Hello,

kernel test robot noticed 
"WARNING:at_kernel/trace/trace_events.c:#trace_event_raw_init" on:

commit: 65a25d9f7ac02e0cf361356e834d1c71d36acca9 ("tracing: Add "%s" check in 
test_event_printk()")
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master

[test failed on linus/master      8faabc041a001140564f718dabe37753e88b37fa]
[test failed on linux-next/master 8155b4ef3466f0e289e8fcc9e6e62f3f4dceeac2]

in testcase: boot

config: i386-randconfig-053-20241220
compiler: clang-19
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G

(please refer to attached dmesg/kmsg for entire log/backtrace)


+--------------------------------------------------------------+------------+------------+
|                                                              | 917110481f | 
65a25d9f7a |
+--------------------------------------------------------------+------------+------------+
| WARNING:at_kernel/trace/trace_events.c:#trace_event_raw_init | 0          | 
18         |
| EIP:trace_event_raw_init                                     | 0          | 
18         |
+--------------------------------------------------------------+------------+------------+


If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <[email protected]>
| Closes: https://lore.kernel.org/oe-lkp/[email protected]


[    0.503105][    T0] ------------[ cut here ]------------
[ 0.503689][ T0] WARNING: CPU: 0 PID: 0 at kernel/trace/trace_events.c:565 
trace_event_raw_init (kernel/trace/trace_events.c:565 (discriminator 12))
[    0.504700][    T0] Modules linked in:
[    0.505081][    T0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G          
      T  6.13.0-rc3-00003-g65a25d9f7ac0 #1 
6c7ccd2413e19711a46a7487fb4ceeafbe928cd0
[    0.506382][    T0] Tainted: [T]=RANDSTRUCT
[    0.506662][    T0] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), 
BIOS 1.16.2-debian-1.16.2-1 04/01/2014
[ 0.507644][ T0] EIP: trace_event_raw_init (kernel/trace/trace_events.c:565 
(discriminator 12))
[ 0.508190][ T0] Code: 89 f0 83 c4 04 09 f8 75 21 b8 88 b2 60 84 89 da 31 c9 6a 
00 e8 cf e5 ff ff 83 c4 04 31 c0 8d 65 f4 5e 5f 5b 5d 31 c9 31 d2 c3 <0f> 0b b8 
88 b2 60 84 89 da 31 c9 6a 00 e8 ac e5 ff ff 89 f2 83 c4
All code
========
   0:   89 f0                   mov    %esi,%eax
   2:   83 c4 04                add    $0x4,%esp
   5:   09 f8                   or     %edi,%eax
   7:   75 21                   jne    0x2a
   9:   b8 88 b2 60 84          mov    $0x8460b288,%eax
   e:   89 da                   mov    %ebx,%edx
  10:   31 c9                   xor    %ecx,%ecx
  12:   6a 00                   push   $0x0
  14:   e8 cf e5 ff ff          call   0xffffffffffffe5e8
  19:   83 c4 04                add    $0x4,%esp
  1c:   31 c0                   xor    %eax,%eax
  1e:   8d 65 f4                lea    -0xc(%rbp),%esp
  21:   5e                      pop    %rsi
  22:   5f                      pop    %rdi
  23:   5b                      pop    %rbx
  24:   5d                      pop    %rbp
  25:   31 c9                   xor    %ecx,%ecx
  27:   31 d2                   xor    %edx,%edx
  29:   c3                      ret
  2a:*  0f 0b                   ud2             <-- trapping instruction
  2c:   b8 88 b2 60 84          mov    $0x8460b288,%eax
  31:   89 da                   mov    %ebx,%edx
  33:   31 c9                   xor    %ecx,%ecx
  35:   6a 00                   push   $0x0
  37:   e8 ac e5 ff ff          call   0xffffffffffffe5e8
  3c:   89 f2                   mov    %esi,%edx
  3e:   83                      .byte 0x83
  3f:   c4                      .byte 0xc4

Code starting with the faulting instruction
===========================================
   0:   0f 0b                   ud2
   2:   b8 88 b2 60 84          mov    $0x8460b288,%eax
   7:   89 da                   mov    %ebx,%edx
   9:   31 c9                   xor    %ecx,%ecx
   b:   6a 00                   push   $0x0
   d:   e8 ac e5 ff ff          call   0xffffffffffffe5be
  12:   89 f2                   mov    %esi,%edx
  14:   83                      .byte 0x83
  15:   c4                      .byte 0xc4
[    0.510118][    T0] EAX: 00000018 EBX: 00000001 ECX: 00000000 EDX: 00000000
[    0.510764][    T0] ESI: 00000018 EDI: 00000000 EBP: 83f67f3c ESP: 83f67ea0
[    0.511422][    T0] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 
00210006
[    0.512164][    T0] CR0: 80050033 CR2: ff9ff000 CR3: 048d9000 CR4: 00000090
[    0.512839][    T0] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[    0.513519][    T0] DR6: fffe0ff0 DR7: 00000400
[    0.513962][    T0] Call Trace:
[ 0.514276][ T0] ? show_regs (arch/x86/kernel/dumpstack.c:478 (discriminator 1))
[ 0.514680][ T0] ? trace_event_raw_init (kernel/trace/trace_events.c:565 
(discriminator 12))
[ 0.515186][ T0] ? __warn (kernel/panic.c:242 kernel/panic.c:748)
[ 0.515576][ T0] ? trace_event_raw_init (kernel/trace/trace_events.c:565 
(discriminator 12))
[ 0.516094][ T0] ? report_bug (lib/bug.c:199 (discriminator 2))
[ 0.516522][ T0] ? exc_overflow (arch/x86/kernel/traps.c:301)
[ 0.516952][ T0] ? handle_bug (arch/x86/kernel/traps.c:?)
[ 0.517363][ T0] ? exc_invalid_op (arch/x86/kernel/traps.c:309 (discriminator 
1))
[ 0.517815][ T0] ? handle_exception (arch/x86/entry/entry_32.S:1048)
[ 0.518296][ T0] ? exc_overflow (arch/x86/kernel/traps.c:301)
[ 0.518704][ T0] ? trace_event_raw_init (kernel/trace/trace_events.c:565 
(discriminator 12))
[ 0.519182][ T0] ? exc_overflow (arch/x86/kernel/traps.c:301)
[ 0.519614][ T0] ? trace_event_raw_init (kernel/trace/trace_events.c:565 
(discriminator 12))
[ 0.520146][ T0] ? __set_enter_print_fmt (kernel/trace/trace_syscalls.c:227 
(discriminator 3))
[ 0.520642][ T0] ? set_syscall_print_fmt (kernel/trace/trace_syscalls.c:256)
[ 0.521139][ T0] event_init (kernel/trace/trace_events.c:2832)
[ 0.521533][ T0] event_trace_enable (kernel/trace/trace_events.c:4163)
[ 0.522007][ T0] trace_event_init (kernel/trace/trace_events.c:4256)
[ 0.522452][ T0] trace_init (kernel/trace/trace.c:10838)
[ 0.522824][ T0] start_kernel (init/main.c:999)
[ 0.523252][ T0] i386_start_kernel (arch/x86/kernel/head32.c:79 (discriminator 
1))
[ 0.523740][ T0] startup_32_smp (arch/x86/kernel/head_32.S:292)
[    0.524202][    T0] irq event stamp: 0
[ 0.524575][ T0] hardirqs last enabled at (0): 0x0
[ 0.525196][ T0] hardirqs last disabled at (0): 0x0
[ 0.525821][ T0] softirqs last enabled at (0): 0x0
[ 0.526405][ T0] softirqs last disabled at (0): 0x0
[    0.526966][    T0] ---[ end trace 0000000000000000 ]---
[    0.527479][    T0] event xe_bo_move has unsafe dereference of argument 4
[    0.528145][    T0] print_fmt: "move_lacks_source:%s, migrate object %p 
[size %zu] from %s to %s device_id:%s", REC->move_lacks_source ? "yes" : "no", 
REC->bo, REC->size, xe_mem_type_to_name[REC->old_placement], 
xe_mem_type_to_name[REC->new_placement], __get_str(device_id)


The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20241224/[email protected]



-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki


Reply via email to