lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <59223446-251F-41A4-87ED-A37A181262CC@fb.com>
Date:   Tue, 31 Aug 2021 04:45:49 +0000
From:   Song Liu <songliubraving@...com>
To:     kernel test robot <oliver.sang@...el.com>
CC:     0day robot <lkp@...el.com>, LKML <linux-kernel@...r.kernel.org>,
        LKP <lkp@...ts.01.org>,
        "open list:BPF (Safe dynamic programs and tools)" 
        <bpf@...r.kernel.org>, Arnaldo Carvalho de Melo <acme@...nel.org>,
        "Peter Zijlstra" <peterz@...radead.org>,
        Ingo Molnar <mingo@...hat.com>,
        Kernel Team <Kernel-team@...com>
Subject: Re: [selftests/bpf]  8dff2c1958:
 BUG:using_smp_processor_id()in_preemptible



> On Aug 30, 2021, at 6:30 PM, kernel test robot <oliver.sang@...el.com> wrote:
> 
> 
> 
> Greeting,
> 
> FYI, we noticed the following commit (built with gcc-9):
> 
> commit: 8dff2c1958c234e90dff289a2034217b293985e4 ("[PATCH bpf-next 3/3] selftests/bpf: add test for bpf_get_branch_trace")
> url: https://github.com/0day-ci/linux/commits/Song-Liu/bpf-introduce-bpf_get_branch_trace/20210824-140315
> base: https://git.kernel.org/cgit/linux/kernel/git/bpf/bpf-next.git master
> 
> in testcase: kernel-selftests
> version: kernel-selftests-x86_64-ebaa603b-1_20210825
> with following parameters:
> 
> 	group: bpf
> 	ucode: 0xde
> 
> test-description: The kernel contains a set of "self tests" under the tools/testing/selftests/ directory. These are intended to be small unit tests to exercise individual code paths in the kernel.
> test-url: https://www.kernel.org/doc/Documentation/kselftest.txt
> 
> 
> on test machine: 4 threads 1 sockets Intel(R) Core(TM) i7-7567U CPU @ 3.50GHz with 32G memory
> 
> caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):
> 
> 
> 
> If you fix the issue, kindly add following tag
> Reported-by: kernel test robot <oliver.sang@...el.com>
> 
> 
> kern  :err   : [  136.592584] BUG: using smp_processor_id() in preemptible [00000000] code: test_progs/5262

hmm... I guess we need to move the call to after migrate_disable(). 


> kern :warn : [  136.593280] caller is intel_pmu_snapshot_branch_stack (arch/x86/events/intel/lbr.c:1868) 
> kern  :warn  : [  136.593811] CPU: 1 PID: 5262 Comm: test_progs Tainted: G        W  OE     5.14.0-rc5-01207-g8dff2c1958c2 #1
> kern  :warn  : [  136.594609] Hardware name: Intel Corporation NUC7i7BNH/NUC7i7BNB, BIOS BNKBL357.86A.0067.2018.0814.1500 08/14/2018
> kern  :warn  : [  136.595501] Call Trace:
> kern :warn : [  136.595776] dump_stack_lvl (lib/dump_stack.c:106) 
> kern :warn : [  136.596136] check_preemption_disabled (lib/smp_processor_id.c:49) 
> kern :warn : [  136.596565] intel_pmu_snapshot_branch_stack (arch/x86/events/intel/lbr.c:1868) 
> kern :warn : [  136.597024] __bpf_prog_enter (kernel/bpf/trampoline.c:577) 
> kern :warn : [  136.597434] bpf_trampoline_6442562768_0+0x3b/0x1000 
> kern :warn : [  136.597968] bpf_fexit_loop_test1 (net/bpf/test_run.c:236) 
> kern :warn : [  136.598331] bpf_prog_test_run_tracing (net/bpf/test_run.c:308) 
> kern :warn : [  136.598832] __sys_bpf (kernel/bpf/syscall.c:3307 kernel/bpf/syscall.c:4605) 
> kern :warn : [  136.599172] ? __sys_bpf (kernel/bpf/syscall.c:4629) 
> kern :warn : [  136.599575] __x64_sys_bpf (kernel/bpf/syscall.c:4689) 
> kern :warn : [  136.599962] do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80) 
> kern :warn : [  136.600293] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.600711] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.601122] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.601481] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.601880] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.602239] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.602639] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.603034] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.603403] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.603740] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.604111] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) 
> kern :warn : [  136.604560] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) 
> kern :warn : [  136.605018] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.605455] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:113) 
> kern  :warn  : [  136.605903] RIP: 0033:0x7f0fcbd69f59
> kern :warn : [ 136.606268] Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 07 6f 0c 00 f7 d8 64 89 01 48
> All code
> ========
>   0:	00 c3                	add    %al,%bl
>   2:	66 2e 0f 1f 84 00 00 	nopw   %cs:0x0(%rax,%rax,1)
>   9:	00 00 00 
>   c:	0f 1f 44 00 00       	nopl   0x0(%rax,%rax,1)
>  11:	48 89 f8             	mov    %rdi,%rax
>  14:	48 89 f7             	mov    %rsi,%rdi
>  17:	48 89 d6             	mov    %rdx,%rsi
>  1a:	48 89 ca             	mov    %rcx,%rdx
>  1d:	4d 89 c2             	mov    %r8,%r10
>  20:	4d 89 c8             	mov    %r9,%r8
>  23:	4c 8b 4c 24 08       	mov    0x8(%rsp),%r9
>  28:	0f 05                	syscall 
>  2a:*	48 3d 01 f0 ff ff    	cmp    $0xfffffffffffff001,%rax		<-- trapping instruction
>  30:	73 01                	jae    0x33
>  32:	c3                   	retq   
>  33:	48 8b 0d 07 6f 0c 00 	mov    0xc6f07(%rip),%rcx        # 0xc6f41
>  3a:	f7 d8                	neg    %eax
>  3c:	64 89 01             	mov    %eax,%fs:(%rcx)
>  3f:	48                   	rex.W
> 
> Code starting with the faulting instruction
> ===========================================
>   0:	48 3d 01 f0 ff ff    	cmp    $0xfffffffffffff001,%rax
>   6:	73 01                	jae    0x9
>   8:	c3                   	retq   
>   9:	48 8b 0d 07 6f 0c 00 	mov    0xc6f07(%rip),%rcx        # 0xc6f17
>  10:	f7 d8                	neg    %eax
>  12:	64 89 01             	mov    %eax,%fs:(%rcx)
>  15:	48                   	rex.W
> kern  :warn  : [  136.607706] RSP: 002b:00007ffd572256a8 EFLAGS: 00000202 ORIG_RAX: 0000000000000141
> kern  :warn  : [  136.608350] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0fcbd69f59
> kern  :warn  : [  136.609058] RDX: 0000000000000080 RSI: 00007ffd57225700 RDI: 000000000000000a
> kern  :warn  : [  136.609656] RBP: 00007ffd572256c0 R08: 0000000000000000 R09: 00007ffd57225700
> kern  :warn  : [  136.610260] R10: 0000000000000000 R11: 0000000000000202 R12: 0000562a6e61ddb0
> kern  :warn  : [  136.610920] R13: 00007ffd57225a20 R14: 0000000000000000 R15: 0000000000000000
> kern  :err   : [  136.611581] BUG: using smp_processor_id() in preemptible [00000000] code: test_progs/5262
> kern :warn : [  136.612259] caller is intel_pmu_lbr_disable_all (arch/x86/events/intel/lbr.c:780) 
> kern  :warn  : [  136.612817] CPU: 1 PID: 5262 Comm: test_progs Tainted: G        W  OE     5.14.0-rc5-01207-g8dff2c1958c2 #1
> kern  :warn  : [  136.613653] Hardware name: Intel Corporation NUC7i7BNH/NUC7i7BNB, BIOS BNKBL357.86A.0067.2018.0814.1500 08/14/2018
> kern  :warn  : [  136.614642] Call Trace:
> kern :warn : [  136.614904] dump_stack_lvl (lib/dump_stack.c:106) 
> kern :warn : [  136.615293] check_preemption_disabled (lib/smp_processor_id.c:49) 
> kern :warn : [  136.615759] intel_pmu_lbr_disable_all (arch/x86/events/intel/lbr.c:780) 
> kern :warn : [  136.616221] intel_pmu_snapshot_branch_stack (arch/x86/events/intel/lbr.c:1871) 
> kern :warn : [  136.616705] __bpf_prog_enter (kernel/bpf/trampoline.c:577) 
> kern :warn : [  136.617068] bpf_trampoline_6442562768_0+0x3b/0x1000 
> kern :warn : [  136.617528] bpf_fexit_loop_test1 (net/bpf/test_run.c:236) 
> kern :warn : [  136.617923] bpf_prog_test_run_tracing (net/bpf/test_run.c:308) 
> kern :warn : [  136.618367] __sys_bpf (kernel/bpf/syscall.c:3307 kernel/bpf/syscall.c:4605) 
> kern :warn : [  136.618692] ? __sys_bpf (kernel/bpf/syscall.c:4629) 
> kern :warn : [  136.619054] __x64_sys_bpf (kernel/bpf/syscall.c:4689) 
> kern :warn : [  136.619418] do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80) 
> kern :warn : [  136.619819] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.620237] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.620581] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.620976] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.621354] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.621695] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.622150] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.622491] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.622849] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.623262] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.623605] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) 
> kern :warn : [  136.624072] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) 
> kern :warn : [  136.624531] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.624930] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:113) 
> kern  :warn  : [  136.625417] RIP: 0033:0x7f0fcbd69f59
> kern :warn : [ 136.625835] Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 07 6f 0c 00 f7 d8 64 89 01 48
> All code
> ========
>   0:	00 c3                	add    %al,%bl
>   2:	66 2e 0f 1f 84 00 00 	nopw   %cs:0x0(%rax,%rax,1)
>   9:	00 00 00 
>   c:	0f 1f 44 00 00       	nopl   0x0(%rax,%rax,1)
>  11:	48 89 f8             	mov    %rdi,%rax
>  14:	48 89 f7             	mov    %rsi,%rdi
>  17:	48 89 d6             	mov    %rdx,%rsi
>  1a:	48 89 ca             	mov    %rcx,%rdx
>  1d:	4d 89 c2             	mov    %r8,%r10
>  20:	4d 89 c8             	mov    %r9,%r8
>  23:	4c 8b 4c 24 08       	mov    0x8(%rsp),%r9
>  28:	0f 05                	syscall 
>  2a:*	48 3d 01 f0 ff ff    	cmp    $0xfffffffffffff001,%rax		<-- trapping instruction
>  30:	73 01                	jae    0x33
>  32:	c3                   	retq   
>  33:	48 8b 0d 07 6f 0c 00 	mov    0xc6f07(%rip),%rcx        # 0xc6f41
>  3a:	f7 d8                	neg    %eax
>  3c:	64 89 01             	mov    %eax,%fs:(%rcx)
>  3f:	48                   	rex.W
> 
> Code starting with the faulting instruction
> ===========================================
>   0:	48 3d 01 f0 ff ff    	cmp    $0xfffffffffffff001,%rax
>   6:	73 01                	jae    0x9
>   8:	c3                   	retq   
>   9:	48 8b 0d 07 6f 0c 00 	mov    0xc6f07(%rip),%rcx        # 0xc6f17
>  10:	f7 d8                	neg    %eax
>  12:	64 89 01             	mov    %eax,%fs:(%rcx)
>  15:	48                   	rex.W
> kern  :warn  : [  136.627326] RSP: 002b:00007ffd572256a8 EFLAGS: 00000202 ORIG_RAX: 0000000000000141
> kern  :warn  : [  136.628018] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0fcbd69f59
> kern  :warn  : [  136.628623] RDX: 0000000000000080 RSI: 00007ffd57225700 RDI: 000000000000000a
> kern  :warn  : [  136.629262] RBP: 00007ffd572256c0 R08: 0000000000000000 R09: 00007ffd57225700
> kern  :warn  : [  136.629847] R10: 0000000000000000 R11: 0000000000000202 R12: 0000562a6e61ddb0
> kern  :warn  : [  136.630469] R13: 00007ffd57225a20 R14: 0000000000000000 R15: 0000000000000000
> kern  :err   : [  136.631171] BUG: using smp_processor_id() in preemptible [00000000] code: test_progs/5262
> kern :warn : [  136.631873] caller is intel_pmu_lbr_disable_all (arch/x86/events/intel/lbr.c:764 arch/x86/events/intel/lbr.c:782 arch/x86/events/intel/lbr.c:778) 
> kern  :warn  : [  136.632412] CPU: 1 PID: 5262 Comm: test_progs Tainted: G        W  OE     5.14.0-rc5-01207-g8dff2c1958c2 #1
> kern  :warn  : [  136.633255] Hardware name: Intel Corporation NUC7i7BNH/NUC7i7BNB, BIOS BNKBL357.86A.0067.2018.0814.1500 08/14/2018
> kern  :warn  : [  136.634100] Call Trace:
> kern :warn : [  136.634348] dump_stack_lvl (lib/dump_stack.c:106) 
> kern :warn : [  136.634741] check_preemption_disabled (lib/smp_processor_id.c:49) 
> kern :warn : [  136.635190] intel_pmu_lbr_disable_all (arch/x86/events/intel/lbr.c:764 arch/x86/events/intel/lbr.c:782 arch/x86/events/intel/lbr.c:778) 
> kern :warn : [  136.635611] intel_pmu_snapshot_branch_stack (arch/x86/events/intel/lbr.c:1871) 
> kern :warn : [  136.636065] __bpf_prog_enter (kernel/bpf/trampoline.c:577) 
> kern :warn : [  136.636466] bpf_trampoline_6442562768_0+0x3b/0x1000 
> kern :warn : [  136.636981] bpf_fexit_loop_test1 (net/bpf/test_run.c:236) 
> kern :warn : [  136.637347] bpf_prog_test_run_tracing (net/bpf/test_run.c:308) 
> kern :warn : [  136.637863] __sys_bpf (kernel/bpf/syscall.c:3307 kernel/bpf/syscall.c:4605) 
> kern :warn : [  136.638206] ? __sys_bpf (kernel/bpf/syscall.c:4629) 
> kern :warn : [  136.638582] __x64_sys_bpf (kernel/bpf/syscall.c:4689) 
> kern :warn : [  136.638944] do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80) 
> kern :warn : [  136.639273] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.639656] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.640054] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.640412] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.640810] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.641169] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.641568] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.641963] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.642343] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.642718] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.643075] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) 
> kern :warn : [  136.643575] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) 
> kern :warn : [  136.644033] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.644437] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:113) 
> kern  :warn  : [  136.644884] RIP: 0033:0x7f0fcbd69f59
> kern :warn : [ 136.645231] Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 07 6f 0c 00 f7 d8 64 89 01 48
> All code
> ========
>   0:	00 c3                	add    %al,%bl
>   2:	66 2e 0f 1f 84 00 00 	nopw   %cs:0x0(%rax,%rax,1)
>   9:	00 00 00 
>   c:	0f 1f 44 00 00       	nopl   0x0(%rax,%rax,1)
>  11:	48 89 f8             	mov    %rdi,%rax
>  14:	48 89 f7             	mov    %rsi,%rdi
>  17:	48 89 d6             	mov    %rdx,%rsi
>  1a:	48 89 ca             	mov    %rcx,%rdx
>  1d:	4d 89 c2             	mov    %r8,%r10
>  20:	4d 89 c8             	mov    %r9,%r8
>  23:	4c 8b 4c 24 08       	mov    0x8(%rsp),%r9
>  28:	0f 05                	syscall 
>  2a:*	48 3d 01 f0 ff ff    	cmp    $0xfffffffffffff001,%rax		<-- trapping instruction
>  30:	73 01                	jae    0x33
>  32:	c3                   	retq   
>  33:	48 8b 0d 07 6f 0c 00 	mov    0xc6f07(%rip),%rcx        # 0xc6f41
>  3a:	f7 d8                	neg    %eax
>  3c:	64 89 01             	mov    %eax,%fs:(%rcx)
>  3f:	48                   	rex.W
> 
> Code starting with the faulting instruction
> ===========================================
>   0:	48 3d 01 f0 ff ff    	cmp    $0xfffffffffffff001,%rax
>   6:	73 01                	jae    0x9
>   8:	c3                   	retq   
>   9:	48 8b 0d 07 6f 0c 00 	mov    0xc6f07(%rip),%rcx        # 0xc6f17
>  10:	f7 d8                	neg    %eax
>  12:	64 89 01             	mov    %eax,%fs:(%rcx)
>  15:	48                   	rex.W
> kern  :warn  : [  136.646685] RSP: 002b:00007ffd572256a8 EFLAGS: 00000202 ORIG_RAX: 0000000000000141
> kern  :warn  : [  136.647304] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0fcbd69f59
> kern  :warn  : [  136.647966] RDX: 0000000000000080 RSI: 00007ffd57225700 RDI: 000000000000000a
> kern  :warn  : [  136.648588] RBP: 00007ffd572256c0 R08: 0000000000000000 R09: 00007ffd57225700
> kern  :warn  : [  136.649246] R10: 0000000000000000 R11: 0000000000000202 R12: 0000562a6e61ddb0
> kern  :warn  : [  136.649869] R13: 00007ffd57225a20 R14: 0000000000000000 R15: 0000000000000000
> kern  :err   : [  136.650512] BUG: using smp_processor_id() in preemptible [00000000] code: test_progs/5262
> kern :warn : [  136.651226] caller is intel_pmu_lbr_read (arch/x86/events/intel/lbr.c:1003) 
> kern  :warn  : [  136.651691] CPU: 1 PID: 5262 Comm: test_progs Tainted: G        W  OE     5.14.0-rc5-01207-g8dff2c1958c2 #1
> kern  :warn  : [  136.652530] Hardware name: Intel Corporation NUC7i7BNH/NUC7i7BNB, BIOS BNKBL357.86A.0067.2018.0814.1500 08/14/2018
> kern  :warn  : [  136.653440] Call Trace:
> kern :warn : [  136.653762] dump_stack_lvl (lib/dump_stack.c:106) 
> kern :warn : [  136.654133] check_preemption_disabled (lib/smp_processor_id.c:49) 
> kern :warn : [  136.654603] intel_pmu_lbr_read (arch/x86/events/intel/lbr.c:1003) 
> kern :warn : [  136.654966] intel_pmu_snapshot_branch_stack (arch/x86/events/intel/lbr.c:1873) 
> kern :warn : [  136.655408] __bpf_prog_enter (kernel/bpf/trampoline.c:577) 
> kern :warn : [  136.655754] bpf_trampoline_6442562768_0+0x3b/0x1000 
> kern :warn : [  136.656180] bpf_fexit_loop_test1 (net/bpf/test_run.c:236) 
> kern :warn : [  136.656562] bpf_prog_test_run_tracing (net/bpf/test_run.c:308) 
> kern :warn : [  136.656992] __sys_bpf (kernel/bpf/syscall.c:3307 kernel/bpf/syscall.c:4605) 
> kern :warn : [  136.657332] ? __sys_bpf (kernel/bpf/syscall.c:4629) 
> kern :warn : [  136.657695] __x64_sys_bpf (kernel/bpf/syscall.c:4689) 
> kern :warn : [  136.658040] do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80) 
> kern :warn : [  136.658422] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.658856] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.659272] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.659613] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.660049] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.660406] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.660805] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.661220] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.661560] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.661919] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.662298] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) 
> kern :warn : [  136.662746] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) 
> kern :warn : [  136.663205] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.663605] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:113) 
> kern  :warn  : [  136.664051] RIP: 0033:0x7f0fcbd69f59
> kern :warn : [ 136.664383] Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 07 6f 0c 00 f7 d8 64 89 01 48
> All code
> ========
>   0:	00 c3                	add    %al,%bl
>   2:	66 2e 0f 1f 84 00 00 	nopw   %cs:0x0(%rax,%rax,1)
>   9:	00 00 00 
>   c:	0f 1f 44 00 00       	nopl   0x0(%rax,%rax,1)
>  11:	48 89 f8             	mov    %rdi,%rax
>  14:	48 89 f7             	mov    %rsi,%rdi
>  17:	48 89 d6             	mov    %rdx,%rsi
>  1a:	48 89 ca             	mov    %rcx,%rdx
>  1d:	4d 89 c2             	mov    %r8,%r10
>  20:	4d 89 c8             	mov    %r9,%r8
>  23:	4c 8b 4c 24 08       	mov    0x8(%rsp),%r9
>  28:	0f 05                	syscall 
>  2a:*	48 3d 01 f0 ff ff    	cmp    $0xfffffffffffff001,%rax		<-- trapping instruction
>  30:	73 01                	jae    0x33
>  32:	c3                   	retq   
>  33:	48 8b 0d 07 6f 0c 00 	mov    0xc6f07(%rip),%rcx        # 0xc6f41
>  3a:	f7 d8                	neg    %eax
>  3c:	64 89 01             	mov    %eax,%fs:(%rcx)
>  3f:	48                   	rex.W
> 
> Code starting with the faulting instruction
> ===========================================
>   0:	48 3d 01 f0 ff ff    	cmp    $0xfffffffffffff001,%rax
>   6:	73 01                	jae    0x9
>   8:	c3                   	retq   
>   9:	48 8b 0d 07 6f 0c 00 	mov    0xc6f07(%rip),%rcx        # 0xc6f17
>  10:	f7 d8                	neg    %eax
>  12:	64 89 01             	mov    %eax,%fs:(%rcx)
>  15:	48                   	rex.W
> kern  :warn  : [  136.665964] RSP: 002b:00007ffd572256a8 EFLAGS: 00000202 ORIG_RAX: 0000000000000141
> kern  :warn  : [  136.666650] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0fcbd69f59
> kern  :warn  : [  136.667271] RDX: 0000000000000080 RSI: 00007ffd57225700 RDI: 000000000000000a
> kern  :warn  : [  136.667893] RBP: 00007ffd572256c0 R08: 0000000000000000 R09: 00007ffd57225700
> kern  :warn  : [  136.668517] R10: 0000000000000000 R11: 0000000000000202 R12: 0000562a6e61ddb0
> kern  :warn  : [  136.669104] R13: 00007ffd57225a20 R14: 0000000000000000 R15: 0000000000000000
> kern  :err   : [  136.669728] BUG: using smp_processor_id() in preemptible [00000000] code: test_progs/5262
> kern :warn : [  136.670431] caller is intel_pmu_lbr_read (arch/x86/events/intel/lbr.c:764 arch/x86/events/intel/lbr.c:1011) 
> kern  :warn  : [  136.670867] CPU: 1 PID: 5262 Comm: test_progs Tainted: G        W  OE     5.14.0-rc5-01207-g8dff2c1958c2 #1
> kern  :warn  : [  136.671765] Hardware name: Intel Corporation NUC7i7BNH/NUC7i7BNB, BIOS BNKBL357.86A.0067.2018.0814.1500 08/14/2018
> kern  :warn  : [  136.672649] Call Trace:
> kern :warn : [  136.672912] dump_stack_lvl (lib/dump_stack.c:106) 
> kern :warn : [  136.673301] check_preemption_disabled (lib/smp_processor_id.c:49) 
> kern :warn : [  136.673765] intel_pmu_lbr_read (arch/x86/events/intel/lbr.c:764 arch/x86/events/intel/lbr.c:1011) 
> kern :warn : [  136.674149] intel_pmu_snapshot_branch_stack (arch/x86/events/intel/lbr.c:1873) 
> kern :warn : [  136.674604] __bpf_prog_enter (kernel/bpf/trampoline.c:577) 
> kern :warn : [  136.674968] bpf_trampoline_6442562768_0+0x3b/0x1000 
> kern :warn : [  136.675448] bpf_fexit_loop_test1 (net/bpf/test_run.c:236) 
> kern :warn : [  136.675865] bpf_prog_test_run_tracing (net/bpf/test_run.c:308) 
> kern :warn : [  136.676331] __sys_bpf (kernel/bpf/syscall.c:3307 kernel/bpf/syscall.c:4605) 
> kern :warn : [  136.676672] ? __sys_bpf (kernel/bpf/syscall.c:4629) 
> kern :warn : [  136.677067] __x64_sys_bpf (kernel/bpf/syscall.c:4689) 
> kern :warn : [  136.677413] do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80) 
> kern :warn : [  136.677799] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.678234] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.678597] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.678991] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.679388] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.679747] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.680146] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.680505] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.680863] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.681240] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.681582] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) 
> kern :warn : [  136.682043] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) 
> kern :warn : [  136.682503] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.682903] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:113) 
> kern  :warn  : [  136.683388] RIP: 0033:0x7f0fcbd69f59
> kern :warn : [ 136.683771] Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 07 6f 0c 00 f7 d8 64 89 01 48
> All code
> ========
>   0:	00 c3                	add    %al,%bl
>   2:	66 2e 0f 1f 84 00 00 	nopw   %cs:0x0(%rax,%rax,1)
>   9:	00 00 00 
>   c:	0f 1f 44 00 00       	nopl   0x0(%rax,%rax,1)
>  11:	48 89 f8             	mov    %rdi,%rax
>  14:	48 89 f7             	mov    %rsi,%rdi
>  17:	48 89 d6             	mov    %rdx,%rsi
>  1a:	48 89 ca             	mov    %rcx,%rdx
>  1d:	4d 89 c2             	mov    %r8,%r10
>  20:	4d 89 c8             	mov    %r9,%r8
>  23:	4c 8b 4c 24 08       	mov    0x8(%rsp),%r9
>  28:	0f 05                	syscall 
>  2a:*	48 3d 01 f0 ff ff    	cmp    $0xfffffffffffff001,%rax		<-- trapping instruction
>  30:	73 01                	jae    0x33
>  32:	c3                   	retq   
>  33:	48 8b 0d 07 6f 0c 00 	mov    0xc6f07(%rip),%rcx        # 0xc6f41
>  3a:	f7 d8                	neg    %eax
>  3c:	64 89 01             	mov    %eax,%fs:(%rcx)
>  3f:	48                   	rex.W
> 
> Code starting with the faulting instruction
> ===========================================
>   0:	48 3d 01 f0 ff ff    	cmp    $0xfffffffffffff001,%rax
>   6:	73 01                	jae    0x9
>   8:	c3                   	retq   
>   9:	48 8b 0d 07 6f 0c 00 	mov    0xc6f07(%rip),%rcx        # 0xc6f17
>  10:	f7 d8                	neg    %eax
>  12:	64 89 01             	mov    %eax,%fs:(%rcx)
>  15:	48                   	rex.W
> kern  :warn  : [  136.685257] RSP: 002b:00007ffd572256a8 EFLAGS: 00000202 ORIG_RAX: 0000000000000141
> kern  :warn  : [  136.685878] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0fcbd69f59
> kern  :warn  : [  136.686512] RDX: 0000000000000080 RSI: 00007ffd57225700 RDI: 000000000000000a
> kern  :warn  : [  136.687152] RBP: 00007ffd572256c0 R08: 0000000000000000 R09: 00007ffd57225700
> kern  :warn  : [  136.687739] R10: 0000000000000000 R11: 0000000000000202 R12: 0000562a6e61ddb0
> kern  :warn  : [  136.688399] R13: 00007ffd57225a20 R14: 0000000000000000 R15: 0000000000000000
> kern  :err   : [  136.689060] BUG: using smp_processor_id() in preemptible [00000000] code: test_progs/5262
> kern :warn : [  136.689760] caller is intel_pmu_snapshot_branch_stack (arch/x86/events/intel/lbr.c:1872) 
> kern  :warn  : [  136.690329] CPU: 1 PID: 5262 Comm: test_progs Tainted: G        W  OE     5.14.0-rc5-01207-g8dff2c1958c2 #1
> kern  :warn  : [  136.691130] Hardware name: Intel Corporation NUC7i7BNH/NUC7i7BNB, BIOS BNKBL357.86A.0067.2018.0814.1500 08/14/2018
> kern  :warn  : [  136.691976] Call Trace:
> kern :warn : [  136.692257] dump_stack_lvl (lib/dump_stack.c:106) 
> kern :warn : [  136.692645] check_preemption_disabled (lib/smp_processor_id.c:49) 
> kern :warn : [  136.693130] intel_pmu_snapshot_branch_stack (arch/x86/events/intel/lbr.c:1872) 
> kern :warn : [  136.693629] __bpf_prog_enter (kernel/bpf/trampoline.c:577) 
> kern :warn : [  136.694029] bpf_trampoline_6442562768_0+0x3b/0x1000 
> kern :warn : [  136.694472] bpf_fexit_loop_test1 (net/bpf/test_run.c:236) 
> kern :warn : [  136.694889] bpf_prog_test_run_tracing (net/bpf/test_run.c:308) 
> kern :warn : [  136.695319] __sys_bpf (kernel/bpf/syscall.c:3307 kernel/bpf/syscall.c:4605) 
> kern :warn : [  136.695693] ? __sys_bpf (kernel/bpf/syscall.c:4629) 
> kern :warn : [  136.696090] __x64_sys_bpf (kernel/bpf/syscall.c:4689) 
> kern :warn : [  136.696436] do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80) 
> kern :warn : [  136.696782] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.697181] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.697543] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.697937] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.698368] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.698762] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.699161] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.699556] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.699914] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.700291] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.700667] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) 
> kern :warn : [  136.701133] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) 
> kern :warn : [  136.701629] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.702029] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:113) 
> kern  :warn  : [  136.702478] RIP: 0033:0x7f0fcbd69f59
> kern :warn : [ 136.702824] Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 07 6f 0c 00 f7 d8 64 89 01 48
> All code
> ========
>   0:	00 c3                	add    %al,%bl
>   2:	66 2e 0f 1f 84 00 00 	nopw   %cs:0x0(%rax,%rax,1)
>   9:	00 00 00 
>   c:	0f 1f 44 00 00       	nopl   0x0(%rax,%rax,1)
>  11:	48 89 f8             	mov    %rdi,%rax
>  14:	48 89 f7             	mov    %rsi,%rdi
>  17:	48 89 d6             	mov    %rdx,%rsi
>  1a:	48 89 ca             	mov    %rcx,%rdx
>  1d:	4d 89 c2             	mov    %r8,%r10
>  20:	4d 89 c8             	mov    %r9,%r8
>  23:	4c 8b 4c 24 08       	mov    0x8(%rsp),%r9
>  28:	0f 05                	syscall 
>  2a:*	48 3d 01 f0 ff ff    	cmp    $0xfffffffffffff001,%rax		<-- trapping instruction
>  30:	73 01                	jae    0x33
>  32:	c3                   	retq   
>  33:	48 8b 0d 07 6f 0c 00 	mov    0xc6f07(%rip),%rcx        # 0xc6f41
>  3a:	f7 d8                	neg    %eax
>  3c:	64 89 01             	mov    %eax,%fs:(%rcx)
>  3f:	48                   	rex.W
> 
> Code starting with the faulting instruction
> ===========================================
>   0:	48 3d 01 f0 ff ff    	cmp    $0xfffffffffffff001,%rax
>   6:	73 01                	jae    0x9
>   8:	c3                   	retq   
>   9:	48 8b 0d 07 6f 0c 00 	mov    0xc6f07(%rip),%rcx        # 0xc6f17
>  10:	f7 d8                	neg    %eax
>  12:	64 89 01             	mov    %eax,%fs:(%rcx)
>  15:	48                   	rex.W
> kern  :warn  : [  136.704386] RSP: 002b:00007ffd572256a8 EFLAGS: 00000202 ORIG_RAX: 0000000000000141
> kern  :warn  : [  136.705038] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0fcbd69f59
> kern  :warn  : [  136.705625] RDX: 0000000000000080 RSI: 00007ffd57225700 RDI: 000000000000000a
> kern  :warn  : [  136.706267] RBP: 00007ffd572256c0 R08: 0000000000000000 R09: 00007ffd57225700
> kern  :warn  : [  136.706836] R10: 0000000000000000 R11: 0000000000000202 R12: 0000562a6e61ddb0
> kern  :warn  : [  136.707496] R13: 00007ffd57225a20 R14: 0000000000000000 R15: 0000000000000000
> kern  :err   : [  136.708104] BUG: using smp_processor_id() in preemptible [00000000] code: test_progs/5262
> kern :warn : [  136.708822] caller is intel_pmu_snapshot_branch_stack (arch/x86/events/intel/lbr.c:1875) 
> kern  :warn  : [  136.709398] CPU: 1 PID: 5262 Comm: test_progs Tainted: G        W  OE     5.14.0-rc5-01207-g8dff2c1958c2 #1
> kern  :warn  : [  136.710237] Hardware name: Intel Corporation NUC7i7BNH/NUC7i7BNB, BIOS BNKBL357.86A.0067.2018.0814.1500 08/14/2018
> kern  :warn  : [  136.711142] Call Trace:
> kern :warn : [  136.711429] dump_stack_lvl (lib/dump_stack.c:106) 
> kern :warn : [  136.711838] check_preemption_disabled (lib/smp_processor_id.c:49) 
> kern :warn : [  136.712273] intel_pmu_snapshot_branch_stack (arch/x86/events/intel/lbr.c:1875) 
> kern :warn : [  136.712764] __bpf_prog_enter (kernel/bpf/trampoline.c:577) 
> kern :warn : [  136.713127] bpf_trampoline_6442562768_0+0x3b/0x1000 
> kern :warn : [  136.713572] bpf_fexit_loop_test1 (net/bpf/test_run.c:236) 
> kern :warn : [  136.713953] bpf_prog_test_run_tracing (net/bpf/test_run.c:308) 
> kern :warn : [  136.714418] __sys_bpf (kernel/bpf/syscall.c:3307 kernel/bpf/syscall.c:4605) 
> kern :warn : [  136.714794] ? __sys_bpf (kernel/bpf/syscall.c:4629) 
> kern :warn : [  136.715214] __x64_sys_bpf (kernel/bpf/syscall.c:4689) 
> kern :warn : [  136.715539] do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80) 
> kern :warn : [  136.715887] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.716307] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.716651] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.717008] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.717407] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.717766] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.718179] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.718549] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.718906] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.719264] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.719623] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) 
> kern :warn : [  136.720089] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) 
> kern :warn : [  136.720585] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.721058] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:113) 
> kern  :warn  : [  136.721489] RIP: 0033:0x7f0fcbd69f59
> kern :warn : [ 136.721854] Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 07 6f 0c 00 f7 d8 64 89 01 48
> All code
> ========
>   0:	00 c3                	add    %al,%bl
>   2:	66 2e 0f 1f 84 00 00 	nopw   %cs:0x0(%rax,%rax,1)
>   9:	00 00 00 
>   c:	0f 1f 44 00 00       	nopl   0x0(%rax,%rax,1)
>  11:	48 89 f8             	mov    %rdi,%rax
>  14:	48 89 f7             	mov    %rsi,%rdi
>  17:	48 89 d6             	mov    %rdx,%rsi
>  1a:	48 89 ca             	mov    %rcx,%rdx
>  1d:	4d 89 c2             	mov    %r8,%r10
>  20:	4d 89 c8             	mov    %r9,%r8
>  23:	4c 8b 4c 24 08       	mov    0x8(%rsp),%r9
>  28:	0f 05                	syscall 
>  2a:*	48 3d 01 f0 ff ff    	cmp    $0xfffffffffffff001,%rax		<-- trapping instruction
>  30:	73 01                	jae    0x33
>  32:	c3                   	retq   
>  33:	48 8b 0d 07 6f 0c 00 	mov    0xc6f07(%rip),%rcx        # 0xc6f41
>  3a:	f7 d8                	neg    %eax
>  3c:	64 89 01             	mov    %eax,%fs:(%rcx)
>  3f:	48                   	rex.W
> 
> Code starting with the faulting instruction
> ===========================================
>   0:	48 3d 01 f0 ff ff    	cmp    $0xfffffffffffff001,%rax
>   6:	73 01                	jae    0x9
>   8:	c3                   	retq   
>   9:	48 8b 0d 07 6f 0c 00 	mov    0xc6f07(%rip),%rcx        # 0xc6f17
>  10:	f7 d8                	neg    %eax
>  12:	64 89 01             	mov    %eax,%fs:(%rcx)
>  15:	48                   	rex.W
> kern  :warn  : [  136.723348] RSP: 002b:00007ffd572256a8 EFLAGS: 00000202 ORIG_RAX: 0000000000000141
> kern  :warn  : [  136.724036] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0fcbd69f59
> kern  :warn  : [  136.724625] RDX: 0000000000000080 RSI: 00007ffd57225700 RDI: 000000000000000a
> kern  :warn  : [  136.725212] RBP: 00007ffd572256c0 R08: 0000000000000000 R09: 00007ffd57225700
> kern  :warn  : [  136.725798] R10: 0000000000000000 R11: 0000000000000202 R12: 0000562a6e61ddb0
> kern  :warn  : [  136.726457] R13: 00007ffd57225a20 R14: 0000000000000000 R15: 0000000000000000
> kern  :err   : [  136.727118] BUG: using smp_processor_id() in preemptible [00000000] code: test_progs/5262
> kern :warn : [  136.727822] caller is intel_pmu_lbr_enable_all (arch/x86/events/intel/lbr.c:772) 
> kern  :warn  : [  136.728317] CPU: 1 PID: 5262 Comm: test_progs Tainted: G        W  OE     5.14.0-rc5-01207-g8dff2c1958c2 #1
> kern  :warn  : [  136.729158] Hardware name: Intel Corporation NUC7i7BNH/NUC7i7BNB, BIOS BNKBL357.86A.0067.2018.0814.1500 08/14/2018
> kern  :warn  : [  136.730037] Call Trace:
> kern :warn : [  136.730301] dump_stack_lvl (lib/dump_stack.c:106) 
> kern :warn : [  136.730671] check_preemption_disabled (lib/smp_processor_id.c:49) 
> kern :warn : [  136.731121] intel_pmu_lbr_enable_all (arch/x86/events/intel/lbr.c:772) 
> kern :warn : [  136.731586] __bpf_prog_enter (kernel/bpf/trampoline.c:577) 
> kern :warn : [  136.731987] bpf_trampoline_6442562768_0+0x3b/0x1000 
> kern :warn : [  136.732467] bpf_fexit_loop_test1 (net/bpf/test_run.c:236) 
> kern :warn : [  136.732884] bpf_prog_test_run_tracing (net/bpf/test_run.c:308) 
> kern :warn : [  136.733335] __sys_bpf (kernel/bpf/syscall.c:3307 kernel/bpf/syscall.c:4605) 
> kern :warn : [  136.733656] ? __sys_bpf (kernel/bpf/syscall.c:4629) 
> kern :warn : [  136.734076] __x64_sys_bpf (kernel/bpf/syscall.c:4689) 
> kern :warn : [  136.734401] do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80) 
> kern :warn : [  136.734750] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.735204] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.735549] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.735906] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.736306] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.736665] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.737077] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.737416] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.737847] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.738204] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.738581] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) 
> kern :warn : [  136.739031] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) 
> kern :warn : [  136.739490] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.739921] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:113) 
> kern  :warn  : [  136.740400] RIP: 0033:0x7f0fcbd69f59
> kern :warn : [ 136.740784] Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 07 6f 0c 00 f7 d8 64 89 01 48
> All code
> ========
>   0:	00 c3                	add    %al,%bl
>   2:	66 2e 0f 1f 84 00 00 	nopw   %cs:0x0(%rax,%rax,1)
>   9:	00 00 00 
>   c:	0f 1f 44 00 00       	nopl   0x0(%rax,%rax,1)
>  11:	48 89 f8             	mov    %rdi,%rax
>  14:	48 89 f7             	mov    %rsi,%rdi
>  17:	48 89 d6             	mov    %rdx,%rsi
>  1a:	48 89 ca             	mov    %rcx,%rdx
>  1d:	4d 89 c2             	mov    %r8,%r10
>  20:	4d 89 c8             	mov    %r9,%r8
>  23:	4c 8b 4c 24 08       	mov    0x8(%rsp),%r9
>  28:	0f 05                	syscall 
>  2a:*	48 3d 01 f0 ff ff    	cmp    $0xfffffffffffff001,%rax		<-- trapping instruction
>  30:	73 01                	jae    0x33
>  32:	c3                   	retq   
>  33:	48 8b 0d 07 6f 0c 00 	mov    0xc6f07(%rip),%rcx        # 0xc6f41
>  3a:	f7 d8                	neg    %eax
>  3c:	64 89 01             	mov    %eax,%fs:(%rcx)
>  3f:	48                   	rex.W
> 
> Code starting with the faulting instruction
> ===========================================
>   0:	48 3d 01 f0 ff ff    	cmp    $0xfffffffffffff001,%rax
>   6:	73 01                	jae    0x9
>   8:	c3                   	retq   
>   9:	48 8b 0d 07 6f 0c 00 	mov    0xc6f07(%rip),%rcx        # 0xc6f17
>  10:	f7 d8                	neg    %eax
>  12:	64 89 01             	mov    %eax,%fs:(%rcx)
>  15:	48                   	rex.W
> kern  :warn  : [  136.742236] RSP: 002b:00007ffd572256a8 EFLAGS: 00000202 ORIG_RAX: 0000000000000141
> kern  :warn  : [  136.742870] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0fcbd69f59
> kern  :warn  : [  136.743514] RDX: 0000000000000080 RSI: 00007ffd57225700 RDI: 000000000000000a
> kern  :warn  : [  136.744099] RBP: 00007ffd572256c0 R08: 0000000000000000 R09: 00007ffd57225700
> kern  :warn  : [  136.744723] R10: 0000000000000000 R11: 0000000000000202 R12: 0000562a6e61ddb0
> kern  :warn  : [  136.745328] R13: 00007ffd57225a20 R14: 0000000000000000 R15: 0000000000000000
> kern  :err   : [  136.746006] BUG: using smp_processor_id() in preemptible [00000000] code: test_progs/5262
> kern :warn : [  136.746743] caller is intel_pmu_lbr_enable_all (arch/x86/events/intel/lbr.c:764 arch/x86/events/intel/lbr.c:774 arch/x86/events/intel/lbr.c:770) 
> kern  :warn  : [  136.747218] CPU: 1 PID: 5262 Comm: test_progs Tainted: G        W  OE     5.14.0-rc5-01207-g8dff2c1958c2 #1
> kern  :warn  : [  136.748040] Hardware name: Intel Corporation NUC7i7BNH/NUC7i7BNB, BIOS BNKBL357.86A.0067.2018.0814.1500 08/14/2018
> kern  :warn  : [  136.749026] Call Trace:
> kern :warn : [  136.749274] dump_stack_lvl (lib/dump_stack.c:106) 
> kern :warn : [  136.749627] check_preemption_disabled (lib/smp_processor_id.c:49) 
> kern :warn : [  136.750131] intel_pmu_lbr_enable_all (arch/x86/events/intel/lbr.c:764 arch/x86/events/intel/lbr.c:774 arch/x86/events/intel/lbr.c:770) 
> kern :warn : [  136.750538] __bpf_prog_enter (kernel/bpf/trampoline.c:577) 
> kern :warn : [  136.750938] bpf_trampoline_6442562768_0+0x3b/0x1000 
> kern :warn : [  136.751416] bpf_fexit_loop_test1 (net/bpf/test_run.c:236) 
> kern :warn : [  136.751797] bpf_prog_test_run_tracing (net/bpf/test_run.c:308) 
> kern :warn : [  136.752281] __sys_bpf (kernel/bpf/syscall.c:3307 kernel/bpf/syscall.c:4605) 
> kern :warn : [  136.752604] ? __sys_bpf (kernel/bpf/syscall.c:4629) 
> kern :warn : [  136.752966] __x64_sys_bpf (kernel/bpf/syscall.c:4689) 
> kern :warn : [  136.753311] do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80) 
> kern :warn : [  136.753658] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.754091] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.754453] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.754846] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.755245] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.755589] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.756007] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.756349] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.756795] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.757153] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.757511] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) 
> kern :warn : [  136.758011] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) 
> kern :warn : [  136.758471] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.758871] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:113) 
> kern  :warn  : [  136.759319] RIP: 0033:0x7f0fcbd69f59
> kern :warn : [ 136.759666] Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 07 6f 0c 00 f7 d8 64 89 01 48
> All code
> ========
>   0:	00 c3                	add    %al,%bl
>   2:	66 2e 0f 1f 84 00 00 	nopw   %cs:0x0(%rax,%rax,1)
>   9:	00 00 00 
>   c:	0f 1f 44 00 00       	nopl   0x0(%rax,%rax,1)
>  11:	48 89 f8             	mov    %rdi,%rax
>  14:	48 89 f7             	mov    %rsi,%rdi
>  17:	48 89 d6             	mov    %rdx,%rsi
>  1a:	48 89 ca             	mov    %rcx,%rdx
>  1d:	4d 89 c2             	mov    %r8,%r10
>  20:	4d 89 c8             	mov    %r9,%r8
>  23:	4c 8b 4c 24 08       	mov    0x8(%rsp),%r9
>  28:	0f 05                	syscall 
>  2a:*	48 3d 01 f0 ff ff    	cmp    $0xfffffffffffff001,%rax		<-- trapping instruction
>  30:	73 01                	jae    0x33
>  32:	c3                   	retq   
>  33:	48 8b 0d 07 6f 0c 00 	mov    0xc6f07(%rip),%rcx        # 0xc6f41
>  3a:	f7 d8                	neg    %eax
>  3c:	64 89 01             	mov    %eax,%fs:(%rcx)
>  3f:	48                   	rex.W
> 
> Code starting with the faulting instruction
> ===========================================
>   0:	48 3d 01 f0 ff ff    	cmp    $0xfffffffffffff001,%rax
>   6:	73 01                	jae    0x9
>   8:	c3                   	retq   
>   9:	48 8b 0d 07 6f 0c 00 	mov    0xc6f07(%rip),%rcx        # 0xc6f17
>  10:	f7 d8                	neg    %eax
>  12:	64 89 01             	mov    %eax,%fs:(%rcx)
>  15:	48                   	rex.W
> kern  :warn  : [  136.761174] RSP: 002b:00007ffd572256a8 EFLAGS: 00000202 ORIG_RAX: 0000000000000141
> kern  :warn  : [  136.761776] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0fcbd69f59
> kern  :warn  : [  136.762436] RDX: 0000000000000080 RSI: 00007ffd57225700 RDI: 000000000000000a
> kern  :warn  : [  136.763021] RBP: 00007ffd572256c0 R08: 0000000000000000 R09: 00007ffd57225700
> kern  :warn  : [  136.763680] R10: 0000000000000000 R11: 0000000000000202 R12: 0000562a6e61ddb0
> kern  :warn  : [  136.764266] R13: 00007ffd57225a20 R14: 0000000000000000 R15: 0000000000000000
> kern  :err   : [  136.764875] BUG: using smp_processor_id() in preemptible [00000000] code: test_progs/5262
> kern :warn : [  136.765626] caller is intel_pmu_lbr_enable_all (arch/x86/events/intel/lbr.c:190 arch/x86/events/intel/lbr.c:775 arch/x86/events/intel/lbr.c:770) 
> kern  :warn  : [  136.766173] CPU: 1 PID: 5262 Comm: test_progs Tainted: G        W  OE     5.14.0-rc5-01207-g8dff2c1958c2 #1
> kern  :warn  : [  136.767068] Hardware name: Intel Corporation NUC7i7BNH/NUC7i7BNB, BIOS BNKBL357.86A.0067.2018.0814.1500 08/14/2018
> kern  :warn  : [  136.767986] Call Trace:
> kern :warn : [  136.768248] dump_stack_lvl (lib/dump_stack.c:106) 
> kern :warn : [  136.768620] check_preemption_disabled (lib/smp_processor_id.c:49) 
> kern :warn : [  136.769141] intel_pmu_lbr_enable_all (arch/x86/events/intel/lbr.c:190 arch/x86/events/intel/lbr.c:775 arch/x86/events/intel/lbr.c:770) 
> kern :warn : [  136.769570] __bpf_prog_enter (kernel/bpf/trampoline.c:577) 
> kern :warn : [  136.769933] bpf_trampoline_6442562768_0+0x3b/0x1000 
> kern :warn : [  136.770407] bpf_fexit_loop_test1 (net/bpf/test_run.c:236) 
> kern :warn : [  136.770790] bpf_prog_test_run_tracing (net/bpf/test_run.c:308) 
> kern :warn : [  136.771237] __sys_bpf (kernel/bpf/syscall.c:3307 kernel/bpf/syscall.c:4605) 
> kern :warn : [  136.771594] ? __sys_bpf (kernel/bpf/syscall.c:4629) 
> kern :warn : [  136.771957] __x64_sys_bpf (kernel/bpf/syscall.c:4689) 
> kern :warn : [  136.772322] do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80) 
> kern :warn : [  136.772688] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.773087] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.773463] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.773803] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.774202] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.774563] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.774961] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.775320] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.775678] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.776035] ? do_syscall_64 (arch/x86/entry/common.c:87) 
> kern :warn : [  136.776424] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) 
> kern :warn : [  136.776962] ? asm_sysvec_apic_timer_interrupt (arch/x86/include/asm/idtentry.h:638) 
> kern :warn : [  136.777458] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4344) 
> kern :warn : [  136.777858] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:113) 
> kern  :warn  : [  136.778327] RIP: 0033:0x7f0fcbd69f59
> kern :warn : [ 136.778655] Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 07 6f 0c 00 f7 d8 64 89 01 48
> All code
> ========
>   0:	00 c3                	add    %al,%bl
>   2:	66 2e 0f 1f 84 00 00 	nopw   %cs:0x0(%rax,%rax,1)
>   9:	00 00 00 
>   c:	0f 1f 44 00 00       	nopl   0x0(%rax,%rax,1)
>  11:	48 89 f8             	mov    %rdi,%rax
>  14:	48 89 f7             	mov    %rsi,%rdi
>  17:	48 89 d6             	mov    %rdx,%rsi
>  1a:	48 89 ca             	mov    %rcx,%rdx
>  1d:	4d 89 c2             	mov    %r8,%r10
>  20:	4d 89 c8             	mov    %r9,%r8
>  23:	4c 8b 4c 24 08       	mov    0x8(%rsp),%r9
>  28:	0f 05                	syscall 
>  2a:*	48 3d 01 f0 ff ff    	cmp    $0xfffffffffffff001,%rax		<-- trapping instruction
>  30:	73 01                	jae    0x33
>  32:	c3                   	retq   
>  33:	48 8b 0d 07 6f 0c 00 	mov    0xc6f07(%rip),%rcx        # 0xc6f41
>  3a:	f7 d8                	neg    %eax
>  3c:	64 89 01             	mov    %eax,%fs:(%rcx)
>  3f:	48                   	rex.W
> 
> Code starting with the faulting instruction
> ===========================================
>   0:	48 3d 01 f0 ff ff    	cmp    $0xfffffffffffff001,%rax
>   6:	73 01                	jae    0x9
>   8:	c3                   	retq   
>   9:	48 8b 0d 07 6f 0c 00 	mov    0xc6f07(%rip),%rcx        # 0xc6f17
>  10:	f7 d8                	neg    %eax
>  12:	64 89 01             	mov    %eax,%fs:(%rcx)
>  15:	48                   	rex.W
> kern  :warn  : [  136.780125] RSP: 002b:00007ffd572256a8 EFLAGS: 00000202 ORIG_RAX: 0000000000000141
> kern  :warn  : [  136.780727] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0fcbd69f59
> kern  :warn  : [  136.781313] RDX: 0000000000000080 RSI: 00007ffd57225700 RDI: 000000000000000a
> kern  :warn  : [  136.781899] RBP: 00007ffd572256c0 R08: 0000000000000000 R09: 00007ffd57225700
> kern  :warn  : [  136.782535] R10: 0000000000000000 R11: 0000000000000202 R12: 0000562a6e61ddb0
> kern  :warn  : [  136.783177] R13: 00007ffd57225a20 R14: 0000000000000000 R15: 0000000000000000
> kern  :info  : [  138.164543] perf: interrupt took too long (3153 > 3143), lowering kernel.perf_event_max_sample_rate to 63000
> kern  :info  : [  138.165345] perf: interrupt took too long (3153 > 3143), lowering kernel.perf_event_max_sample_rate to 63000
> kern  :info  : [  138.166457] perf: interrupt took too long (3945 > 3941), lowering kernel.perf_event_max_sample_rate to 50000
> kern  :info  : [  138.168213] perf: interrupt took too long (4932 > 4931), lowering kernel.perf_event_max_sample_rate to 40000
> user  :notice: [  139.355105] # run_tests_skb_less:FAIL:ipv6-frag nhoff=0/14 thoff=0/62 addr_proto=0x0/0x86dd is_frag=0/1 is_first_frag=0/1 is_encap=0/0 ip_proto=0x0/0x6 n_proto=0x0/0xdd86 flow_label=0x0/0x0 sport=0/80 dport=0/8080
> 
> user  :notice: [  139.359537] # run_tests_skb_less:FAIL:ipv6-frag bpf_map_delete_elem -2
> 
> user  :notice: [  139.362850] # test_skb_less_link_create:PASS:bpf_link__destroy 0 nsec
> 
> user  :notice: [  139.364974] # #46 flow_dissector:FAIL
> 
> user  :notice: [  139.367223] # #47 flow_dissector_load_bytes:OK
> 
> user  :notice: [  139.370893] # #48/1 flow_dissector_reattach/flow dissector prog attach, prog attach (init_net):OK
> 
> user  :notice: [  139.375234] # #48/2 flow_dissector_reattach/flow dissector link create, link create (init_net):OK
> 
> user  :notice: [  139.379842] # #48/3 flow_dissector_reattach/flow dissector prog attach, link create (init_net):OK
> 
> user  :notice: [  139.382497] # #48/4 flow_dissector_reattach/flow dissector link create, prog attach (init_net):OK
> 
> user  :notice: [  139.385061] # #48/5 flow_dissector_reattach/flow dissector link create, prog detach (init_net):OK
> 
> user  :notice: [  139.387717] # #48/6 flow_dissector_reattach/flow dissector prog attach, detach, query (init_net):OK
> 
> user  :notice: [  139.390353] # #48/7 flow_dissector_reattach/flow dissector link create, close, query (init_net):OK
> 
> user  :notice: [  139.392961] # #48/8 flow_dissector_reattach/flow dissector link update no old prog (init_net):OK
> 
> user  :notice: [  139.395690] # #48/9 flow_dissector_reattach/flow dissector link update with replace old prog (init_net):OK
> 
> user  :notice: [  139.398424] # #48/10 flow_dissector_reattach/flow dissector link update with same prog (init_net):OK
> 
> user  :notice: [  139.401090] # #48/11 flow_dissector_reattach/flow dissector link update invalid opts (init_net):OK
> 
> user  :notice: [  139.403722] # #48/12 flow_dissector_reattach/flow dissector link update invalid prog (init_net):OK
> 
> user  :notice: [  139.406231] # #48/13 flow_dissector_reattach/flow dissector link update netns gone (init_net):OK
> 
> user  :notice: [  139.408610] # #48/14 flow_dissector_reattach/flow dissector link get info (init_net):OK
> 
> user  :notice: [  139.411035] # #48/15 flow_dissector_reattach/flow dissector prog attach, prog attach:OK
> 
> user  :notice: [  139.413359] # #48/16 flow_dissector_reattach/flow dissector link create, link create:OK
> 
> user  :notice: [  139.415751] # #48/17 flow_dissector_reattach/flow dissector prog attach, link create:OK
> 
> user  :notice: [  139.417999] # #48/18 flow_dissector_reattach/flow dissector link create, prog attach:OK
> 
> user  :notice: [  139.420432] # #48/19 flow_dissector_reattach/flow dissector link create, prog detach:OK
> 
> user  :notice: [  139.422821] # #48/20 flow_dissector_reattach/flow dissector prog attach, detach, query:OK
> 
> user  :notice: [  139.425174] # #48/21 flow_dissector_reattach/flow dissector link create, close, query:OK
> 
> user  :notice: [  139.427447] # #48/22 flow_dissector_reattach/flow dissector link update no old prog:OK
> 
> user  :notice: [  139.430055] # #48/23 flow_dissector_reattach/flow dissector link update with replace old prog:OK
> 
> user  :notice: [  139.432549] # #48/24 flow_dissector_reattach/flow dissector link update with same prog:OK
> 
> user  :notice: [  139.434965] # #48/25 flow_dissector_reattach/flow dissector link update invalid opts:OK
> 
> user  :notice: [  139.437261] # #48/26 flow_dissector_reattach/flow dissector link update invalid prog:OK
> 
> user  :notice: [  139.439471] # #48/27 flow_dissector_reattach/flow dissector link update netns gone:OK
> 
> user  :notice: [  139.441628] # #48/28 flow_dissector_reattach/flow dissector link get info:OK
> 
> user  :notice: [  139.443097] # #48 flow_dissector_reattach:OK
> 
> user  :notice: [  139.444238] # #49/1 for_each/hash_map:OK
> 
> user  :notice: [  139.445375] # #49/2 for_each/array_map:OK
> 
> user  :notice: [  139.446309] # #49 for_each:OK
> 
> user  :notice: [  139.448091] # test_get_branch_trace:PASS:get_branch_trace__open_and_load 0 nsec
> 
> user  :notice: [  139.449839] # test_get_branch_trace:PASS:kallsyms_find 0 nsec
> 
> 
> 
> To reproduce:
> 
>        git clone https://github.com/intel/lkp-tests.git
>        cd lkp-tests
>        bin/lkp install                job.yaml  # job file is attached in this email
>        bin/lkp split-job --compatible job.yaml  # generate the yaml file for lkp run
>        bin/lkp run                    generated-yaml-file
> 
> 
> 
> ---
> 0DAY/LKP+ Test Infrastructure                   Open Source Technology Center
> https://lists.01.org/hyperkitty/list/lkp@lists.01.org        Intel Corporation
> 
> Thanks,
> Oliver Sang
> 
> <config-5.14.0-rc5-01207-g8dff2c1958c2><job-script.txt><kmsg.xz><kernel-selftests.txt><job.yaml><reproduce.txt>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ