Re: [PATCH 5.10 00/75] 5.10.206-rc1 review

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello!

On 03/01/24 10:54 a. m., Greg Kroah-Hartman wrote:
This is the start of the stable review cycle for the 5.10.206 release.
There are 75 patches in this series, all will be posted as a response
to this one.  If anyone has any issues with these being applied, please
let me know.

Responses should be made by Fri, 05 Jan 2024 16:47:49 +0000.
Anything received after that time might be too late.

The whole patch series can be found in one patch at:
	https://www.kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.10.206-rc1.gz
or in the git tree and branch at:
	git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-5.10.y
and the diffstat can be found below.

thanks,

greg k-h

We're seeing a kernel warning on:
* Juno-r2
* Dragonboard 410c
* i386

that looks like this:

-----8<-----
  ------------[ cut here ]------------
  [  968.182348] WARNING: CPU: 2 PID: 16253 at kernel/module.c:261 module_kallsyms_on_each_symbol+0xaf/0xc0
  [  968.191666] Modules linked in: x86_pkg_temp_thermal fuse ip_tables
  [  968.197876] CPU: 2 PID: 16253 Comm: ftracetest Not tainted 5.10.206-rc1 #1
  [  968.204786] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.7 12/07/2021
  [  968.212208] EIP: module_kallsyms_on_each_symbol+0xaf/0xc0
  [  968.217632] Code: 68 d9 75 a4 31 c0 8d 65 f4 5b 5e 5f 5d c3 8d 74 26 00 90 ba ff ff ff ff b8 38 36 68 d9 e8 e9 61 df 00 85 c0 0f 85 6f ff ff ff  0b e9 68 ff ff ff 8d b4 26 00 00 00 00 8d 76 00 3e 8d 74 26 00
  [  968.236389] EAX: 00000000 EBX: 00000001 ECX: ffffffff EDX: 00000001
  [  968.242700] ESI: c5839d68 EDI: 00025c3b EBP: c5839d54 ESP: c5839d3c
  [  968.249008] DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068 EFLAGS: 00010246
  [  968.255845] CR0: 80050033 CR2: 010d9b70 CR3: 05b30000 CR4: 003506d0
  [  968.262138] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
  [  968.268413] DR6: fffe0ff0 DR7: 00000400
  [  968.272278] Call Trace:
  [  968.274817]  ? show_regs.cold+0x14/0x1a
  [  968.278679]  ? __warn+0x71/0x100
  [  968.281954]  ? module_kallsyms_on_each_symbol+0xaf/0xc0
  [  968.287224]  ? report_bug+0x7e/0xa0
  [  968.290736]  ? exc_overflow+0x40/0x40
  [  968.294452]  ? handle_bug+0x2a/0x50
  [  968.297971]  ? exc_invalid_op+0x1b/0x60
  [  968.301836]  ? handle_exception+0x140/0x140
  [  968.306052]  ? module_kallsyms_on_each_symbol+0xaf/0xc0
  [  968.311310]  ? exc_overflow+0x40/0x40
  [  968.314999]  ? module_kallsyms_on_each_symbol+0xaf/0xc0
  [  968.320252]  ? trace_kprobe_run_command+0x20/0x20
  [  968.324970]  ? trace_kprobe_run_command+0x20/0x20
  [  968.329720]  kallsyms_on_each_symbol+0xc1/0xd0
  [  968.334195]  ? trace_kprobe_run_command+0x20/0x20
  [  968.338939]  trace_kprobe_create+0x5fd/0xb20
  [  968.343243]  ? alloc_trace_kprobe+0x130/0x130
  [  968.347628]  create_dyn_event+0x57/0xc0
  [  968.351495]  ? dyn_event_release+0x140/0x140
  [  968.355791]  trace_run_command+0x69/0x80
  [  968.359754]  trace_parse_run_command+0x97/0x130
  [  968.364339]  ? dyn_event_seq_next+0x20/0x20
  [  968.368549]  dyn_event_write+0x10/0x20
  [  968.372328]  ? dyn_event_release+0x140/0x140
  [  968.376611]  vfs_write+0xe5/0x500
  [  968.379973]  ? lock_acquire+0x8c/0x230
  [  968.383752]  ? __might_fault+0x31/0x70
  [  968.387545]  ? find_held_lock+0x24/0x80
  [  968.391414]  ksys_write+0x72/0xf0
  [  968.394759]  __ia32_sys_write+0x15/0x20
  [  968.398621]  __do_fast_syscall_32+0x54/0xa0
  [  968.402838]  do_fast_syscall_32+0x29/0x60
  [  968.406868]  do_SYSENTER_32+0x15/0x20
  [  968.410547]  entry_SYSENTER_32+0x9f/0xf2
  [  968.414497] EIP: 0xb7f85549
  [  968.417309] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80  5a 59 c3 90 90 90 90 8d 76 00 58 b8 77 00 00 00 cd 80 90 8d 76
  [  968.436081] EAX: ffffffda EBX: 00000001 ECX: 010ccdc0 EDX: 00000018
  [  968.442371] ESI: b7f6aff4 EDI: 010ccdc0 EBP: 0044c4fc ESP: bfd964c0
  [  968.448664] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b EFLAGS: 00000246
  [  968.455478] irq event stamp: 77487
  [  968.458912] hardirqs last  enabled at (77497): [] console_unlock+0x589/0x5a0
  [  968.466837] hardirqs last disabled at (77506): [] console_unlock+0x41d/0x5a0
  [  968.474799] softirqs last  enabled at (77474): [] call_on_stack+0x45/0x50
  [  968.482480] softirqs last disabled at (77469): [] call_on_stack+0x45/0x50
  [  968.490183] ---[ end trace 444b2433ce3c8b30 ]---
----->8-----

and this:

-----8<-----
  ------------[ cut here ]------------
  [  418.955406] WARNING: CPU: 1 PID: 10942 at kernel/module.c:261 module_assert_mutex+0x3c/0x50
  [  418.963777] Modules linked in: tda998x cec drm_kms_helper crct10dif_ce fuse drm dm_mod ip_tables x_tables
  [  418.973433] CPU: 1 PID: 10942 Comm: ftracetest Not tainted 5.10.206-rc1 #1
  [  418.980324] Hardware name: ARM Juno development board (r2) (DT)
  [  418.986261] pstate: 60000005 (nZCv daif -PAN -UAO -TCO BTYPE=--)
  [  418.992284] pc : module_assert_mutex+0x3c/0x50
  [  418.996739] lr : module_assert_mutex+0x38/0x50
  [  419.001192] sp : ffff80001cd03a90
  [  419.004515] x29: ffff80001cd03a90 x28: 0000000000000018
  [  419.009853] x27: 0000000000000002 x26: ffff0008324a6f80
  [  419.015189] x25: 0000000000000006 x24: ffff800012819678
  [  419.020525] x23: ffff0008324a6608 x22: ffff800010229bd0
  [  419.025861] x21: ffff800010229bd0 x20: ffff80001cd03c68
  [  419.031196] x19: 0000000000000000 x18: 0000000000000000
  [  419.036531] x17: 0000000000000000 x16: 0000000000000000
  [  419.041867] x15: 0000aaab20142c50 x14: 0000000000000028
  [  419.047202] x13: 0000000000000002 x12: 0000000000000003
  [  419.052538] x11: 0000000000000002 x10: 0101010101010101
  [  419.057873] x9 : ffff80001019b11c x8 : 7f7f7f7f7f7f7f7f
  [  419.063209] x7 : 625e6b646d71646a x6 : 34001c0a651c383c
  [  419.068544] x5 : 3c381c650a1c0034 x4 : 0000000000000000
  [  419.073880] x3 : 7d95b99001c19d7c x2 : ffff80096cfc9000
  [  419.079215] x1 : 0000000000000000 x0 : 0000000000000000
  [  419.084551] Call trace:
  [  419.087005]  module_assert_mutex+0x3c/0x50
  [  419.091114]  module_kallsyms_on_each_symbol+0x2c/0x100
  [  419.096267]  kallsyms_on_each_symbol+0xe0/0x120
  [  419.100812]  trace_kprobe_create+0x4e4/0x9d0
  [  419.105095]  create_dyn_event+0x80/0xf0
  [  419.108943]  trace_run_command+0x90/0xac
  [  419.112877]  trace_parse_run_command+0x120/0x4c0
  [  419.117506]  dyn_event_write+0x18/0x24
  [  419.121267]  vfs_write+0xec/0x20c
  [  419.124592]  ksys_write+0x78/0x110
  [  419.128004]  __arm64_sys_write+0x24/0x30
  [  419.131939]  el0_svc_common.constprop.0+0x84/0x1e0
  [  419.136743]  do_el0_svc+0x2c/0xa4
  [  419.140069]  el0_svc+0x20/0x30
  [  419.143132]  el0_sync_handler+0xe8/0x114
  [  419.147065]  el0_sync+0x180/0x1c0
  [  419.150387] irq event stamp: 48184
  [  419.153800] hardirqs last  enabled at (48183): [] exit_to_kernel_mode+0x38/0x180
  [  419.162781] hardirqs last disabled at (48184): [] el1_dbg+0x24/0x50
  [  419.170630] softirqs last  enabled at (48168): [] __do_softirq+0x4dc/0x564
  [  419.179091] softirqs last disabled at (48153): [] __irq_exit_rcu+0x170/0x194
  [  419.187721] ---[ end trace 2989cd52be73b559 ]---
  ------------[ cut here ]------------
  [  419.263431] WARNING: CPU: 2 PID: 10942 at kernel/module.c:261 module_assert_mutex+0x3c/0x50
  [  419.271801] Modules linked in: tda998x cec drm_kms_helper crct10dif_ce fuse drm dm_mod ip_tables x_tables
  [  419.281457] CPU: 2 PID: 10942 Comm: ftracetest Tainted: G        W         5.10.206-rc1 #1
  [  419.289740] Hardware name: ARM Juno development board (r2) (DT)
  [  419.295676] pstate: 60000005 (nZCv daif -PAN -UAO -TCO BTYPE=--)
  [  419.301698] pc : module_assert_mutex+0x3c/0x50
  [  419.306154] lr : module_assert_mutex+0x38/0x50
  [  419.310607] sp : ffff80001cd03a90
  [  419.313930] x29: ffff80001cd03a90 x28: 0000000000000018
  [  419.319267] x27: 0000000000000002 x26: ffff000831f8d500
  [  419.324603] x25: 0000000000000007 x24: ffff800012819678
  [  419.329939] x23: ffff000831f8d608 x22: ffff800010229bd0
  [  419.335275] x21: ffff800010229bd0 x20: ffff80001cd03c68
  [  419.340610] x19: 0000000000000000 x18: 0000000000000000
  [  419.345946] x17: 0000000000000000 x16: 0000000000000000
  [  419.351281] x15: 0000aaab20142c50 x14: 000000000003fffd
  [  419.356616] x13: 0000000000000038 x12: 0000000000000038
  [  419.361951] x11: 0000000000000002 x10: 0101010101010101
  [  419.367287] x9 : ffff80001019b11c x8 : 7f7f7f7f7f7f7f7f
  [  419.372622] x7 : 625e6b646d71646a x6 : 34001c0a651c383c
  [  419.377958] x5 : 3c381c650a1c0034 x4 : 0000000000000000
  [  419.383293] x3 : 7d95b99001c19d7c x2 : ffff80096cfeb000
  [  419.388628] x1 : 0000000000000000 x0 : 0000000000000000
  [  419.393964] Call trace:
  [  419.396419]  module_assert_mutex+0x3c/0x50
  [  419.400527]  module_kallsyms_on_each_symbol+0x2c/0x100
  [  419.405679]  kallsyms_on_each_symbol+0xe0/0x120
  [  419.410225]  trace_kprobe_create+0x4e4/0x9d0
  [  419.414507]  create_dyn_event+0x80/0xf0
  [  419.418355]  trace_run_command+0x90/0xac
  [  419.422289]  trace_parse_run_command+0x120/0x4c0
  [  419.426918]  dyn_event_write+0x18/0x24
  [  419.430683]  vfs_write+0xec/0x20c
  [  419.434007]  ksys_write+0x78/0x110
  [  419.437419]  __arm64_sys_write+0x24/0x30
  [  419.441354]  el0_svc_common.constprop.0+0x84/0x1e0
  [  419.446159]  do_el0_svc+0x2c/0xa4
  [  419.449486]  el0_svc+0x20/0x30
  [  419.452549]  el0_sync_handler+0xe8/0x114
  [  419.456482]  el0_sync+0x180/0x1c0
  [  419.459805] irq event stamp: 48666
  [  419.463218] hardirqs last  enabled at (48665): [] exit_to_kernel_mode+0x38/0x180
  [  419.472199] hardirqs last disabled at (48666): [] el1_dbg+0x24/0x50
  [  419.480048] softirqs last  enabled at (48664): [] __do_softirq+0x4dc/0x564
  [  419.488508] softirqs last disabled at (48659): [] __irq_exit_rcu+0x170/0x194
  [  419.497139] ---[ end trace 2989cd52be73b55a ]---
----->8-----

Test execution:

  https://lkft.validation.linaro.org/scheduler/job/7142331

Bisections (Arm64 and x86) point to:

  commit 47808d93a0cd0bb7358d9ef141e85216a4b86ef4
  Author: Francis Laniel <flaniel@xxxxxxxxxxxxxxxxxxx>
  Date:   Fri Oct 20 13:42:49 2023 +0300

      tracing/kprobes: Return EADDRNOTAVAIL when func matches several symbols
commit b022f0c7e404887a7c5229788fc99eff9f9a80d5 upstream.


Reverting made the warning disappear on both Arm64 and i386.

Reported-by: Linux Kernel Functional Testing <lkft@xxxxxxxxxx>


Greetings!

Daniel Díaz
daniel.diaz@xxxxxxxxxx





[Index of Archives]     [Linux Kernel]     [Kernel Development Newbies]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite Hiking]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux