lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <202412242355.7e1a8e45-lkp@intel.com>
Date: Tue, 24 Dec 2024 23:14:40 +0800
From: kernel test robot <oliver.sang@...el.com>
To: Steven Rostedt <rostedt@...dmis.org>
CC: <oe-lkp@...ts.linux.dev>, <lkp@...el.com>, <linux-kernel@...r.kernel.org>,
	Masami Hiramatsu <mhiramat@...nel.org>, Mark Rutland <mark.rutland@....com>,
	Mathieu Desnoyers <mathieu.desnoyers@...icios.com>, Andrew Morton
	<akpm@...ux-foundation.org>, Al Viro <viro@...iv.linux.org.uk>, "Linus
 Torvalds" <torvalds@...ux-foundation.org>,
	<linux-trace-kernel@...r.kernel.org>, <oliver.sang@...el.com>
Subject: [linus:master] [tracing]  65a25d9f7a:
 WARNING:at_kernel/trace/trace_events.c:#trace_event_raw_init



Hello,

kernel test robot noticed "WARNING:at_kernel/trace/trace_events.c:#trace_event_raw_init" on:

commit: 65a25d9f7ac02e0cf361356e834d1c71d36acca9 ("tracing: Add "%s" check in test_event_printk()")
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master

[test failed on linus/master      8faabc041a001140564f718dabe37753e88b37fa]
[test failed on linux-next/master 8155b4ef3466f0e289e8fcc9e6e62f3f4dceeac2]

in testcase: boot

config: i386-randconfig-053-20241220
compiler: clang-19
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G

(please refer to attached dmesg/kmsg for entire log/backtrace)


+--------------------------------------------------------------+------------+------------+
|                                                              | 917110481f | 65a25d9f7a |
+--------------------------------------------------------------+------------+------------+
| WARNING:at_kernel/trace/trace_events.c:#trace_event_raw_init | 0          | 18         |
| EIP:trace_event_raw_init                                     | 0          | 18         |
+--------------------------------------------------------------+------------+------------+


If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@...el.com>
| Closes: https://lore.kernel.org/oe-lkp/202412242355.7e1a8e45-lkp@intel.com


[    0.503105][    T0] ------------[ cut here ]------------
[ 0.503689][ T0] WARNING: CPU: 0 PID: 0 at kernel/trace/trace_events.c:565 trace_event_raw_init (kernel/trace/trace_events.c:565 (discriminator 12))
[    0.504700][    T0] Modules linked in:
[    0.505081][    T0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G                T  6.13.0-rc3-00003-g65a25d9f7ac0 #1 6c7ccd2413e19711a46a7487fb4ceeafbe928cd0
[    0.506382][    T0] Tainted: [T]=RANDSTRUCT
[    0.506662][    T0] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
[ 0.507644][ T0] EIP: trace_event_raw_init (kernel/trace/trace_events.c:565 (discriminator 12))
[ 0.508190][ T0] Code: 89 f0 83 c4 04 09 f8 75 21 b8 88 b2 60 84 89 da 31 c9 6a 00 e8 cf e5 ff ff 83 c4 04 31 c0 8d 65 f4 5e 5f 5b 5d 31 c9 31 d2 c3 <0f> 0b b8 88 b2 60 84 89 da 31 c9 6a 00 e8 ac e5 ff ff 89 f2 83 c4
All code
========
   0:	89 f0                	mov    %esi,%eax
   2:	83 c4 04             	add    $0x4,%esp
   5:	09 f8                	or     %edi,%eax
   7:	75 21                	jne    0x2a
   9:	b8 88 b2 60 84       	mov    $0x8460b288,%eax
   e:	89 da                	mov    %ebx,%edx
  10:	31 c9                	xor    %ecx,%ecx
  12:	6a 00                	push   $0x0
  14:	e8 cf e5 ff ff       	call   0xffffffffffffe5e8
  19:	83 c4 04             	add    $0x4,%esp
  1c:	31 c0                	xor    %eax,%eax
  1e:	8d 65 f4             	lea    -0xc(%rbp),%esp
  21:	5e                   	pop    %rsi
  22:	5f                   	pop    %rdi
  23:	5b                   	pop    %rbx
  24:	5d                   	pop    %rbp
  25:	31 c9                	xor    %ecx,%ecx
  27:	31 d2                	xor    %edx,%edx
  29:	c3                   	ret
  2a:*	0f 0b                	ud2		<-- trapping instruction
  2c:	b8 88 b2 60 84       	mov    $0x8460b288,%eax
  31:	89 da                	mov    %ebx,%edx
  33:	31 c9                	xor    %ecx,%ecx
  35:	6a 00                	push   $0x0
  37:	e8 ac e5 ff ff       	call   0xffffffffffffe5e8
  3c:	89 f2                	mov    %esi,%edx
  3e:	83                   	.byte 0x83
  3f:	c4                   	.byte 0xc4

Code starting with the faulting instruction
===========================================
   0:	0f 0b                	ud2
   2:	b8 88 b2 60 84       	mov    $0x8460b288,%eax
   7:	89 da                	mov    %ebx,%edx
   9:	31 c9                	xor    %ecx,%ecx
   b:	6a 00                	push   $0x0
   d:	e8 ac e5 ff ff       	call   0xffffffffffffe5be
  12:	89 f2                	mov    %esi,%edx
  14:	83                   	.byte 0x83
  15:	c4                   	.byte 0xc4
[    0.510118][    T0] EAX: 00000018 EBX: 00000001 ECX: 00000000 EDX: 00000000
[    0.510764][    T0] ESI: 00000018 EDI: 00000000 EBP: 83f67f3c ESP: 83f67ea0
[    0.511422][    T0] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00210006
[    0.512164][    T0] CR0: 80050033 CR2: ff9ff000 CR3: 048d9000 CR4: 00000090
[    0.512839][    T0] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[    0.513519][    T0] DR6: fffe0ff0 DR7: 00000400
[    0.513962][    T0] Call Trace:
[ 0.514276][ T0] ? show_regs (arch/x86/kernel/dumpstack.c:478 (discriminator 1))
[ 0.514680][ T0] ? trace_event_raw_init (kernel/trace/trace_events.c:565 (discriminator 12))
[ 0.515186][ T0] ? __warn (kernel/panic.c:242 kernel/panic.c:748)
[ 0.515576][ T0] ? trace_event_raw_init (kernel/trace/trace_events.c:565 (discriminator 12))
[ 0.516094][ T0] ? report_bug (lib/bug.c:199 (discriminator 2))
[ 0.516522][ T0] ? exc_overflow (arch/x86/kernel/traps.c:301)
[ 0.516952][ T0] ? handle_bug (arch/x86/kernel/traps.c:?)
[ 0.517363][ T0] ? exc_invalid_op (arch/x86/kernel/traps.c:309 (discriminator 1))
[ 0.517815][ T0] ? handle_exception (arch/x86/entry/entry_32.S:1048)
[ 0.518296][ T0] ? exc_overflow (arch/x86/kernel/traps.c:301)
[ 0.518704][ T0] ? trace_event_raw_init (kernel/trace/trace_events.c:565 (discriminator 12))
[ 0.519182][ T0] ? exc_overflow (arch/x86/kernel/traps.c:301)
[ 0.519614][ T0] ? trace_event_raw_init (kernel/trace/trace_events.c:565 (discriminator 12))
[ 0.520146][ T0] ? __set_enter_print_fmt (kernel/trace/trace_syscalls.c:227 (discriminator 3))
[ 0.520642][ T0] ? set_syscall_print_fmt (kernel/trace/trace_syscalls.c:256)
[ 0.521139][ T0] event_init (kernel/trace/trace_events.c:2832)
[ 0.521533][ T0] event_trace_enable (kernel/trace/trace_events.c:4163)
[ 0.522007][ T0] trace_event_init (kernel/trace/trace_events.c:4256)
[ 0.522452][ T0] trace_init (kernel/trace/trace.c:10838)
[ 0.522824][ T0] start_kernel (init/main.c:999)
[ 0.523252][ T0] i386_start_kernel (arch/x86/kernel/head32.c:79 (discriminator 1))
[ 0.523740][ T0] startup_32_smp (arch/x86/kernel/head_32.S:292)
[    0.524202][    T0] irq event stamp: 0
[ 0.524575][ T0] hardirqs last enabled at (0): 0x0
[ 0.525196][ T0] hardirqs last disabled at (0): 0x0
[ 0.525821][ T0] softirqs last enabled at (0): 0x0
[ 0.526405][ T0] softirqs last disabled at (0): 0x0
[    0.526966][    T0] ---[ end trace 0000000000000000 ]---
[    0.527479][    T0] event xe_bo_move has unsafe dereference of argument 4
[    0.528145][    T0] print_fmt: "move_lacks_source:%s, migrate object %p [size %zu] from %s to %s device_id:%s", REC->move_lacks_source ? "yes" : "no", REC->bo, REC->size, xe_mem_type_to_name[REC->old_placement], xe_mem_type_to_name[REC->new_placement], __get_str(device_id)


The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20241224/202412242355.7e1a8e45-lkp@intel.com



-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ