Hello, kernel test robot noticed "WARNING:at_kernel/trace/ring_buffer_benchmark.c:#ring_buffer_consumer" on: commit: f458a1453424e03462b5bb539673c9a3cddda480 ("ring-buffer: Test last update in 32bit version of __rb_time_read()") https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master [test failed on linus/master 26aff849438cebcd05f1a647390c4aa700d5c0f1] [test failed on linux-next/master abb240f7a2bd14567ab53e602db562bb683391e6] in testcase: locktorture version: with following parameters: runtime: 300s test: cpuhotplug compiler: clang-16 test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G (please refer to attached dmesg/kmsg for entire log/backtrace) +-----------------------------------------------------------------------+------------+------------+ | | b2dd797543 | f458a14534 | +-----------------------------------------------------------------------+------------+------------+ | WARNING:at_kernel/trace/ring_buffer_benchmark.c:#ring_buffer_consumer | 0 | 14 | | EIP:ring_buffer_consumer | 0 | 14 | +-----------------------------------------------------------------------+------------+------------+ If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot <oliver.s...@intel.com> | Closes: https://lore.kernel.org/oe-lkp/202312121655.f8f36552-oliver.s...@intel.com [ 38.075826][ T45] ------------[ cut here ]------------ [ 38.077859][ T45] WARNING: CPU: 1 PID: 45 at kernel/trace/ring_buffer_benchmark.c:147 ring_buffer_consumer (kernel/trace/ring_buffer_benchmark.c:147) [ 38.080140][ T45] Modules linked in: [ 38.080906][ T45] CPU: 1 PID: 45 Comm: rb_consumer Not tainted 6.7.0-rc2-00015-gf458a1453424 #9 [ 38.082662][ T45] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 [ 38.084759][ T45] EIP: ring_buffer_consumer (kernel/trace/ring_buffer_benchmark.c:147) [ 38.085829][ T45] Code: 00 83 e0 1f 8d 04 85 04 00 00 00 80 3d e4 48 ac c2 00 0f 84 00 ff ff ff eb 7c 80 3d e4 48 ac c2 00 75 73 c6 05 e4 48 ac c2 01 <0f> 0b e9 d5 fe ff ff 80 3d e4 48 ac c2 00 75 5c c6 05 e4 48 ac c2 All code ======== 0: 00 83 e0 1f 8d 04 add %al,0x48d1fe0(%rbx) 6: 85 04 00 test %eax,(%rax,%rax,1) 9: 00 00 add %al,(%rax) b: 80 3d e4 48 ac c2 00 cmpb $0x0,-0x3d53b71c(%rip) # 0xffffffffc2ac48f6 12: 0f 84 00 ff ff ff je 0xffffffffffffff18 18: eb 7c jmp 0x96 1a: 80 3d e4 48 ac c2 00 cmpb $0x0,-0x3d53b71c(%rip) # 0xffffffffc2ac4905 21: 75 73 jne 0x96 23: c6 05 e4 48 ac c2 01 movb $0x1,-0x3d53b71c(%rip) # 0xffffffffc2ac490e 2a:* 0f 0b ud2 <-- trapping instruction 2c: e9 d5 fe ff ff jmp 0xffffffffffffff06 31: 80 3d e4 48 ac c2 00 cmpb $0x0,-0x3d53b71c(%rip) # 0xffffffffc2ac491c 38: 75 5c jne 0x96 3a: c6 .byte 0xc6 3b: 05 e4 48 ac c2 add $0xc2ac48e4,%eax Code starting with the faulting instruction =========================================== 0: 0f 0b ud2 2: e9 d5 fe ff ff jmp 0xfffffffffffffedc 7: 80 3d e4 48 ac c2 00 cmpb $0x0,-0x3d53b71c(%rip) # 0xffffffffc2ac48f2 e: 75 5c jne 0x6c 10: c6 .byte 0xc6 11: 05 e4 48 ac c2 add $0xc2ac48e4,%eax [ 38.089748][ T45] EAX: c4f1b094 EBX: 00000000 ECX: c4f1b08c EDX: 00000001 [ 38.091153][ T45] ESI: 00000080 EDI: 00000000 EBP: c0c03f60 ESP: c0c03f28 [ 38.092549][ T45] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00010246 [ 38.093938][ T45] CR0: 80050033 CR2: 00000000 CR3: 023d0000 CR4: 00040690 [ 38.095291][ T45] Call Trace: [ 38.095913][ T45] ? show_regs (arch/x86/kernel/dumpstack.c:478) [ 38.096866][ T45] ? ring_buffer_consumer (kernel/trace/ring_buffer_benchmark.c:147) [ 38.097962][ T45] ? __warn (kernel/panic.c:236 kernel/panic.c:677) [ 38.098783][ T45] ? ring_buffer_consumer (kernel/trace/ring_buffer_benchmark.c:147) [ 38.099849][ T45] ? ring_buffer_consumer (kernel/trace/ring_buffer_benchmark.c:147) [ 38.100987][ T45] ? report_bug (lib/bug.c:199) [ 38.101835][ T45] ? exc_overflow (arch/x86/kernel/traps.c:250) [ 38.102705][ T45] ? handle_bug (arch/x86/kernel/traps.c:237) [ 38.103537][ T45] ? exc_invalid_op (arch/x86/kernel/traps.c:258) [ 38.104583][ T45] ? handle_exception (arch/x86/entry/entry_32.S:1049) [ 38.105519][ T45] ? exc_overflow (arch/x86/kernel/traps.c:250) [ 38.106381][ T45] ? ring_buffer_consumer (kernel/trace/ring_buffer_benchmark.c:147) [ 38.107426][ T45] ? exc_overflow (arch/x86/kernel/traps.c:250) [ 38.108429][ T45] ? ring_buffer_consumer (kernel/trace/ring_buffer_benchmark.c:147) [ 38.109508][ T45] ? trace_hardirqs_on (kernel/trace/trace_preemptirq.c:63) [ 38.110505][ T45] ? complete (kernel/sched/completion.c:48) [ 38.111212][ T45] ring_buffer_consumer_thread (arch/x86/include/asm/current.h:41 kernel/trace/ring_buffer_benchmark.c:388) [ 38.112335][ T45] kthread (kernel/kthread.c:390) [ 38.113096][ T45] ? rb_check_timestamp (kernel/trace/ring_buffer_benchmark.c:382) [ 38.114061][ T45] ? kthread_unuse_mm (kernel/kthread.c:341) [ 38.114962][ T45] ? kthread_unuse_mm (kernel/kthread.c:341) [ 38.115897][ T45] ret_from_fork (arch/x86/kernel/process.c:153) [ 38.116892][ T45] ret_from_fork_asm (arch/x86/entry/entry_32.S:741) [ 38.117827][ T45] entry_INT80_32 (arch/x86/entry/entry_32.S:947) [ 38.118756][ T45] irq event stamp: 45237315 [ 38.119660][ T45] hardirqs last enabled at (45237323): console_unlock (arch/x86/include/asm/irqflags.h:26 arch/x86/include/asm/irqflags.h:67 arch/x86/include/asm/irqflags.h:127 kernel/printk/printk.c:341 kernel/printk/printk.c:2706 kernel/printk/printk.c:3038) [ 38.121456][ T45] hardirqs last disabled at (45237572): console_unlock (kernel/printk/printk.c:339) [ 38.123207][ T45] softirqs last enabled at (45237570): do_softirq_own_stack (arch/x86/kernel/irq_32.c:57 arch/x86/kernel/irq_32.c:147) [ 38.125116][ T45] softirqs last disabled at (45237589): do_softirq_own_stack (arch/x86/kernel/irq_32.c:57 arch/x86/kernel/irq_32.c:147) [ 38.126991][ T45] ---[ end trace 0000000000000000 ]--- The kernel config and materials to reproduce are available at: https://download.01.org/0day-ci/archive/20231212/202312121655.f8f36552-oliver.s...@intel.com -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki