lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Wed, 13 May 2020 16:48:11 +0800
From:   kernel test robot <rong.a.chen@...el.com>
To:     Peter Zijlstra <peterz@...radead.org>
Cc:     x86@...nel.org, peterz@...radead.org, linux-kernel@...r.kernel.org,
        rostedt@...dmis.org, mhiramat@...nel.org, bristot@...hat.com,
        jbaron@...mai.com, torvalds@...ux-foundation.org,
        tglx@...utronix.de, mingo@...nel.org, namit@...are.com,
        hpa@...or.com, luto@...nel.org, ard.biesheuvel@...aro.org,
        jpoimboe@...hat.com, pbonzini@...hat.com,
        mathieu.desnoyers@...icios.com, lkp@...ts.01.org
Subject: [tracepoint] 01edfaf177:
 WARNING:at_kernel/static_call.c:#__static_call_update

Greeting,

FYI, we noticed the following commit (built with gcc-7):

commit: 01edfaf177311fba9941254793431d2044b00fd7 ("[PATCH v4 12/18] tracepoint: Optimize using static_call()")
url: https://github.com/0day-ci/linux/commits/Peter-Zijlstra/Add-static_call/20200502-045208


in testcase: boot

on test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 8G

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):




If you fix the issue, kindly add following tag
Reported-by: kernel test robot <rong.a.chen@...el.com>


[    1.990628] WARNING: CPU: 0 PID: 0 at kernel/static_call.c:113 __static_call_update+0x83/0x29c
[    1.990660] Modules linked in:
[    1.990703] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.7.0-rc3-next-20200501-00012-g01edfaf177311f #1
[    1.990742] RIP: 0010:__static_call_update+0x83/0x29c
[    1.990781] Code: 4c 89 f2 48 ff 05 d1 9d 83 06 e8 8e 09 d2 ff 48 ff 05 d5 9d 83 06 80 3d 8e a2 83 06 00 0f 85 f3 01 00 00 48 ff 05 c9 9d 83 06 <0f> 0b 48 ff 05 c8 9d 83 06 48 ff 05 c9 9d 83 06 e9 b0 01 00 00 48
[    1.990814] RSP: 0000:ffffffff83c07cf8 EFLAGS: 00010002
[    1.990850] RAX: 0000000000000000 RBX: ffffffff86682620 RCX: 0000000000000000
[    1.990884] RDX: fffffbfff0780f87 RSI: ffffffff83c918c0 RDI: fffffbfff0780f93
[    1.990916] RBP: ffffffff812943ec R08: fffffbfff07e3551 R09: fffffbfff07e3551
[    1.990950] R10: ffffffff83f1aa87 R11: 0000000000000001 R12: ffffffff83f6f0c0
[    1.990982] R13: 00000000ffffffff R14: ffffffff812943ec R15: ffffffff812943ec
[    1.991017] FS:  0000000000000000(0000) GS:ffff8881e8000000(0000) knlGS:0000000000000000
[    1.991049] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[    1.991081] CR2: ffff88823ffff000 CR3: 0000000003c78000 CR4: 00000000000006b0
[    1.991119] Call Trace:
[    1.991164]  ? __SCT__tp_func_sched_waking+0x8/0x8
[    1.991202]  ? allocate_probes+0x2d/0x4d
[    1.991250]  ? probe_sched_switch+0x4f/0x4f
[    1.991286]  ? __SCT__tp_func_sched_waking+0x8/0x8
[    1.991331]  ? probe_sched_switch+0x4f/0x4f
[    1.991366]  tracepoint_update_call+0x6d/0x79
[    1.991416]  tracepoint_probe_register_prio+0x337/0x47f
[    1.991499]  tracepoint_probe_register+0x16/0x1e
[    1.991538]  tracing_start_sched_switch+0xc3/0x1ba
[    1.991627]  tracing_start_cmdline_record+0x11/0x19
[    1.991664]  trace_printk_start_comm+0x1c/0x24
[    1.991725]  trace_event_init+0x1b8/0x20a
[    1.991775]  trace_init+0xc/0x14
[    1.991809]  start_kernel+0x8ed/0xe78
[    1.991862]  ? thread_stack_cache_init+0xd/0xd
[    1.991905]  ? __early_make_pgtable+0x1b9/0x204
[    1.991963]  ? early_make_pgtable+0x27/0x2f
[    1.992000]  ? early_idt_handler_common+0x35/0x4c
[    1.992131]  x86_64_start_reservations+0x42/0x4a
[    1.992170]  x86_64_start_kernel+0xe1/0xea
[    1.992216]  secondary_startup_64+0xa4/0xb0
[    1.992336] irq event stamp: 0
[    1.992371] hardirqs last  enabled at (0): [<0000000000000000>] 0x0
[    1.992403] hardirqs last disabled at (0): [<0000000000000000>] 0x0
[    1.992437] softirqs last  enabled at (0): [<0000000000000000>] 0x0
[    1.992469] softirqs last disabled at (0): [<0000000000000000>] 0x0
[    1.992562] ---[ end trace 15ea566c311b9aea ]---


To reproduce:

        # build kernel
	cd linux
	cp config-5.7.0-rc3-next-20200501-00012-g01edfaf177311f .config
	make HOSTCC=gcc-7 CC=gcc-7 ARCH=x86_64 olddefconfig prepare modules_prepare bzImage

        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        bin/lkp qemu -k <bzImage> job-script # job-script is attached in this email



Thanks,
Rong Chen


View attachment "config-5.7.0-rc3-next-20200501-00012-g01edfaf177311f" of type "text/plain" (142104 bytes)

View attachment "job-script" of type "text/plain" (4766 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (11180 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ