Bug 1359 - [anolisos8] [x86_64] 执行ltp冒烟测试产生crash:BUG: kernel NULL pointer dereference, address: 0000000000000000,RIP: 0010:0x0,Oops: 0010 [#1] SMP NOPTI
Summary: [anolisos8] [x86_64] 执行ltp冒烟测试产生crash:BUG: kernel NULL pointer dereference, a...
Status: CONFIRMED
Alias: None
Product: Anolis OS 8
Classification: Anolis OS
Component: kernel - anck-5.10 (show other bugs) kernel - anck-5.10
Version: 8.4
Hardware: x86_64 Linux
: P3-Medium S3-normal
Target Milestone: ---
Assignee: xunlei
QA Contact: shuming
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2022-05-30 10:54 UTC by liuyaqing
Modified: 2022-06-06 14:59 UTC (History)
1 user (show)

See Also:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description liuyaqing alibaba_cloud_group 2022-05-30 10:54:42 UTC
Description of problem:
在anolisos x86_64执行ltp冒烟测试产生crash:
BUG: kernel NULL pointer dereference, address: 0000000000000000
Oops: 0010 [#1] SMP NOPTI

vmcore-dmesg.txt部分日志:
【无start trace】
[25233.598157] Tasks state (memory values in pages):
[25233.598158] [  pid  ]   uid  tgid total_vm      rss pgtables_bytes swapents oom_score_adj name
[25233.598161] [ 101552]     0 101552     2011      291    57344        0             0 memcg_process
[25233.598162] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0-3,oom_memcg=/ltp_101470,task_memcg=/ltp_101470,task=memcg_process,pid=101552,uid=0
[25233.598562] oom_reaper: reaped process 101552 (memcg_process), now anon-rss:0kB, file-rss:0kB, shmem-rss:4kB
[25234.195599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[25234.195679] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[25380.854119] BUG: kernel NULL pointer dereference, address: 0000000000000000
[25380.854121] #PF: supervisor instruction fetch in kernel mode
[25380.854122] #PF: error_code(0x0010) - not-present page
[25380.854123] PGD 0 P4D 0
[25380.854126] Oops: 0010 [#1] SMP NOPTI
[25380.854129] CPU: 28 PID: 153 Comm: ksoftirqd/28 Kdump: loaded Tainted: G           OE     5.10.84-10.3.an8.x86_64 #1
[25380.854130] Hardware name: Alibaba Cloud Alibaba Cloud ECS, BIOS 8c24b4c 04/01/2014
[25380.854140] RIP: 0010:0x0
[25380.854143] Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6.
[25380.854143] RSP: 0018:ffff9b1c4cda7e08 EFLAGS: 00010282
[25380.854145] RAX: ffff8e2befacbc80 RBX: 000000000000003e RCX: 0000000080400016
[25380.854146] RDX: 0000000000000000 RSI: ffffffffa715c913 RDI: ffff8e2befacbc80
[25380.854147] RBP: 0000000000000000 R08: 0000000000000001 R09: ffffffffa715c900
[25380.854147] R10: ffff8e4652595600 R11: 0000000000000001 R12: 0000000000000000
[25380.854148] R13: ffff8e49c1d342c0 R14: ffffffffa715c93e R15: ffff8e49c1d34330
[25380.854151] FS:  0000000000000000(0000) GS:ffff8e49c1d00000(0000) knlGS:0000000000000000
[25380.854154] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[25380.854155] CR2: ffffffffffffffd6 CR3: 0000001baecd6000 CR4: 00000000003506e0
[25380.854155] Call Trace:
[25380.854161]  rcu_do_batch+0x163/0x450
[25380.854164]  rcu_core+0x17d/0x2b0
[25380.854168]  __do_softirq+0xc4/0x287
[25380.854171]  ? sort_range+0x20/0x20
[25380.854173]  run_ksoftirqd+0x1a/0x20
[25380.854188]  smpboot_thread_fn+0xc5/0x160
[25380.854190]  kthread+0x116/0x130
[25380.854192]  ? __kthread_cancel_work+0x40/0x40
[25380.854195]  ret_from_fork+0x22/0x30
[25380.854197] Modules linked in: brd(E) tun(E) n_gsm(E) pps_ldisc(E) ppp_synctty(E) n_hdlc(E) ppp_async(E) ppp_generic(E) slhc(E) salsa20_generic(E) msdos(E) binfmt_misc(E) sha3_generic(E) authenc(E) pcrypt(E) crypto_user(E) uinput(E) vsock_loopback(E) vmw_vsock_virtio_transport_common(E) vmw_vsock_vmci_transport(E) vsock(E) vmw_vmci(E) vfat(E) fat(E) xfs(E) libcrc32c(E) loop(E) veth(E) fuse(E) tcp_diag(E) inet_diag(E) rfkill(E) sunrpc(E) kvm_amd(E) ccp(E) mousedev(E) kvm(E) irqbypass(E) crct10dif_pclmul(E) crc32_pclmul(E) ghash_clmulni_intel(E) psmouse(E) i2c_piix4(E) virtio_balloon(E) pcspkr(E) ata_generic(E) cirrus(E) drm_kms_helper(E) syscopyarea(E) sysfillrect(E) sysimgblt(E) fb_sys_fops(E) virtio_net(E) ata_piix(E) drm(E) net_failover(E) crc32c_intel(E) serio_raw(E) failover(E) virtio_console(E) i2c_core(E) libata(E) [last unloaded: finit_module]
[25380.854236] CR2: 0000000000000000
[25380.854238] ---[ end trace 3fa2f8b32e381c59 ]---
[25380.854239] RIP: 0010:0x0
[25380.854241] Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6.
[25380.854242] RSP: 0018:ffff9b1c4cda7e08 EFLAGS: 00010282
[25380.854242] RAX: ffff8e2befacbc80 RBX: 000000000000003e RCX: 0000000080400016
[25380.854243] RDX: 0000000000000000 RSI: ffffffffa715c913 RDI: ffff8e2befacbc80
[25380.854244] RBP: 0000000000000000 R08: 0000000000000001 R09: ffffffffa715c900
[25380.854245] R10: ffff8e4652595600 R11: 0000000000000001 R12: 0000000000000000
[25380.854245] R13: ffff8e49c1d342c0 R14: ffffffffa715c93e R15: ffff8e49c1d34330
[25380.854247] FS:  0000000000000000(0000) GS:ffff8e49c1d00000(0000) knlGS:0000000000000000
[25380.854250] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[25380.854250] CR2: ffffffffffffffd6 CR3: 0000001baecd6000 CR4: 00000000003506e0
[25380.854252] Kernel panic - not syncing: Fatal exception in interrupt
[25380.857036] Kernel Offset: 0x26000000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff)
                                                                                                                                                                               48643,16      Bot

# cat  /etc/image-id
image_name="Anolis OS 8.4 ANCK 64 bit"
image_id="anolisos_8_4_x64_20G_anck_alibase_20220518.vhd"
release_date="20220518111246"


Version-Release number of selected component (if applicable):
5.10.84-10.3.an8.x86_64

How reproducible:


Steps to Reproduce:
1.git clone https://github.com/linux-test-project/ltp
yum install gcc-c++ gcc git libaio* kernel-debuginfo -y --skip-broken
cd ltp
make autotools && ./configure && make && make install
mkdir /disk1
wipefs -a --force /dev/vdb 
mkfs -t ext4 -q -F /dev/vdb
mount -t ext4 /dev/vdb /disk1
mkdir -p /disk1/tmpdir/ltp
lsblk
mount | grep vdb
cd /opt/ltp
vim load.sh
#!/bin/bash
echo 1  > /proc/sys/kernel/panic
echo 1  > /proc/sys/kernel/hardlockup_panic
echo 1  > /proc/sys/kernel/softlockup_panic
echo 50 > /proc/sys/kernel/watchdog_thresh
echo 1200 > /proc/sys/kernel/hung_task_timeout_secs
echo 0   > /proc/sys/kernel/hung_task_panic
nr_cpu=$(nproc)
mem_kb=$(grep ^MemTotal /proc/meminfo | awk '{print $2}')
./runltp \
 -c $((nr_cpu / 2)) \
 -m $((nr_cpu / 4)),4,$((mem_kb / nr_cpu / 2 * 1024)),1 \
 -D $((nr_cpu / 10)),1,0,1 \
 -i 2 \
 -B ext4 \
 -R -p -q \
 -t 24h \
 -d /disk1/tmpdir/ltp
chmod +x load.sh
nohup ./load.sh > t1.log &
2.
3.

Actual results:
产生crash:http://vmcore.alibaba-inc.com/vmcore_detail/20220527161949_172.16.3.8/
Expected results:
正常运行24h,无crash,hung及已知问题

Additional info:
Comment 1 cherryliyumei alibaba_cloud_group 2022-06-01 18:16:34 UTC
经owner评估,不影响发布