Hello,

kernel test robot noticed 
"WARNING:at_kernel/trace/trace.c:#run_tracer_selftest" on:

commit: 1c96d64aa1853ed6272439901bb8daa85b012d89 ("function_graph: Add a new 
entry handler with parent_ip and ftrace_regs")
https://git.kernel.org/cgit/linux/kernel/git/mhiramat/linux.git 
topic/fprobe-on-fgraph

in testcase: boot

compiler: gcc-12
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G

(please refer to attached dmesg/kmsg for entire log/backtrace)


+----------------------------------------------------------------------------------+------------+------------+
|                                                                               
   | c9e840a68b | 1c96d64aa1 |
+----------------------------------------------------------------------------------+------------+------------+
| WARNING:at_kernel/trace/trace.c:#run_tracer_selftest                          
   | 0          | 6          |
| EIP:run_tracer_selftest                                                       
   | 0          | 6          |
+----------------------------------------------------------------------------------+------------+------------+


If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.s...@intel.com>
| Closes: 
https://lore.kernel.org/oe-lkp/202311241731.d1159c9f-oliver.s...@intel.com


[   10.938801][    T1] ------------[ cut here ]------------
[ 10.938801][ T1] WARNING: CPU: 1 PID: 1 at kernel/trace/trace.c:2030 
run_tracer_selftest (kernel/trace/trace.c:2030) 
[   10.939915][    T1] Modules linked in:
[   10.940689][    T1] CPU: 1 PID: 1 Comm: swapper/0 Not tainted 
6.6.0-rc7-00021-g1c96d64aa185 #1
[   10.945702][    T1] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), 
BIOS 1.16.2-debian-1.16.2-1 04/01/2014
[ 10.947518][ T1] EIP: run_tracer_selftest (kernel/trace/trace.c:2030) 
[ 10.948530][ T1] Code: 00 00 00 00 66 90 8b 15 ac 05 1d c3 a1 e8 05 1d c3 b9 
ff ff ff ff e8 07 5c ff ff e9 29 fe ff ff 68 2f 0b be c2 e8 b4 8d f5 ff <0f> 0b 
b8 ff ff ff ff 5a e9 a5 fe ff ff b8 f4 ff ff ff e9 9b fe ff
All code
========
   0:   00 00                   add    %al,(%rax)
   2:   00 00                   add    %al,(%rax)
   4:   66 90                   xchg   %ax,%ax
   6:   8b 15 ac 05 1d c3       mov    -0x3ce2fa54(%rip),%edx        # 
0xffffffffc31d05b8
   c:   a1 e8 05 1d c3 b9 ff    movabs 0xffffffb9c31d05e8,%eax
  13:   ff ff 
  15:   ff                      (bad)
  16:   e8 07 5c ff ff          call   0xffffffffffff5c22
  1b:   e9 29 fe ff ff          jmp    0xfffffffffffffe49
  20:   68 2f 0b be c2          push   $0xffffffffc2be0b2f
  25:   e8 b4 8d f5 ff          call   0xfffffffffff58dde
  2a:*  0f 0b                   ud2             <-- trapping instruction
  2c:   b8 ff ff ff ff          mov    $0xffffffff,%eax
  31:   5a                      pop    %rdx
  32:   e9 a5 fe ff ff          jmp    0xfffffffffffffedc
  37:   b8 f4 ff ff ff          mov    $0xfffffff4,%eax
  3c:   e9                      .byte 0xe9
  3d:   9b                      fwait
  3e:   fe                      (bad)
  3f:   ff                      .byte 0xff

Code starting with the faulting instruction
===========================================
   0:   0f 0b                   ud2
   2:   b8 ff ff ff ff          mov    $0xffffffff,%eax
   7:   5a                      pop    %rdx
   8:   e9 a5 fe ff ff          jmp    0xfffffffffffffeb2
   d:   b8 f4 ff ff ff          mov    $0xfffffff4,%eax
  12:   e9                      .byte 0xe9
  13:   9b                      fwait
  14:   fe                      (bad)
  15:   ff                      .byte 0xff
[   10.950058][    T1] EAX: 00000007 EBX: c345a6a0 ECX: 00000000 EDX: 00000000
[   10.951304][    T1] ESI: c2be3ee0 EDI: c4434400 EBP: c4d97ee4 ESP: c4d97ed4
[   10.952559][    T1] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 
00010246
[   10.953640][    T1] CR0: 80050033 CR2: 00000000 CR3: 03696000 CR4: 000406d0
[   10.954878][    T1] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[   10.956215][    T1] DR6: fffe0ff0 DR7: 00000400
[   10.957111][    T1] Call Trace:
[ 10.957426][ T1] ? show_regs (arch/x86/kernel/dumpstack.c:479 
arch/x86/kernel/dumpstack.c:465) 
[ 10.958254][ T1] ? run_tracer_selftest (kernel/trace/trace.c:2030) 
[ 10.959206][ T1] ? __warn (kernel/panic.c:673) 
[ 10.960018][ T1] ? run_tracer_selftest (kernel/trace/trace.c:2030) 
[ 10.960992][ T1] ? report_bug (lib/bug.c:201 lib/bug.c:219) 
[ 10.961462][ T1] ? exc_overflow (arch/x86/kernel/traps.c:250) 
[ 10.962321][ T1] ? handle_bug (arch/x86/kernel/traps.c:216) 
[ 10.963166][ T1] ? exc_invalid_op (arch/x86/kernel/traps.c:258 (discriminator 
1)) 
[ 10.964052][ T1] ? handle_exception (arch/x86/entry/entry_32.S:1056) 
[ 10.965001][ T1] ? exc_overflow (arch/x86/kernel/traps.c:250) 
[ 10.965461][ T1] ? run_tracer_selftest (kernel/trace/trace.c:2030) 
[ 10.966444][ T1] ? exc_overflow (arch/x86/kernel/traps.c:250) 
[ 10.967306][ T1] ? run_tracer_selftest (kernel/trace/trace.c:2030) 
[ 10.968289][ T1] register_tracer (kernel/trace/trace.c:2064 
kernel/trace/trace.c:2187) 
[ 10.969155][ T1] ? init_graph_tracefs 
(kernel/trace/trace_functions_graph.c:1448) 
[ 10.969155][ T1] init_graph_trace (kernel/trace/trace_functions_graph.c:1462) 
[ 10.969155][ T1] do_one_initcall (init/main.c:1232) 
[ 10.969155][ T1] ? parameq (include/linux/fortify-string.h:214 
kernel/params.c:98) 
[ 10.969155][ T1] do_initcalls (init/main.c:1293 init/main.c:1310) 
[ 10.969155][ T1] ? rest_init (init/main.c:1429) 
[ 10.969155][ T1] kernel_init_freeable (init/main.c:1549) 
[ 10.969155][ T1] kernel_init (init/main.c:1439) 
[ 10.969155][ T1] ret_from_fork (arch/x86/kernel/process.c:153) 
[ 10.969155][ T1] ? rest_init (init/main.c:1429) 
[ 10.973466][ T1] ret_from_fork_asm (arch/x86/entry/entry_32.S:741) 
[ 10.974376][ T1] entry_INT80_32 (arch/x86/entry/entry_32.S:947) 
[   10.975233][    T1] irq event stamp: 4679531
[ 10.976101][ T1] hardirqs last enabled at (4679541): console_unlock 
(arch/x86/include/asm/irqflags.h:42 arch/x86/include/asm/irqflags.h:77 
arch/x86/include/asm/irqflags.h:135 kernel/printk/printk.c:347 
kernel/printk/printk.c:2718 kernel/printk/printk.c:3037) 
[ 10.977685][ T1] hardirqs last disabled at (4679552): console_unlock 
(kernel/printk/printk.c:345 kernel/printk/printk.c:2718 
kernel/printk/printk.c:3037) 
[ 10.979295][ T1] softirqs last enabled at (4679152): __do_softirq 
(arch/x86/include/asm/preempt.h:27 kernel/softirq.c:400 kernel/softirq.c:582) 
[ 10.980885][ T1] softirqs last disabled at (4679147): do_softirq_own_stack 
(arch/x86/kernel/irq_32.c:57 arch/x86/kernel/irq_32.c:147) 
[   10.981739][    T1] ---[ end trace 0000000000000000 ]---
[   10.983191][    T1] pinctrl core: initialized pinctrl subsystem



The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20231124/202311241731.d1159c9f-oliver.s...@intel.com



-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki


Reply via email to