From: kernel test robot <oliver.sang@intel.com>
To: Kefeng Wang <wangkefeng.wang@huawei.com>
Cc: <oe-lkp@lists.linux.dev>, <lkp@intel.com>,
<kasan-dev@googlegroups.com>, <linux-mm@kvack.org>,
Andrey Ryabinin <ryabinin.a.a@gmail.com>,
"Alexander Potapenko" <glider@google.com>,
Andrey Konovalov <andreyknvl@gmail.com>,
Dmitry Vyukov <dvyukov@google.com>,
Vincenzo Frascino <vincenzo.frascino@arm.com>,
Andrew Morton <akpm@linux-foundation.org>,
Uladzislau Rezki <urezki@gmail.com>,
Christoph Hellwig <hch@infradead.org>,
Lorenzo Stoakes <lstoakes@gmail.com>,
Kefeng Wang <wangkefeng.wang@huawei.com>, <oliver.sang@intel.com>
Subject: Re: [PATCH -rfc 3/3] mm: kasan: shadow: HACK: add cond_resched_lock() in kasan_depopulate_vmalloc_pte()
Date: Wed, 13 Sep 2023 16:48:04 +0800 [thread overview]
Message-ID: <202309131652.3e9c0f06-oliver.sang@intel.com> (raw)
In-Reply-To: <20230906124234.134200-4-wangkefeng.wang@huawei.com>
hi, Kefeng Wang,
we don't have enough knowledge to connect below random issues with your change,
however, by running up to 300 times, we observed the parent keeps clean.
so make out this report FYI.
if you need more tests, please let us know. Thanks.
cb588b24f0fcf515 eaf065b089545219e27e529e3d6
---------------- ---------------------------
fail:runs %reproduction fail:runs
| | |
:300 6% 17:300 dmesg.BUG:#DF_stack_guard_page_was_hit_at#(stack_is#..#)
:300 0% 1:300 dmesg.BUG:#DF_stack_guard_page_was_hit_at(____ptrval____)(stack_is(____ptrval____)..(____ptrval____))
:300 6% 18:300 dmesg.BUG:KASAN:stack-out-of-bounds_in_vsnprintf
:300 6% 17:300 dmesg.BUG:TASK_stack_guard_page_was_hit_at#(stack_is#..#)
:300 0% 1:300 dmesg.BUG:TASK_stack_guard_page_was_hit_at(____ptrval____)(stack_is(____ptrval____)..(____ptrval____))
:300 9% 28:300 dmesg.BUG:unable_to_handle_page_fault_for_address
:300 3% 8:300 dmesg.Kernel_panic-not_syncing:Fatal_exception
:300 7% 20:300 dmesg.Kernel_panic-not_syncing:Fatal_exception_in_interrupt
:300 3% 10:300 dmesg.Oops:#[##]
:300 6% 19:300 dmesg.RIP:__sanitizer_cov_trace_pc
:300 5% 14:300 dmesg.RIP:exc_page_fault
:300 6% 18:300 dmesg.WARNING:kernel_stack
:300 6% 18:300 dmesg.WARNING:stack_recursion
:300 6% 18:300 dmesg.stack_guard_page:#[##]
Hello,
kernel test robot noticed "BUG:TASK_stack_guard_page_was_hit_at#(stack_is#..#)" on:
commit: eaf065b089545219e27e529e3d6deac4c0bad525 ("[PATCH -rfc 3/3] mm: kasan: shadow: HACK: add cond_resched_lock() in kasan_depopulate_vmalloc_pte()")
url: https://github.com/intel-lab-lkp/linux/commits/Kefeng-Wang/mm-kasan-shadow-add-cond_resched-in-kasan_populate_vmalloc_pte/20230906-205407
base: https://git.kernel.org/cgit/linux/kernel/git/akpm/mm.git mm-everything
patch link: https://lore.kernel.org/all/20230906124234.134200-4-wangkefeng.wang@huawei.com/
patch subject: [PATCH -rfc 3/3] mm: kasan: shadow: HACK: add cond_resched_lock() in kasan_depopulate_vmalloc_pte()
in testcase: rcuscale
version:
with following parameters:
runtime: 300s
scale_type: srcud
compiler: gcc-9
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G
(please refer to attached dmesg/kmsg for entire log/backtrace)
If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@intel.com>
| Closes: https://lore.kernel.org/oe-lkp/202309131652.3e9c0f06-oliver.sang@intel.com
[ 114.366291][ C1] BUG: TASK stack guard page was hit at 00000000d230e938 (stack is 000000004315c7ed..00000000e1c06e40)
[ 114.366312][ C1] stack guard page: 0000 [#1] SMP KASAN
[ 114.366324][ C1] CPU: 1 PID: 400 Comm: systemd-journal Tainted: G W N 6.5.0-11778-geaf065b08954 #1
[ 114.366338][ C1] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
[ 114.366345][ C1] RIP: 0010:exc_page_fault (arch/x86/mm/fault.c:1518)
[ 114.366365][ C1] Code: 89 ee e8 74 ca 7c fe 0f 1f 44 00 00 90 44 89 f6 4c 89 e7 e8 7d 0b 00 00 41 5c 41 5d 41 5e 5d c3 66 0f 1f 00 55 48 89 e5 41 57 <41> 56 41 55 49 89 f5 41 54 49 89 fc 0f 1f 44 00 00 41 0f 20 d6 65
All code
========
0: 89 ee mov %ebp,%esi
2: e8 74 ca 7c fe callq 0xfffffffffe7cca7b
7: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1)
c: 90 nop
d: 44 89 f6 mov %r14d,%esi
10: 4c 89 e7 mov %r12,%rdi
13: e8 7d 0b 00 00 callq 0xb95
18: 41 5c pop %r12
1a: 41 5d pop %r13
1c: 41 5e pop %r14
1e: 5d pop %rbp
1f: c3 retq
20: 66 0f 1f 00 nopw (%rax)
24: 55 push %rbp
25: 48 89 e5 mov %rsp,%rbp
28: 41 57 push %r15
2a:* 41 56 push %r14 <-- trapping instruction
2c: 41 55 push %r13
2e: 49 89 f5 mov %rsi,%r13
31: 41 54 push %r12
33: 49 89 fc mov %rdi,%r12
36: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1)
3b: 41 0f 20 d6 mov %cr2,%r14
3f: 65 gs
Code starting with the faulting instruction
===========================================
0: 41 56 push %r14
2: 41 55 push %r13
4: 49 89 f5 mov %rsi,%r13
7: 41 54 push %r12
9: 49 89 fc mov %rdi,%r12
c: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1)
11: 41 0f 20 d6 mov %cr2,%r14
15: 65 gs
[ 114.366375][ C1] RSP: 0000:ffffc90001388000 EFLAGS: 00210087
[ 114.366386][ C1] RAX: ffffc90001388018 RBX: 0000000000000000 RCX: ffffffff84801717
[ 114.366394][ C1] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc90001388018
[ 114.366401][ C1] RBP: ffffc90001388008 R08: 0000000000000000 R09: 0000000000000000
[ 114.366409][ C1] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[ 114.366416][ C1] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[ 114.366423][ C1] FS: 0000000000000000(0000) GS:ffff8883af500000(0063) knlGS:00000000f516bb40
[ 114.366433][ C1] CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033
[ 114.366441][ C1] CR2: ffffc90001387ff8 CR3: 00000001bcfc9000 CR4: 00000000000406a0
[ 114.366451][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 114.366459][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 114.366466][ C1] Call Trace:
[ 114.366473][ C1] BUG: unable to handle page fault for address: fffff52000271002
[ 114.366479][ C1] #PF: supervisor read access in kernel mode
[ 114.366485][ C1] #PF: error_code(0x0000) - not-present page
[ 114.366491][ C1] PGD 417fdf067 P4D 417fdf067 PUD 1009ad067 PMD 14692d067 PTE 0
[ 114.366513][ C1] BUG: unable to handle page fault for address: fffff52000271000
[ 114.366518][ C1] #PF: supervisor read access in kernel mode
[ 114.366524][ C1] #PF: error_code(0x0000) - not-present page
[ 114.366529][ C1] PGD 417fdf067 P4D 417fdf067 PUD 1009ad067 PMD 14692d067 PTE 0
[ 114.366549][ C1] BUG: unable to handle page fault for address: fffff52000271000
[ 114.366554][ C1] #PF: supervisor read access in kernel mode
[ 114.366559][ C1] #PF: error_code(0x0000) - not-present page
[ 114.366565][ C1] PGD 417fdf067 P4D 417fdf067 PUD 1009ad067 PMD 14692d067 PTE 0
[ 114.366584][ C1] BUG: unable to handle page fault for address: fffff52000271000
[ 114.366589][ C1] #PF: supervisor read access in kernel mode
[ 114.366595][ C1] #PF: error_code(0x0000) - not-present page
[ 114.366600][ C1] PGD 417fdf067 P4D 417fdf067 PUD 1009ad067 PMD 14692d067 PTE 0
[ 114.366620][ C1] BUG: unable to handle page fault for address: fffff52000271000
[ 114.366625][ C1] #PF: supervisor read access in kernel mode
[ 114.366630][ C1] #PF: error_code(0x0000) - not-present page
[ 114.366635][ C1] PGD 417fdf067 P4D 417fdf067 PUD 1009ad067 PMD 14692d067 PTE 0
[ 114.366655][ C1] BUG: unable to handle page fault for address: fffff52000271000
[ 114.366660][ C1] #PF: supervisor read access in kernel mode
[ 114.366666][ C1] #PF: error_code(0x0000) - not-present page
[ 114.366671][ C1] PGD 417fdf067 P4D 417fdf067 PUD 1009ad067 PMD 14692d067 PTE 0
[ 114.366691][ C1] BUG: unable to handle page fault for address: fffff52000271000
[ 114.366695][ C1] #PF: supervisor read access in kernel mode
[ 114.366701][ C1] #PF: error_code(0x0000) - not-present page
[ 114.366706][ C1] PGD 417fdf067 P4D 417fdf067 PUD 1009ad067 PMD 14692d067 PTE 0
[ 114.366726][ C1] BUG: unable to handle page fault for address: fffff52000271000
[ 114.366731][ C1] #PF: supervisor read access in kernel mode
[ 114.366736][ C1] #PF: error_code(0x0000) - not-present page
[ 114.366741][ C1] PGD 417fdf067 P4D 417fdf067 PUD 1009ad067 PMD 14692d067 PTE 0
[ 114.366761][ C1] BUG: unable to handle page fault for address: fffff52000271000
[ 114.366766][ C1] #PF: supervisor read access in kernel mode
[ 114.366771][ C1] #PF: error_code(0x0000) - not-present page
[ 114.366776][ C1] PGD 417fdf067 P4D 417fdf067 PUD 1009ad067 PMD 14692d067 PTE 0
[ 114.366796][ C1] BUG: unable to handle page fault for address: fffff52000271000
[ 114.366801][ C1] #PF: supervisor read access in kernel mode
[ 114.366807][ C1] #PF: error_code(0x0000) - not-present page
[ 114.366811][ C1] PGD 417fdf067 P4D 417fdf067 PUD 1009ad067 PMD 14692d067 PTE 0
[ 114.366831][ C1] BUG: unable to handle page fault for address: fffff52000271000
[ 114.366836][ C1] #PF: supervisor read access in kernel mode
[ 114.366842][ C1] #PF: error_code(0x0000) - not-present page
[ 114.366847][ C1] PGD 417fdf067 P4D 417fdf067 PUD 1009ad067 PMD 14692d067 PTE 0
[ 114.366866][ C1] BUG: unable to handle page fault for address: fffff52000271000
[ 114.366871][ C1] #PF: supervisor read access in kernel mode
[ 114.366877][ C1] #PF: error_code(0x0000) - not-present page
[ 114.366882][ C1] PGD 417fdf067 P4D 417fdf067 PUD 1009ad067 PMD 14692d067 PTE 0
[ 114.366902][ C1] BUG: unable to handle page fault for address: fffff52000271000
[ 114.366907][ C1] #PF: supervisor read access in kernel mode
[ 114.366912][ C1] #PF: error_code(0x0000) - not-present page
[ 114.366917][ C1] PGD 417fdf067 P4D 417fdf067 PUD 1009ad067 PMD 14692d067 PTE 0
[ 114.366932][ C1] BUG: unable to handle page fault for address: fffff52000271000
[ 114.366937][ C1] #PF: supervisor read access in kernel mode
[ 114.366942][ C1] #PF: error_code(0x0000) - not-present page
[ 114.366947][ C1] PGD 417fdf067 P4D 417fdf067 PUD 1009ad067 PMD 14692d067 PTE 0
[ 114.366966][ C1] BUG: unable to handle page fault for address: fffff52000271000
[ 114.366971][ C1] #PF: supervisor read access in kernel mode
[ 114.366976][ C1] #PF: error_code(0x0000) - not-present page
[ 114.366981][ C1] PGD 417fdf067 P4D 417fdf067 PUD 1009ad067 PMD 14692d067 PTE 0
[ 114.367001][ C1] BUG: unable to handle page fault for address: fffff52000271000
[ 114.367006][ C1] #PF: supervisor read access in kernel mode
[ 114.367012][ C1] #PF: error_code(0x0000) - not-present page
[ 114.367016][ C1] PGD 417fdf067 P4D 417fdf067 PUD 1009ad067 PMD 14692d067 PTE 0
[ 114.367036][ C1] BUG: unable to handle page fault for address: fffff52000271000
[ 114.367042][ C1] #PF: supervisor read access in kernel mode
[ 114.367047][ C1] #PF: error_code(0x0000) - not-present page
[ 114.367052][ C1] PGD 417fdf067 P4D 417fdf067 PUD 1009ad067 PMD 14692d067 PTE 0
[ 114.367075][ C1] BUG: #DF stack guard page was hit at 0000000071957a17 (stack is 00000000d15a2314..00000000d7ec09e2)
[ 114.367086][ C1] stack guard page: 0000 [#2] SMP KASAN
[ 114.367095][ C1] CPU: 1 PID: 400 Comm: systemd-journal Tainted: G W N 6.5.0-11778-geaf065b08954 #1
[ 114.367107][ C1] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
[ 114.367121][ C1] ==================================================================
[ 114.367125][ C1] BUG: KASAN: stack-out-of-bounds in vsnprintf (lib/vsprintf.c:2851)
[ 114.367141][ C1] Read of size 8 at addr fffffe39ea66b3c0 by task systemd-journal/400
[ 114.367150][ C1]
[ 114.367153][ C1] CPU: 1 PID: 400 Comm: systemd-journal Tainted: G W N 6.5.0-11778-geaf065b08954 #1
[ 114.367165][ C1] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
[ 114.367172][ C1] Call Trace:
[ 114.367176][ C1] <#DF>
[ 114.367181][ C1] dump_stack_lvl (lib/dump_stack.c:107 (discriminator 4))
[ 114.367197][ C1] print_address_description+0x7d/0x2ee
[ 114.367219][ C1] print_report (mm/kasan/report.c:476)
[ 114.367234][ C1] ? vsnprintf (lib/vsprintf.c:2851)
[ 114.367248][ C1] ? kasan_addr_to_slab (mm/kasan/common.c:35)
[ 114.367265][ C1] ? vsnprintf (lib/vsprintf.c:2851)
[ 114.367278][ C1] kasan_report (mm/kasan/report.c:590)
[ 114.367293][ C1] ? format_decode (lib/vsprintf.c:2526)
[ 114.367308][ C1] ? vsnprintf (lib/vsprintf.c:2851)
[ 114.367327][ C1] __asan_report_load8_noabort (mm/kasan/report_generic.c:381)
[ 114.367346][ C1] vsnprintf (lib/vsprintf.c:2851)
[ 114.367365][ C1] ? pointer (lib/vsprintf.c:2749)
[ 114.367384][ C1] sprintf (lib/vsprintf.c:3017)
[ 114.367399][ C1] ? snprintf (lib/vsprintf.c:3017)
[ 114.367411][ C1] ? kallsyms_sym_address (kernel/kallsyms.c:164)
[ 114.367426][ C1] ? kallsyms_expand_symbol+0x1f1/0x231
[ 114.367443][ C1] ? __sanitizer_cov_trace_pc (kernel/kcov.c:200)
[ 114.367460][ C1] ? kallsyms_lookup_buildid (kernel/kallsyms.c:437)
[ 114.367476][ C1] __sprint_symbol+0x15b/0x1ec
[ 114.367491][ C1] ? kallsyms_lookup_buildid (kernel/kallsyms.c:482)
[ 114.367504][ C1] ? page_fault_oops (arch/x86/mm/fault.c:699)
[ 114.367516][ C1] ? fixup_exception (arch/x86/mm/extable.c:305)
[ 114.367550][ C1] ? kernelmode_fixup_or_oops (arch/x86/mm/fault.c:761)
[ 114.367566][ C1] ? __bad_area_nosemaphore (arch/x86/mm/fault.c:819)
[ 114.367579][ C1] ? __sanitizer_cov_trace_pc (kernel/kcov.c:200)
[ 114.367597][ C1] sprint_symbol (kernel/kallsyms.c:536)
[ 114.367609][ C1] ? __sanitizer_cov_trace_pc (kernel/kcov.c:200)
[ 114.367625][ C1] symbol_string (lib/vsprintf.c:1001)
[ 114.367639][ C1] ? ip4_addr_string (lib/vsprintf.c:983)
[ 114.367656][ C1] ? asm_exc_page_fault (arch/x86/include/asm/idtentry.h:570)
[ 114.367677][ C1] ? page_fault_oops (include/linux/sched/task_stack.h:31 arch/x86/mm/fault.c:699)
[ 114.367689][ C1] ? page_fault_oops (arch/x86/mm/fault.c:699)
[ 114.367706][ C1] ? dump_pagetable (arch/x86/mm/fault.c:635)
[ 114.367718][ C1] ? search_extable (lib/extable.c:115)
[ 114.367731][ C1] ? is_prefetch+0x36f/0x3b4
[ 114.367745][ C1] ? spurious_kernel_fault_check (arch/x86/mm/fault.c:122)
[ 114.367758][ C1] ? search_module_extables (arch/x86/include/asm/preempt.h:85 kernel/module/main.c:3236)
[ 114.367775][ C1] ? widen_string (lib/vsprintf.c:618)
[ 114.367792][ C1] ? widen_string (lib/vsprintf.c:618)
[ 114.367805][ C1] ? set_precision (lib/vsprintf.c:618)
[ 114.367824][ C1] ? string_nocheck (lib/vsprintf.c:640)
[ 114.367838][ C1] ? number (lib/vsprintf.c:573)
[ 114.367854][ C1] ? __sanitizer_cov_trace_pc (kernel/kcov.c:200)
[ 114.367872][ C1] pointer (lib/vsprintf.c:2416)
[ 114.367887][ C1] ? va_format+0x1a1/0x1a1
[ 114.367900][ C1] ? hex_string (lib/vsprintf.c:723)
[ 114.367919][ C1] vsnprintf (lib/vsprintf.c:2822)
[ 114.367937][ C1] ? pointer (lib/vsprintf.c:2749)
[ 114.367952][ C1] ? kvm_sched_clock_read (arch/x86/kernel/kvmclock.c:91)
[ 114.367966][ C1] ? sched_clock_noinstr (arch/x86/kernel/tsc.c:267)
[ 114.367982][ C1] vprintk_store (kernel/printk/printk.c:2193)
[ 114.367996][ C1] ? __kasan_check_write (mm/kasan/shadow.c:38)
[ 114.368011][ C1] ? printk_sprint (kernel/printk/printk.c:2158)
[ 114.368028][ C1] ? printk_sprint (kernel/printk/printk.c:2158)
[ 114.368057][ C1] vprintk_emit (kernel/printk/printk.c:2290)
[ 114.368074][ C1] vprintk_deferred (kernel/printk/printk.c:3911)
[ 114.368089][ C1] vprintk (kernel/printk/printk_safe.c:42)
[ 114.368104][ C1] _printk (kernel/printk/printk.c:2329)
[ 114.368116][ C1] ? syslog_print (kernel/printk/printk.c:2329)
[ 114.368127][ C1] ? vprintk (kernel/printk/printk_safe.c:46)
[ 114.368143][ C1] ? syslog_print (kernel/printk/printk.c:2329)
[ 114.368157][ C1] ? __sanitizer_cov_trace_pc (kernel/kcov.c:200)
[ 114.368175][ C1] show_ip (arch/x86/kernel/dumpstack.c:144)
[ 114.368188][ C1] show_iret_regs (arch/x86/kernel/dumpstack.c:150)
[ 114.368200][ C1] __show_regs (arch/x86/kernel/process_64.c:77)
[ 114.368214][ C1] ? dump_stack_print_info (lib/dump_stack.c:71)
[ 114.368231][ C1] show_regs (arch/x86/kernel/dumpstack.c:477)
[ 114.368243][ C1] __die_body (arch/x86/kernel/dumpstack.c:421)
[ 114.368256][ C1] __die (arch/x86/kernel/dumpstack.c:435)
[ 114.368268][ C1] die (arch/x86/kernel/dumpstack.c:448)
[ 114.368280][ C1] handle_stack_overflow (arch/x86/kernel/traps.c:327)
[ 114.368298][ C1] exc_double_fault (arch/x86/kernel/traps.c:464)
[ 114.368315][ C1] asm_exc_double_fault (arch/x86/include/asm/idtentry.h:611)
[ 114.368329][ C1] RIP: 0010:__sanitizer_cov_trace_pc (kernel/kcov.c:200)
[ 114.368347][ C1] Code: 00 00 48 c1 e6 38 48 21 fe 74 12 b8 01 00 00 00 48 c1 e0 38 48 39 c6 b0 00 0f 44 c2 c3 85 ff 0f 44 c1 c3 31 c0 c3 f3 0f 1e fa <55> 65 8b 05 6e 52 f0 7c 89 c1 48 89 e5 81 e1 00 01 00 00 48 8b 75
All code
========
0: 00 00 add %al,(%rax)
2: 48 c1 e6 38 shl $0x38,%rsi
6: 48 21 fe and %rdi,%rsi
9: 74 12 je 0x1d
b: b8 01 00 00 00 mov $0x1,%eax
10: 48 c1 e0 38 shl $0x38,%rax
14: 48 39 c6 cmp %rax,%rsi
17: b0 00 mov $0x0,%al
19: 0f 44 c2 cmove %edx,%eax
1c: c3 retq
1d: 85 ff test %edi,%edi
1f: 0f 44 c1 cmove %ecx,%eax
22: c3 retq
23: 31 c0 xor %eax,%eax
25: c3 retq
26: f3 0f 1e fa endbr64
2a:* 55 push %rbp <-- trapping instruction
2b: 65 8b 05 6e 52 f0 7c mov %gs:0x7cf0526e(%rip),%eax # 0x7cf052a0
32: 89 c1 mov %eax,%ecx
34: 48 89 e5 mov %rsp,%rbp
37: 81 e1 00 01 00 00 and $0x100,%ecx
3d: 48 rex.W
3e: 8b .byte 0x8b
3f: 75 .byte 0x75
Code starting with the faulting instruction
===========================================
0: 55 push %rbp
1: 65 8b 05 6e 52 f0 7c mov %gs:0x7cf0526e(%rip),%eax # 0x7cf05276
8: 89 c1 mov %eax,%ecx
a: 48 89 e5 mov %rsp,%rbp
d: 81 e1 00 01 00 00 and $0x100,%ecx
13: 48 rex.W
14: 8b .byte 0x8b
15: 75 .byte 0x75
The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20230913/202309131652.3e9c0f06-oliver.sang@intel.com
--
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki
next prev parent reply other threads:[~2023-09-13 8:48 UTC|newest]
Thread overview: 14+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-09-06 12:42 [PATCH -rfc 0/3] mm: kasan: fix softlock when populate or depopulate pte Kefeng Wang
2023-09-06 12:42 ` [PATCH -rfc 1/3] mm: kasan: shadow: add cond_resched() in kasan_populate_vmalloc_pte() Kefeng Wang
2023-09-06 12:42 ` [PATCH -rfc 2/3] mm: kasan: shadow: move free_page() out of page table lock Kefeng Wang
2023-09-06 12:42 ` [PATCH -rfc 3/3] mm: kasan: shadow: HACK: add cond_resched_lock() in kasan_depopulate_vmalloc_pte() Kefeng Wang
2023-09-13 8:48 ` kernel test robot [this message]
2023-09-13 11:21 ` Kefeng Wang
2023-09-15 0:58 ` [PATCH -rfc 0/3] mm: kasan: fix softlock when populate or depopulate pte Kefeng Wang
2023-10-18 14:16 ` Kefeng Wang
2023-10-18 16:37 ` Marco Elver
2023-10-19 1:40 ` Kefeng Wang
2023-10-19 6:17 ` Uladzislau Rezki
2023-10-19 7:26 ` Kefeng Wang
2023-10-19 8:53 ` Uladzislau Rezki
2023-10-19 9:47 ` Kefeng Wang
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=202309131652.3e9c0f06-oliver.sang@intel.com \
--to=oliver.sang@intel.com \
--cc=akpm@linux-foundation.org \
--cc=andreyknvl@gmail.com \
--cc=dvyukov@google.com \
--cc=glider@google.com \
--cc=hch@infradead.org \
--cc=kasan-dev@googlegroups.com \
--cc=linux-mm@kvack.org \
--cc=lkp@intel.com \
--cc=lstoakes@gmail.com \
--cc=oe-lkp@lists.linux.dev \
--cc=ryabinin.a.a@gmail.com \
--cc=urezki@gmail.com \
--cc=vincenzo.frascino@arm.com \
--cc=wangkefeng.wang@huawei.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox