Description of problem: 在anolisos x86_64执行ltp冒烟测试产生crash: BUG: kernel NULL pointer dereference, address: 0000000000000000 Oops: 0010 [#1] SMP NOPTI vmcore-dmesg.txt部分日志: 【无start trace】 [25233.598157] Tasks state (memory values in pages): [25233.598158] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [25233.598161] [ 101552] 0 101552 2011 291 57344 0 0 memcg_process [25233.598162] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0-3,oom_memcg=/ltp_101470,task_memcg=/ltp_101470,task=memcg_process,pid=101552,uid=0 [25233.598562] oom_reaper: reaped process 101552 (memcg_process), now anon-rss:0kB, file-rss:0kB, shmem-rss:4kB [25234.195599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [25234.195679] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [25380.854119] BUG: kernel NULL pointer dereference, address: 0000000000000000 [25380.854121] #PF: supervisor instruction fetch in kernel mode [25380.854122] #PF: error_code(0x0010) - not-present page [25380.854123] PGD 0 P4D 0 [25380.854126] Oops: 0010 [#1] SMP NOPTI [25380.854129] CPU: 28 PID: 153 Comm: ksoftirqd/28 Kdump: loaded Tainted: G OE 5.10.84-10.3.an8.x86_64 #1 [25380.854130] Hardware name: Alibaba Cloud Alibaba Cloud ECS, BIOS 8c24b4c 04/01/2014 [25380.854140] RIP: 0010:0x0 [25380.854143] Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6. [25380.854143] RSP: 0018:ffff9b1c4cda7e08 EFLAGS: 00010282 [25380.854145] RAX: ffff8e2befacbc80 RBX: 000000000000003e RCX: 0000000080400016 [25380.854146] RDX: 0000000000000000 RSI: ffffffffa715c913 RDI: ffff8e2befacbc80 [25380.854147] RBP: 0000000000000000 R08: 0000000000000001 R09: ffffffffa715c900 [25380.854147] R10: ffff8e4652595600 R11: 0000000000000001 R12: 0000000000000000 [25380.854148] R13: ffff8e49c1d342c0 R14: ffffffffa715c93e R15: ffff8e49c1d34330 [25380.854151] FS: 0000000000000000(0000) GS:ffff8e49c1d00000(0000) knlGS:0000000000000000 [25380.854154] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [25380.854155] CR2: ffffffffffffffd6 CR3: 0000001baecd6000 CR4: 00000000003506e0 [25380.854155] Call Trace: [25380.854161] rcu_do_batch+0x163/0x450 [25380.854164] rcu_core+0x17d/0x2b0 [25380.854168] __do_softirq+0xc4/0x287 [25380.854171] ? sort_range+0x20/0x20 [25380.854173] run_ksoftirqd+0x1a/0x20 [25380.854188] smpboot_thread_fn+0xc5/0x160 [25380.854190] kthread+0x116/0x130 [25380.854192] ? __kthread_cancel_work+0x40/0x40 [25380.854195] ret_from_fork+0x22/0x30 [25380.854197] Modules linked in: brd(E) tun(E) n_gsm(E) pps_ldisc(E) ppp_synctty(E) n_hdlc(E) ppp_async(E) ppp_generic(E) slhc(E) salsa20_generic(E) msdos(E) binfmt_misc(E) sha3_generic(E) authenc(E) pcrypt(E) crypto_user(E) uinput(E) vsock_loopback(E) vmw_vsock_virtio_transport_common(E) vmw_vsock_vmci_transport(E) vsock(E) vmw_vmci(E) vfat(E) fat(E) xfs(E) libcrc32c(E) loop(E) veth(E) fuse(E) tcp_diag(E) inet_diag(E) rfkill(E) sunrpc(E) kvm_amd(E) ccp(E) mousedev(E) kvm(E) irqbypass(E) crct10dif_pclmul(E) crc32_pclmul(E) ghash_clmulni_intel(E) psmouse(E) i2c_piix4(E) virtio_balloon(E) pcspkr(E) ata_generic(E) cirrus(E) drm_kms_helper(E) syscopyarea(E) sysfillrect(E) sysimgblt(E) fb_sys_fops(E) virtio_net(E) ata_piix(E) drm(E) net_failover(E) crc32c_intel(E) serio_raw(E) failover(E) virtio_console(E) i2c_core(E) libata(E) [last unloaded: finit_module] [25380.854236] CR2: 0000000000000000 [25380.854238] ---[ end trace 3fa2f8b32e381c59 ]--- [25380.854239] RIP: 0010:0x0 [25380.854241] Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6. [25380.854242] RSP: 0018:ffff9b1c4cda7e08 EFLAGS: 00010282 [25380.854242] RAX: ffff8e2befacbc80 RBX: 000000000000003e RCX: 0000000080400016 [25380.854243] RDX: 0000000000000000 RSI: ffffffffa715c913 RDI: ffff8e2befacbc80 [25380.854244] RBP: 0000000000000000 R08: 0000000000000001 R09: ffffffffa715c900 [25380.854245] R10: ffff8e4652595600 R11: 0000000000000001 R12: 0000000000000000 [25380.854245] R13: ffff8e49c1d342c0 R14: ffffffffa715c93e R15: ffff8e49c1d34330 [25380.854247] FS: 0000000000000000(0000) GS:ffff8e49c1d00000(0000) knlGS:0000000000000000 [25380.854250] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [25380.854250] CR2: ffffffffffffffd6 CR3: 0000001baecd6000 CR4: 00000000003506e0 [25380.854252] Kernel panic - not syncing: Fatal exception in interrupt [25380.857036] Kernel Offset: 0x26000000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) 48643,16 Bot # cat /etc/image-id image_name="Anolis OS 8.4 ANCK 64 bit" image_id="anolisos_8_4_x64_20G_anck_alibase_20220518.vhd" release_date="20220518111246" Version-Release number of selected component (if applicable): 5.10.84-10.3.an8.x86_64 How reproducible: Steps to Reproduce: 1.git clone https://github.com/linux-test-project/ltp yum install gcc-c++ gcc git libaio* kernel-debuginfo -y --skip-broken cd ltp make autotools && ./configure && make && make install mkdir /disk1 wipefs -a --force /dev/vdb mkfs -t ext4 -q -F /dev/vdb mount -t ext4 /dev/vdb /disk1 mkdir -p /disk1/tmpdir/ltp lsblk mount | grep vdb cd /opt/ltp vim load.sh #!/bin/bash echo 1 > /proc/sys/kernel/panic echo 1 > /proc/sys/kernel/hardlockup_panic echo 1 > /proc/sys/kernel/softlockup_panic echo 50 > /proc/sys/kernel/watchdog_thresh echo 1200 > /proc/sys/kernel/hung_task_timeout_secs echo 0 > /proc/sys/kernel/hung_task_panic nr_cpu=$(nproc) mem_kb=$(grep ^MemTotal /proc/meminfo | awk '{print $2}') ./runltp \ -c $((nr_cpu / 2)) \ -m $((nr_cpu / 4)),4,$((mem_kb / nr_cpu / 2 * 1024)),1 \ -D $((nr_cpu / 10)),1,0,1 \ -i 2 \ -B ext4 \ -R -p -q \ -t 24h \ -d /disk1/tmpdir/ltp chmod +x load.sh nohup ./load.sh > t1.log & 2. 3. Actual results: 产生crash:http://vmcore.alibaba-inc.com/vmcore_detail/20220527161949_172.16.3.8/ Expected results: 正常运行24h,无crash,hung及已知问题 Additional info:
经owner评估,不影响发布