[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <202504172239.4a2422e2-lkp@intel.com>
Date: Thu, 17 Apr 2025 22:42:55 +0800
From: kernel test robot <oliver.sang@...el.com>
To: Masami Hiramatsu <mhiramat@...nel.org>
CC: <oe-lkp@...ts.linux.dev>, <lkp@...el.com>, <linux-kernel@...r.kernel.org>,
<linux-trace-kernel@...r.kernel.org>, <oliver.sang@...el.com>
Subject: [linus:master] [tracing] a3dc2983ca: WARNING:suspicious_RCU_usage
Hello,
kernel test robot noticed "WARNING:suspicious_RCU_usage" on:
commit: a3dc2983ca7b90fd35f978502de6d4664d965cfb ("tracing: fprobe: Cleanup fprobe hash when module unloading")
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master
[test failed on linus/master 834a4a689699090a406d1662b03affa8b155d025]
[test failed on linux-next/master b425262c07a6a643ebeed91046e161e20b944164]
in testcase: boot
config: x86_64-randconfig-r052-20250414
compiler: gcc-12
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G
(please refer to attached dmesg/kmsg for entire log/backtrace)
+-----------------------------------------------------------------+------------+------------+
| | dd941507a9 | a3dc2983ca |
+-----------------------------------------------------------------+------------+------------+
| WARNING:suspicious_RCU_usage | 0 | 12 |
| kernel/trace/fprobe.c:#RCU-list_traversed_in_non-reader_section | 0 | 12 |
+-----------------------------------------------------------------+------------+------------+
If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@...el.com>
| Closes: https://lore.kernel.org/oe-lkp/202504172239.4a2422e2-lkp@intel.com
[ 16.078479][ T140] WARNING: suspicious RCU usage
[ 16.078939][ T140] 6.14.0-00003-ga3dc2983ca7b #1 Not tainted
[ 16.079450][ T140] -----------------------------
[ 16.079768][ T140] kernel/trace/fprobe.c:457 RCU-list traversed in non-reader section!!
[ 16.080214][ T140]
[ 16.080214][ T140] other info that might help us debug this:
[ 16.080214][ T140]
[ 16.080781][ T140]
[ 16.080781][ T140] rcu_scheduler_active = 2, debug_locks = 1
[ 16.081220][ T140] 2 locks held by systemd-udevd/140:
[ 16.081511][ T140] #0: ffffffff83474cf8 ((module_notify_list).rwsem){++++}-{4:4}, at: blocking_notifier_call_chain (kernel/notifier.c:380 kernel/notifier.c:368)
[ 16.082152][ T140] #1: ffffffff8349b610 (fprobe_mutex){+.+.}-{4:4}, at: fprobe_module_callback (kernel/trace/fprobe.c:488)
[ 16.082725][ T140]
[ 16.082725][ T140] stack backtrace:
[ 16.083056][ T140] CPU: 0 UID: 0 PID: 140 Comm: systemd-udevd Not tainted 6.14.0-00003-ga3dc2983ca7b #1
[ 16.083059][ T140] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
[ 16.083060][ T140] Call Trace:
[ 16.083062][ T140] <TASK>
[ 16.083064][ T140] dump_stack_lvl (lib/dump_stack.c:123)
[ 16.083069][ T140] dump_stack (lib/dump_stack.c:130)
[ 16.083072][ T140] lockdep_rcu_suspicious (kernel/locking/lockdep.c:6848)
[ 16.083081][ T140] fprobe_module_callback (kernel/trace/fprobe.c:457 kernel/trace/fprobe.c:489)
[ 16.083084][ T140] ? mutex_unlock (kernel/locking/mutex.c:524)
[ 16.083097][ T140] notifier_call_chain (kernel/notifier.c:85)
[ 16.083105][ T140] blocking_notifier_call_chain (kernel/notifier.c:381 kernel/notifier.c:368)
[ 16.083110][ T140] do_init_module (kernel/module/main.c:3086)
[ 16.083119][ T140] load_module (kernel/module/main.c:3458)
[ 16.083130][ T140] init_module_from_file (kernel/module/main.c:3648)
[ 16.083147][ T140] idempotent_init_module (kernel/module/main.c:3659)
[ 16.083165][ T140] __do_sys_finit_module (include/linux/file.h:62 include/linux/file.h:83 kernel/module/main.c:3682)
[ 16.083172][ T140] __ia32_sys_finit_module (kernel/module/main.c:3669)
[ 16.083176][ T140] ia32_sys_call (kbuild/obj/consumer/x86_64-randconfig-r052-20250414/./arch/x86/include/generated/asm/syscalls_32.h:351)
[ 16.083181][ T140] __do_fast_syscall_32 (arch/x86/entry/common.c:165 arch/x86/entry/common.c:387)
[ 16.083187][ T140] do_fast_syscall_32 (arch/x86/entry/common.c:412)
[ 16.083191][ T140] do_SYSENTER_32 (arch/x86/entry/common.c:451)
[ 16.083194][ T140] entry_SYSENTER_compat_after_hwframe (arch/x86/entry/entry_64_compat.S:127)
[ 16.083198][ T140] RIP: 0023:0xf7ee3579
[ 16.083201][ T140] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 cc 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00
All code
========
0: b8 01 10 06 03 mov $0x3061001,%eax
5: 74 b4 je 0xffffffffffffffbb
7: 01 10 add %edx,(%rax)
9: 07 (bad)
a: 03 74 b0 01 add 0x1(%rax,%rsi,4),%esi
e: 10 08 adc %cl,(%rax)
10: 03 74 d8 01 add 0x1(%rax,%rbx,8),%esi
...
20: 00 51 52 add %dl,0x52(%rcx)
23: 55 push %rbp
24:* 89 e5 mov %esp,%ebp <-- trapping instruction
26: 0f 34 sysenter
28: cd 80 int $0x80
2a: 5d pop %rbp
2b: 5a pop %rdx
2c: 59 pop %rcx
2d: c3 ret
2e: cc int3
2f: 90 nop
30: 90 nop
31: 90 nop
32: 8d b4 26 00 00 00 00 lea 0x0(%rsi,%riz,1),%esi
39: 8d b4 26 00 00 00 00 lea 0x0(%rsi,%riz,1),%esi
Code starting with the faulting instruction
===========================================
0: 5d pop %rbp
1: 5a pop %rdx
2: 59 pop %rcx
3: c3 ret
4: cc int3
5: 90 nop
6: 90 nop
7: 90 nop
8: 8d b4 26 00 00 00 00 lea 0x0(%rsi,%riz,1),%esi
f: 8d b4 26 00 00 00 00 lea 0x0(%rsi,%riz,1),%esi
[ 16.083203][ T140] RSP: 002b:00000000ff85cc9c EFLAGS: 00200296 ORIG_RAX: 000000000000015e
[ 16.083206][ T140] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000f7ecdd41
[ 16.083208][ T140] RDX: 0000000000000000 RSI: 000000005670d000 RDI: 00000000566fe070
[ 16.083209][ T140] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[ 16.083211][ T140] R10: 0000000000000000 R11: 0000000000200246 R12: 0000000000000000
[ 16.083212][ T140] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[ 16.083227][ T140] </TASK>
The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20250417/202504172239.4a2422e2-lkp@intel.com
--
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki
Powered by blists - more mailing lists