[<prev] [next>] [day] [month] [year] [list]
Message-ID: <202501252026.e14cafc1-lkp@intel.com>
Date: Sat, 25 Jan 2025 21:27:08 +0800
From: kernel test robot <oliver.sang@...el.com>
To: Peter Zijlstra <peterz@...radead.org>
CC: <oe-lkp@...ts.linux.dev>, <lkp@...el.com>,
<linux-perf-users@...r.kernel.org>, <linux-kernel@...r.kernel.org>,
<oliver.sang@...el.com>
Subject: [peterz-queue:perf/pmu-unregister] [perf] 957245e139:
WARNING:at_kernel/tracepoint.c:#tracepoint_remove_func
Hello,
kernel test robot noticed "WARNING:at_kernel/tracepoint.c:#tracepoint_remove_func" on:
commit: 957245e139f2cc743fe0e922292d532695bc7446 ("perf: Simplify perf_event_alloc() error path")
https://git.kernel.org/cgit/linux/kernel/git/peterz/queue.git perf/pmu-unregister
in testcase: trinity
version:
with following parameters:
runtime: 300s
group: group-02
nr_groups: 5
config: i386-randconfig-006-20250122
compiler: gcc-12
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G
(please refer to attached dmesg/kmsg for entire log/backtrace)
+--------------------------------------------------------+------------+------------+
| | b132a6f899 | 957245e139 |
+--------------------------------------------------------+------------+------------+
| WARNING:at_kernel/tracepoint.c:#tracepoint_remove_func | 0 | 12 |
| EIP:tracepoint_remove_func | 0 | 12 |
+--------------------------------------------------------+------------+------------+
If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@...el.com>
| Closes: https://lore.kernel.org/oe-lkp/202501252026.e14cafc1-lkp@intel.com
[ 28.022186][ T3556] ------------[ cut here ]------------
[ 28.023066][ T3556] WARNING: CPU: 0 PID: 3556 at kernel/tracepoint.c:358 tracepoint_remove_func (kernel/tracepoint.c:358 (discriminator 1))
[ 28.024406][ T3556] Modules linked in:
[ 28.024976][ T3556] CPU: 0 UID: 0 PID: 3556 Comm: trinity-main Not tainted 6.13.0-rc1-00045-g957245e139f2 #1 5b670c1516a7ab6a07963dcfb7871776d6e3b5df
[ 28.026633][ T3556] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
[ 28.027890][ T3556] EIP: tracepoint_remove_func (kernel/tracepoint.c:358 (discriminator 1))
[ 28.028405][ T3556] Code: e8 39 16 74 0e 83 c0 0c 8b 10 85 d2 75 f0 e9 2f 01 00 00 8b 4e 04 39 48 04 75 ea c7 00 95 38 0e 41 eb e2 c7 45 f0 fe ff ff ff <0f> 0b 8b 45 f0 e9 1c 01 00 00 39 5d f0 0f 84 01 01 00 00 89 d8 e8
All code
========
0: e8 39 16 74 0e call 0xe74163e
5: 83 c0 0c add $0xc,%eax
8: 8b 10 mov (%rax),%edx
a: 85 d2 test %edx,%edx
c: 75 f0 jne 0xfffffffffffffffe
e: e9 2f 01 00 00 jmp 0x142
13: 8b 4e 04 mov 0x4(%rsi),%ecx
16: 39 48 04 cmp %ecx,0x4(%rax)
19: 75 ea jne 0x5
1b: c7 00 95 38 0e 41 movl $0x410e3895,(%rax)
21: eb e2 jmp 0x5
23: c7 45 f0 fe ff ff ff movl $0xfffffffe,-0x10(%rbp)
2a:* 0f 0b ud2 <-- trapping instruction
2c: 8b 45 f0 mov -0x10(%rbp),%eax
2f: e9 1c 01 00 00 jmp 0x150
34: 39 5d f0 cmp %ebx,-0x10(%rbp)
37: 0f 84 01 01 00 00 je 0x13e
3d: 89 d8 mov %ebx,%eax
3f: e8 .byte 0xe8
Code starting with the faulting instruction
===========================================
0: 0f 0b ud2
2: 8b 45 f0 mov -0x10(%rbp),%eax
5: e9 1c 01 00 00 jmp 0x126
a: 39 5d f0 cmp %ebx,-0x10(%rbp)
d: 0f 84 01 01 00 00 je 0x114
13: 89 d8 mov %ebx,%eax
15: e8 .byte 0xe8
[ 28.029967][ T3556] EAX: 00000000 EBX: 4333d300 ECX: 00000000 EDX: 00000000
[ 28.030565][ T3556] ESI: 432d4924 EDI: 41c64038 EBP: 46975c10 ESP: 46975bf0
[ 28.031162][ T3556] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 0068 EFLAGS: 00010246
[ 28.031857][ T3556] CR0: 80050033 CR2: 093fc02c CR3: 070576a0 CR4: 000406b0
[ 28.032493][ T3556] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[ 28.033089][ T3556] DR6: fffe0ff0 DR7: 00000400
[ 28.033518][ T3556] Call Trace:
[ 28.033848][ T3556] ? show_regs (arch/x86/kernel/dumpstack.c:479 arch/x86/kernel/dumpstack.c:465)
[ 28.034249][ T3556] ? tracepoint_remove_func (kernel/tracepoint.c:358 (discriminator 1))
[ 28.034739][ T3556] ? __warn (kernel/panic.c:748)
[ 28.035122][ T3556] ? report_bug (lib/bug.c:201 lib/bug.c:219)
[ 28.035534][ T3556] ? tracepoint_remove_func (kernel/tracepoint.c:358 (discriminator 1))
[ 28.036034][ T3556] ? exc_overflow (arch/x86/kernel/traps.c:301)
[ 28.036454][ T3556] ? handle_bug (arch/x86/kernel/traps.c:285)
[ 28.036854][ T3556] ? exc_invalid_op (arch/x86/kernel/traps.c:309 (discriminator 1))
[ 28.037283][ T3556] ? handle_exception (arch/x86/entry/entry_32.S:1048)
[ 28.037737][ T3556] ? perf_trace_binder_update_page_range (drivers/android/./binder_trace.h:339)
[ 28.038295][ T3556] ? atomic64_inc_return_cx8 (arch/x86/lib/atomic64_cx8_32.S:105)
[ 28.038771][ T3556] ? exc_overflow (arch/x86/kernel/traps.c:301)
[ 28.039186][ T3556] ? tracepoint_remove_func (kernel/tracepoint.c:358 (discriminator 1))
[ 28.039673][ T3556] ? exc_overflow (arch/x86/kernel/traps.c:301)
[ 28.040113][ T3556] ? tracepoint_remove_func (kernel/tracepoint.c:358 (discriminator 1))
[ 28.040605][ T3556] ? __mutex_lock (kernel/locking/mutex.c:588 kernel/locking/mutex.c:735)
[ 28.041030][ T3556] ? perf_trace_binder_update_page_range (drivers/android/./binder_trace.h:339)
[ 28.041588][ T3556] ? tracepoint_probe_unregister (kernel/tracepoint.c:504)
[ 28.042115][ T3556] ? perf_trace_binder_update_page_range (drivers/android/./binder_trace.h:339)
[ 28.042678][ T3556] ? trace_event_reg (kernel/trace/trace_events.c:542)
[ 28.043125][ T3556] ? perf_trace_event_unreg (include/linux/tracepoint.h:117 kernel/trace/trace_event_perf.c:168)
[ 28.043608][ T3556] ? perf_trace_destroy (kernel/trace/trace_event_perf.c:242)
[ 28.044072][ T3556] ? tp_perf_event_destroy (kernel/events/core.c:10437)
[ 28.044531][ T3556] ? __free_event (kernel/events/core.c:5343)
[ 28.044948][ T3556] ? perf_event_alloc (include/linux/err.h:41 kernel/events/core.c:12497)
[ 28.045404][ T3556] ? __do_sys_perf_event_open (kernel/events/core.c:12907)
[ 28.045909][ T3556] ? perf_prepare_header (kernel/events/core.c:8145)
[ 28.046379][ T3556] ? __ia32_sys_perf_event_open (kernel/events/core.c:12797)
[ 28.046878][ T3556] ? ia32_sys_call (kbuild/obj/consumer/i386-randconfig-006-20250122/./arch/x86/include/generated/asm/syscalls_32.h:337)
[ 28.047317][ T3556] ? do_int80_syscall_32 (arch/x86/entry/common.c:165 arch/x86/entry/common.c:339)
[ 28.047789][ T3556] ? __might_fault (mm/memory.c:6750 mm/memory.c:6744)
[ 28.048218][ T3556] ? lock_acquire (kernel/locking/lockdep.c:467 kernel/locking/lockdep.c:5851 kernel/locking/lockdep.c:5814)
[ 28.048643][ T3556] ? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:4653)
[ 28.049209][ T3556] ? syscall_exit_to_user_mode (kernel/entry/common.c:221)
[ 28.049706][ T3556] ? do_int80_syscall_32 (arch/x86/entry/common.c:343)
[ 28.050168][ T3556] ? __might_fault (mm/memory.c:6750 mm/memory.c:6744)
[ 28.050593][ T3556] ? lock_release (kernel/locking/lockdep.c:467 kernel/locking/lockdep.c:5872)
[ 28.051011][ T3556] ? _copy_from_user (arch/x86/include/asm/uaccess_32.h:26 include/linux/uaccess.h:178 lib/usercopy.c:18)
[ 28.051447][ T3556] ? perf_copy_attr (include/linux/uaccess.h:212 include/linux/uaccess.h:401 kernel/events/core.c:12519)
[ 28.052019][ T3556] ? __do_sys_perf_event_open (kernel/events/core.c:12819)
[ 28.052519][ T3556] ? perfmon_capable (include/linux/capability.h:197)
[ 28.052948][ T3556] ? perf_allow_kernel (kernel/events/core.c:13687)
[ 28.053395][ T3556] ? __do_sys_perf_event_open (kernel/events/core.c:12829)
[ 28.053898][ T3556] ? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:4653)
[ 28.054465][ T3556] ? syscall_exit_to_user_mode (kernel/entry/common.c:221)
[ 28.054963][ T3556] ? do_int80_syscall_32 (arch/x86/entry/common.c:343)
[ 28.055427][ T3556] ? syscall_exit_to_user_mode (kernel/entry/common.c:221)
[ 28.055944][ T3556] ? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:4653)
[ 28.056506][ T3556] ? syscall_exit_to_user_mode (kernel/entry/common.c:221)
[ 28.056999][ T3556] ? do_int80_syscall_32 (arch/x86/entry/common.c:343)
[ 28.057460][ T3556] ? exc_page_fault (arch/x86/mm/fault.c:1543)
[ 28.057903][ T3556] ? entry_INT80_32 (arch/x86/entry/entry_32.S:945)
[ 28.058348][ T3556] irq event stamp: 2189241
[ 28.058756][ T3556] hardirqs last enabled at (2189251): __up_console_sem (arch/x86/include/asm/irqflags.h:42 (discriminator 1) arch/x86/include/asm/irqflags.h:97 (discriminator 1) arch/x86/include/asm/irqflags.h:155 (discriminator 1) kernel/printk/printk.c:344 (discriminator 1))
[ 28.059530][ T3556] hardirqs last disabled at (2189260): __up_console_sem (kernel/printk/printk.c:342 (discriminator 1))
[ 28.060302][ T3556] softirqs last enabled at (2189108): handle_softirqs (kernel/softirq.c:401 kernel/softirq.c:582)
[ 28.061076][ T3556] softirqs last disabled at (2189095): __do_softirq (kernel/softirq.c:589)
[ 28.061812][ T3556] ---[ end trace 0000000000000000 ]---
[ 28.193713][ T3556] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list
[ 28.195493][ T3556] trinity-main uses obsolete (PF_INET,SOCK_PACKET)
[ 28.231307][ T3556] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list
[ 317.381340][ T306] sh: can't kill pid 3553: No such process
LKP: ttyS0: 273: LKP: rebooting forcely
[ 324.872695][ T273] sysrq: Emergency Sync
[ 324.874299][ T7] Emergency Sync complete
[ 324.875652][ T273] sysrq: Resetting
The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20250125/202501252026.e14cafc1-lkp@intel.com
--
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki
Powered by blists - more mailing lists