Received: by 2002:ac0:a679:0:0:0:0:0 with SMTP id p54csp494099imp; Thu, 21 Feb 2019 05:41:44 -0800 (PST) X-Google-Smtp-Source: AHgI3IbMMHBMFyEHty6Iyeye4D8KQoT6ovkDTf8BR+3kYPlA40QmlLkaWSnFkRmKie+9tkm1JvjK X-Received: by 2002:a63:be0a:: with SMTP id l10mr34190782pgf.292.1550756504042; Thu, 21 Feb 2019 05:41:44 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550756504; cv=none; d=google.com; s=arc-20160816; b=g9ojz0S2DXYxG8NzCs0jHieNrwFBpfFH0TTQHHo57jGYQxju3dFney3ez92Kbri5B4 iNM5/Y8rpwSX0b7+xsfAKeA/ZrxlM/UPy4sVas3pi1Qwd4M2QLpJxJtY3PCwHwZYa4ys SrcpG8nIYlPIRP4A8n11VdSoKbRtKSKSnk8x8SIdvio5rcofXFLJNoeGdSz5u9WCbv22 mqUjr82GmTrS3wEZ58WsncbbY1a+i/bCGYndN4mYB+Yw7D8h57xUdizqFwf+8BAuA/N2 F5HuXZomgIa6n48e56qemr8rbCisuetRVzjOq+sLR4XvsuF7XdSqMLBc15QRHypMcz6N adtQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=MbjjQRUXKrV/tbbiGwmsBe42hRnWkka6Ob00bbVhAxM=; b=LtYLn8ZU8Mm5fDMpqOno2x91BTq7e1yg6oCYm1FN6J0Uqob0dJO0NB6oQTdfg4iLlD y0lzzBofUIIWlNJOuPFCvvjMMj2fMsyZl08OMJtVD29GD1fg4VgA8pwSelaWMvqobROW nCuDDYW+jiIo24Pzb5nBgcAHGAcsGIg7WeEKY2FH/VE6k022fisWFEGzQ/+El/6yc3Bz 9FmpnWRhTpmXwMx8z4KoP7N1+O5lfO408ZqVIvCxGlc6fp4DvMOP9WP0CSF2k2hY2jnv a3lTDpGIETY0yvnWh+jPCqVWjc+v5Q1escMJlDDnmBnjYQVt3/TlIICXeJTp/QRb05nW RHfg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v8si22526060plg.408.2019.02.21.05.41.28; Thu, 21 Feb 2019 05:41:44 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727610AbfBUNjk (ORCPT + 99 others); Thu, 21 Feb 2019 08:39:40 -0500 Received: from www62.your-server.de ([213.133.104.62]:44716 "EHLO www62.your-server.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725385AbfBUNjk (ORCPT ); Thu, 21 Feb 2019 08:39:40 -0500 Received: from [78.46.172.3] (helo=sslproxy06.your-server.de) by www62.your-server.de with esmtpsa (TLSv1.2:DHE-RSA-AES256-GCM-SHA384:256) (Exim 4.89_1) (envelope-from ) id 1gwoZV-0005pS-Ix; Thu, 21 Feb 2019 14:39:29 +0100 Received: from [178.197.248.36] (helo=linux.home) by sslproxy06.your-server.de with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.89) (envelope-from ) id 1gwoZV-000LBJ-9w; Thu, 21 Feb 2019 14:39:29 +0100 Subject: Re: [bpf] 568f196756: BUG:assuming_atomic_context_at_kernel/seccomp.c To: kernel test robot , Peter Zijlstra Cc: Jann Horn , Alexei Starovoitov , Song Liu , LKML , Stephen Rothwell , lkp@01.org References: <20190221133556.eqzclahgngq53s64@inn2.lkp.intel.com> From: Daniel Borkmann Message-ID: Date: Thu, 21 Feb 2019 14:39:27 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.3.0 MIME-Version: 1.0 In-Reply-To: <20190221133556.eqzclahgngq53s64@inn2.lkp.intel.com> Content-Type: text/plain; charset=windows-1252 Content-Language: en-US Content-Transfer-Encoding: 7bit X-Authenticated-Sender: daniel@iogearbox.net X-Virus-Scanned: Clear (ClamAV 0.100.2/25366/Wed Feb 20 12:52:59 2019) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 02/21/2019 02:35 PM, kernel test robot wrote: > > FYI, we noticed the following commit (built with gcc-7): > > commit: 568f196756ad9fe2b49c46bbf6a9de1b190438b4 ("bpf: check that BPF programs run with preemption disabled") > https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git master > > in testcase: boot > > on test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 2G > > caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace): Fyi, false positive and already fixed in bpf-next. (https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=435b3ff5b08a99a15647be32735abf8db66cea9a)