread Peter Zijlstra
On Mon, Jul 20, 2020 at 10:26:58AM +0200, Oleg Nesterov wrote: > Peter, > > Let me add another note. TASK_TRACED/TASK_STOPPED was always protected by > ->siglock. In particular, ttwu(__TASK_TRACED) must be always called with > ->siglock held. That is why ptrace_freeze_traced() assumes it can

Re: 5.8-rc*: kernel BUG at kernel/signal.c:1917

2020-07-20 Thread Oleg Nesterov
Peter, Let me add another note. TASK_TRACED/TASK_STOPPED was always protected by ->siglock. In particular, ttwu(__TASK_TRACED) must be always called with ->siglock held. That is why ptrace_freeze_traced() assumes it can safely do s/TASK_TRACED/__TASK_TRACED/ under spin_lock(siglock). Can this

Re: 5.8-rc*: kernel BUG at kernel/signal.c:1917

2020-07-20 Thread Oleg Nesterov
On 07/20, Jiri Slaby wrote: > > On 18. 07. 20, 19:14, Oleg Nesterov wrote: > > > > This is already wrong. But > > > > Where does this __might_sleep() come from ??? I ses no blocking calls > > in ptrace_stop(). Not to mention it is called with ->siglock held and > > right after this

Re: 5.8-rc*: kernel BUG at kernel/signal.c:1917

2020-07-20 Thread Oleg Nesterov
On 07/20, Jiri Slaby wrote: > > You tackled it, we cherry-picked dbfb089d360 to our kernels. Ccing more > people. Thanks... so with this patch __schedule() does prev_state = prev->state; ... if (!preempt && prev_state && prev_state == prev->state) { if

Re: 5.8-rc*: kernel BUG at kernel/signal.c:1917

2020-07-20 Thread Jiri Slaby
On 18. 07. 20, 19:14, Oleg Nesterov wrote: > On 07/18, Jiri Slaby wrote: >> >> On 17. 07. 20, 14:40, Oleg Nesterov wrote: >>> >>> please see the updated patch below, lets check ptrace_unfreeze() too. >> >> Sure, dmesg attached. > > Thanks a lot! > > But I am totally confused... > >> [

Re: 5.8-rc*: kernel BUG at kernel/signal.c:1917

2020-07-19 Thread Jiri Slaby
On 18. 07. 20, 19:44, Christian Brauner wrote: > On Sat, Jul 18, 2020 at 07:14:07PM +0200, Oleg Nesterov wrote: >> On 07/18, Jiri Slaby wrote: >>> >>> On 17. 07. 20, 14:40, Oleg Nesterov wrote: please see the updated patch below, lets check ptrace_unfreeze() too. >>> >>> Sure, dmesg

Re: 5.8-rc*: kernel BUG at kernel/signal.c:1917

2020-07-19 Thread Oleg Nesterov
Hi Hillf, On 07/19, Hillf Danton wrote: > > Dunno if the wheel prior to JOBCTL_TASK_WORK helps debug the warnings. > > --- a/kernel/signal.c > +++ b/kernel/signal.c > @@ -2541,7 +2541,7 @@ bool get_signal(struct ksignal *ksig) > > relock: > spin_lock_irq(>siglock); > - current->jobctl

Re: 5.8-rc*: kernel BUG at kernel/signal.c:1917

2020-07-18 Thread Christian Brauner
On Sat, Jul 18, 2020 at 07:14:07PM +0200, Oleg Nesterov wrote: > On 07/18, Jiri Slaby wrote: > > > > On 17. 07. 20, 14:40, Oleg Nesterov wrote: > > > > > > please see the updated patch below, lets check ptrace_unfreeze() too. > > > > Sure, dmesg attached. > > Thanks a lot! > > But I am totally

Re: 5.8-rc*: kernel BUG at kernel/signal.c:1917

2020-07-18 Thread Oleg Nesterov
On 07/18, Jiri Slaby wrote: > > On 17. 07. 20, 14:40, Oleg Nesterov wrote: > > > > please see the updated patch below, lets check ptrace_unfreeze() too. > > Sure, dmesg attached. Thanks a lot! But I am totally confused... > [ 94.513944] [ cut here ] > [ 94.513985] do

Re: 5.8-rc*: kernel BUG at kernel/signal.c:1917

2020-07-18 Thread Jiri Slaby
On 17. 07. 20, 13:12, Christian Brauner wrote: > On Fri, Jul 17, 2020 at 01:04:38PM +0200, Jiri Slaby wrote: >> On 17. 07. 20, 12:45, Jiri Slaby wrote: >>> Hi, >>> >>> the strace testsuite triggers this on 5.8-rc4 and -rc5 both on x86_64 >>> and i586: >> >> make check needs -jsomething, running is

Re: 5.8-rc*: kernel BUG at kernel/signal.c:1917

2020-07-18 Thread Jiri Slaby
On 17. 07. 20, 14:40, Oleg Nesterov wrote: > On 07/17, Oleg Nesterov wrote: >> >> On 07/17, Jiri Slaby wrote: >>> >>> On 17. 07. 20, 12:45, Jiri Slaby wrote: Hi, the strace testsuite triggers this on 5.8-rc4 and -rc5 both on x86_64 and i586: >>> >>> make check needs

Re: 5.8-rc*: kernel BUG at kernel/signal.c:1917

2020-07-17 Thread Oleg Nesterov
On 07/17, Oleg Nesterov wrote: > > On 07/17, Jiri Slaby wrote: > > > > On 17. 07. 20, 12:45, Jiri Slaby wrote: > > > Hi, > > > > > > the strace testsuite triggers this on 5.8-rc4 and -rc5 both on x86_64 > > > and i586: > > > > make check needs -jsomething, running is sequentially (-j1) doesn't > >

Re: 5.8-rc*: kernel BUG at kernel/signal.c:1917

2020-07-17 Thread Oleg Nesterov
On 07/17, Jiri Slaby wrote: > > On 17. 07. 20, 12:45, Jiri Slaby wrote: > > Hi, > > > > the strace testsuite triggers this on 5.8-rc4 and -rc5 both on x86_64 > > and i586: > > make check needs -jsomething, running is sequentially (-j1) doesn't > trigger it. After the error, I cannot run anything.

Re: 5.8-rc*: kernel BUG at kernel/signal.c:1917

2020-07-17 Thread Christian Brauner
On Fri, Jul 17, 2020 at 01:04:38PM +0200, Jiri Slaby wrote: > On 17. 07. 20, 12:45, Jiri Slaby wrote: > > Hi, > > > > the strace testsuite triggers this on 5.8-rc4 and -rc5 both on x86_64 > > and i586: > > make check needs -jsomething, running is sequentially (-j1) doesn't > trigger it. After

Re: 5.8-rc*: kernel BUG at kernel/signal.c:1917

2020-07-17 Thread Jiri Slaby
test caused the crash... 5.7 was fine. >> kernel BUG at kernel/signal.c:1917! >> invalid opcode: [#1] SMP NOPTI >> CPU: 7 PID: 18367 Comm: filter-unavaila Not tainted >> 5.8.0-rc4-3.g2cd7849-default #1 openSUSE Tumbleweed (unreleased) >> Hardware name: QEMU Stand

5.8-rc*: kernel BUG at kernel/signal.c:1917

2020-07-17 Thread Jiri Slaby
Hi, the strace testsuite triggers this on 5.8-rc4 and -rc5 both on x86_64 and i586: > kernel BUG at kernel/signal.c:1917! > invalid opcode: [#1] SMP NOPTI > CPU: 7 PID: 18367 Comm: filter-unavaila Not tainted > 5.8.0-rc4-3.g2cd7849-default #1 openSUSE Tumbleweed (unreleased

Re: Maybe a bug in kernel/irq/chip.c unmask_irq(), device IRQ masked unexpectedly. (re-formated the mail body, sorry)

2019-10-14 Thread Yi Zheng
Hi, Thomas I canceled that patch. In my testing, that will not fix the problem. Why the IRQ is unexpectedly masked, that is not an easy bug for me. More time need to hacking the driver/kernel code. Thanks for your reply. Thomas Gleixner 于2019年10月14日周一 下午8:34写道: > > On Tue, 8 Oct 2019, Yi Zheng

Re: Maybe a bug in kernel/irq/chip.c unmask_irq(), device IRQ masked unexpectedly. (re-formated the mail body, sorry)

2019-10-14 Thread Thomas Gleixner
On Tue, 8 Oct 2019, Yi Zheng wrote: > There is some defects on IRQ processing: > > (1) At the beginning of handle_level_irq(), the IRQ-28 is masked, and ACK > action is executed: On my machine, it runs the 'else' branch: > > static inline void mask_ack_irq(struct

Re: Maybe a bug in kernel/irq/chip.c unmask_irq(), device IRQ masked unexpectedly. (re-formated the mail body, sorry)

2019-10-10 Thread Tony Lindgren
* Yi Zheng [191010 06:22]: > Hi > >My patch is canceled. I have tested that simple adjustment, the > device IRQ masked unexpectedly. It seems that it is more easily to > occur with that patch. > > So, the root cause is not found yet. OK. Based on your description, it could be a missing

Re: Maybe a bug in kernel/irq/chip.c unmask_irq(), device IRQ masked unexpectedly. (re-formated the mail body, sorry)

2019-10-10 Thread Yi Zheng
Hi My patch is canceled. I have tested that simple adjustment, the device IRQ masked unexpectedly. It seems that it is more easily to occur with that patch. So, the root cause is not found yet.

Re: Maybe a bug in kernel/irq/chip.c unmask_irq(), device IRQ masked unexpectedly. (re-formated the mail body, sorry)

2019-10-09 Thread Tony Lindgren
Hi, * Yi Zheng [191008 13:06]: > NOTE: (1) My SoC is a single core ARM chip: TI-AM3352, so the raw > spin-lock irq_desc->lock will be optimized to > nothing. handle_level_irq() has no spin-lock protection, right? Well not always, With CONFIG_SMP we modify only some of

Maybe a bug in kernel/irq/chip.c unmask_irq(), device IRQ masked unexpectedly. (re-formated the mail body, sorry)

2019-10-08 Thread Yi Zheng
Hi, I found something wrong on my AM3352 SoC machine, the GPIO triggered IRQ is masked unexpectedly. That bug cause the devices using that GPIO-IRQ can not work. Even the latest kernel version (v5.4-rc2-20-geda57a0e4299)! After a long time hacking, I guess the bug

Maybe a bug in kernel/irq/chip.c unmask_irq(), device irq is masked unexpectedly.

2019-10-08 Thread Yi Zheng
Hi, I found something wrong on my AM3352 SoC machine, the GPIO triggered IRQ is masked unexpectedly. That bug cause the devices using that GPIO-IRQ can not work. Even the latest kernel version (v5.4-rc2-20-geda57a0e4299)! After a long time hacking, I guess the bug

kernel BUG at kernel/time/timer.c:LINE! (4)

2019-10-07 Thread syzbot
to the commit: Reported-by: syzbot+f49d12d34f2321cf4...@syzkaller.appspotmail.com [ cut here ] kernel BUG at kernel/time/timer.c:956! invalid opcode: [#1] SMP KASAN CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.4.0-rc1+ #0 Hardware name: Google Google Compute Engine/Google

Re: Bug at kernel/cred.c +443

2019-09-09 Thread rishabhb
On 2019-09-09 15:47, risha...@codeaurora.org wrote: Hi Miklos In 4.19 kernel when we write to a file that doesn't exist we see the following stack: [ 377.382745] ovl_create_or_link+0xac/0x710 [ 377.382745] ovl_create_object+0xb8/0x110 [ 377.382745] ovl_create+0x34/0x40 [ 377.382745]

Bug at kernel/cred.c +432

2019-09-09 Thread rishabhb
Hi Miklos In 4.19 kernel when we write to a file that doesn't exist we see the following stack: [ 377.382745] ovl_create_or_link+0xac/0x710 [ 377.382745] ovl_create_object+0xb8/0x110 [ 377.382745] ovl_create+0x34/0x40 [ 377.382745] path_openat+0xd44/0x15a8 [ 377.382745]

Reminder: 1 open syzbot bug in "kernel/cgroup" subsystem

2019-07-23 Thread Eric Biggers
[This email was generated by a script. Let me know if you have any suggestions to make it better, or if you want it re-generated with the latest status.] Of the currently open syzbot reports against the upstream kernel, I've manually marked 1 of them as possibly being a bug in the "kernel/c

Reminder: 1 open syzbot bug in "kernel/cgroup" subsystem

2019-07-09 Thread Eric Biggers
[This email was generated by a script. Let me know if you have any suggestions to make it better, or if you want it re-generated with the latest status.] Of the currently open syzbot reports against the upstream kernel, I've manually marked 1 of them as possibly being a bug in the "kernel/c

Re: kernel BUG at kernel/cred.c:434!

2019-04-23 Thread Paul Moore
On Tue, Apr 23, 2019 at 12:08 AM Yang Yingliang wrote: > On 2019/4/23 3:48, Paul Moore wrote: > > On Sat, Apr 20, 2019 at 3:39 AM Yang Yingliang > > wrote: > >> I'm not sure you got my point. > > I went back and looked at your previous emails again to try and > > understand what you are talking

Re: kernel BUG at kernel/cred.c:434!

2019-04-22 Thread Yang Yingliang
On 2019/4/23 3:48, Paul Moore wrote: On Sat, Apr 20, 2019 at 3:39 AM Yang Yingliang wrote: I'm not sure you got my point. I went back and looked at your previous emails again to try and understand what you are talking about, and I'm a little confused by some of the output ... ---

Re: kernel BUG at kernel/cred.c:434!

2019-04-22 Thread Paul Moore
his again? Looking at the task pointer and the timestamp, this is the same task exiting and trying to write to the accounting file, yes? This output is particularly curious since it appears that real_cred has changed; where is this happening? > [ 56.653565] [ cut here ]-

Re: kernel BUG at kernel/cred.c:434!

2019-04-20 Thread Yang Yingliang
On 2019/4/20 0:13, Paul Moore wrote: On Fri, Apr 19, 2019 at 10:34 AM Yang Yingliang wrote: On 2019/4/19 21:24, Paul Moore wrote: On Thu, Apr 18, 2019 at 10:42 PM Yang Yingliang wrote: On 2019/4/19 10:04, Paul Moore wrote: On Wed, Apr 17, 2019 at 10:50 PM Yang Yingliang wrote: On

Re: kernel BUG at kernel/cred.c:434!

2019-04-19 Thread Paul Moore
On Thu, Apr 18, 2019 at 10:42 PM Yang Yingliang wrote: > On 2019/4/19 10:04, Paul Moore wrote: > > On Wed, Apr 17, 2019 at 10:50 PM Yang Yingliang > > wrote: > >> On 2019/4/18 8:24, Casey Schaufler wrote: > >>> On 4/17/2019 4:39 PM, Paul Moore wrote: > Since it looks like all three LSMs

Re: kernel BUG at kernel/cred.c:434!

2019-04-19 Thread Paul Moore
On Fri, Apr 19, 2019 at 10:34 AM Yang Yingliang wrote: > On 2019/4/19 21:24, Paul Moore wrote: > > On Thu, Apr 18, 2019 at 10:42 PM Yang Yingliang > > wrote: > >> On 2019/4/19 10:04, Paul Moore wrote: > >>> On Wed, Apr 17, 2019 at 10:50 PM Yang Yingliang > >>> wrote: > On 2019/4/18 8:24,

Re: kernel BUG at kernel/cred.c:434!

2019-04-19 Thread Yang Yingliang
f88841ae450c0 [ 56.653565] --------[ cut here ] [ 56.655119] kernel BUG at kernel/cred.c:434! [ 56.656590] invalid opcode: [#1] SMP PTI [ 56.658033] CPU: 2 PID: 4169 Comm: syz-executor.15 Not tainted 5.1.0-rc4-00034-g869e3305f23d-dirty #143 [ 56.661077] Hardware name: QEMU S

Re: kernel BUG at kernel/cred.c:434!

2019-04-18 Thread Yang Yingliang
On 2019/4/19 10:04, Paul Moore wrote: On Wed, Apr 17, 2019 at 10:50 PM Yang Yingliang wrote: On 2019/4/18 8:24, Casey Schaufler wrote: On 4/17/2019 4:39 PM, Paul Moore wrote: Since it looks like all three LSMs which implement the setprocattr hook are vulnerable I'm open to the idea that

Re: kernel BUG at kernel/cred.c:434!

2019-04-18 Thread Paul Moore
On Wed, Apr 17, 2019 at 10:50 PM Yang Yingliang wrote: > On 2019/4/18 8:24, Casey Schaufler wrote: > > On 4/17/2019 4:39 PM, Paul Moore wrote: > >> > >> Since it looks like all three LSMs which implement the setprocattr > >> hook are vulnerable I'm open to the idea that proc_pid_attr_write() is >

Re: kernel BUG at kernel/cred.c:434!

2019-04-18 Thread Stephen Smalley
On 4/17/19 12:42 PM, Casey Schaufler wrote: On 4/17/2019 9:27 AM, Oleg Nesterov wrote: On 04/17, Paul Moore wrote: On Wed, Apr 17, 2019 at 10:57 AM Oleg Nesterov wrote: On 04/17, Paul Moore wrote: I'm tempted to simply return an error in selinux_setprocattr() if the task's credentials are

Re: kernel BUG at kernel/cred.c:434!

2019-04-17 Thread Yang Yingliang
Hi, Casey On 2019/4/18 8:24, Casey Schaufler wrote: On 4/17/2019 4:39 PM, Paul Moore wrote: On Wed, Apr 17, 2019 at 12:27 PM Oleg Nesterov wrote: On 04/17, Paul Moore wrote: On Wed, Apr 17, 2019 at 10:57 AM Oleg Nesterov wrote: On 04/17, Paul Moore wrote: I'm tempted to simply return an

Re: kernel BUG at kernel/cred.c:434!

2019-04-17 Thread Casey Schaufler
On 4/17/2019 4:39 PM, Paul Moore wrote: On Wed, Apr 17, 2019 at 12:27 PM Oleg Nesterov wrote: On 04/17, Paul Moore wrote: On Wed, Apr 17, 2019 at 10:57 AM Oleg Nesterov wrote: On 04/17, Paul Moore wrote: I'm tempted to simply return an error in selinux_setprocattr() if the task's

Re: kernel BUG at kernel/cred.c:434!

2019-04-17 Thread John Johansen
On 4/17/19 4:39 PM, Paul Moore wrote: > On Wed, Apr 17, 2019 at 12:27 PM Oleg Nesterov wrote: >> On 04/17, Paul Moore wrote: >>> >>> On Wed, Apr 17, 2019 at 10:57 AM Oleg Nesterov wrote: On 04/17, Paul Moore wrote: > > I'm tempted to simply return an error in selinux_setprocattr()

Re: kernel BUG at kernel/cred.c:434!

2019-04-17 Thread Paul Moore
On Wed, Apr 17, 2019 at 12:27 PM Oleg Nesterov wrote: > On 04/17, Paul Moore wrote: > > > > On Wed, Apr 17, 2019 at 10:57 AM Oleg Nesterov wrote: > > > On 04/17, Paul Moore wrote: > > > > > > > > I'm tempted to simply return an error in selinux_setprocattr() if > > > > the task's credentials are

Re: kernel BUG at kernel/cred.c:434!

2019-04-17 Thread Casey Schaufler
On 4/17/2019 9:27 AM, Oleg Nesterov wrote: On 04/17, Paul Moore wrote: On Wed, Apr 17, 2019 at 10:57 AM Oleg Nesterov wrote: On 04/17, Paul Moore wrote: I'm tempted to simply return an error in selinux_setprocattr() if the task's credentials are not the same as its real_cred; What about

Re: kernel BUG at kernel/cred.c:434!

2019-04-17 Thread Oleg Nesterov
On 04/17, Paul Moore wrote: > > On Wed, Apr 17, 2019 at 10:57 AM Oleg Nesterov wrote: > > On 04/17, Paul Moore wrote: > > > > > > I'm tempted to simply return an error in selinux_setprocattr() if > > > the task's credentials are not the same as its real_cred; > > > > What about other modules? I

Re: kernel BUG at kernel/cred.c:434!

2019-04-17 Thread Paul Moore
On Wed, Apr 17, 2019 at 10:57 AM Oleg Nesterov wrote: > On 04/17, Paul Moore wrote: > > > > I'm tempted to simply return an error in selinux_setprocattr() if > > the task's credentials are not the same as its real_cred; > > What about other modules? I have no idea what smack_setprocattr() is, >

Re: kernel BUG at kernel/cred.c:434!

2019-04-17 Thread Casey Schaufler
On 4/17/2019 7:57 AM, Oleg Nesterov wrote: On 04/17, Paul Moore wrote: I'm tempted to simply return an error in selinux_setprocattr() if the task's credentials are not the same as its real_cred; What about other modules? I have no idea what smack_setprocattr() is, but it too does

Re: kernel BUG at kernel/cred.c:434!

2019-04-17 Thread Oleg Nesterov
On 04/17, Paul Moore wrote: > > I'm tempted to simply return an error in selinux_setprocattr() if > the task's credentials are not the same as its real_cred; What about other modules? I have no idea what smack_setprocattr() is, but it too does prepare_creds/commit creds. it seems that the

Re: kernel BUG at kernel/cred.c:434!

2019-04-17 Thread Paul Moore
On Tue, Apr 16, 2019 at 10:46 AM chengjian (D) wrote: > On 2019/4/16 11:40, Kees Cook wrote: > > On Mon, Apr 15, 2019 at 11:20 AM Paul Moore wrote: > >> On Mon, Apr 15, 2019 at 11:05 AM Oleg Nesterov wrote: > >>> On 04/15, Paul Moore wrote: > On Mon, Apr 15, 2019 at 9:43 AM Oleg Nesterov

Re: kernel BUG at kernel/cred.c:434!

2019-04-16 Thread chengjian (D)
On 2019/4/16 11:40, Kees Cook wrote: On Mon, Apr 15, 2019 at 11:20 AM Paul Moore wrote: On Mon, Apr 15, 2019 at 11:05 AM Oleg Nesterov wrote: On 04/15, Paul Moore wrote: On Mon, Apr 15, 2019 at 9:43 AM Oleg Nesterov wrote: Well, acct("/proc/self/attr/current") doesn't look like a good

Re: kernel BUG at kernel/cred.c:434!

2019-04-15 Thread Kees Cook
On Mon, Apr 15, 2019 at 11:20 AM Paul Moore wrote: > > On Mon, Apr 15, 2019 at 11:05 AM Oleg Nesterov wrote: > > On 04/15, Paul Moore wrote: > > > > > > On Mon, Apr 15, 2019 at 9:43 AM Oleg Nesterov wrote: > > > > Well, acct("/proc/self/attr/current") doesn't look like a good idea, > > > > but

  1   2   3   4   5   6   7   8   9   10   >