lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <202504172239.4a2422e2-lkp@intel.com>
Date: Thu, 17 Apr 2025 22:42:55 +0800
From: kernel test robot <oliver.sang@...el.com>
To: Masami Hiramatsu <mhiramat@...nel.org>
CC: <oe-lkp@...ts.linux.dev>, <lkp@...el.com>, <linux-kernel@...r.kernel.org>,
	<linux-trace-kernel@...r.kernel.org>, <oliver.sang@...el.com>
Subject: [linus:master] [tracing]  a3dc2983ca: WARNING:suspicious_RCU_usage



Hello,

kernel test robot noticed "WARNING:suspicious_RCU_usage" on:

commit: a3dc2983ca7b90fd35f978502de6d4664d965cfb ("tracing: fprobe: Cleanup fprobe hash when module unloading")
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master

[test failed on linus/master      834a4a689699090a406d1662b03affa8b155d025]
[test failed on linux-next/master b425262c07a6a643ebeed91046e161e20b944164]

in testcase: boot

config: x86_64-randconfig-r052-20250414
compiler: gcc-12
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G

(please refer to attached dmesg/kmsg for entire log/backtrace)


+-----------------------------------------------------------------+------------+------------+
|                                                                 | dd941507a9 | a3dc2983ca |
+-----------------------------------------------------------------+------------+------------+
| WARNING:suspicious_RCU_usage                                    | 0          | 12         |
| kernel/trace/fprobe.c:#RCU-list_traversed_in_non-reader_section | 0          | 12         |
+-----------------------------------------------------------------+------------+------------+


If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@...el.com>
| Closes: https://lore.kernel.org/oe-lkp/202504172239.4a2422e2-lkp@intel.com


[   16.078479][  T140] WARNING: suspicious RCU usage
[   16.078939][  T140] 6.14.0-00003-ga3dc2983ca7b #1 Not tainted
[   16.079450][  T140] -----------------------------
[   16.079768][  T140] kernel/trace/fprobe.c:457 RCU-list traversed in non-reader section!!
[   16.080214][  T140]
[   16.080214][  T140] other info that might help us debug this:
[   16.080214][  T140]
[   16.080781][  T140]
[   16.080781][  T140] rcu_scheduler_active = 2, debug_locks = 1
[   16.081220][  T140] 2 locks held by systemd-udevd/140:
[ 16.081511][ T140] #0: ffffffff83474cf8 ((module_notify_list).rwsem){++++}-{4:4}, at: blocking_notifier_call_chain (kernel/notifier.c:380 kernel/notifier.c:368) 
[ 16.082152][ T140] #1: ffffffff8349b610 (fprobe_mutex){+.+.}-{4:4}, at: fprobe_module_callback (kernel/trace/fprobe.c:488) 
[   16.082725][  T140]
[   16.082725][  T140] stack backtrace:
[   16.083056][  T140] CPU: 0 UID: 0 PID: 140 Comm: systemd-udevd Not tainted 6.14.0-00003-ga3dc2983ca7b #1
[   16.083059][  T140] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
[   16.083060][  T140] Call Trace:
[   16.083062][  T140]  <TASK>
[ 16.083064][ T140] dump_stack_lvl (lib/dump_stack.c:123) 
[ 16.083069][ T140] dump_stack (lib/dump_stack.c:130) 
[ 16.083072][ T140] lockdep_rcu_suspicious (kernel/locking/lockdep.c:6848) 
[ 16.083081][ T140] fprobe_module_callback (kernel/trace/fprobe.c:457 kernel/trace/fprobe.c:489) 
[ 16.083084][ T140] ? mutex_unlock (kernel/locking/mutex.c:524) 
[ 16.083097][ T140] notifier_call_chain (kernel/notifier.c:85) 
[ 16.083105][ T140] blocking_notifier_call_chain (kernel/notifier.c:381 kernel/notifier.c:368) 
[ 16.083110][ T140] do_init_module (kernel/module/main.c:3086) 
[ 16.083119][ T140] load_module (kernel/module/main.c:3458) 
[ 16.083130][ T140] init_module_from_file (kernel/module/main.c:3648) 
[ 16.083147][ T140] idempotent_init_module (kernel/module/main.c:3659) 
[ 16.083165][ T140] __do_sys_finit_module (include/linux/file.h:62 include/linux/file.h:83 kernel/module/main.c:3682) 
[ 16.083172][ T140] __ia32_sys_finit_module (kernel/module/main.c:3669) 
[ 16.083176][ T140] ia32_sys_call (kbuild/obj/consumer/x86_64-randconfig-r052-20250414/./arch/x86/include/generated/asm/syscalls_32.h:351) 
[ 16.083181][ T140] __do_fast_syscall_32 (arch/x86/entry/common.c:165 arch/x86/entry/common.c:387) 
[ 16.083187][ T140] do_fast_syscall_32 (arch/x86/entry/common.c:412) 
[ 16.083191][ T140] do_SYSENTER_32 (arch/x86/entry/common.c:451) 
[ 16.083194][ T140] entry_SYSENTER_compat_after_hwframe (arch/x86/entry/entry_64_compat.S:127) 
[   16.083198][  T140] RIP: 0023:0xf7ee3579
[ 16.083201][ T140] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 cc 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00
All code
========
   0:	b8 01 10 06 03       	mov    $0x3061001,%eax
   5:	74 b4                	je     0xffffffffffffffbb
   7:	01 10                	add    %edx,(%rax)
   9:	07                   	(bad)
   a:	03 74 b0 01          	add    0x1(%rax,%rsi,4),%esi
   e:	10 08                	adc    %cl,(%rax)
  10:	03 74 d8 01          	add    0x1(%rax,%rbx,8),%esi
	...
  20:	00 51 52             	add    %dl,0x52(%rcx)
  23:	55                   	push   %rbp
  24:*	89 e5                	mov    %esp,%ebp		<-- trapping instruction
  26:	0f 34                	sysenter
  28:	cd 80                	int    $0x80
  2a:	5d                   	pop    %rbp
  2b:	5a                   	pop    %rdx
  2c:	59                   	pop    %rcx
  2d:	c3                   	ret
  2e:	cc                   	int3
  2f:	90                   	nop
  30:	90                   	nop
  31:	90                   	nop
  32:	8d b4 26 00 00 00 00 	lea    0x0(%rsi,%riz,1),%esi
  39:	8d b4 26 00 00 00 00 	lea    0x0(%rsi,%riz,1),%esi

Code starting with the faulting instruction
===========================================
   0:	5d                   	pop    %rbp
   1:	5a                   	pop    %rdx
   2:	59                   	pop    %rcx
   3:	c3                   	ret
   4:	cc                   	int3
   5:	90                   	nop
   6:	90                   	nop
   7:	90                   	nop
   8:	8d b4 26 00 00 00 00 	lea    0x0(%rsi,%riz,1),%esi
   f:	8d b4 26 00 00 00 00 	lea    0x0(%rsi,%riz,1),%esi
[   16.083203][  T140] RSP: 002b:00000000ff85cc9c EFLAGS: 00200296 ORIG_RAX: 000000000000015e
[   16.083206][  T140] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000f7ecdd41
[   16.083208][  T140] RDX: 0000000000000000 RSI: 000000005670d000 RDI: 00000000566fe070
[   16.083209][  T140] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[   16.083211][  T140] R10: 0000000000000000 R11: 0000000000200246 R12: 0000000000000000
[   16.083212][  T140] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[   16.083227][  T140]  </TASK>


The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20250417/202504172239.4a2422e2-lkp@intel.com



-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ