【环境信息】
硬件信息:
1) 裸机场景提供出问题的硬件信息;
2) 虚机场景提供虚机XML文件或者配置信息
软件信息:
1) OS版本及分支:openEuler-23.09
2) 内核信息:6.4.0
3) 软件组件:
【问题复现步骤】
sysctl -w kernel.watchdog_thresh=10
cd /sys/kernel/tracing/
mkdir instances/A
cd instances/A
echo 11 > per_cpu/cpu0/buffer_size_kb # 配成3个页
taskset -c 0 echo abcdefg > trace_marker # 写一条记录
echo 7 > per_cpu/cpu0/buffer_size_kb # 去掉1个页
echo > per_cpu/cpu0/trace # 重置ring_buffer
echo 11 > per_cpu/cpu0/buffer_size_kb # 重新增加1个页
echo 7 > per_cpu/cpu0/buffer_size_kb # 重新去掉1个页,overrun被误+1
taskset -c 0 echo abcdefg > trace_marker # 再写一条记录
cat trace_pipe
【预期结果】
系统正常
【实际结果】
触发softlock up
【附件信息】
[88475.640151] syscopyarea sha256_arm64 sysfillrect nfit sha1_ce hinic libata sbsa_gwdt hns3 sysimgblt drm_ttm_helper libnvdimm ttm hnae3 i2c_designware_platform i2c_designware_core dm_mirror dm_region_hash dm_log dm_mod aes_neon_bs aes_neon_blk aes_ce_blk aes_ce_cipher [last unloaded: test_mask_sdei(OE)]
[88475.640205] CPU: 43 PID: 2351851 Comm: cat Kdump: loaded Tainted: G W OEL 6.4.0 #6
[88475.640210] Hardware name: Huawei TaiShan 200 (Model 2280)/BC82AMDD, BIOS 6.57 05/17/2023
[88475.640214] pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[88475.640218] pc : ring_buffer_empty_cpu+0x84/0x1b0
[88475.640224] lr : ring_buffer_empty_cpu+0x74/0x1b0
[88475.640228] sp : ffff800118093ba0
[88475.640231] x29: ffff800118093ba0 x28: 0000000000000000 x27: 0000000000000000
[88475.640240] x26: ffff004142b222f8 x25: 0000000000000054 x24: ffff004142b222f0
[88475.640250] x23: 0000000000000000 x22: ffff00404dba5400 x21: ffff20200b331018
[88475.640259] x20: 0000000000000000 x19: ffff20200b331000 x18: 0000000000000000
[88475.640268] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[88475.640277] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[88475.640287] x11: ffffa4c6244ee698 x10: ffff800118093c90 x9 : ffffa4c6236fb7a0
[88475.640296] x8 : ffff004142b210b8 x7 : ffff203d5c65fa80 x6 : ffff20200b331000
[88475.640305] x5 : 0000000000000003 x4 : ffff2021d2b6ae00 x3 : 0000000000000000
[88475.640314] x2 : ffff2021d2b6ae00 x1 : ffff2021d2b6ae00 x0 : 0000000000000001
[88475.640324] Call trace:
[88475.640327] ring_buffer_empty_cpu+0x84/0x1b0
[88475.640331] __find_next_entry+0xb4/0x1d8
[88475.640337] trace_find_next_entry_inc+0x30/0x98
[88475.640342] tracing_read_pipe+0x188/0x318
[88475.640346] vfs_read+0xc8/0x298
[88475.640351] ksys_read+0x74/0x110
[88475.640356] __arm64_sys_read+0x24/0x38
[88475.640360] invoke_syscall+0x50/0x128
[88475.640364] el0_svc_common.constprop.0+0x158/0x188
[88475.640368] do_el0_svc+0x34/0x50
[88475.640372] el0_svc+0x28/0xe0
[88475.640378] el0t_64_sync_handler+0xf4/0x120
[88475.640383] el0t_64_sync+0x188/0x190
此处可能存在不合适展示的内容,页面不予展示。您可通过相关编辑功能自查并修改。
如您确认内容无涉及 不当用语 / 纯广告导流 / 暴力 / 低俗色情 / 侵权 / 盗版 / 虚假 / 无价值内容或违法国家有关法律法规的内容,可点击提交进行申诉,我们将尽快为您处理。
测试通过
登录 后才可以发表评论