From: kernel test robot <oliver.sang@intel.com> To: Valentin Schneider <vschneid@redhat.com> Cc: <oe-lkp@lists.linux.dev>, <lkp@intel.com>, Josh Poimboeuf <jpoimboe@kernel.org>, <linux-kernel@vger.kernel.org>, <ltp@lists.linux.it>, <kvm@vger.kernel.org>, <linux-arch@vger.kernel.org>, <x86@kernel.org>, "Thomas Gleixner" <tglx@linutronix.de>, Borislav Petkov <bp@alien8.de>, Peter Zijlstra <peterz@infradead.org>, Pawan Gupta <pawan.kumar.gupta@linux.intel.com>, "Ingo Molnar" <mingo@redhat.com>, Dave Hansen <dave.hansen@linux.intel.com>, "H. Peter Anvin" <hpa@zytor.com>, Paolo Bonzini <pbonzini@redhat.com>, Wanpeng Li <wanpengli@tencent.com>, Vitaly Kuznetsov <vkuznets@redhat.com>, "Arnd Bergmann" <arnd@arndb.de>, Jason Baron <jbaron@akamai.com>, Steven Rostedt <rostedt@goodmis.org>, Ard Biesheuvel <ardb@kernel.org>, Frederic Weisbecker <frederic@kernel.org>, "Paul E. McKenney" <paulmck@kernel.org>, Feng Tang <feng.tang@intel.com>, Andrew Morton <akpm@linux-foundation.org>, "Mike Rapoport (IBM)" <rppt@kernel.org>, Vlastimil Babka <vbabka@suse.cz>, "David Hildenbrand" <david@redhat.com>, "ndesaulniers@google.com" <ndesaulniers@google.com>, Michael Kelley <mikelley@microsoft.com>, "Masami Hiramatsu (Google)" <mhiramat@kernel.org>, <oliver.sang@intel.com> Subject: Re: [PATCH v2 2/5] context_tracking: Make context_tracking_key __ro_after_init Date: Mon, 19 Feb 2024 14:10:40 +0800 [thread overview] Message-ID: <202402191313.3276317d-oliver.sang@intel.com> (raw) In-Reply-To: <20240206173911.4131670-3-vschneid@redhat.com> Hello, kernel test robot noticed "WARNING:at_kernel/jump_label.c:#jump_label_del_module" on: commit: b42c2f5e8e4d403b5891b566b015177c8f471858 ("[PATCH v2 2/5] context_tracking: Make context_tracking_key __ro_after_init") url: https://github.com/intel-lab-lkp/linux/commits/Valentin-Schneider/jump_label-module-Don-t-alloc-static_key_mod-for-__ro_after_init-keys/20240207-014501 base: https://git.kernel.org/cgit/virt/kvm/kvm.git queue patch link: https://lore.kernel.org/all/20240206173911.4131670-3-vschneid@redhat.com/ patch subject: [PATCH v2 2/5] context_tracking: Make context_tracking_key __ro_after_init in testcase: ltp version: ltp-x86_64-14c1f76-1_20230715 with following parameters: test: kernel_misc compiler: gcc-12 test machine: 8 threads 1 sockets Intel(R) Core(TM) i7-3770K CPU @ 3.50GHz (Ivy Bridge) with 16G memory (please refer to attached dmesg/kmsg for entire log/backtrace) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot <oliver.sang@intel.com> | Closes: https://lore.kernel.org/oe-lkp/202402191313.3276317d-oliver.sang@intel.com [ 215.214621][ T3608] ------------[ cut here ]------------ [ 215.214849][ T3608] WARNING: CPU: 1 PID: 3608 at kernel/jump_label.c:764 jump_label_del_module (kernel/jump_label.c:764 (discriminator 1)) [ 215.215123][ T3608] Modules linked in: rcutorture(-) torture netconsole btrfs blake2b_generic xor raid6_pq zstd_compress libcrc32c intel_rapl_msr intel_rapl_common x86_pkg_temp_thermal intel_powerclamp sd_mod t10_pi coretemp crc64_rocksoft_generic crc64_rocksoft kvm_intel crc64 sg ipmi_devintf i915 ipmi_msghandler kvm irqbypass crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel sha512_ssse3 drm_buddy rapl intel_gtt intel_cstate drm_display_helper mxm_wmi firewire_ohci ttm ahci firewire_core libahci drm_kms_helper intel_uncore crc_itu_t libata i2c_i801 video i2c_smbus lpc_ich wmi binfmt_misc fuse drm ip_tables [ 215.216369][ T3608] CPU: 1 PID: 3608 Comm: modprobe Not tainted 6.7.0-rc7-00234-gb42c2f5e8e4d #1 [ 215.216637][ T3608] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 215.216918][ T3608] RIP: 0010:jump_label_del_module (kernel/jump_label.c:764 (discriminator 1)) [ 215.217162][ T3608] Code: 03 75 35 83 e6 03 48 09 f0 4c 89 fe 48 c1 ee 03 80 3c 2e 00 0f 85 cf 01 00 00 49 89 45 08 e9 bf fe ff ff 0f 0b e9 6b ff ff ff <0f> 0b e9 64 ff ff ff 0f 0b e9 e2 fe ff ff 0f 0b eb c7 0f 0b e9 19 All code ======== 0: 03 75 35 add 0x35(%rbp),%esi 3: 83 e6 03 and $0x3,%esi 6: 48 09 f0 or %rsi,%rax 9: 4c 89 fe mov %r15,%rsi c: 48 c1 ee 03 shr $0x3,%rsi 10: 80 3c 2e 00 cmpb $0x0,(%rsi,%rbp,1) 14: 0f 85 cf 01 00 00 jne 0x1e9 1a: 49 89 45 08 mov %rax,0x8(%r13) 1e: e9 bf fe ff ff jmpq 0xfffffffffffffee2 23: 0f 0b ud2 25: e9 6b ff ff ff jmpq 0xffffffffffffff95 2a:* 0f 0b ud2 <-- trapping instruction 2c: e9 64 ff ff ff jmpq 0xffffffffffffff95 31: 0f 0b ud2 33: e9 e2 fe ff ff jmpq 0xffffffffffffff1a 38: 0f 0b ud2 3a: eb c7 jmp 0x3 3c: 0f 0b ud2 3e: e9 .byte 0xe9 3f: 19 .byte 0x19 Code starting with the faulting instruction =========================================== 0: 0f 0b ud2 2: e9 64 ff ff ff jmpq 0xffffffffffffff6b 7: 0f 0b ud2 9: e9 e2 fe ff ff jmpq 0xfffffffffffffef0 e: 0f 0b ud2 10: eb c7 jmp 0xffffffffffffffd9 12: 0f 0b ud2 14: e9 .byte 0xe9 15: 19 .byte 0x19 [ 215.217593][ T3608] RSP: 0018:ffffc9000159fd38 EFLAGS: 00010297 [ 215.217877][ T3608] RAX: 1ffffffff089982f RBX: 0000000000000000 RCX: ffffffffc14dc060 [ 215.218140][ T3608] RDX: ffffffffc1c6b580 RSI: 0000000000000002 RDI: ffffffffc14dc000 [ 215.218409][ T3608] RBP: dffffc0000000000 R08: ffffffffc1c6b8b8 R09: fffff520002b3fa6 [ 215.218636][ T3608] R10: ffffc9000159fd37 R11: 0000000000000001 R12: ffffffff844cc178 [ 215.218935][ T3608] R13: ffffffff844cc170 R14: ffffffffc14dc008 R15: ffffffff844cc178 [ 215.219166][ T3608] FS: 00007f5e44068580(0000) GS:ffff888348080000(0000) knlGS:0000000000000000 [ 215.219459][ T3608] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 215.219717][ T3608] CR2: 00007fceb9a28008 CR3: 00000001a718e005 CR4: 00000000001706f0 [ 215.219956][ T3608] Call Trace: [ 215.220126][ T3608] <TASK> [ 215.220307][ T3608] ? __warn (kernel/panic.c:677) [ 215.220503][ T3608] ? jump_label_del_module (kernel/jump_label.c:764 (discriminator 1)) [ 215.220745][ T3608] ? report_bug (lib/bug.c:180 lib/bug.c:219) [ 215.220961][ T3608] ? handle_bug (arch/x86/kernel/traps.c:237) [ 215.221126][ T3608] ? exc_invalid_op (arch/x86/kernel/traps.c:258 (discriminator 1)) [ 215.221288][ T3608] ? asm_exc_invalid_op (arch/x86/include/asm/idtentry.h:568) [ 215.221543][ T3608] ? jump_label_del_module (kernel/jump_label.c:764 (discriminator 1)) [ 215.221835][ T3608] ? jump_label_add_module (kernel/jump_label.c:787) [ 215.222061][ T3608] jump_label_module_notify (kernel/jump_label.c:32 kernel/jump_label.c:807) [ 215.222255][ T3608] notifier_call_chain (kernel/notifier.c:95) [ 215.222433][ T3608] ? mutex_unlock (arch/x86/include/asm/atomic64_64.h:109 include/linux/atomic/atomic-arch-fallback.h:4308 include/linux/atomic/atomic-long.h:1499 include/linux/atomic/atomic-instrumented.h:4446 kernel/locking/mutex.c:181 kernel/locking/mutex.c:540) [ 215.222603][ T3608] blocking_notifier_call_chain (kernel/notifier.c:389 kernel/notifier.c:376) [ 215.222845][ T3608] __do_sys_delete_module+0x32a/0x540 [ 215.223066][ T3608] ? module_flags (kernel/module/main.c:698) [ 215.223239][ T3608] ? __x64_sys_close (fs/open.c:1590 fs/open.c:1572 fs/open.c:1572) [ 215.223526][ T3608] ? kmem_cache_free (mm/slub.c:1826 mm/slub.c:3809 mm/slub.c:3831) [ 215.223772][ T3608] do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) [ 215.224010][ T3608] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:129) [ 215.224246][ T3608] RIP: 0033:0x7f5e44177847 [ 215.224423][ T3608] Code: 73 01 c3 48 8b 0d b9 85 0c 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 b0 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 89 85 0c 00 f7 d8 64 89 01 48 All code ======== 0: 73 01 jae 0x3 2: c3 retq 3: 48 8b 0d b9 85 0c 00 mov 0xc85b9(%rip),%rcx # 0xc85c3 a: f7 d8 neg %eax c: 64 89 01 mov %eax,%fs:(%rcx) f: 48 83 c8 ff or $0xffffffffffffffff,%rax 13: c3 retq 14: 66 2e 0f 1f 84 00 00 nopw %cs:0x0(%rax,%rax,1) 1b: 00 00 00 1e: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 23: b8 b0 00 00 00 mov $0xb0,%eax 28: 0f 05 syscall 2a:* 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax <-- trapping instruction 30: 73 01 jae 0x33 32: c3 retq 33: 48 8b 0d 89 85 0c 00 mov 0xc8589(%rip),%rcx # 0xc85c3 3a: f7 d8 neg %eax 3c: 64 89 01 mov %eax,%fs:(%rcx) 3f: 48 rex.W Code starting with the faulting instruction =========================================== 0: 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax 6: 73 01 jae 0x9 8: c3 retq 9: 48 8b 0d 89 85 0c 00 mov 0xc8589(%rip),%rcx # 0xc8599 10: f7 d8 neg %eax 12: 64 89 01 mov %eax,%fs:(%rcx) 15: 48 rex.W [ 215.224940][ T3608] RSP: 002b:00007ffedaff1e88 EFLAGS: 00000206 ORIG_RAX: 00000000000000b0 [ 215.225209][ T3608] RAX: ffffffffffffffda RBX: 0000562acd24d150 RCX: 00007f5e44177847 [ 215.225467][ T3608] RDX: 0000000000000000 RSI: 0000000000000800 RDI: 0000562acd24d1b8 [ 215.225754][ T3608] RBP: 0000000000000000 R08: 1999999999999999 R09: 0000000000000000 [ 215.226033][ T3608] R10: 00007f5e441eaac0 R11: 0000000000000206 R12: 0000000000000000 [ 215.226303][ T3608] R13: 0000000000000000 R14: 00007ffedaff1ec0 R15: 00007ffedaff3378 [ 215.226579][ T3608] </TASK> [ 215.226794][ T3608] ---[ end trace 0000000000000000 ]--- The kernel config and materials to reproduce are available at: https://download.01.org/0day-ci/archive/20240219/202402191313.3276317d-oliver.sang@intel.com -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki
WARNING: multiple messages have this Message-ID (diff)
From: kernel test robot <oliver.sang@intel.com> To: Valentin Schneider <vschneid@redhat.com> Cc: Feng Tang <feng.tang@intel.com>, Wanpeng Li <wanpengli@tencent.com>, kvm@vger.kernel.org, David Hildenbrand <david@redhat.com>, Peter Zijlstra <peterz@infradead.org>, Dave Hansen <dave.hansen@linux.intel.com>, Michael Kelley <mikelley@microsoft.com>, "H. Peter Anvin" <hpa@zytor.com>, Ard Biesheuvel <ardb@kernel.org>, linux-arch@vger.kernel.org, lkp@intel.com, "Paul E. McKenney" <paulmck@kernel.org>, x86@kernel.org, Ingo Molnar <mingo@redhat.com>, Pawan Gupta <pawan.kumar.gupta@linux.intel.com>, Vlastimil Babka <vbabka@suse.cz>, Arnd Bergmann <arnd@arndb.de>, Frederic Weisbecker <frederic@kernel.org>, Steven Rostedt <rostedt@goodmis.org>, Jason Baron <jbaron@akamai.com>, Borislav Petkov <bp@alien8.de>, Thomas Gleixner <tglx@linutronix.de>, Josh Poimboeuf <jpoimboe@kernel.org>, ltp@lists.linux.it, Andrew Morton <akpm@linux-foundation.org>, "ndesaulniers@google.com" <ndesaulniers@google.com>, linux-kernel@vger.kernel.org, oliver.sang@intel.com, "Masami Hiramatsu \(Google\)" <mhiramat@kernel.org>, oe-lkp@lists.linux.dev, Paolo Bonzini <pbonzini@redhat.com>, Vitaly Kuznetsov <vkuznets@redhat.com>, "Mike Rapoport \(IBM\)" <rppt@kernel.org> Subject: Re: [LTP] [PATCH v2 2/5] context_tracking: Make context_tracking_key __ro_after_init Date: Mon, 19 Feb 2024 14:10:40 +0800 [thread overview] Message-ID: <202402191313.3276317d-oliver.sang@intel.com> (raw) In-Reply-To: <20240206173911.4131670-3-vschneid@redhat.com> Hello, kernel test robot noticed "WARNING:at_kernel/jump_label.c:#jump_label_del_module" on: commit: b42c2f5e8e4d403b5891b566b015177c8f471858 ("[PATCH v2 2/5] context_tracking: Make context_tracking_key __ro_after_init") url: https://github.com/intel-lab-lkp/linux/commits/Valentin-Schneider/jump_label-module-Don-t-alloc-static_key_mod-for-__ro_after_init-keys/20240207-014501 base: https://git.kernel.org/cgit/virt/kvm/kvm.git queue patch link: https://lore.kernel.org/all/20240206173911.4131670-3-vschneid@redhat.com/ patch subject: [PATCH v2 2/5] context_tracking: Make context_tracking_key __ro_after_init in testcase: ltp version: ltp-x86_64-14c1f76-1_20230715 with following parameters: test: kernel_misc compiler: gcc-12 test machine: 8 threads 1 sockets Intel(R) Core(TM) i7-3770K CPU @ 3.50GHz (Ivy Bridge) with 16G memory (please refer to attached dmesg/kmsg for entire log/backtrace) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot <oliver.sang@intel.com> | Closes: https://lore.kernel.org/oe-lkp/202402191313.3276317d-oliver.sang@intel.com [ 215.214621][ T3608] ------------[ cut here ]------------ [ 215.214849][ T3608] WARNING: CPU: 1 PID: 3608 at kernel/jump_label.c:764 jump_label_del_module (kernel/jump_label.c:764 (discriminator 1)) [ 215.215123][ T3608] Modules linked in: rcutorture(-) torture netconsole btrfs blake2b_generic xor raid6_pq zstd_compress libcrc32c intel_rapl_msr intel_rapl_common x86_pkg_temp_thermal intel_powerclamp sd_mod t10_pi coretemp crc64_rocksoft_generic crc64_rocksoft kvm_intel crc64 sg ipmi_devintf i915 ipmi_msghandler kvm irqbypass crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel sha512_ssse3 drm_buddy rapl intel_gtt intel_cstate drm_display_helper mxm_wmi firewire_ohci ttm ahci firewire_core libahci drm_kms_helper intel_uncore crc_itu_t libata i2c_i801 video i2c_smbus lpc_ich wmi binfmt_misc fuse drm ip_tables [ 215.216369][ T3608] CPU: 1 PID: 3608 Comm: modprobe Not tainted 6.7.0-rc7-00234-gb42c2f5e8e4d #1 [ 215.216637][ T3608] Hardware name: /DZ77BH-55K, BIOS BHZ7710H.86A.0097.2012.1228.1346 12/28/2012 [ 215.216918][ T3608] RIP: 0010:jump_label_del_module (kernel/jump_label.c:764 (discriminator 1)) [ 215.217162][ T3608] Code: 03 75 35 83 e6 03 48 09 f0 4c 89 fe 48 c1 ee 03 80 3c 2e 00 0f 85 cf 01 00 00 49 89 45 08 e9 bf fe ff ff 0f 0b e9 6b ff ff ff <0f> 0b e9 64 ff ff ff 0f 0b e9 e2 fe ff ff 0f 0b eb c7 0f 0b e9 19 All code ======== 0: 03 75 35 add 0x35(%rbp),%esi 3: 83 e6 03 and $0x3,%esi 6: 48 09 f0 or %rsi,%rax 9: 4c 89 fe mov %r15,%rsi c: 48 c1 ee 03 shr $0x3,%rsi 10: 80 3c 2e 00 cmpb $0x0,(%rsi,%rbp,1) 14: 0f 85 cf 01 00 00 jne 0x1e9 1a: 49 89 45 08 mov %rax,0x8(%r13) 1e: e9 bf fe ff ff jmpq 0xfffffffffffffee2 23: 0f 0b ud2 25: e9 6b ff ff ff jmpq 0xffffffffffffff95 2a:* 0f 0b ud2 <-- trapping instruction 2c: e9 64 ff ff ff jmpq 0xffffffffffffff95 31: 0f 0b ud2 33: e9 e2 fe ff ff jmpq 0xffffffffffffff1a 38: 0f 0b ud2 3a: eb c7 jmp 0x3 3c: 0f 0b ud2 3e: e9 .byte 0xe9 3f: 19 .byte 0x19 Code starting with the faulting instruction =========================================== 0: 0f 0b ud2 2: e9 64 ff ff ff jmpq 0xffffffffffffff6b 7: 0f 0b ud2 9: e9 e2 fe ff ff jmpq 0xfffffffffffffef0 e: 0f 0b ud2 10: eb c7 jmp 0xffffffffffffffd9 12: 0f 0b ud2 14: e9 .byte 0xe9 15: 19 .byte 0x19 [ 215.217593][ T3608] RSP: 0018:ffffc9000159fd38 EFLAGS: 00010297 [ 215.217877][ T3608] RAX: 1ffffffff089982f RBX: 0000000000000000 RCX: ffffffffc14dc060 [ 215.218140][ T3608] RDX: ffffffffc1c6b580 RSI: 0000000000000002 RDI: ffffffffc14dc000 [ 215.218409][ T3608] RBP: dffffc0000000000 R08: ffffffffc1c6b8b8 R09: fffff520002b3fa6 [ 215.218636][ T3608] R10: ffffc9000159fd37 R11: 0000000000000001 R12: ffffffff844cc178 [ 215.218935][ T3608] R13: ffffffff844cc170 R14: ffffffffc14dc008 R15: ffffffff844cc178 [ 215.219166][ T3608] FS: 00007f5e44068580(0000) GS:ffff888348080000(0000) knlGS:0000000000000000 [ 215.219459][ T3608] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 215.219717][ T3608] CR2: 00007fceb9a28008 CR3: 00000001a718e005 CR4: 00000000001706f0 [ 215.219956][ T3608] Call Trace: [ 215.220126][ T3608] <TASK> [ 215.220307][ T3608] ? __warn (kernel/panic.c:677) [ 215.220503][ T3608] ? jump_label_del_module (kernel/jump_label.c:764 (discriminator 1)) [ 215.220745][ T3608] ? report_bug (lib/bug.c:180 lib/bug.c:219) [ 215.220961][ T3608] ? handle_bug (arch/x86/kernel/traps.c:237) [ 215.221126][ T3608] ? exc_invalid_op (arch/x86/kernel/traps.c:258 (discriminator 1)) [ 215.221288][ T3608] ? asm_exc_invalid_op (arch/x86/include/asm/idtentry.h:568) [ 215.221543][ T3608] ? jump_label_del_module (kernel/jump_label.c:764 (discriminator 1)) [ 215.221835][ T3608] ? jump_label_add_module (kernel/jump_label.c:787) [ 215.222061][ T3608] jump_label_module_notify (kernel/jump_label.c:32 kernel/jump_label.c:807) [ 215.222255][ T3608] notifier_call_chain (kernel/notifier.c:95) [ 215.222433][ T3608] ? mutex_unlock (arch/x86/include/asm/atomic64_64.h:109 include/linux/atomic/atomic-arch-fallback.h:4308 include/linux/atomic/atomic-long.h:1499 include/linux/atomic/atomic-instrumented.h:4446 kernel/locking/mutex.c:181 kernel/locking/mutex.c:540) [ 215.222603][ T3608] blocking_notifier_call_chain (kernel/notifier.c:389 kernel/notifier.c:376) [ 215.222845][ T3608] __do_sys_delete_module+0x32a/0x540 [ 215.223066][ T3608] ? module_flags (kernel/module/main.c:698) [ 215.223239][ T3608] ? __x64_sys_close (fs/open.c:1590 fs/open.c:1572 fs/open.c:1572) [ 215.223526][ T3608] ? kmem_cache_free (mm/slub.c:1826 mm/slub.c:3809 mm/slub.c:3831) [ 215.223772][ T3608] do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) [ 215.224010][ T3608] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:129) [ 215.224246][ T3608] RIP: 0033:0x7f5e44177847 [ 215.224423][ T3608] Code: 73 01 c3 48 8b 0d b9 85 0c 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 b0 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 89 85 0c 00 f7 d8 64 89 01 48 All code ======== 0: 73 01 jae 0x3 2: c3 retq 3: 48 8b 0d b9 85 0c 00 mov 0xc85b9(%rip),%rcx # 0xc85c3 a: f7 d8 neg %eax c: 64 89 01 mov %eax,%fs:(%rcx) f: 48 83 c8 ff or $0xffffffffffffffff,%rax 13: c3 retq 14: 66 2e 0f 1f 84 00 00 nopw %cs:0x0(%rax,%rax,1) 1b: 00 00 00 1e: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 23: b8 b0 00 00 00 mov $0xb0,%eax 28: 0f 05 syscall 2a:* 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax <-- trapping instruction 30: 73 01 jae 0x33 32: c3 retq 33: 48 8b 0d 89 85 0c 00 mov 0xc8589(%rip),%rcx # 0xc85c3 3a: f7 d8 neg %eax 3c: 64 89 01 mov %eax,%fs:(%rcx) 3f: 48 rex.W Code starting with the faulting instruction =========================================== 0: 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax 6: 73 01 jae 0x9 8: c3 retq 9: 48 8b 0d 89 85 0c 00 mov 0xc8589(%rip),%rcx # 0xc8599 10: f7 d8 neg %eax 12: 64 89 01 mov %eax,%fs:(%rcx) 15: 48 rex.W [ 215.224940][ T3608] RSP: 002b:00007ffedaff1e88 EFLAGS: 00000206 ORIG_RAX: 00000000000000b0 [ 215.225209][ T3608] RAX: ffffffffffffffda RBX: 0000562acd24d150 RCX: 00007f5e44177847 [ 215.225467][ T3608] RDX: 0000000000000000 RSI: 0000000000000800 RDI: 0000562acd24d1b8 [ 215.225754][ T3608] RBP: 0000000000000000 R08: 1999999999999999 R09: 0000000000000000 [ 215.226033][ T3608] R10: 00007f5e441eaac0 R11: 0000000000000206 R12: 0000000000000000 [ 215.226303][ T3608] R13: 0000000000000000 R14: 00007ffedaff1ec0 R15: 00007ffedaff3378 [ 215.226579][ T3608] </TASK> [ 215.226794][ T3608] ---[ end trace 0000000000000000 ]--- The kernel config and materials to reproduce are available at: https://download.01.org/0day-ci/archive/20240219/202402191313.3276317d-oliver.sang@intel.com -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki -- Mailing list info: https://lists.linux.it/listinfo/ltp
next prev parent reply other threads:[~2024-02-19 6:11 UTC|newest] Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top 2024-02-06 17:39 [PATCH v2 0/5] jump_label: Fix __ro_after_init keys for modules & annotate some keys Valentin Schneider 2024-02-06 17:39 ` [PATCH v2 1/5] jump_label,module: Don't alloc static_key_mod for __ro_after_init keys Valentin Schneider 2024-02-06 17:39 ` [PATCH v2 2/5] context_tracking: Make context_tracking_key __ro_after_init Valentin Schneider 2024-02-19 6:10 ` kernel test robot [this message] 2024-02-19 6:10 ` [LTP] " kernel test robot 2024-02-06 17:39 ` [PATCH v2 3/5] x86/kvm: Make kvm_async_pf_enabled __ro_after_init Valentin Schneider 2024-02-06 17:39 ` [PATCH v2 4/5] x86/speculation: Make mds_user_clear __ro_after_init Valentin Schneider 2024-02-06 17:39 ` [PATCH v2 5/5] x86/tsc: Make __use_tsc __ro_after_init Valentin Schneider
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=202402191313.3276317d-oliver.sang@intel.com \ --to=oliver.sang@intel.com \ --cc=akpm@linux-foundation.org \ --cc=ardb@kernel.org \ --cc=arnd@arndb.de \ --cc=bp@alien8.de \ --cc=dave.hansen@linux.intel.com \ --cc=david@redhat.com \ --cc=feng.tang@intel.com \ --cc=frederic@kernel.org \ --cc=hpa@zytor.com \ --cc=jbaron@akamai.com \ --cc=jpoimboe@kernel.org \ --cc=kvm@vger.kernel.org \ --cc=linux-arch@vger.kernel.org \ --cc=linux-kernel@vger.kernel.org \ --cc=lkp@intel.com \ --cc=ltp@lists.linux.it \ --cc=mhiramat@kernel.org \ --cc=mikelley@microsoft.com \ --cc=mingo@redhat.com \ --cc=ndesaulniers@google.com \ --cc=oe-lkp@lists.linux.dev \ --cc=paulmck@kernel.org \ --cc=pawan.kumar.gupta@linux.intel.com \ --cc=pbonzini@redhat.com \ --cc=peterz@infradead.org \ --cc=rostedt@goodmis.org \ --cc=rppt@kernel.org \ --cc=tglx@linutronix.de \ --cc=vbabka@suse.cz \ --cc=vkuznets@redhat.com \ --cc=vschneid@redhat.com \ --cc=wanpengli@tencent.com \ --cc=x86@kernel.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.