[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <eb17f8c6-3967-4a39-aaa3-0252950c9084@linaro.org>
Date: Thu, 4 Jan 2024 03:16:15 -0600
From: Daniel Díaz <daniel.diaz@...aro.org>
To: Greg Kroah-Hartman <gregkh@...uxfoundation.org>, stable@...r.kernel.org
Cc: patches@...ts.linux.dev, linux-kernel@...r.kernel.org,
torvalds@...ux-foundation.org, akpm@...ux-foundation.org,
linux@...ck-us.net, shuah@...nel.org, patches@...nelci.org,
lkft-triage@...ts.linaro.org, pavel@...x.de, jonathanh@...dia.com,
f.fainelli@...il.com, sudipm.mukherjee@...il.com, srw@...dewatkins.net,
rwarsow@....de, conor@...nel.org, allen.lkml@...il.com,
Francis Laniel <flaniel@...ux.microsoft.com>
Subject: Re: [PATCH 5.10 00/75] 5.10.206-rc1 review
Hello!
On 03/01/24 10:54 a. m., Greg Kroah-Hartman wrote:
> This is the start of the stable review cycle for the 5.10.206 release.
> There are 75 patches in this series, all will be posted as a response
> to this one. If anyone has any issues with these being applied, please
> let me know.
>
> Responses should be made by Fri, 05 Jan 2024 16:47:49 +0000.
> Anything received after that time might be too late.
>
> The whole patch series can be found in one patch at:
> https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.10.206-rc1.gz
> or in the git tree and branch at:
> git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.10.y
> and the diffstat can be found below.
>
> thanks,
>
> greg k-h
We're seeing a kernel warning on:
* Juno-r2
* Dragonboard 410c
* i386
that looks like this:
-----8<-----
------------[ cut here ]------------
[ 968.182348] WARNING: CPU: 2 PID: 16253 at kernel/module.c:261 module_kallsyms_on_each_symbol+0xaf/0xc0
[ 968.191666] Modules linked in: x86_pkg_temp_thermal fuse ip_tables
[ 968.197876] CPU: 2 PID: 16253 Comm: ftracetest Not tainted 5.10.206-rc1 #1
[ 968.204786] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
[ 968.212208] EIP: module_kallsyms_on_each_symbol+0xaf/0xc0
[ 968.217632] Code: 68 d9 75 a4 31 c0 8d 65 f4 5b 5e 5f 5d c3 8d 74 26 00 90 ba ff ff ff ff b8 38 36 68 d9 e8 e9 61 df 00 85 c0 0f 85 6f ff ff ff 0b e9 68 ff ff ff 8d b4 26 00 00 00 00 8d 76 00 3e 8d 74 26 00
[ 968.236389] EAX: 00000000 EBX: 00000001 ECX: ffffffff EDX: 00000001
[ 968.242700] ESI: c5839d68 EDI: 00025c3b EBP: c5839d54 ESP: c5839d3c
[ 968.249008] DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068 EFLAGS: 00010246
[ 968.255845] CR0: 80050033 CR2: 010d9b70 CR3: 05b30000 CR4: 003506d0
[ 968.262138] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[ 968.268413] DR6: fffe0ff0 DR7: 00000400
[ 968.272278] Call Trace:
[ 968.274817] ? show_regs.cold+0x14/0x1a
[ 968.278679] ? __warn+0x71/0x100
[ 968.281954] ? module_kallsyms_on_each_symbol+0xaf/0xc0
[ 968.287224] ? report_bug+0x7e/0xa0
[ 968.290736] ? exc_overflow+0x40/0x40
[ 968.294452] ? handle_bug+0x2a/0x50
[ 968.297971] ? exc_invalid_op+0x1b/0x60
[ 968.301836] ? handle_exception+0x140/0x140
[ 968.306052] ? module_kallsyms_on_each_symbol+0xaf/0xc0
[ 968.311310] ? exc_overflow+0x40/0x40
[ 968.314999] ? module_kallsyms_on_each_symbol+0xaf/0xc0
[ 968.320252] ? trace_kprobe_run_command+0x20/0x20
[ 968.324970] ? trace_kprobe_run_command+0x20/0x20
[ 968.329720] kallsyms_on_each_symbol+0xc1/0xd0
[ 968.334195] ? trace_kprobe_run_command+0x20/0x20
[ 968.338939] trace_kprobe_create+0x5fd/0xb20
[ 968.343243] ? alloc_trace_kprobe+0x130/0x130
[ 968.347628] create_dyn_event+0x57/0xc0
[ 968.351495] ? dyn_event_release+0x140/0x140
[ 968.355791] trace_run_command+0x69/0x80
[ 968.359754] trace_parse_run_command+0x97/0x130
[ 968.364339] ? dyn_event_seq_next+0x20/0x20
[ 968.368549] dyn_event_write+0x10/0x20
[ 968.372328] ? dyn_event_release+0x140/0x140
[ 968.376611] vfs_write+0xe5/0x500
[ 968.379973] ? lock_acquire+0x8c/0x230
[ 968.383752] ? __might_fault+0x31/0x70
[ 968.387545] ? find_held_lock+0x24/0x80
[ 968.391414] ksys_write+0x72/0xf0
[ 968.394759] __ia32_sys_write+0x15/0x20
[ 968.398621] __do_fast_syscall_32+0x54/0xa0
[ 968.402838] do_fast_syscall_32+0x29/0x60
[ 968.406868] do_SYSENTER_32+0x15/0x20
[ 968.410547] entry_SYSENTER_32+0x9f/0xf2
[ 968.414497] EIP: 0xb7f85549
[ 968.417309] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 5a 59 c3 90 90 90 90 8d 76 00 58 b8 77 00 00 00 cd 80 90 8d 76
[ 968.436081] EAX: ffffffda EBX: 00000001 ECX: 010ccdc0 EDX: 00000018
[ 968.442371] ESI: b7f6aff4 EDI: 010ccdc0 EBP: 0044c4fc ESP: bfd964c0
[ 968.448664] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b EFLAGS: 00000246
[ 968.455478] irq event stamp: 77487
[ 968.458912] hardirqs last enabled at (77497): [] console_unlock+0x589/0x5a0
[ 968.466837] hardirqs last disabled at (77506): [] console_unlock+0x41d/0x5a0
[ 968.474799] softirqs last enabled at (77474): [] call_on_stack+0x45/0x50
[ 968.482480] softirqs last disabled at (77469): [] call_on_stack+0x45/0x50
[ 968.490183] ---[ end trace 444b2433ce3c8b30 ]---
----->8-----
and this:
-----8<-----
------------[ cut here ]------------
[ 418.955406] WARNING: CPU: 1 PID: 10942 at kernel/module.c:261 module_assert_mutex+0x3c/0x50
[ 418.963777] Modules linked in: tda998x cec drm_kms_helper crct10dif_ce fuse drm dm_mod ip_tables x_tables
[ 418.973433] CPU: 1 PID: 10942 Comm: ftracetest Not tainted 5.10.206-rc1 #1
[ 418.980324] Hardware name: ARM Juno development board (r2) (DT)
[ 418.986261] pstate: 60000005 (nZCv daif -PAN -UAO -TCO BTYPE=--)
[ 418.992284] pc : module_assert_mutex+0x3c/0x50
[ 418.996739] lr : module_assert_mutex+0x38/0x50
[ 419.001192] sp : ffff80001cd03a90
[ 419.004515] x29: ffff80001cd03a90 x28: 0000000000000018
[ 419.009853] x27: 0000000000000002 x26: ffff0008324a6f80
[ 419.015189] x25: 0000000000000006 x24: ffff800012819678
[ 419.020525] x23: ffff0008324a6608 x22: ffff800010229bd0
[ 419.025861] x21: ffff800010229bd0 x20: ffff80001cd03c68
[ 419.031196] x19: 0000000000000000 x18: 0000000000000000
[ 419.036531] x17: 0000000000000000 x16: 0000000000000000
[ 419.041867] x15: 0000aaab20142c50 x14: 0000000000000028
[ 419.047202] x13: 0000000000000002 x12: 0000000000000003
[ 419.052538] x11: 0000000000000002 x10: 0101010101010101
[ 419.057873] x9 : ffff80001019b11c x8 : 7f7f7f7f7f7f7f7f
[ 419.063209] x7 : 625e6b646d71646a x6 : 34001c0a651c383c
[ 419.068544] x5 : 3c381c650a1c0034 x4 : 0000000000000000
[ 419.073880] x3 : 7d95b99001c19d7c x2 : ffff80096cfc9000
[ 419.079215] x1 : 0000000000000000 x0 : 0000000000000000
[ 419.084551] Call trace:
[ 419.087005] module_assert_mutex+0x3c/0x50
[ 419.091114] module_kallsyms_on_each_symbol+0x2c/0x100
[ 419.096267] kallsyms_on_each_symbol+0xe0/0x120
[ 419.100812] trace_kprobe_create+0x4e4/0x9d0
[ 419.105095] create_dyn_event+0x80/0xf0
[ 419.108943] trace_run_command+0x90/0xac
[ 419.112877] trace_parse_run_command+0x120/0x4c0
[ 419.117506] dyn_event_write+0x18/0x24
[ 419.121267] vfs_write+0xec/0x20c
[ 419.124592] ksys_write+0x78/0x110
[ 419.128004] __arm64_sys_write+0x24/0x30
[ 419.131939] el0_svc_common.constprop.0+0x84/0x1e0
[ 419.136743] do_el0_svc+0x2c/0xa4
[ 419.140069] el0_svc+0x20/0x30
[ 419.143132] el0_sync_handler+0xe8/0x114
[ 419.147065] el0_sync+0x180/0x1c0
[ 419.150387] irq event stamp: 48184
[ 419.153800] hardirqs last enabled at (48183): [] exit_to_kernel_mode+0x38/0x180
[ 419.162781] hardirqs last disabled at (48184): [] el1_dbg+0x24/0x50
[ 419.170630] softirqs last enabled at (48168): [] __do_softirq+0x4dc/0x564
[ 419.179091] softirqs last disabled at (48153): [] __irq_exit_rcu+0x170/0x194
[ 419.187721] ---[ end trace 2989cd52be73b559 ]---
------------[ cut here ]------------
[ 419.263431] WARNING: CPU: 2 PID: 10942 at kernel/module.c:261 module_assert_mutex+0x3c/0x50
[ 419.271801] Modules linked in: tda998x cec drm_kms_helper crct10dif_ce fuse drm dm_mod ip_tables x_tables
[ 419.281457] CPU: 2 PID: 10942 Comm: ftracetest Tainted: G W 5.10.206-rc1 #1
[ 419.289740] Hardware name: ARM Juno development board (r2) (DT)
[ 419.295676] pstate: 60000005 (nZCv daif -PAN -UAO -TCO BTYPE=--)
[ 419.301698] pc : module_assert_mutex+0x3c/0x50
[ 419.306154] lr : module_assert_mutex+0x38/0x50
[ 419.310607] sp : ffff80001cd03a90
[ 419.313930] x29: ffff80001cd03a90 x28: 0000000000000018
[ 419.319267] x27: 0000000000000002 x26: ffff000831f8d500
[ 419.324603] x25: 0000000000000007 x24: ffff800012819678
[ 419.329939] x23: ffff000831f8d608 x22: ffff800010229bd0
[ 419.335275] x21: ffff800010229bd0 x20: ffff80001cd03c68
[ 419.340610] x19: 0000000000000000 x18: 0000000000000000
[ 419.345946] x17: 0000000000000000 x16: 0000000000000000
[ 419.351281] x15: 0000aaab20142c50 x14: 000000000003fffd
[ 419.356616] x13: 0000000000000038 x12: 0000000000000038
[ 419.361951] x11: 0000000000000002 x10: 0101010101010101
[ 419.367287] x9 : ffff80001019b11c x8 : 7f7f7f7f7f7f7f7f
[ 419.372622] x7 : 625e6b646d71646a x6 : 34001c0a651c383c
[ 419.377958] x5 : 3c381c650a1c0034 x4 : 0000000000000000
[ 419.383293] x3 : 7d95b99001c19d7c x2 : ffff80096cfeb000
[ 419.388628] x1 : 0000000000000000 x0 : 0000000000000000
[ 419.393964] Call trace:
[ 419.396419] module_assert_mutex+0x3c/0x50
[ 419.400527] module_kallsyms_on_each_symbol+0x2c/0x100
[ 419.405679] kallsyms_on_each_symbol+0xe0/0x120
[ 419.410225] trace_kprobe_create+0x4e4/0x9d0
[ 419.414507] create_dyn_event+0x80/0xf0
[ 419.418355] trace_run_command+0x90/0xac
[ 419.422289] trace_parse_run_command+0x120/0x4c0
[ 419.426918] dyn_event_write+0x18/0x24
[ 419.430683] vfs_write+0xec/0x20c
[ 419.434007] ksys_write+0x78/0x110
[ 419.437419] __arm64_sys_write+0x24/0x30
[ 419.441354] el0_svc_common.constprop.0+0x84/0x1e0
[ 419.446159] do_el0_svc+0x2c/0xa4
[ 419.449486] el0_svc+0x20/0x30
[ 419.452549] el0_sync_handler+0xe8/0x114
[ 419.456482] el0_sync+0x180/0x1c0
[ 419.459805] irq event stamp: 48666
[ 419.463218] hardirqs last enabled at (48665): [] exit_to_kernel_mode+0x38/0x180
[ 419.472199] hardirqs last disabled at (48666): [] el1_dbg+0x24/0x50
[ 419.480048] softirqs last enabled at (48664): [] __do_softirq+0x4dc/0x564
[ 419.488508] softirqs last disabled at (48659): [] __irq_exit_rcu+0x170/0x194
[ 419.497139] ---[ end trace 2989cd52be73b55a ]---
----->8-----
Test execution:
https://lkft.validation.linaro.org/scheduler/job/7142331
Bisections (Arm64 and x86) point to:
commit 47808d93a0cd0bb7358d9ef141e85216a4b86ef4
Author: Francis Laniel <flaniel@...ux.microsoft.com>
Date: Fri Oct 20 13:42:49 2023 +0300
tracing/kprobes: Return EADDRNOTAVAIL when func matches several symbols
commit b022f0c7e404887a7c5229788fc99eff9f9a80d5 upstream.
Reverting made the warning disappear on both Arm64 and i386.
Reported-by: Linux Kernel Functional Testing <lkft@...aro.org>
Greetings!
Daniel Díaz
daniel.diaz@...aro.org
Powered by blists - more mailing lists