Description of problem: anolisos8在执行ltp冒烟测试时产生crash:kernel BUG at lib/list_debug.c:28! invalid opcode: 0000 [#1] SMP PTI CPU: 23 PID: 1717136 Comm: mkdir Kdump: loaded Tainted: G W OE 5.10.84-10.3.an8.x86_64 #1 Version-Release number of selected component (if applicable): 5.10.84-10.3.an8.x86_64 How reproducible: Steps to Reproduce: 1.git clone https://github.com/linux-test-project/ltp yum install gcc-c++ gcc git libaio* kernel-debuginfo -y --skip-broken cd ltp make autotools && ./configure && make && make install mkdir /disk1 wipefs -a --force /dev/vdb mkfs -t ext4 -q -F /dev/vdb mount -t ext4 /dev/vdb /disk1 mkdir -p /disk1/tmpdir/ltp lsblk mount | grep vdb cd /opt/ltp vim load.sh #!/bin/bash echo 1 > /proc/sys/kernel/panic echo 1 > /proc/sys/kernel/hardlockup_panic echo 1 > /proc/sys/kernel/softlockup_panic echo 50 > /proc/sys/kernel/watchdog_thresh echo 1200 > /proc/sys/kernel/hung_task_timeout_secs echo 0 > /proc/sys/kernel/hung_task_panic nr_cpu=$(nproc) mem_kb=$(grep ^MemTotal /proc/meminfo | awk '{print $2}') ./runltp \ -c $((nr_cpu / 2)) \ -m $((nr_cpu / 4)),4,$((mem_kb / nr_cpu / 2 * 1024)),1 \ -D $((nr_cpu / 10)),1,0,1 \ -i 2 \ -B ext4 \ -R -p -q \ -t 24h \ -d /disk1/tmpdir/ltp chmod +x load.sh nohup ./load.sh > t1.log & 2. 3. Actual results: 拉起24h ltp测试运行,注释因oom导致的失败用例:memcg_usage_in_bytes memcg_usage_in_bytes_test.sh,readahead02 readahead02,ftest08 ftest08 ,ptrace04 ptrace04,运行1h后产生crash vmcore:http://vmcore.alibaba-inc.com/vmcore_detail/20220530092945_192.108.10.2/ Expected results: 稳定运行24h,无crash,hung及已知问题 Additional info: # cat /etc/image-id image_name="Anolis OS 8.4 ANCK 64 bit" image_id="anolisos_8_4_x64_20G_anck_alibase_20220518.vhd" release_date="20220518111246" vmcore-dmesg.txt Call-trace: [ 8345.171016] ------------[ cut here ]------------ [ 8345.171026] WARNING: CPU: 71 PID: 84049 at block/genhd.c:516 unregister_blkdev+0x5c/0xb0 [ 8345.171027] Modules linked in: ltp_block_dev(OE) uinput(E) vmac(E) squashfs(E) binfmt_misc(E) vfat(E) fat(E) fuse(E) xfs(E) libcrc32c(E) loop(E) veth(E) tcp_diag(E) inet_diag(E) rfkill(E) sunrpc(E) intel_rapl_msr(E) intel_rapl_common(E) isst_if_common(E) nfit(E) intel_powerclamp(E) crct10dif_pclmul(E) crc32_pclmul(E) joydev(E) ghash_clmulni_intel(E) rapl(E) mousedev(E) psmouse(E) virtio_balloon(E) i2c_piix4(E) pcspkr(E) ata_generic(E) cirrus(E) drm_kms_helper(E) syscopyarea(E) sysfillrect(E) sysimgblt(E) fb_sys_fops(E) crc32c_intel(E) ata_piix(E) virtio_net(E) drm(E) net_failover(E) serio_raw(E) failover(E) virtio_console(E) i2c_core(E) libata(E) [last unloaded: finit_module] [ 8345.171069] CPU: 71 PID: 84049 Comm: block_dev Kdump: loaded Tainted: G OE 5.10.84-10.3.an8.x86_64 #1 [ 8345.171070] Hardware name: Alibaba Cloud Alibaba Cloud ECS, BIOS 8f19b21 04/01/2014 [ 8345.171073] RIP: 0010:unregister_blkdev+0x5c/0xb0 [ 8345.171074] Code: 68 4f 00 48 63 c3 48 8b 04 c5 c0 57 bc b8 48 85 c0 74 17 3b 68 08 75 0a eb 48 39 6b 08 74 27 48 89 d8 48 8b 18 48 85 db 75 f0 <0f> 0b 31 db 48 c7 c7 e0 84 05 b8 e8 24 62 4f 00 48 89 df 5b 5d 41 [ 8345.171076] RSP: 0018:ffff9c6362ee3dc0 EFLAGS: 00010246 [ 8345.171078] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 8345.171079] RDX: ffff90d8a42e8000 RSI: ffffffffc06e07f3 RDI: ffffffffb80584e0 [ 8345.171080] RBP: 0000000000000000 R08: 0000000000000020 R09: c0000000fffeffff [ 8345.171082] R10: 0000000000000001 R11: ffff9c6362ee3c10 R12: ffffffffc06e07f3 [ 8345.171083] R13: fffffffffffffff2 R14: ffff9c6362ee3e98 R15: ffff90d8ab3e2c20 [ 8345.171085] FS: 00007f0b50492740(0000) GS:ffff9107022c0000(0000) knlGS:0000000000000000 [ 8345.171089] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 8345.171090] CR2: 0000000000a074c8 CR3: 000000304400c001 CR4: 00000000003706e0 [ 8345.171091] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 8345.171092] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 8345.171092] Call Trace: [ 8345.171100] sys_tcase.cold.0+0x1dd/0x743 [ltp_block_dev] [ 8345.171107] ? kernfs_fop_write_iter+0x130/0x1c0 [ 8345.171111] ? new_sync_write+0x10b/0x190 [ 8345.171115] ? vfs_write+0x182/0x250 [ 8345.171116] ? ksys_write+0x45/0xb0 [ 8345.171122] ? do_syscall_64+0x33/0x40 [ 8345.171127] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 8345.171130] ---[ end trace 692626902284b551 ]--- [25399.856668] ------------[ cut here ]------------ [25399.857879] kernel BUG at lib/list_debug.c:28! [25399.859038] invalid opcode: 0000 [#1] SMP PTI [25399.860239] CPU: 23 PID: 1717136 Comm: mkdir Kdump: loaded Tainted: G W OE 5.10.84-10.3.an8.x86_64 #1 [25399.862188] Hardware name: Alibaba Cloud Alibaba Cloud ECS, BIOS 8f19b21 04/01/2014 [25399.863783] RIP: 0010:__list_add_valid.cold.0+0x26/0x28 [25399.865103] Code: f9 62 b7 ff 48 89 d1 48 c7 c7 40 a4 17 b7 48 89 c2 e8 03 12 ff ff 0f 0b 48 89 c1 4c 89 c6 48 c7 c7 98 a4 17 b7 e8 ef 11 ff ff <0f> 0b 48 89 fe 48 89 c2 48 c7 c7 28 a5 17 b7 e8 db 11 ff ff 0f 0b [25399.868830] RSP: 0018:ffff9c634ddc3de8 EFLAGS: 00010282 [25399.870151] RAX: 0000000000000075 RBX: ffff90a975513000 RCX: 0000000000000000 [25399.871792] RDX: ffff90d7023efe60 RSI: ffff90d7023e0080 RDI: ffff90d7023e0080 [25399.873397] RBP: ffff90a971ce5000 R08: 0000000000000000 R09: c0000000fffeffff [25399.875018] R10: 0000000000000001 R11: ffff9c634ddc3c18 R12: ffffffffb7fbd0b0 [25399.876675] R13: ffffffffb7fbd0c8 R14: ffffffffb7ffe820 R15: ffff90ac4bf42020 [25399.878262] FS: 00007fed29434380(0000) GS:ffff90d7023c0000(0000) knlGS:0000000000000000 [25399.880057] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [25399.881574] CR2: 00007fed2940cf40 CR3: 00000022bbbf8005 CR4: 00000000003706e0 [25399.883183] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [25399.884842] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [25399.886524] Call Trace: [25399.887579] cgroup_apply_control_enable+0x1d0/0x340 [25399.888999] cgroup_mkdir+0x1e8/0x3a0 [25399.890241] kernfs_iop_mkdir+0x58/0x80 [25399.891500] vfs_mkdir+0x102/0x1b0 [25399.892662] do_mkdirat+0xd9/0x100 [25399.893848] do_syscall_64+0x33/0x40 [25399.895049] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [25399.896402] RIP: 0033:0x7fed28aed21b [25399.897579] Code: ff ff c3 0f 1f 40 00 48 8b 05 69 1c 2d 00 64 c7 00 5f 00 00 00 b8 ff ff ff ff c3 0f 1f 40 00 f3 0f 1e fa b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 3d 1c 2d 00 f7 d8 64 89 01 48 [25399.901402] RSP: 002b:00007ffdfb667508 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [25399.903118] RAX: ffffffffffffffda RBX: 00007ffdfb6684fe RCX: 00007fed28aed21b [25399.904727] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00007ffdfb6684fe [25399.906353] RBP: 00007ffdfb6684fe R08: 00000000000001ff R09: 000055bc74203270 [25399.907927] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000001ff [25399.909503] R13: 0000000000000000 R14: 00007ffdfb667680 R15: 00007ffdfb667820 [25399.911126] Modules linked in: n_hdlc(E) zram(E) tun(E) overlay(E) authenc(E) pcrypt(E) crypto_user(E) uinput(E) vmac(E) squashfs(E) binfmt_misc(E) vfat(E) fat(E) fuse(E) xfs(E) libcrc32c(E) loop(E) veth(E) tcp_diag(E) inet_diag(E) rfkill(E) sunrpc(E) intel_rapl_msr(E) intel_rapl_common(E) isst_if_common(E) nfit(E) intel_powerclamp(E) crct10dif_pclmul(E) crc32_pclmul(E) joydev(E) ghash_clmulni_intel(E) rapl(E) mousedev(E) psmouse(E) virtio_balloon(E) i2c_piix4(E) pcspkr(E) ata_generic(E) cirrus(E) drm_kms_helper(E) syscopyarea(E) sysfillrect(E) sysimgblt(E) fb_sys_fops(E) crc32c_intel(E) ata_piix(E) virtio_net(E) drm(E) net_failover(E) serio_raw(E) failover(E) virtio_console(E) i2c_core(E) libata(E) [last unloaded: init_module] [25399.923458] ---[ end trace 692626902284b552 ]---
经owner评估,不影响发布