From: kernel test robot <oliver.sang@intel.com>
To: Xiu Jianfeng <xiujianfeng@huawei.com>
Cc: <oe-lkp@lists.linux.dev>, <lkp@intel.com>,
Linux Memory Management List <linux-mm@kvack.org>,
Andrew Morton <akpm@linux-foundation.org>,
Muchun Song <muchun.song@linux.dev>,
Oscar Salvador <osalvador@suse.de>, <oliver.sang@intel.com>
Subject: [linux-next:master] [mm/hugetlb_cgroup] 11308a02a5: BUG:key#has_not_been_registered
Date: Tue, 18 Jun 2024 10:42:30 +0800 [thread overview]
Message-ID: <202406181046.8d8b2492-oliver.sang@intel.com> (raw)
Hello,
kernel test robot noticed "BUG:key#has_not_been_registered" on:
commit: 11308a02a56ccd8b3523d5472bd89bc91888edfb ("mm/hugetlb_cgroup: switch to the new cftypes")
https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git master
in testcase: boot
compiler: clang-18
test machine: qemu-system-i386 -enable-kvm -cpu SandyBridge -smp 2 -m 4G
(please refer to attached dmesg/kmsg for entire log/backtrace)
+------------------------------------------------------------+------------+------------+
| | e18df2889f | 11308a02a5 |
+------------------------------------------------------------+------------+------------+
| BUG:key#has_not_been_registered | 0 | 6 |
| WARNING:at_kernel/locking/lockdep.c:#lockdep_init_map_type | 0 | 6 |
| EIP:lockdep_init_map_type | 0 | 6 |
+------------------------------------------------------------+------------+------------+
If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@intel.com>
| Closes: https://lore.kernel.org/oe-lkp/202406181046.8d8b2492-oliver.sang@intel.com
[ 17.312964][ T1] BUG: key c3daa090 has not been registered!
[ 17.313956][ T1] ------------[ cut here ]------------
[ 17.314778][ T1] DEBUG_LOCKS_WARN_ON(1)
[ 17.314828][ T1] WARNING: CPU: 1 PID: 1 at kernel/locking/lockdep.c:4895 lockdep_init_map_type (kernel/locking/lockdep.c:4895)
[ 17.317059][ T1] Modules linked in:
[ 17.317706][ T1] CPU: 1 PID: 1 Comm: init Not tainted 6.10.0-rc3-00221-g11308a02a56c #1
[ 17.319005][ T1] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
[ 17.320620][ T1] EIP: lockdep_init_map_type (kernel/locking/lockdep.c:4895)
[ 17.321551][ T1] Code: 93 62 c3 00 75 d7 e8 e2 71 4b 00 85 c0 74 ce 83 3d ec c4 e8 c2 00 75 c5 68 bb ef 81 c2 68 ed f4 8c c2 e8 26 74 f8 ff 83 c4 08 <0f> 0b eb af 51 68 e8 f8 8c c2 e8 f8 4d 0a 01 83 c4 08 83 3d 80 93
All code
========
0: 93 xchg %eax,%ebx
1: 62 c3 (bad)
3: 00 75 d7 add %dh,-0x29(%rbp)
6: e8 e2 71 4b 00 call 0x4b71ed
b: 85 c0 test %eax,%eax
d: 74 ce je 0xffffffffffffffdd
f: 83 3d ec c4 e8 c2 00 cmpl $0x0,-0x3d173b14(%rip) # 0xffffffffc2e8c502
16: 75 c5 jne 0xffffffffffffffdd
18: 68 bb ef 81 c2 push $0xffffffffc281efbb
1d: 68 ed f4 8c c2 push $0xffffffffc28cf4ed
22: e8 26 74 f8 ff call 0xfffffffffff8744d
27: 83 c4 08 add $0x8,%esp
2a:* 0f 0b ud2 <-- trapping instruction
2c: eb af jmp 0xffffffffffffffdd
2e: 51 push %rcx
2f: 68 e8 f8 8c c2 push $0xffffffffc28cf8e8
34: e8 f8 4d 0a 01 call 0x10a4e31
39: 83 c4 08 add $0x8,%esp
3c: 83 .byte 0x83
3d: 3d .byte 0x3d
3e: 80 .byte 0x80
3f: 93 xchg %eax,%ebx
Code starting with the faulting instruction
===========================================
0: 0f 0b ud2
2: eb af jmp 0xffffffffffffffb3
4: 51 push %rcx
5: 68 e8 f8 8c c2 push $0xffffffffc28cf8e8
a: e8 f8 4d 0a 01 call 0x10a4e07
f: 83 c4 08 add $0x8,%esp
12: 83 .byte 0x83
13: 3d .byte 0x3d
14: 80 .byte 0x80
15: 93 xchg %eax,%ebx
[ 17.324581][ T1] EAX: b42eb320 EBX: c4e60000 ECX: c29aae84 EDX: 00000000
[ 17.325660][ T1] ESI: c3daa090 EDI: c510dea8 EBP: c3ac7c68 ESP: c3ac7c50
[ 17.326730][ T1] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 00010296
[ 17.327901][ T1] CR0: 80050033 CR2: b7f2c844 CR3: 03e01de0 CR4: 000406b0
[ 17.329065][ T1] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[ 17.330100][ T1] DR6: fffe0ff0 DR7: 00000400
[ 17.330786][ T1] Call Trace:
[ 17.331280][ T1] ? show_regs (arch/x86/kernel/dumpstack.c:478)
[ 17.331925][ T1] ? __warn (kernel/panic.c:239 kernel/panic.c:693)
[ 17.332528][ T1] ? lockdep_init_map_type (kernel/locking/lockdep.c:4895)
[ 17.333339][ T1] ? report_bug (lib/bug.c:199)
[ 17.333992][ T1] ? exc_overflow (arch/x86/kernel/traps.c:252)
[ 17.334646][ T1] ? handle_bug (arch/x86/kernel/traps.c:?)
[ 17.335274][ T1] ? exc_invalid_op (arch/x86/kernel/traps.c:260)
[ 17.335969][ T1] ? handle_exception (arch/x86/entry/entry_32.S:1047)
[ 17.336724][ T1] ? exc_overflow (arch/x86/kernel/traps.c:252)
[ 17.337392][ T1] ? lockdep_init_map_type (kernel/locking/lockdep.c:4895)
[ 17.338183][ T1] ? exc_overflow (arch/x86/kernel/traps.c:252)
[ 17.338837][ T1] ? lockdep_init_map_type (kernel/locking/lockdep.c:4895)
[ 17.339631][ T1] __kernfs_create_file (include/linux/lockdep.h:135 include/linux/lockdep.h:142 include/linux/lockdep.h:148 fs/kernfs/file.c:1046)
[ 17.340358][ T1] cgroup_addrm_files (kernel/cgroup/cgroup.c:4201)
[ 17.341105][ T1] css_populate_dir (kernel/cgroup/cgroup.c:?)
[ 17.341806][ T1] cgroup_apply_control_enable (kernel/cgroup/cgroup.c:3226)
[ 17.342663][ T1] cgroup_apply_control (kernel/cgroup/cgroup.c:3300)
[ 17.343398][ T1] ? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:? kernel/locking/lockdep.c:4359)
[ 17.347609][ T1] ? _raw_spin_unlock_irq (arch/x86/include/asm/irqflags.h:42 arch/x86/include/asm/irqflags.h:77 include/linux/spinlock_api_smp.h:159 kernel/locking/spinlock.c:202)
[ 17.348416][ T1] ? rebind_subsystems (include/linux/spinlock.h:? kernel/cgroup/cgroup.c:1861)
[ 17.349188][ T1] ? trace_hardirqs_on (kernel/trace/trace_preemptirq.c:63)
[ 17.349921][ T1] rebind_subsystems (kernel/cgroup/cgroup.c:1880)
[ 17.350650][ T1] cgroup_setup_root (kernel/cgroup/cgroup.c:2118)
[ 17.351383][ T1] cgroup1_get_tree (kernel/cgroup/cgroup-v1.c:1225)
[ 17.352116][ T1] vfs_get_tree (fs/super.c:1781)
[ 17.352808][ T1] do_new_mount (fs/namespace.c:3352)
[ 17.353490][ T1] ? security_capable (security/security.c:1036)
[ 17.354209][ T1] path_mount (fs/namespace.c:3679)
[ 17.354846][ T1] __ia32_sys_mount (fs/namespace.c:3692 fs/namespace.c:3898 fs/namespace.c:3875 fs/namespace.c:3875)
[ 17.355575][ T1] ? __might_fault (mm/memory.c:?)
[ 17.356258][ T1] ia32_sys_call (arch/x86/entry/syscall_32.c:42)
[ 17.356960][ T1] __do_fast_syscall_32 (arch/x86/entry/common.c:?)
[ 17.357718][ T1] ? irqentry_exit_to_user_mode (kernel/entry/common.c:234)
[ 17.358564][ T1] ? irqentry_exit (kernel/entry/common.c:367)
[ 17.359249][ T1] do_fast_syscall_32 (arch/x86/entry/common.c:411)
[ 17.360017][ T1] do_SYSENTER_32 (arch/x86/entry/common.c:449)
[ 17.360693][ T1] entry_SYSENTER_32 (arch/x86/entry/entry_32.S:836)
[ 17.361438][ T1] EIP: 0xb7f5a539
[ 17.361997][ T1] Code: 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 0f 1f 00 58 b8 77 00 00 00 cd 80 90 0f 1f
All code
========
0: 03 74 b4 01 add 0x1(%rsp,%rsi,4),%esi
4: 10 07 adc %al,(%rdi)
6: 03 74 b0 01 add 0x1(%rax,%rsi,4),%esi
a: 10 08 adc %cl,(%rax)
c: 03 74 d8 01 add 0x1(%rax,%rbx,8),%esi
...
20: 00 51 52 add %dl,0x52(%rcx)
23: 55 push %rbp
24:* 89 e5 mov %esp,%ebp <-- trapping instruction
26: 0f 34 sysenter
28: cd 80 int $0x80
2a: 5d pop %rbp
2b: 5a pop %rdx
2c: 59 pop %rcx
2d: c3 ret
2e: 90 nop
2f: 90 nop
30: 90 nop
31: 90 nop
32: 0f 1f 00 nopl (%rax)
35: 58 pop %rax
36: b8 77 00 00 00 mov $0x77,%eax
3b: cd 80 int $0x80
3d: 90 nop
3e: 0f .byte 0xf
3f: 1f (bad)
Code starting with the faulting instruction
===========================================
0: 5d pop %rbp
1: 5a pop %rdx
2: 59 pop %rcx
3: c3 ret
4: 90 nop
5: 90 nop
6: 90 nop
7: 90 nop
8: 0f 1f 00 nopl (%rax)
b: 58 pop %rax
c: b8 77 00 00 00 mov $0x77,%eax
11: cd 80 int $0x80
13: 90 nop
14: 0f .byte 0xf
15: 1f (bad)
The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20240618/202406181046.8d8b2492-oliver.sang@intel.com
--
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki
next reply other threads:[~2024-06-18 2:42 UTC|newest]
Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-06-18 2:42 kernel test robot [this message]
2024-06-18 3:58 ` xiujianfeng
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=202406181046.8d8b2492-oliver.sang@intel.com \
--to=oliver.sang@intel.com \
--cc=akpm@linux-foundation.org \
--cc=linux-mm@kvack.org \
--cc=lkp@intel.com \
--cc=muchun.song@linux.dev \
--cc=oe-lkp@lists.linux.dev \
--cc=osalvador@suse.de \
--cc=xiujianfeng@huawei.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox