Greeting,
FYI, we noticed the following commit (built with clang-14):
commit: 2fcb93629ad8911c846cdc44521c746e53cc4e6d ("mm/damon: add a tracepoint")
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master
in testcase: trinity
version: trinity-static-i386-x86_64-f93256fb_2019-08-28
with following parameters:
runtime: 300s
group: group-01
test-description: Trinity is a linux system call fuzz tester.
test-url:
http://codemonkey.org.uk/projects/trinity/
on test machine: qemu-system-i386 -enable-kvm -cpu SandyBridge -smp 2 -m 4G
caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):
+-----------------------------------------------------+------------+------------+
| | 3f49584b26 | 2fcb93629a |
+-----------------------------------------------------+------------+------------+
| WARNING:at_kernel/tracepoint.c:#tracepoint_add_func | 0 | 15 |
| EIP:tracepoint_add_func | 0 | 15 |
+-----------------------------------------------------+------------+------------+
If you fix the issue, kindly add following tag
Reported-by: kernel test robot <oliver.sang(a)intel.com>
[ 125.457949][ T3574] WARNING: CPU: 1 PID: 3574 at kernel/tracepoint.c:188
tracepoint_add_func (kernel/tracepoint.c:336 kernel/tracepoint.c:338)
[ 125.459938][ T3574] Modules linked in: serio_raw evdev input_leds tiny_power_button
button
[ 125.461589][ T3574] CPU: 1 PID: 3574 Comm: trinity-main Not tainted
5.14.0-00035-g2fcb93629ad8 #1
[ 125.463374][ T3574] EIP: tracepoint_add_func (kernel/tracepoint.c:336
kernel/tracepoint.c:338)
[ 125.464470][ T3574] Code: 75 ab c2 00 ff ff c6 05 ff ff c6 05 01 b8 c1 aa 01 b8 c1 aa 01
00 00 b9 01 00 00 b9 e8 51 e6 f7 e8 51 e6 f7 ff ff 0f 0b ff ff <0f> 0b c2 89 da 31
c2 89 da 31 fa 81 02 00 fa 81 02 00 5d f0 bf ea
All code
========
0: 75 ab jne 0xffffffffffffffad
2: c2 00 ff retq $0xff00
5: ff c6 inc %esi
7: 05 ff ff c6 05 add $0x5c6ffff,%eax
c: 01 b8 c1 aa 01 b8 add %edi,-0x47fe553f(%rax)
12: c1 aa 01 00 00 b9 01 shrl $0x1,-0x46ffffff(%rdx)
19: 00 00 add %al,(%rax)
1b: b9 e8 51 e6 f7 mov $0xf7e651e8,%ecx
20: e8 51 e6 f7 ff callq 0xfffffffffff7e676
25: ff 0f decl (%rdi)
27: 0b ff or %edi,%edi
29: ff 0f decl (%rdi)
2b:* 0b c2 or %edx,%eax <-- trapping instruction
2d: 89 da mov %ebx,%edx
2f: 31 c2 xor %eax,%edx
31: 89 da mov %ebx,%edx
33: 31 fa xor %edi,%edx
35: 81 02 00 fa 81 02 addl $0x281fa00,(%rdx)
3b: 00 5d f0 add %bl,-0x10(%rbp)
3e: bf .byte 0xbf
3f: ea (bad)
Code starting with the faulting instruction
===========================================
0: 0f 0b ud2
2: c2 89 da retq $0xda89
5: 31 c2 xor %eax,%edx
7: 89 da mov %ebx,%edx
9: 31 fa xor %edi,%edx
b: 81 02 00 fa 81 02 addl $0x281fa00,(%rdx)
11: 00 5d f0 add %bl,-0x10(%rbp)
14: bf .byte 0xbf
15: ea (bad)
[ 125.478613][ T3574] EAX: 00000001 EBX: 00000001 ECX: 00000000 EDX: ffffffff
[ 125.479986][ T3574] ESI: 00000000 EDI: 00000000 EBP: f5f7fdd8 ESP: f5f7fdbc
[ 125.481344][ T3574] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 00010246
[ 125.482847][ T3574] CR0: 80050033 CR2: 08d8100c CR3: 35f10000 CR4: 000406f0
[ 125.484190][ T3574] Call Trace:
[ 125.484844][ T3574] ? mutex_lock_nested (kernel/locking/mutex.c:1104
kernel/locking/mutex.c:1119)
[ 125.485778][ T3574] tracepoint_probe_register (kernel/tracepoint.c:511
kernel/tracepoint.c:531)
[ 125.486892][ T3574] trace_event_reg (kernel/trace/trace_events.c:512)
[ 125.487828][ T3574] ? trace_event_buffer_reserve (kernel/trace/trace_events.c:495)
[ 125.488922][ T3574] perf_trace_event_init (kernel/trace/trace_event_perf.c:129
kernel/trace/trace_event_perf.c:204)
[ 125.489946][ T3574] perf_trace_init (kernel/trace/trace_event_perf.c:229)
[ 125.500175][ T3574] perf_tp_event_init (kernel/events/core.c:9725)
[ 125.501858][ T3574] perf_try_init_event (kernel/events/core.c:11192)
[ 125.503727][ T3574] perf_event_alloc (kernel/events/core.c:11256
kernel/events/core.c:11547)
[ 125.505324][ T3574] __ia32_sys_perf_event_open (kernel/events/core.c:12068
kernel/events/core.c:11960 kernel/events/core.c:11960)
[ 125.507235][ T3574] ? syscall_enter_from_user_mode (arch/x86/include/asm/irqflags.h:45
arch/x86/include/asm/irqflags.h:80 kernel/entry/common.c:107)
[ 125.509227][ T3574] ? syscall_enter_from_user_mode (arch/x86/include/asm/irqflags.h:45
arch/x86/include/asm/irqflags.h:80 kernel/entry/common.c:107)
[ 125.511394][ T3574] do_int80_syscall_32 (arch/x86/entry/common.c:112
arch/x86/entry/common.c:132)
[ 125.512627][ T3574] ? exc_page_fault (arch/x86/mm/fault.c:1535)
[ 125.513600][ T3574] entry_INT80_32 (arch/x86/entry/entry_32.S:981)
[ 125.515381][ T3574] EIP: 0x8097522
[ 125.516815][ T3574] Code: 89 c8 c3 90 8d 74 26 00 85 c0 c7 01 01 00 00 00 75 d8 a1 cc 3c
ad 08 eb d1 66 90 66 90 66 90 66 90 66 90 66 90 66 90 90 cd 80 <c3> 8d b6 00 00 00
00 8d bc 27 00 00 00 00 8b 10 a3 f4 3c ad 08 85
All code
========
0: 89 c8 mov %ecx,%eax
2: c3 retq
3: 90 nop
4: 8d 74 26 00 lea 0x0(%rsi,%riz,1),%esi
8: 85 c0 test %eax,%eax
a: c7 01 01 00 00 00 movl $0x1,(%rcx)
10: 75 d8 jne 0xffffffffffffffea
12: a1 cc 3c ad 08 eb d1 movabs 0x9066d1eb08ad3ccc,%eax
19: 66 90
1b: 66 90 xchg %ax,%ax
1d: 66 90 xchg %ax,%ax
1f: 66 90 xchg %ax,%ax
21: 66 90 xchg %ax,%ax
23: 66 90 xchg %ax,%ax
25: 66 90 xchg %ax,%ax
27: 90 nop
28: cd 80 int $0x80
2a:* c3 retq <-- trapping instruction
2b: 8d b6 00 00 00 00 lea 0x0(%rsi),%esi
31: 8d bc 27 00 00 00 00 lea 0x0(%rdi,%riz,1),%edi
38: 8b 10 mov (%rax),%edx
3a: a3 .byte 0xa3
3b: f4 hlt
3c: 3c ad cmp $0xad,%al
3e: 08 .byte 0x8
3f: 85 .byte 0x85
Code starting with the faulting instruction
===========================================
0: c3 retq
1: 8d b6 00 00 00 00 lea 0x0(%rsi),%esi
7: 8d bc 27 00 00 00 00 lea 0x0(%rdi,%riz,1),%edi
e: 8b 10 mov (%rax),%edx
10: a3 .byte 0xa3
11: f4 hlt
12: 3c ad cmp $0xad,%al
14: 08 .byte 0x8
15: 85 .byte 0x85
[ 125.524040][ T3574] EAX: ffffffda EBX: 08d81718 ECX: 00000df6 EDX: ffffffff
[ 125.526956][ T3574] ESI: 00000111 EDI: 00000009 EBP: 00000005 ESP: bfade408
[ 125.529387][ T3574] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b EFLAGS: 00000282
[ 125.532073][ T3574] irq event stamp: 1392883
[ 125.533918][ T3574] hardirqs last enabled at (1392891): console_unlock
(arch/x86/include/asm/irqflags.h:22 arch/x86/include/asm/irqflags.h:70
arch/x86/include/asm/irqflags.h:132 kernel/printk/printk.c:2668)
[ 125.537178][ T3574] hardirqs last disabled at (1392906): console_unlock
(kernel/printk/printk.c:2589)
[ 125.540379][ T3574] softirqs last enabled at (1392904): __do_softirq
(arch/x86/include/asm/preempt.h:27 kernel/softirq.c:402 kernel/softirq.c:587)
[ 125.543618][ T3574] softirqs last disabled at (1392899): do_softirq_own_stack
(arch/x86/kernel/irq_32.c:60 arch/x86/kernel/irq_32.c:149)
[ 125.547068][ T3574] ---[ end trace 3cf4e488c277e941 ]---
[ 125.549053][ T3574] ------------[ cut here ]------------
To reproduce:
# build kernel
cd linux
cp config-5.14.0-00035-g2fcb93629ad8 .config
make HOSTCC=clang-14 CC=clang-14 ARCH=i386 olddefconfig prepare modules_prepare bzImage
git clone
https://github.com/intel/lkp-tests.git
cd lkp-tests
bin/lkp qemu -k <bzImage> job-script # job-script is attached in this email
# if come across any failure that blocks the test,
# please remove ~/.lkp and /lkp dir to run from a clean state.
---
0DAY/LKP+ Test Infrastructure Open Source Technology Center
https://lists.01.org/hyperkitty/list/lkp@lists.01.org Intel Corporation
Thanks,
Oliver Sang