Greeting,
FYI, we noticed the following commit (built with gcc-9):
commit: 77422ffeee9da53069006c1ed9eb0bab4ccf5aca ("dyndbg: RFC drop _ddebug.site
pointer")
https://github.com/jimc/linux.git dd-diet-6c2
in testcase: stress-ng
version: stress-ng-x86_64-0.11-06_20210616
with following parameters:
nr_threads: 10%
disk: 1HDD
testtime: 60s
fs: ext4
class: os
test: enosys
cpufreq_governor: performance
ucode: 0x5003006
on test machine: 96 threads 2 sockets Intel(R) Xeon(R) Gold 6252 CPU @ 2.10GHz with 192G
memory
caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):
If you fix the issue, kindly add following tag
Reported-by: kernel test robot <oliver.sang(a)intel.com>
[ 15.356920] WARNING: CPU: 44 PID: 1349 at kernel/trace/trace_events.c:369
test_event_printk (kbuild/src/consumer/kernel/trace/trace_events.c:369)
[ 15.380633] Modules linked in: acpi_cpufreq(-) btrfs(+) blake2b_generic xor
zstd_compress raid6_pq libcrc32c intel_rapl_msr intel_rapl_common sd_mod t10_pi sg
skx_edac nfit libnvdimm x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm
irqbypass crct10dif_pclmul crc32_pclmul crc32c_intel ipmi_ssif ghash_clmulni_intel ast
drm_vram_helper rapl drm_ttm_helper intel_cstate ttm drm_kms_helper syscopyarea
sysfillrect sysimgblt fb_sys_fops ahci acpi_ipmi intel_uncore libahci mei_me drm ioatdma
ipmi_si libata mei joydev intel_pch_thermal ipmi_devintf dca wmi ipmi_msghandler acpi_pad
acpi_power_meter ip_tables
[ 15.436906] CPU: 44 PID: 1349 Comm: modprobe Not tainted 5.13.0-rc6-00027-g77422ffeee9d
#1
[ 15.445721] Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS
SE5C620.86B.02.01.0008.031920191559 03/19/2019
[ 15.456704] RIP: 0010:test_event_printk
(kbuild/src/consumer/kernel/trace/trace_events.c:369)
[ 15.462133] Code: 8b 70 18 29 f9 4c 01 fa 41 f6 40 70 10 74 08 48 85 f6 74 03 48 8b 36 49
c7 c0 e0 ac 57 82 48 c7 c7 a8 af 57 82 e8 87 99 a6 00 <0f> 0b e9 ca fb ff ff 48 c7
c7 e2 ac 57 82 b9 05 00 00 00 48 89 d6
All code
========
0: 8b 70 18 mov 0x18(%rax),%esi
3: 29 f9 sub %edi,%ecx
5: 4c 01 fa add %r15,%rdx
8: 41 f6 40 70 10 testb $0x10,0x70(%r8)
d: 74 08 je 0x17
f: 48 85 f6 test %rsi,%rsi
12: 74 03 je 0x17
14: 48 8b 36 mov (%rsi),%rsi
17: 49 c7 c0 e0 ac 57 82 mov $0xffffffff8257ace0,%r8
1e: 48 c7 c7 a8 af 57 82 mov $0xffffffff8257afa8,%rdi
25: e8 87 99 a6 00 callq 0xa699b1
2a:* 0f 0b ud2 <-- trapping instruction
2c: e9 ca fb ff ff jmpq 0xfffffffffffffbfb
31: 48 c7 c7 e2 ac 57 82 mov $0xffffffff8257ace2,%rdi
38: b9 05 00 00 00 mov $0x5,%ecx
3d: 48 89 d6 mov %rdx,%rsi
Code starting with the faulting instruction
===========================================
0: 0f 0b ud2
2: e9 ca fb ff ff jmpq 0xfffffffffffffbd1
7: 48 c7 c7 e2 ac 57 82 mov $0xffffffff8257ace2,%rdi
e: b9 05 00 00 00 mov $0x5,%ecx
13: 48 89 d6 mov %rdx,%rsi
[ 15.482040] RSP: 0018:ffffc9000f52fc10 EFLAGS: 00010282
[ 15.487877] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000027
[ 15.495641] RDX: 0000000000000027 RSI: 00000000ffff7fff RDI: ffff88afca917bf8
[ 15.503405] RBP: 0000000000000001 R08: ffff88afca917bf0 R09: ffffc9000f52fa30
[ 15.511159] R10: 0000000000000001 R11: 0000000000000001 R12: 000508b58019388f
[ 15.518945] R13: 0000000000000029 R14: 000000000000012d R15: ffffffffc1148740
[ 15.526688] FS: 00007fed64c22480(0000) GS:ffff88afca900000(0000)
knlGS:0000000000000000
[ 15.535407] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 15.541780] CR2: 00007f5534396b2b CR3: 000000303a208006 CR4: 00000000007706e0
[ 15.549543] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 15.557312] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 15.565082] PKRU: 55555554
[ 15.568417] Call Trace:
[ 15.571492] trace_event_raw_init (kbuild/src/consumer/kernel/trace/trace_events.c:438)
[ 15.576301] event_init (kbuild/src/consumer/kernel/trace/trace_events.c:2510)
[ 15.580246] trace_module_notify (kbuild/src/consumer/kernel/trace/trace.c:8482)
[ 15.585150] notifier_call_chain_robust (kbuild/src/consumer/kernel/notifier.c:83
kbuild/src/consumer/kernel/notifier.c:118)
[ 15.590501] blocking_notifier_call_chain_robust
(kbuild/src/consumer/kernel/notifier.c:303 kbuild/src/consumer/kernel/notifier.c:290)
[ 15.596654] load_module (kbuild/src/consumer/include/linux/notifier.h:200
kbuild/src/consumer/kernel/module.c:3856 kbuild/src/consumer/kernel/module.c:4034)
[ 15.600978] ? kernel_read_file (kbuild/src/consumer/fs/kernel_read_file.c:110)
[ 15.605820] ? __do_sys_finit_module (kbuild/src/consumer/kernel/module.c:4158)
[ 15.611012] __do_sys_finit_module (kbuild/src/consumer/kernel/module.c:4158)
[ 15.616019] do_syscall_64 (kbuild/src/consumer/arch/x86/entry/common.c:47)
[ 15.620250] entry_SYSCALL_64_after_hwframe
(kbuild/src/consumer/arch/x86/entry/entry_64.S:112)
[ 15.625966] RIP: 0033:0x7fed64d3cf59
[ 15.630203] Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48
89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3
48 8b 0d 07 6f 0c 00 f7 d8 64 89 01 48
All code
========
0: 00 c3 add %al,%bl
2: 66 2e 0f 1f 84 00 00 nopw %cs:0x0(%rax,%rax,1)
9: 00 00 00
c: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1)
11: 48 89 f8 mov %rdi,%rax
14: 48 89 f7 mov %rsi,%rdi
17: 48 89 d6 mov %rdx,%rsi
1a: 48 89 ca mov %rcx,%rdx
1d: 4d 89 c2 mov %r8,%r10
20: 4d 89 c8 mov %r9,%r8
23: 4c 8b 4c 24 08 mov 0x8(%rsp),%r9
28: 0f 05 syscall
2a:* 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax <-- trapping instruction
30: 73 01 jae 0x33
32: c3 retq
33: 48 8b 0d 07 6f 0c 00 mov 0xc6f07(%rip),%rcx # 0xc6f41
3a: f7 d8 neg %eax
3c: 64 89 01 mov %eax,%fs:(%rcx)
3f: 48 rex.W
Code starting with the faulting instruction
===========================================
0: 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax
6: 73 01 jae 0x9
8: c3 retq
9: 48 8b 0d 07 6f 0c 00 mov 0xc6f07(%rip),%rcx # 0xc6f17
10: f7 d8 neg %eax
12: 64 89 01 mov %eax,%fs:(%rcx)
15: 48 rex.W
[ 15.650389] RSP: 002b:00007ffe48a11078 EFLAGS: 00000246 ORIG_RAX: 0000000000000139
[ 15.658715] RAX: ffffffffffffffda RBX: 0000555abde1abb0 RCX: 00007fed64d3cf59
[ 15.666623] RDX: 0000000000000000 RSI: 0000555abd3ed3f0 RDI: 0000000000000005
[ 15.674531] RBP: 0000555abd3ed3f0 R08: 0000000000000000 R09: 0000000000000000
[ 15.682421] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000000
[ 15.690323] R13: 0000555abde1b0a0 R14: 0000000000040000 R15: 0000555abde1abb0
[ 15.698173] ---[ end trace 4a3a0a80cf0409e6 ]---
To reproduce:
git clone
https://github.com/intel/lkp-tests.git
cd lkp-tests
bin/lkp install job.yaml # job file is attached in this email
bin/lkp split-job --compatible job.yaml # generate the yaml file for lkp run
bin/lkp run generated-yaml-file
---
0DAY/LKP+ Test Infrastructure Open Source Technology Center
https://lists.01.org/hyperkitty/list/lkp@lists.01.org Intel Corporation
Thanks,
Oliver Sang