lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <202309041211.4f7e4d51-oliver.sang@intel.com>
Date:   Mon, 4 Sep 2023 13:26:37 +0800
From:   kernel test robot <oliver.sang@...el.com>
To:     Tom Zanussi <zanussi@...nel.org>
CC:     <oe-lkp@...ts.linux.dev>, <lkp@...el.com>,
        <linux-kernel@...r.kernel.org>,
        Steven Rostedt <rostedt@...dmis.org>,
        <linux-trace-kernel@...r.kernel.org>, <oliver.sang@...el.com>
Subject: [linus:master] [tracing]  726721a518:
 WARNING:at_kernel/trace/trace_events.c:#event_trace_self_tests



Hello,

kernel test robot noticed "WARNING:at_kernel/trace/trace_events.c:#event_trace_self_tests" on:

commit: 726721a51838e3983023f906580722fc83f804ee ("tracing: Move synthetic events to a separate file")
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master

[test failed on linus/master 99d99825fc075fd24b60cc9cf0fb1e20b9c16b0f]
[test failed on linux-next/master a47fc304d2b678db1a5d760a7d644dac9b067752]
[test failed on fix commit 6c95503c292610ff2898b4271c510c16efdcd4e1]

in testcase: boot

compiler: clang-16
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G

(please refer to attached dmesg/kmsg for entire log/backtrace)


+----------------------------------------------------------------+------------+------------+
|                                                                | 5bbf959de4 | 726721a518 |
+----------------------------------------------------------------+------------+------------+
| WARNING:at_kernel/trace/trace_events.c:#event_trace_self_tests | 0          | 20         |
| RIP:event_trace_self_tests                                     | 0          | 20         |
+----------------------------------------------------------------+------------+------------+


If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@...el.com>
| Closes: https://lore.kernel.org/oe-lkp/202309041211.4f7e4d51-oliver.sang@intel.com


[   38.032327][    T1] ------------[ cut here ]------------
[ 38.033043][ T1] WARNING: CPU: 0 PID: 1 at kernel/trace/trace_events.c:3579 event_trace_self_tests (kernel/trace/trace_events.c:3578) 
[   38.034342][    T1] Modules linked in:
[   38.034833][    T1] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 5.7.0-rc6-00009-g726721a51838e #1
[ 38.035931][ T1] RIP: 0010:event_trace_self_tests (kernel/trace/trace_events.c:3578) 
[ 38.036698][ T1] Code: 00 4c 89 f7 31 f6 31 d2 e8 be 86 4f fd 48 c7 c7 a0 a2 e0 82 e8 71 79 96 fe e9 2d fe ff ff 48 c7 c7 40 a2 e0 82 e8 60 79 96 fe <0f> 0b e9 1a fe ff ff 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 2b ff ff
All code
========
   0:	00 4c 89 f7          	add    %cl,-0x9(%rcx,%rcx,4)
   4:	31 f6                	xor    %esi,%esi
   6:	31 d2                	xor    %edx,%edx
   8:	e8 be 86 4f fd       	call   0xfffffffffd4f86cb
   d:	48 c7 c7 a0 a2 e0 82 	mov    $0xffffffff82e0a2a0,%rdi
  14:	e8 71 79 96 fe       	call   0xfffffffffe96798a
  19:	e9 2d fe ff ff       	jmp    0xfffffffffffffe4b
  1e:	48 c7 c7 40 a2 e0 82 	mov    $0xffffffff82e0a240,%rdi
  25:	e8 60 79 96 fe       	call   0xfffffffffe96798a
  2a:*	0f 0b                	ud2		<-- trapping instruction
  2c:	e9 1a fe ff ff       	jmp    0xfffffffffffffe4b
  31:	89 f9                	mov    %edi,%ecx
  33:	80 e1 07             	and    $0x7,%cl
  36:	80 c1 03             	add    $0x3,%cl
  39:	38 c1                	cmp    %al,%cl
  3b:	0f                   	.byte 0xf
  3c:	8c 2b                	mov    %gs,(%rbx)
  3e:	ff                   	(bad)
  3f:	ff                   	.byte 0xff

Code starting with the faulting instruction
===========================================
   0:	0f 0b                	ud2
   2:	e9 1a fe ff ff       	jmp    0xfffffffffffffe21
   7:	89 f9                	mov    %edi,%ecx
   9:	80 e1 07             	and    $0x7,%cl
   c:	80 c1 03             	add    $0x3,%cl
   f:	38 c1                	cmp    %al,%cl
  11:	0f                   	.byte 0xf
  12:	8c 2b                	mov    %gs,(%rbx)
  14:	ff                   	(bad)
  15:	ff                   	.byte 0xff
[   38.039936][    T1] RSP: 0000:ffffc9000002fd28 EFLAGS: 00010246
[   38.040690][    T1] RAX: 000000000000001f RBX: 1ffff110692b1a13 RCX: 5cd88e2e3e192400
[   38.041751][    T1] RDX: dffffc0000000000 RSI: 0000000000000006 RDI: 0000000000000246
[   38.042766][    T1] RBP: ffff88834958d090 R08: ffff8883a00fccd4 R09: ffff8883a00fcd0c
[   38.043757][    T1] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88834958d038
[   38.044754][    T1] R13: dffffc0000000000 R14: ffff8883a0abfbb8 R15: ffff8883a0abfc00
[   38.045753][    T1] FS:  0000000000000000(0000) GS:ffff8883a2600000(0000) knlGS:0000000000000000
[   38.046834][    T1] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   38.047635][    T1] CR2: 0000000000000000 CR3: 0000000003414000 CR4: 00000000000406f0
[   38.048622][    T1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   38.049668][    T1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   38.050655][    T1] Call Trace:
[ 38.051097][ T1] event_trace_self_tests_init (kernel/trace/trace_events.c:3722) 
[ 38.051812][ T1] do_one_initcall (init/main.c:1196) 
[ 38.052414][ T1] ? event_trace_enable (kernel/trace/trace_events.c:3720) 
[ 38.053076][ T1] ? parameq (include/linux/string.h:303 kernel/params.c:97) 
[ 38.053580][ T1] ? do_initcall_level (init/main.c:1254) 
[ 38.054207][ T1] ? parse_args (kernel/params.c:153) 
[ 38.054768][ T1] ? rcu_read_lock_sched_held (include/linux/lockdep.h:406 kernel/rcu/update.c:121) 
[ 38.055461][ T1] do_initcall_level (init/main.c:1268) 
[ 38.056080][ T1] do_initcalls (init/main.c:1282) 
[ 38.056625][ T1] kernel_init_freeable (init/main.c:1491) 
[ 38.057825][ T1] ? rest_init (init/main.c:1393) 
[ 38.058411][ T1] kernel_init (init/main.c:1398) 
[ 38.058947][ T1] ? rest_init (init/main.c:1393) 
[ 38.059515][ T1] ret_from_fork (arch/x86/entry/entry_64.S:357) 
[   38.060075][    T1] irq event stamp: 4794060
[ 38.060625][ T1] hardirqs last enabled at (4794059): console_unlock (arch/x86/include/asm/paravirt.h:759 kernel/printk/printk.c:2527) 
[ 38.061824][ T1] hardirqs last disabled at (4794060): trace_hardirqs_off_thunk (arch/x86/entry/thunk_64.S:42) 
[ 38.063131][ T1] softirqs last enabled at (4793252): __do_softirq (arch/x86/include/asm/preempt.h:26 kernel/softirq.c:320) 
[ 38.064320][ T1] softirqs last disabled at (4793245): irq_exit (kernel/softirq.c:373) 
[   38.065481][    T1] ---[ end trace af295442fa96db7c ]---
[   38.066228][    T1] Testing event empty_synth_test:
[   38.066230][    T1] Enabled event during self test!
[   38.067535][    T1] Testing event gen_synth_test:
[   38.067536][    T1] Enabled event during self test!
[   38.068811][    T1] Testing event initcall_level: OK



The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20230904/202309041211.4f7e4d51-oliver.sang@intel.com



-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki



View attachment "config-5.7.0-rc6-00009-g726721a51838e" of type "text/plain" (109992 bytes)

View attachment "job-script" of type "text/plain" (4939 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (21096 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ