[<prev] [next>] [day] [month] [year] [list]
Message-ID: <202309051054.cc75bafb-oliver.sang@intel.com>
Date: Tue, 5 Sep 2023 10:49:54 +0800
From: kernel test robot <oliver.sang@...el.com>
To: Steven Rostedt <rostedt@...dmis.org>
CC: <oe-lkp@...ts.linux.dev>, <lkp@...el.com>,
<linux-kernel@...r.kernel.org>,
Masami Hiramatsu <mhiramat@...nel.org>,
<linux-trace-kernel@...r.kernel.org>, <oliver.sang@...el.com>
Subject: [linus:master] [tracing] 1d18538e6a:
WARNING:at_kernel/trace/trace_kprobe.c:#kprobe_trace_self_tests_init
Hello,
kernel test robot noticed "WARNING:at_kernel/trace/trace_kprobe.c:#kprobe_trace_self_tests_init" on:
commit: 1d18538e6a09265003a0a94ca779d7a6127cb76c ("tracing: Have dynamic events have a ref counter")
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master
[test failed on linus/master 0468be89b3fa5b9249cee1097f1d50314950a2df]
[test failed on linux-next/master a47fc304d2b678db1a5d760a7d644dac9b067752]
[test failed on fix commit 7249921d94ff64f67b733eca0b68853a62032b3d]
in testcase: boot
compiler: gcc-12
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G
(please refer to attached dmesg/kmsg for entire log/backtrace)
If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@...el.com>
| Closes: https://lore.kernel.org/oe-lkp/202309051054.cc75bafb-oliver.sang@intel.com
[ 635.235522][ T1] ------------[ cut here ]------------
[ 635.237065][ T1] WARNING: CPU: 0 PID: 1 at kernel/trace/trace_kprobe.c:2100 kprobe_trace_self_tests_init (kernel/trace/trace_kprobe.c:2100)
[ 635.238389][ T1] Modules linked in:
[ 635.238874][ T1] CPU: 0 PID: 1 Comm: swapper Not tainted 5.14.0-rc2-00045-g1d18538e6a09 #1
[ 635.239910][ T1] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
[ 635.241298][ T1] EIP: kprobe_trace_self_tests_init (kernel/trace/trace_kprobe.c:2100)
[ 635.242039][ T1] Code: fe b8 4b 3e d0 c1 fe 85 d0 c1 fe 85 0b 68 7d 3e 0b 68 7d 3e 88 47 ff b8 88 47 ff b8 e8 87 14 c2 e8 87 14 c2 74 35 0f 0b 74 35 <0f> 0b 81 e8 49 88 81 e8 49 88 62 bf fe 58 62 bf fe 58 00 ba 8a f9
All code
========
0: fe (bad)
1: b8 4b 3e d0 c1 mov $0xc1d03e4b,%eax
6: fe 85 d0 c1 fe 85 incb -0x7a013e30(%rbp)
c: 0b 68 7d or 0x7d(%rax),%ebp
f: 3e 0b 68 7d ds or 0x7d(%rax),%ebp
13: 3e 88 47 ff ds mov %al,-0x1(%rdi)
17: b8 88 47 ff b8 mov $0xb8ff4788,%eax
1c: e8 87 14 c2 e8 call 0xffffffffe8c214a8
21: 87 14 c2 xchg %edx,(%rdx,%rax,8)
24: 74 35 je 0x5b
26: 0f 0b ud2
28: 74 35 je 0x5f
2a:* 0f 0b ud2 <-- trapping instruction
2c: 81 e8 49 88 81 e8 sub $0xe8818849,%eax
32: 49 88 62 bf rex.WB mov %spl,-0x41(%r10)
36: fe (bad)
37: 58 pop %rax
38: 62 (bad)
39: bf fe 58 00 ba mov $0xba0058fe,%edi
3e: 8a f9 mov %cl,%bh
Code starting with the faulting instruction
===========================================
0: 0f 0b ud2
2: 81 e8 49 88 81 e8 sub $0xe8818849,%eax
8: 49 88 62 bf rex.WB mov %spl,-0x41(%r10)
c: fe (bad)
d: 58 pop %rax
e: 62 (bad)
f: bf fe 58 00 ba mov $0xba0058fe,%edi
14: 8a f9 mov %cl,%bh
[ 635.244386][ T1] EAX: fffffff0 EBX: 00000000 ECX: 00000000 EDX: 00000000
[ 635.245402][ T1] ESI: ee1d16c0 EDI: 00000000 EBP: 83c73f20 ESP: 83c73f18
[ 635.246304][ T1] DS: 007b ES: 007b FS: 0000 GS: 0000 SS: 0068 EFLAGS: 00010286
[ 635.247265][ T1] CR0: 80050033 CR2: 77eee844 CR3: 0257e000 CR4: 000406f0
[ 635.248166][ T1] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[ 635.249201][ T1] DR6: fffe0ff0 DR7: 00000400
[ 635.249789][ T1] Call Trace:
[ 635.250204][ T1] ? init_kprobe_trace (kernel/trace/trace_kprobe.c:1976)
[ 635.250861][ T1] do_one_initcall (init/main.c:1287)
[ 635.251460][ T1] ? lock_is_held (include/linux/lockdep.h:284)
[ 635.251993][ T1] ? rcu_read_lock_sched_held (kernel/rcu/update.c:125)
[ 635.252813][ T1] do_initcalls (init/main.c:1359 init/main.c:1376)
[ 635.253377][ T1] kernel_init_freeable (init/main.c:1602)
[ 635.253991][ T1] ? rest_init (init/main.c:1482)
[ 635.254526][ T1] kernel_init (init/main.c:1492)
[ 635.255052][ T1] ret_from_fork (arch/x86/entry/entry_32.S:775)
[ 635.255618][ T1] irq event stamp: 23945227
[ 635.256148][ T1] hardirqs last enabled at (23945235): console_unlock (arch/x86/include/asm/irqflags.h:45 (discriminator 1) arch/x86/include/asm/irqflags.h:80 (discriminator 1) arch/x86/include/asm/irqflags.h:140 (discriminator 1) kernel/printk/printk.c:2668 (discriminator 1))
[ 635.257407][ T1] hardirqs last disabled at (23945244): console_unlock (kernel/printk/printk.c:2589 (discriminator 3))
[ 635.258495][ T1] softirqs last enabled at (23883956): __do_softirq (arch/x86/include/asm/preempt.h:27 kernel/softirq.c:402 kernel/softirq.c:587)
[ 635.259587][ T1] softirqs last disabled at (23883945): do_softirq_own_stack (arch/x86/kernel/irq_32.c:60 arch/x86/kernel/irq_32.c:149)
[ 635.260899][ T1] ---[ end trace e6ccfb1eebc48ce3 ]---
[ 635.261605][ T1] trace_kprobe: error on cleaning up probes.
[ 635.262352][ T1] NG: Some tests are failed. Please check them.
The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20230905/202309051054.cc75bafb-oliver.sang@intel.com
--
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki
Powered by blists - more mailing lists