linux-mm.kvack.org archive mirror
 help / color / mirror / Atom feed
* 4.5.0-rc6: kernel BUG at ../mm/memory.c:1879
@ 2016-03-07 11:14 Matwey V. Kornilov
  2016-03-07 12:46 ` Matwey V. Kornilov
  2016-03-07 12:51 ` Vlastimil Babka
  0 siblings, 2 replies; 8+ messages in thread
From: Matwey V. Kornilov @ 2016-03-07 11:14 UTC (permalink / raw)
  To: linux-mm


Hello,

I see the following when try to boot 4.5.0-rc6 on ARM TI AM33xx based board.

    [   13.907631] ------------[ cut here ]------------
    [   13.912323] kernel BUG at ../mm/memory.c:1879!
    [   13.916795] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP ARM
    [   13.922663] Modules linked in:
    [   13.925761] CPU: 0 PID: 242 Comm: systemd-udevd Not tainted 4.5.0-rc6-3.ga55dde2-default #1
    [   13.934153] Hardware name: Generic AM33XX (Flattened Device Tree)
    [   13.940281] task: c2da2040 ti: c2db4000 task.ti: c2db4000
    [   13.945738] PC is at apply_to_page_range+0x23c/0x240
    [   13.950741] LR is at change_memory_common+0x94/0xe0
    [   13.955648] pc : [<c03b333c>]    lr : [<c0231dc4>]    psr: 60010013
    [   13.955648] sp : c2db5d88  ip : c2db5dd8  fp : c2db5dd4
    [   13.967182] r10: bf002080  r9 : c2db5de8  r8 : c0231cec
    [   13.972434] r7 : bf002180  r6 : bf006000  r5 : bf006000  r4 : bf006000
    [   13.978995] r3 : c0231cec  r2 : bf006000  r1 : bf006000  r0 : c11d3190
    [   13.985559] Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment user
    [   13.992732] Control: 10c5387d  Table: 82dc0019  DAC: 00000055
    [   13.998509] Process systemd-udevd (pid: 242, stack limit = 0xc2db4220)
    [   14.005070] Stack: (0xc2db5d88 to 0xc2db6000)
    [   14.009457] 5d80:                   bf005fff c11d3190 c11d3190 00000001 c1187dc4 c136c540
    [   14.017682] 5da0: bf006000 c11d3190 c2db5dd4 bf006000 00000000 bf006000 bf002180 00000000
    [   14.025907] 5dc0: c118350c bf002080 c2db5e14 c2db5dd8 c0231dc4 c03b310c c2db5de8 0000000c
    [   14.034130] 5de0: c2db5dfc c2db5df0 00000080 00000000 c2db5e4c c0231e10 bf0021ac bf002180
    [   14.042355] 5e00: bf002180 bf0021ac c2db5e24 c2db5e18 c0231e30 c0231d3c c2db5e3c c2db5e28
    [   14.050579] 5e20: c02fd5b4 c0231e1c c0231e10 bf0021ac c2db5e5c c2db5e40 c02ff4f8 c02fd568
    [   14.058802] 5e40: 00000001 bf00208c c2db5f40 bf002180 c2db5f34 c2db5e60 c0301c80 c02ff4ac
    [   14.067025] 5e60: bf002080 c042d74c 00000000 00000000 bf000000 c118350c c0b359cc 00000000
    [   14.075250] 5e80: bf00208c c118350c bf003000 c2db5ea0 bf002190 bf00208c 000014e4 00000000
    [   14.083473] 5ea0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
    [   14.091695] 5ec0: 00000000 00000000 6e72656b 00006c65 00000000 00000000 00000000 00000000
    [   14.099918] 5ee0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
    [   14.108143] 5f00: 00000000 dc8ba700 00000010 00000000 00000006 b6e73664 0000017b c021c308
    [   14.116367] 5f20: c2db4000 00000000 c2db5fa4 c2db5f38 c0302120 c03009ac 00000002 00000000
    [   14.124590] 5f40: d0851000 000014e4 d0851f0c d085180b d0851ca4 00003000 00003110 00000000
    [   14.132814] 5f60: 00000000 00000000 00001538 0000001b 0000001c 00000014 00000011 0000000d
    [   14.141036] 5f80: 00000000 00000000 00000000 7f611780 00000000 00000000 00000000 c2db5fa8
    [   14.149259] 5fa0: c021c140 c0302090 7f611780 00000000 00000006 b6e73664 00000000 7f611830
    [   14.157484] 5fc0: 7f611780 00000000 00000000 0000017b 00000000 00000000 00020000 80a76238
    [   14.165707] 5fe0: be8c8058 be8c8048 b6e69de0 b6d8db40 60010010 00000006 45145044 91104437
    [   14.173957] [<c03b333c>] (apply_to_page_range) from [<c0231dc4>] (change_memory_common+0x94/0xe0)
    [   14.182888] [<c0231dc4>] (change_memory_common) from [<c0231e30>] (set_memory_ro+0x20/0x28)
    [   14.191307] [<c0231e30>] (set_memory_ro) from [<c02fd5b4>] (frob_rodata+0x58/0x6c)
    [   14.198930] [<c02fd5b4>] (frob_rodata) from [<c02ff4f8>] (module_enable_ro+0x58/0x60)
    [   14.206811] [<c02ff4f8>] (module_enable_ro) from [<c0301c80>] (load_module+0x12e0/0x1548)
    [   14.215039] [<c0301c80>] (load_module) from [<c0302120>] (SyS_finit_module+0x9c/0xd8)
    [   14.222920] [<c0302120>] (SyS_finit_module) from [<c021c140>] (ret_fast_syscall+0x0/0x34)
    [   14.231148] Code: e3500000 1afffff4 e51a3008 eaffffe5 (e7f001f2)
    [   14.237282] ---[ end trace e25b4430ecf4fcdd ]---


--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: 4.5.0-rc6: kernel BUG at ../mm/memory.c:1879
  2016-03-07 11:14 4.5.0-rc6: kernel BUG at ../mm/memory.c:1879 Matwey V. Kornilov
@ 2016-03-07 12:46 ` Matwey V. Kornilov
  2016-03-07 12:59   ` Matwey V. Kornilov
  2016-03-07 12:51 ` Vlastimil Babka
  1 sibling, 1 reply; 8+ messages in thread
From: Matwey V. Kornilov @ 2016-03-07 12:46 UTC (permalink / raw)
  To: linux-mm


I believe the following kgdb backtrace is relevant.

size = 0 for some reason in apply_to_page_range
This means that end == addr.

(gdb) bt
#0  apply_to_page_range (mm=0xc11d3190 <init_mm>, addr=3204472832,
size=0, fn=0xc0231cec <change_page_range>, data=0xdb5c3de8)
    at ../mm/memory.c:1876
#1  0xc0231dc4 in change_memory_common (addr=3204472832,
numpages=<optimized out>, set_mask=<optimized out>, clear_mask=0)
    at ../arch/arm/mm/pageattr.c:61
#2  0xc0231e30 in set_memory_ro (addr=<optimized out>,
numpages=<optimized out>) at ../arch/arm/mm/pageattr.c:70
#3  0xc02fd5b4 in frob_rodata (layout=<optimized out>,
set_memory=0xbf006000) at ../kernel/module.c:1983
#4  0xc02ff4f8 in module_enable_ro (mod=<optimized out>) at
../kernel/module.c:2011
#5  0xc0301c80 in complete_formation (info=<optimized out>,
mod=<optimized out>) at ../kernel/module.c:3494
#6  load_module (info=0xdb5c3f40, uargs=<optimized out>,
flags=<optimized out>) at ../kernel/module.c:3622
#7  0xc0302120 in SYSC_finit_module (flags=<optimized out>,
uargs=<optimized out>, fd=<optimized out>) at ../kernel/module.c:3741
#8  SyS_finit_module (fd=6, uargs=-1226082716, flags=0) at
../kernel/module.c:3722
#9  0xc021c140 in arm_elf_read_implies_exec (x=<optimized out>,
executable_stack=-1090494464) at ../arch/arm/kernel/elf.c:90
#10 0x00000006 in __vectors_start ()
Backtrace stopped: previous frame inner to this frame (corrupt stack?)

07.03.2016 14:14, Matwey V. Kornilov D?D,N?DuN?:
> 
> Hello,
> 
> I see the following when try to boot 4.5.0-rc6 on ARM TI AM33xx based board.
> 
>     [   13.907631] ------------[ cut here ]------------
>     [   13.912323] kernel BUG at ../mm/memory.c:1879!
>     [   13.916795] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP ARM
>     [   13.922663] Modules linked in:
>     [   13.925761] CPU: 0 PID: 242 Comm: systemd-udevd Not tainted 4.5.0-rc6-3.ga55dde2-default #1
>     [   13.934153] Hardware name: Generic AM33XX (Flattened Device Tree)
>     [   13.940281] task: c2da2040 ti: c2db4000 task.ti: c2db4000
>     [   13.945738] PC is at apply_to_page_range+0x23c/0x240
>     [   13.950741] LR is at change_memory_common+0x94/0xe0
>     [   13.955648] pc : [<c03b333c>]    lr : [<c0231dc4>]    psr: 60010013
>     [   13.955648] sp : c2db5d88  ip : c2db5dd8  fp : c2db5dd4
>     [   13.967182] r10: bf002080  r9 : c2db5de8  r8 : c0231cec
>     [   13.972434] r7 : bf002180  r6 : bf006000  r5 : bf006000  r4 : bf006000
>     [   13.978995] r3 : c0231cec  r2 : bf006000  r1 : bf006000  r0 : c11d3190
>     [   13.985559] Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment user
>     [   13.992732] Control: 10c5387d  Table: 82dc0019  DAC: 00000055
>     [   13.998509] Process systemd-udevd (pid: 242, stack limit = 0xc2db4220)
>     [   14.005070] Stack: (0xc2db5d88 to 0xc2db6000)
>     [   14.009457] 5d80:                   bf005fff c11d3190 c11d3190 00000001 c1187dc4 c136c540
>     [   14.017682] 5da0: bf006000 c11d3190 c2db5dd4 bf006000 00000000 bf006000 bf002180 00000000
>     [   14.025907] 5dc0: c118350c bf002080 c2db5e14 c2db5dd8 c0231dc4 c03b310c c2db5de8 0000000c
>     [   14.034130] 5de0: c2db5dfc c2db5df0 00000080 00000000 c2db5e4c c0231e10 bf0021ac bf002180
>     [   14.042355] 5e00: bf002180 bf0021ac c2db5e24 c2db5e18 c0231e30 c0231d3c c2db5e3c c2db5e28
>     [   14.050579] 5e20: c02fd5b4 c0231e1c c0231e10 bf0021ac c2db5e5c c2db5e40 c02ff4f8 c02fd568
>     [   14.058802] 5e40: 00000001 bf00208c c2db5f40 bf002180 c2db5f34 c2db5e60 c0301c80 c02ff4ac
>     [   14.067025] 5e60: bf002080 c042d74c 00000000 00000000 bf000000 c118350c c0b359cc 00000000
>     [   14.075250] 5e80: bf00208c c118350c bf003000 c2db5ea0 bf002190 bf00208c 000014e4 00000000
>     [   14.083473] 5ea0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
>     [   14.091695] 5ec0: 00000000 00000000 6e72656b 00006c65 00000000 00000000 00000000 00000000
>     [   14.099918] 5ee0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
>     [   14.108143] 5f00: 00000000 dc8ba700 00000010 00000000 00000006 b6e73664 0000017b c021c308
>     [   14.116367] 5f20: c2db4000 00000000 c2db5fa4 c2db5f38 c0302120 c03009ac 00000002 00000000
>     [   14.124590] 5f40: d0851000 000014e4 d0851f0c d085180b d0851ca4 00003000 00003110 00000000
>     [   14.132814] 5f60: 00000000 00000000 00001538 0000001b 0000001c 00000014 00000011 0000000d
>     [   14.141036] 5f80: 00000000 00000000 00000000 7f611780 00000000 00000000 00000000 c2db5fa8
>     [   14.149259] 5fa0: c021c140 c0302090 7f611780 00000000 00000006 b6e73664 00000000 7f611830
>     [   14.157484] 5fc0: 7f611780 00000000 00000000 0000017b 00000000 00000000 00020000 80a76238
>     [   14.165707] 5fe0: be8c8058 be8c8048 b6e69de0 b6d8db40 60010010 00000006 45145044 91104437
>     [   14.173957] [<c03b333c>] (apply_to_page_range) from [<c0231dc4>] (change_memory_common+0x94/0xe0)
>     [   14.182888] [<c0231dc4>] (change_memory_common) from [<c0231e30>] (set_memory_ro+0x20/0x28)
>     [   14.191307] [<c0231e30>] (set_memory_ro) from [<c02fd5b4>] (frob_rodata+0x58/0x6c)
>     [   14.198930] [<c02fd5b4>] (frob_rodata) from [<c02ff4f8>] (module_enable_ro+0x58/0x60)
>     [   14.206811] [<c02ff4f8>] (module_enable_ro) from [<c0301c80>] (load_module+0x12e0/0x1548)
>     [   14.215039] [<c0301c80>] (load_module) from [<c0302120>] (SyS_finit_module+0x9c/0xd8)
>     [   14.222920] [<c0302120>] (SyS_finit_module) from [<c021c140>] (ret_fast_syscall+0x0/0x34)
>     [   14.231148] Code: e3500000 1afffff4 e51a3008 eaffffe5 (e7f001f2)
>     [   14.237282] ---[ end trace e25b4430ecf4fcdd ]---
> 
> 
> --
> To unsubscribe, send a message with 'unsubscribe linux-mm' in
> the body to majordomo@kvack.org.  For more info on Linux MM,
> see: http://www.linux-mm.org/ .
> Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>
> 


--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: 4.5.0-rc6: kernel BUG at ../mm/memory.c:1879
  2016-03-07 11:14 4.5.0-rc6: kernel BUG at ../mm/memory.c:1879 Matwey V. Kornilov
  2016-03-07 12:46 ` Matwey V. Kornilov
@ 2016-03-07 12:51 ` Vlastimil Babka
  2016-03-07 12:53   ` Vlastimil Babka
  2016-03-07 13:03   ` Russell King - ARM Linux
  1 sibling, 2 replies; 8+ messages in thread
From: Vlastimil Babka @ 2016-03-07 12:51 UTC (permalink / raw)
  To: Matwey V. Kornilov, linux-mm
  Cc: Rusty Russell, Russell King, linux-arm-kernel, LKML

[+CC ARM, module maintainers/lists]

On 03/07/2016 12:14 PM, Matwey V. Kornilov wrote:
>
> Hello,
>
> I see the following when try to boot 4.5.0-rc6 on ARM TI AM33xx based board.
>
>      [   13.907631] ------------[ cut here ]------------
>      [   13.912323] kernel BUG at ../mm/memory.c:1879!

That's:
BUG_ON(addr >= end);

where:
end = addr + size;

All these variables are unsigned long, so they overflown?

I don't know ARM much, and there's no code for decodecode, but if I get 
the calling convention correctly, and the registers didn't change, both 
addr is r1 and size is r2, i.e. both bf006000. Weird.

>      [   13.916795] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP ARM
>      [   13.922663] Modules linked in:
>      [   13.925761] CPU: 0 PID: 242 Comm: systemd-udevd Not tainted 4.5.0-rc6-3.ga55dde2-default #1
>      [   13.934153] Hardware name: Generic AM33XX (Flattened Device Tree)
>      [   13.940281] task: c2da2040 ti: c2db4000 task.ti: c2db4000
>      [   13.945738] PC is at apply_to_page_range+0x23c/0x240
>      [   13.950741] LR is at change_memory_common+0x94/0xe0
>      [   13.955648] pc : [<c03b333c>]    lr : [<c0231dc4>]    psr: 60010013
>      [   13.955648] sp : c2db5d88  ip : c2db5dd8  fp : c2db5dd4
>      [   13.967182] r10: bf002080  r9 : c2db5de8  r8 : c0231cec
>      [   13.972434] r7 : bf002180  r6 : bf006000  r5 : bf006000  r4 : bf006000
>      [   13.978995] r3 : c0231cec  r2 : bf006000  r1 : bf006000  r0 : c11d3190
>      [   13.985559] Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment user
>      [   13.992732] Control: 10c5387d  Table: 82dc0019  DAC: 00000055
>      [   13.998509] Process systemd-udevd (pid: 242, stack limit = 0xc2db4220)
>      [   14.005070] Stack: (0xc2db5d88 to 0xc2db6000)
>      [   14.009457] 5d80:                   bf005fff c11d3190 c11d3190 00000001 c1187dc4 c136c540
>      [   14.017682] 5da0: bf006000 c11d3190 c2db5dd4 bf006000 00000000 bf006000 bf002180 00000000
>      [   14.025907] 5dc0: c118350c bf002080 c2db5e14 c2db5dd8 c0231dc4 c03b310c c2db5de8 0000000c
>      [   14.034130] 5de0: c2db5dfc c2db5df0 00000080 00000000 c2db5e4c c0231e10 bf0021ac bf002180
>      [   14.042355] 5e00: bf002180 bf0021ac c2db5e24 c2db5e18 c0231e30 c0231d3c c2db5e3c c2db5e28
>      [   14.050579] 5e20: c02fd5b4 c0231e1c c0231e10 bf0021ac c2db5e5c c2db5e40 c02ff4f8 c02fd568
>      [   14.058802] 5e40: 00000001 bf00208c c2db5f40 bf002180 c2db5f34 c2db5e60 c0301c80 c02ff4ac
>      [   14.067025] 5e60: bf002080 c042d74c 00000000 00000000 bf000000 c118350c c0b359cc 00000000
>      [   14.075250] 5e80: bf00208c c118350c bf003000 c2db5ea0 bf002190 bf00208c 000014e4 00000000
>      [   14.083473] 5ea0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
>      [   14.091695] 5ec0: 00000000 00000000 6e72656b 00006c65 00000000 00000000 00000000 00000000
>      [   14.099918] 5ee0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
>      [   14.108143] 5f00: 00000000 dc8ba700 00000010 00000000 00000006 b6e73664 0000017b c021c308
>      [   14.116367] 5f20: c2db4000 00000000 c2db5fa4 c2db5f38 c0302120 c03009ac 00000002 00000000
>      [   14.124590] 5f40: d0851000 000014e4 d0851f0c d085180b d0851ca4 00003000 00003110 00000000
>      [   14.132814] 5f60: 00000000 00000000 00001538 0000001b 0000001c 00000014 00000011 0000000d
>      [   14.141036] 5f80: 00000000 00000000 00000000 7f611780 00000000 00000000 00000000 c2db5fa8
>      [   14.149259] 5fa0: c021c140 c0302090 7f611780 00000000 00000006 b6e73664 00000000 7f611830
>      [   14.157484] 5fc0: 7f611780 00000000 00000000 0000017b 00000000 00000000 00020000 80a76238
>      [   14.165707] 5fe0: be8c8058 be8c8048 b6e69de0 b6d8db40 60010010 00000006 45145044 91104437
>      [   14.173957] [<c03b333c>] (apply_to_page_range) from [<c0231dc4>] (change_memory_common+0x94/0xe0)
>      [   14.182888] [<c0231dc4>] (change_memory_common) from [<c0231e30>] (set_memory_ro+0x20/0x28)
>      [   14.191307] [<c0231e30>] (set_memory_ro) from [<c02fd5b4>] (frob_rodata+0x58/0x6c)
>      [   14.198930] [<c02fd5b4>] (frob_rodata) from [<c02ff4f8>] (module_enable_ro+0x58/0x60)

These just seem to pass on whatever module loader told them.

>      [   14.206811] [<c02ff4f8>] (module_enable_ro) from [<c0301c80>] (load_module+0x12e0/0x1548)

This uses mod->core_layout to get the range, so maybe that's what's wrong?

>      [   14.215039] [<c0301c80>] (load_module) from [<c0302120>] (SyS_finit_module+0x9c/0xd8)
>      [   14.222920] [<c0302120>] (SyS_finit_module) from [<c021c140>] (ret_fast_syscall+0x0/0x34)
>      [   14.231148] Code: e3500000 1afffff4 e51a3008 eaffffe5 (e7f001f2)
>      [   14.237282] ---[ end trace e25b4430ecf4fcdd ]---
>
>
> --
> To unsubscribe, send a message with 'unsubscribe linux-mm' in
> the body to majordomo@kvack.org.  For more info on Linux MM,
> see: http://www.linux-mm.org/ .
> Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>
>

--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: 4.5.0-rc6: kernel BUG at ../mm/memory.c:1879
  2016-03-07 12:51 ` Vlastimil Babka
@ 2016-03-07 12:53   ` Vlastimil Babka
  2016-03-07 13:03   ` Russell King - ARM Linux
  1 sibling, 0 replies; 8+ messages in thread
From: Vlastimil Babka @ 2016-03-07 12:53 UTC (permalink / raw)
  To: Matwey V. Kornilov, linux-mm
  Cc: Rusty Russell, Russell King, linux-arm-kernel, LKML

On 03/07/2016 01:51 PM, Vlastimil Babka wrote:
> [+CC ARM, module maintainers/lists]
>
> On 03/07/2016 12:14 PM, Matwey V. Kornilov wrote:
>>
>> Hello,
>>
>> I see the following when try to boot 4.5.0-rc6 on ARM TI AM33xx based board.
>>
>>       [   13.907631] ------------[ cut here ]------------
>>       [   13.912323] kernel BUG at ../mm/memory.c:1879!
>
> That's:
> BUG_ON(addr >= end);
>
> where:
> end = addr + size;
>
> All these variables are unsigned long, so they overflown?
>
> I don't know ARM much, and there's no code for decodecode, but if I get
> the calling convention correctly, and the registers didn't change, both
> addr is r1 and size is r2, i.e. both bf006000. Weird.

OK, wrong, according to followup mail from Matwey which I'm pasting here 
to include the CC list:

===
I believe the following kgdb backtrace is relevant.

size = 0 for some reason in apply_to_page_range
This means that end == addr.

(gdb) bt
#0  apply_to_page_range (mm=0xc11d3190 <init_mm>, addr=3204472832,
size=0, fn=0xc0231cec <change_page_range>, data=0xdb5c3de8)
     at ../mm/memory.c:1876
#1  0xc0231dc4 in change_memory_common (addr=3204472832,
numpages=<optimized out>, set_mask=<optimized out>, clear_mask=0)
     at ../arch/arm/mm/pageattr.c:61
#2  0xc0231e30 in set_memory_ro (addr=<optimized out>,
numpages=<optimized out>) at ../arch/arm/mm/pageattr.c:70
#3  0xc02fd5b4 in frob_rodata (layout=<optimized out>,
set_memory=0xbf006000) at ../kernel/module.c:1983
#4  0xc02ff4f8 in module_enable_ro (mod=<optimized out>) at
../kernel/module.c:2011
#5  0xc0301c80 in complete_formation (info=<optimized out>,
mod=<optimized out>) at ../kernel/module.c:3494
#6  load_module (info=0xdb5c3f40, uargs=<optimized out>,
flags=<optimized out>) at ../kernel/module.c:3622
#7  0xc0302120 in SYSC_finit_module (flags=<optimized out>,
uargs=<optimized out>, fd=<optimized out>) at ../kernel/module.c:3741
#8  SyS_finit_module (fd=6, uargs=-1226082716, flags=0) at
../kernel/module.c:3722
#9  0xc021c140 in arm_elf_read_implies_exec (x=<optimized out>,
executable_stack=-1090494464) at ../arch/arm/kernel/elf.c:90
#10 0x00000006 in __vectors_start ()
Backtrace stopped: previous frame inner to this frame (corrupt stack?)

>
>>       [   13.916795] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP ARM
>>       [   13.922663] Modules linked in:
>>       [   13.925761] CPU: 0 PID: 242 Comm: systemd-udevd Not tainted 4.5.0-rc6-3.ga55dde2-default #1
>>       [   13.934153] Hardware name: Generic AM33XX (Flattened Device Tree)
>>       [   13.940281] task: c2da2040 ti: c2db4000 task.ti: c2db4000
>>       [   13.945738] PC is at apply_to_page_range+0x23c/0x240
>>       [   13.950741] LR is at change_memory_common+0x94/0xe0
>>       [   13.955648] pc : [<c03b333c>]    lr : [<c0231dc4>]    psr: 60010013
>>       [   13.955648] sp : c2db5d88  ip : c2db5dd8  fp : c2db5dd4
>>       [   13.967182] r10: bf002080  r9 : c2db5de8  r8 : c0231cec
>>       [   13.972434] r7 : bf002180  r6 : bf006000  r5 : bf006000  r4 : bf006000
>>       [   13.978995] r3 : c0231cec  r2 : bf006000  r1 : bf006000  r0 : c11d3190
>>       [   13.985559] Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment user
>>       [   13.992732] Control: 10c5387d  Table: 82dc0019  DAC: 00000055
>>       [   13.998509] Process systemd-udevd (pid: 242, stack limit = 0xc2db4220)
>>       [   14.005070] Stack: (0xc2db5d88 to 0xc2db6000)
>>       [   14.009457] 5d80:                   bf005fff c11d3190 c11d3190 00000001 c1187dc4 c136c540
>>       [   14.017682] 5da0: bf006000 c11d3190 c2db5dd4 bf006000 00000000 bf006000 bf002180 00000000
>>       [   14.025907] 5dc0: c118350c bf002080 c2db5e14 c2db5dd8 c0231dc4 c03b310c c2db5de8 0000000c
>>       [   14.034130] 5de0: c2db5dfc c2db5df0 00000080 00000000 c2db5e4c c0231e10 bf0021ac bf002180
>>       [   14.042355] 5e00: bf002180 bf0021ac c2db5e24 c2db5e18 c0231e30 c0231d3c c2db5e3c c2db5e28
>>       [   14.050579] 5e20: c02fd5b4 c0231e1c c0231e10 bf0021ac c2db5e5c c2db5e40 c02ff4f8 c02fd568
>>       [   14.058802] 5e40: 00000001 bf00208c c2db5f40 bf002180 c2db5f34 c2db5e60 c0301c80 c02ff4ac
>>       [   14.067025] 5e60: bf002080 c042d74c 00000000 00000000 bf000000 c118350c c0b359cc 00000000
>>       [   14.075250] 5e80: bf00208c c118350c bf003000 c2db5ea0 bf002190 bf00208c 000014e4 00000000
>>       [   14.083473] 5ea0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
>>       [   14.091695] 5ec0: 00000000 00000000 6e72656b 00006c65 00000000 00000000 00000000 00000000
>>       [   14.099918] 5ee0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
>>       [   14.108143] 5f00: 00000000 dc8ba700 00000010 00000000 00000006 b6e73664 0000017b c021c308
>>       [   14.116367] 5f20: c2db4000 00000000 c2db5fa4 c2db5f38 c0302120 c03009ac 00000002 00000000
>>       [   14.124590] 5f40: d0851000 000014e4 d0851f0c d085180b d0851ca4 00003000 00003110 00000000
>>       [   14.132814] 5f60: 00000000 00000000 00001538 0000001b 0000001c 00000014 00000011 0000000d
>>       [   14.141036] 5f80: 00000000 00000000 00000000 7f611780 00000000 00000000 00000000 c2db5fa8
>>       [   14.149259] 5fa0: c021c140 c0302090 7f611780 00000000 00000006 b6e73664 00000000 7f611830
>>       [   14.157484] 5fc0: 7f611780 00000000 00000000 0000017b 00000000 00000000 00020000 80a76238
>>       [   14.165707] 5fe0: be8c8058 be8c8048 b6e69de0 b6d8db40 60010010 00000006 45145044 91104437
>>       [   14.173957] [<c03b333c>] (apply_to_page_range) from [<c0231dc4>] (change_memory_common+0x94/0xe0)
>>       [   14.182888] [<c0231dc4>] (change_memory_common) from [<c0231e30>] (set_memory_ro+0x20/0x28)
>>       [   14.191307] [<c0231e30>] (set_memory_ro) from [<c02fd5b4>] (frob_rodata+0x58/0x6c)
>>       [   14.198930] [<c02fd5b4>] (frob_rodata) from [<c02ff4f8>] (module_enable_ro+0x58/0x60)
>
> These just seem to pass on whatever module loader told them.
>
>>       [   14.206811] [<c02ff4f8>] (module_enable_ro) from [<c0301c80>] (load_module+0x12e0/0x1548)
>
> This uses mod->core_layout to get the range, so maybe that's what's wrong?
>
>>       [   14.215039] [<c0301c80>] (load_module) from [<c0302120>] (SyS_finit_module+0x9c/0xd8)
>>       [   14.222920] [<c0302120>] (SyS_finit_module) from [<c021c140>] (ret_fast_syscall+0x0/0x34)
>>       [   14.231148] Code: e3500000 1afffff4 e51a3008 eaffffe5 (e7f001f2)
>>       [   14.237282] ---[ end trace e25b4430ecf4fcdd ]---
>>
>>
>> --
>> To unsubscribe, send a message with 'unsubscribe linux-mm' in
>> the body to majordomo@kvack.org.  For more info on Linux MM,
>> see: http://www.linux-mm.org/ .
>> Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>
>>
>
> --
> To unsubscribe, send a message with 'unsubscribe linux-mm' in
> the body to majordomo@kvack.org.  For more info on Linux MM,
> see: http://www.linux-mm.org/ .
> Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>
>

--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: 4.5.0-rc6: kernel BUG at ../mm/memory.c:1879
  2016-03-07 12:46 ` Matwey V. Kornilov
@ 2016-03-07 12:59   ` Matwey V. Kornilov
  2016-03-07 13:03     ` Matwey V. Kornilov
  0 siblings, 1 reply; 8+ messages in thread
From: Matwey V. Kornilov @ 2016-03-07 12:59 UTC (permalink / raw)
  To: linux-mm


Further research shows that init_layout.ro_size == init_layout.text_size
for some reason.

Then (layout->ro_size - layout->text_size) >> PAGE_SHIFT == 0 in
frob_rodata() function.

(gdb) print mod->init_layout
$21 = {base = 0xbf005000, size = 8192, text_size = 4096, ro_size = 4096,
mtn = {mod = 0xbf002080, node = {node = {{
          __rb_parent_color = 3204456852, rb_right = 0x0
<__vectors_start>, rb_left = 0x0 <__vectors_start>}, {
          __rb_parent_color = 3204456864, rb_right = 0x0
<__vectors_start>, rb_left = 0x0 <__vectors_start>}}}}}


07.03.2016 15:46, Matwey V. Kornilov D?D,N?DuN?:
> 
> I believe the following kgdb backtrace is relevant.
> 
> size = 0 for some reason in apply_to_page_range
> This means that end == addr.
> 
> (gdb) bt
> #0  apply_to_page_range (mm=0xc11d3190 <init_mm>, addr=3204472832,
> size=0, fn=0xc0231cec <change_page_range>, data=0xdb5c3de8)
>     at ../mm/memory.c:1876
> #1  0xc0231dc4 in change_memory_common (addr=3204472832,
> numpages=<optimized out>, set_mask=<optimized out>, clear_mask=0)
>     at ../arch/arm/mm/pageattr.c:61
> #2  0xc0231e30 in set_memory_ro (addr=<optimized out>,
> numpages=<optimized out>) at ../arch/arm/mm/pageattr.c:70
> #3  0xc02fd5b4 in frob_rodata (layout=<optimized out>,
> set_memory=0xbf006000) at ../kernel/module.c:1983
> #4  0xc02ff4f8 in module_enable_ro (mod=<optimized out>) at
> ../kernel/module.c:2011
> #5  0xc0301c80 in complete_formation (info=<optimized out>,
> mod=<optimized out>) at ../kernel/module.c:3494
> #6  load_module (info=0xdb5c3f40, uargs=<optimized out>,
> flags=<optimized out>) at ../kernel/module.c:3622
> #7  0xc0302120 in SYSC_finit_module (flags=<optimized out>,
> uargs=<optimized out>, fd=<optimized out>) at ../kernel/module.c:3741
> #8  SyS_finit_module (fd=6, uargs=-1226082716, flags=0) at
> ../kernel/module.c:3722
> #9  0xc021c140 in arm_elf_read_implies_exec (x=<optimized out>,
> executable_stack=-1090494464) at ../arch/arm/kernel/elf.c:90
> #10 0x00000006 in __vectors_start ()
> Backtrace stopped: previous frame inner to this frame (corrupt stack?)
> 
> 07.03.2016 14:14, Matwey V. Kornilov D?D,N?DuN?:
>>
>> Hello,
>>
>> I see the following when try to boot 4.5.0-rc6 on ARM TI AM33xx based board.
>>
>>     [   13.907631] ------------[ cut here ]------------
>>     [   13.912323] kernel BUG at ../mm/memory.c:1879!
>>     [   13.916795] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP ARM
>>     [   13.922663] Modules linked in:
>>     [   13.925761] CPU: 0 PID: 242 Comm: systemd-udevd Not tainted 4.5.0-rc6-3.ga55dde2-default #1
>>     [   13.934153] Hardware name: Generic AM33XX (Flattened Device Tree)
>>     [   13.940281] task: c2da2040 ti: c2db4000 task.ti: c2db4000
>>     [   13.945738] PC is at apply_to_page_range+0x23c/0x240
>>     [   13.950741] LR is at change_memory_common+0x94/0xe0
>>     [   13.955648] pc : [<c03b333c>]    lr : [<c0231dc4>]    psr: 60010013
>>     [   13.955648] sp : c2db5d88  ip : c2db5dd8  fp : c2db5dd4
>>     [   13.967182] r10: bf002080  r9 : c2db5de8  r8 : c0231cec
>>     [   13.972434] r7 : bf002180  r6 : bf006000  r5 : bf006000  r4 : bf006000
>>     [   13.978995] r3 : c0231cec  r2 : bf006000  r1 : bf006000  r0 : c11d3190
>>     [   13.985559] Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment user
>>     [   13.992732] Control: 10c5387d  Table: 82dc0019  DAC: 00000055
>>     [   13.998509] Process systemd-udevd (pid: 242, stack limit = 0xc2db4220)
>>     [   14.005070] Stack: (0xc2db5d88 to 0xc2db6000)
>>     [   14.009457] 5d80:                   bf005fff c11d3190 c11d3190 00000001 c1187dc4 c136c540
>>     [   14.017682] 5da0: bf006000 c11d3190 c2db5dd4 bf006000 00000000 bf006000 bf002180 00000000
>>     [   14.025907] 5dc0: c118350c bf002080 c2db5e14 c2db5dd8 c0231dc4 c03b310c c2db5de8 0000000c
>>     [   14.034130] 5de0: c2db5dfc c2db5df0 00000080 00000000 c2db5e4c c0231e10 bf0021ac bf002180
>>     [   14.042355] 5e00: bf002180 bf0021ac c2db5e24 c2db5e18 c0231e30 c0231d3c c2db5e3c c2db5e28
>>     [   14.050579] 5e20: c02fd5b4 c0231e1c c0231e10 bf0021ac c2db5e5c c2db5e40 c02ff4f8 c02fd568
>>     [   14.058802] 5e40: 00000001 bf00208c c2db5f40 bf002180 c2db5f34 c2db5e60 c0301c80 c02ff4ac
>>     [   14.067025] 5e60: bf002080 c042d74c 00000000 00000000 bf000000 c118350c c0b359cc 00000000
>>     [   14.075250] 5e80: bf00208c c118350c bf003000 c2db5ea0 bf002190 bf00208c 000014e4 00000000
>>     [   14.083473] 5ea0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
>>     [   14.091695] 5ec0: 00000000 00000000 6e72656b 00006c65 00000000 00000000 00000000 00000000
>>     [   14.099918] 5ee0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
>>     [   14.108143] 5f00: 00000000 dc8ba700 00000010 00000000 00000006 b6e73664 0000017b c021c308
>>     [   14.116367] 5f20: c2db4000 00000000 c2db5fa4 c2db5f38 c0302120 c03009ac 00000002 00000000
>>     [   14.124590] 5f40: d0851000 000014e4 d0851f0c d085180b d0851ca4 00003000 00003110 00000000
>>     [   14.132814] 5f60: 00000000 00000000 00001538 0000001b 0000001c 00000014 00000011 0000000d
>>     [   14.141036] 5f80: 00000000 00000000 00000000 7f611780 00000000 00000000 00000000 c2db5fa8
>>     [   14.149259] 5fa0: c021c140 c0302090 7f611780 00000000 00000006 b6e73664 00000000 7f611830
>>     [   14.157484] 5fc0: 7f611780 00000000 00000000 0000017b 00000000 00000000 00020000 80a76238
>>     [   14.165707] 5fe0: be8c8058 be8c8048 b6e69de0 b6d8db40 60010010 00000006 45145044 91104437
>>     [   14.173957] [<c03b333c>] (apply_to_page_range) from [<c0231dc4>] (change_memory_common+0x94/0xe0)
>>     [   14.182888] [<c0231dc4>] (change_memory_common) from [<c0231e30>] (set_memory_ro+0x20/0x28)
>>     [   14.191307] [<c0231e30>] (set_memory_ro) from [<c02fd5b4>] (frob_rodata+0x58/0x6c)
>>     [   14.198930] [<c02fd5b4>] (frob_rodata) from [<c02ff4f8>] (module_enable_ro+0x58/0x60)
>>     [   14.206811] [<c02ff4f8>] (module_enable_ro) from [<c0301c80>] (load_module+0x12e0/0x1548)
>>     [   14.215039] [<c0301c80>] (load_module) from [<c0302120>] (SyS_finit_module+0x9c/0xd8)
>>     [   14.222920] [<c0302120>] (SyS_finit_module) from [<c021c140>] (ret_fast_syscall+0x0/0x34)
>>     [   14.231148] Code: e3500000 1afffff4 e51a3008 eaffffe5 (e7f001f2)
>>     [   14.237282] ---[ end trace e25b4430ecf4fcdd ]---
>>
>>
>> --
>> To unsubscribe, send a message with 'unsubscribe linux-mm' in
>> the body to majordomo@kvack.org.  For more info on Linux MM,
>> see: http://www.linux-mm.org/ .
>> Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>
>>
> 
> 
> --
> To unsubscribe, send a message with 'unsubscribe linux-mm' in
> the body to majordomo@kvack.org.  For more info on Linux MM,
> see: http://www.linux-mm.org/ .
> Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>
> 


--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: 4.5.0-rc6: kernel BUG at ../mm/memory.c:1879
  2016-03-07 12:51 ` Vlastimil Babka
  2016-03-07 12:53   ` Vlastimil Babka
@ 2016-03-07 13:03   ` Russell King - ARM Linux
  2016-03-07 13:10     ` Matwey V. Kornilov
  1 sibling, 1 reply; 8+ messages in thread
From: Russell King - ARM Linux @ 2016-03-07 13:03 UTC (permalink / raw)
  To: Vlastimil Babka
  Cc: Matwey V. Kornilov, linux-mm, Rusty Russell, linux-arm-kernel, LKML

On Mon, Mar 07, 2016 at 01:51:40PM +0100, Vlastimil Babka wrote:
> [+CC ARM, module maintainers/lists]
> 
> On 03/07/2016 12:14 PM, Matwey V. Kornilov wrote:
> >
> >Hello,
> >
> >I see the following when try to boot 4.5.0-rc6 on ARM TI AM33xx based board.
> >
> >     [   13.907631] ------------[ cut here ]------------
> >     [   13.912323] kernel BUG at ../mm/memory.c:1879!
> 
> That's:
> BUG_ON(addr >= end);
> 
> where:
> end = addr + size;
> 
> All these variables are unsigned long, so they overflown?
> 
> I don't know ARM much, and there's no code for decodecode, but if I get the
> calling convention correctly, and the registers didn't change, both addr is
> r1 and size is r2, i.e. both bf006000. Weird.

A fix has been recently merged for this.  Look out for
"ARM: 8544/1: set_memory_xx fixes"

-- 
RMK's Patch system: http://www.arm.linux.org.uk/developer/patches/
FTTC broadband for 0.8mile line: currently at 9.6Mbps down 400kbps up
according to speedtest.net.

--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: 4.5.0-rc6: kernel BUG at ../mm/memory.c:1879
  2016-03-07 12:59   ` Matwey V. Kornilov
@ 2016-03-07 13:03     ` Matwey V. Kornilov
  0 siblings, 0 replies; 8+ messages in thread
From: Matwey V. Kornilov @ 2016-03-07 13:03 UTC (permalink / raw)
  To: linux-mm


I am sorry, I think the real issue is that mod->core_layout->text_size =
4096 and ro_size = 8192, then their difference is 4096 in frob_rodata()
function.
This leads to shift of PAGE_SHIFT by 4096 bits.

(gdb) print mod->core_layout
$25 = {base = 0xbf000000, size = 16384, text_size = 4096, ro_size =
8192, mtn = {mod = 0xbf002080, node = {node = {{
          __rb_parent_color = 1, rb_right = 0xbf0021c0, rb_left = 0x0
<__vectors_start>}, {__rb_parent_color = 1,
          rb_right = 0xbf0021cc, rb_left = 0x0 <__vectors_start>}}}}}

07.03.2016 15:59, Matwey V. Kornilov D?D,N?DuN?:
> 
> Further research shows that init_layout.ro_size == init_layout.text_size
> for some reason.
> 
> Then (layout->ro_size - layout->text_size) >> PAGE_SHIFT == 0 in
> frob_rodata() function.
> 
> (gdb) print mod->init_layout
> $21 = {base = 0xbf005000, size = 8192, text_size = 4096, ro_size = 4096,
> mtn = {mod = 0xbf002080, node = {node = {{
>           __rb_parent_color = 3204456852, rb_right = 0x0
> <__vectors_start>, rb_left = 0x0 <__vectors_start>}, {
>           __rb_parent_color = 3204456864, rb_right = 0x0
> <__vectors_start>, rb_left = 0x0 <__vectors_start>}}}}}
> 
> 
> 07.03.2016 15:46, Matwey V. Kornilov D?D,N?DuN?:
>>
>> I believe the following kgdb backtrace is relevant.
>>
>> size = 0 for some reason in apply_to_page_range
>> This means that end == addr.
>>
>> (gdb) bt
>> #0  apply_to_page_range (mm=0xc11d3190 <init_mm>, addr=3204472832,
>> size=0, fn=0xc0231cec <change_page_range>, data=0xdb5c3de8)
>>     at ../mm/memory.c:1876
>> #1  0xc0231dc4 in change_memory_common (addr=3204472832,
>> numpages=<optimized out>, set_mask=<optimized out>, clear_mask=0)
>>     at ../arch/arm/mm/pageattr.c:61
>> #2  0xc0231e30 in set_memory_ro (addr=<optimized out>,
>> numpages=<optimized out>) at ../arch/arm/mm/pageattr.c:70
>> #3  0xc02fd5b4 in frob_rodata (layout=<optimized out>,
>> set_memory=0xbf006000) at ../kernel/module.c:1983
>> #4  0xc02ff4f8 in module_enable_ro (mod=<optimized out>) at
>> ../kernel/module.c:2011
>> #5  0xc0301c80 in complete_formation (info=<optimized out>,
>> mod=<optimized out>) at ../kernel/module.c:3494
>> #6  load_module (info=0xdb5c3f40, uargs=<optimized out>,
>> flags=<optimized out>) at ../kernel/module.c:3622
>> #7  0xc0302120 in SYSC_finit_module (flags=<optimized out>,
>> uargs=<optimized out>, fd=<optimized out>) at ../kernel/module.c:3741
>> #8  SyS_finit_module (fd=6, uargs=-1226082716, flags=0) at
>> ../kernel/module.c:3722
>> #9  0xc021c140 in arm_elf_read_implies_exec (x=<optimized out>,
>> executable_stack=-1090494464) at ../arch/arm/kernel/elf.c:90
>> #10 0x00000006 in __vectors_start ()
>> Backtrace stopped: previous frame inner to this frame (corrupt stack?)
>>
>> 07.03.2016 14:14, Matwey V. Kornilov D?D,N?DuN?:
>>>
>>> Hello,
>>>
>>> I see the following when try to boot 4.5.0-rc6 on ARM TI AM33xx based board.
>>>
>>>     [   13.907631] ------------[ cut here ]------------
>>>     [   13.912323] kernel BUG at ../mm/memory.c:1879!
>>>     [   13.916795] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP ARM
>>>     [   13.922663] Modules linked in:
>>>     [   13.925761] CPU: 0 PID: 242 Comm: systemd-udevd Not tainted 4.5.0-rc6-3.ga55dde2-default #1
>>>     [   13.934153] Hardware name: Generic AM33XX (Flattened Device Tree)
>>>     [   13.940281] task: c2da2040 ti: c2db4000 task.ti: c2db4000
>>>     [   13.945738] PC is at apply_to_page_range+0x23c/0x240
>>>     [   13.950741] LR is at change_memory_common+0x94/0xe0
>>>     [   13.955648] pc : [<c03b333c>]    lr : [<c0231dc4>]    psr: 60010013
>>>     [   13.955648] sp : c2db5d88  ip : c2db5dd8  fp : c2db5dd4
>>>     [   13.967182] r10: bf002080  r9 : c2db5de8  r8 : c0231cec
>>>     [   13.972434] r7 : bf002180  r6 : bf006000  r5 : bf006000  r4 : bf006000
>>>     [   13.978995] r3 : c0231cec  r2 : bf006000  r1 : bf006000  r0 : c11d3190
>>>     [   13.985559] Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment user
>>>     [   13.992732] Control: 10c5387d  Table: 82dc0019  DAC: 00000055
>>>     [   13.998509] Process systemd-udevd (pid: 242, stack limit = 0xc2db4220)
>>>     [   14.005070] Stack: (0xc2db5d88 to 0xc2db6000)
>>>     [   14.009457] 5d80:                   bf005fff c11d3190 c11d3190 00000001 c1187dc4 c136c540
>>>     [   14.017682] 5da0: bf006000 c11d3190 c2db5dd4 bf006000 00000000 bf006000 bf002180 00000000
>>>     [   14.025907] 5dc0: c118350c bf002080 c2db5e14 c2db5dd8 c0231dc4 c03b310c c2db5de8 0000000c
>>>     [   14.034130] 5de0: c2db5dfc c2db5df0 00000080 00000000 c2db5e4c c0231e10 bf0021ac bf002180
>>>     [   14.042355] 5e00: bf002180 bf0021ac c2db5e24 c2db5e18 c0231e30 c0231d3c c2db5e3c c2db5e28
>>>     [   14.050579] 5e20: c02fd5b4 c0231e1c c0231e10 bf0021ac c2db5e5c c2db5e40 c02ff4f8 c02fd568
>>>     [   14.058802] 5e40: 00000001 bf00208c c2db5f40 bf002180 c2db5f34 c2db5e60 c0301c80 c02ff4ac
>>>     [   14.067025] 5e60: bf002080 c042d74c 00000000 00000000 bf000000 c118350c c0b359cc 00000000
>>>     [   14.075250] 5e80: bf00208c c118350c bf003000 c2db5ea0 bf002190 bf00208c 000014e4 00000000
>>>     [   14.083473] 5ea0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
>>>     [   14.091695] 5ec0: 00000000 00000000 6e72656b 00006c65 00000000 00000000 00000000 00000000
>>>     [   14.099918] 5ee0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
>>>     [   14.108143] 5f00: 00000000 dc8ba700 00000010 00000000 00000006 b6e73664 0000017b c021c308
>>>     [   14.116367] 5f20: c2db4000 00000000 c2db5fa4 c2db5f38 c0302120 c03009ac 00000002 00000000
>>>     [   14.124590] 5f40: d0851000 000014e4 d0851f0c d085180b d0851ca4 00003000 00003110 00000000
>>>     [   14.132814] 5f60: 00000000 00000000 00001538 0000001b 0000001c 00000014 00000011 0000000d
>>>     [   14.141036] 5f80: 00000000 00000000 00000000 7f611780 00000000 00000000 00000000 c2db5fa8
>>>     [   14.149259] 5fa0: c021c140 c0302090 7f611780 00000000 00000006 b6e73664 00000000 7f611830
>>>     [   14.157484] 5fc0: 7f611780 00000000 00000000 0000017b 00000000 00000000 00020000 80a76238
>>>     [   14.165707] 5fe0: be8c8058 be8c8048 b6e69de0 b6d8db40 60010010 00000006 45145044 91104437
>>>     [   14.173957] [<c03b333c>] (apply_to_page_range) from [<c0231dc4>] (change_memory_common+0x94/0xe0)
>>>     [   14.182888] [<c0231dc4>] (change_memory_common) from [<c0231e30>] (set_memory_ro+0x20/0x28)
>>>     [   14.191307] [<c0231e30>] (set_memory_ro) from [<c02fd5b4>] (frob_rodata+0x58/0x6c)
>>>     [   14.198930] [<c02fd5b4>] (frob_rodata) from [<c02ff4f8>] (module_enable_ro+0x58/0x60)
>>>     [   14.206811] [<c02ff4f8>] (module_enable_ro) from [<c0301c80>] (load_module+0x12e0/0x1548)
>>>     [   14.215039] [<c0301c80>] (load_module) from [<c0302120>] (SyS_finit_module+0x9c/0xd8)
>>>     [   14.222920] [<c0302120>] (SyS_finit_module) from [<c021c140>] (ret_fast_syscall+0x0/0x34)
>>>     [   14.231148] Code: e3500000 1afffff4 e51a3008 eaffffe5 (e7f001f2)
>>>     [   14.237282] ---[ end trace e25b4430ecf4fcdd ]---
>>>
>>>
>>> --
>>> To unsubscribe, send a message with 'unsubscribe linux-mm' in
>>> the body to majordomo@kvack.org.  For more info on Linux MM,
>>> see: http://www.linux-mm.org/ .
>>> Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>
>>>
>>
>>
>> --
>> To unsubscribe, send a message with 'unsubscribe linux-mm' in
>> the body to majordomo@kvack.org.  For more info on Linux MM,
>> see: http://www.linux-mm.org/ .
>> Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>
>>
> 
> 
> --
> To unsubscribe, send a message with 'unsubscribe linux-mm' in
> the body to majordomo@kvack.org.  For more info on Linux MM,
> see: http://www.linux-mm.org/ .
> Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>
> 


--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: 4.5.0-rc6: kernel BUG at ../mm/memory.c:1879
  2016-03-07 13:03   ` Russell King - ARM Linux
@ 2016-03-07 13:10     ` Matwey V. Kornilov
  0 siblings, 0 replies; 8+ messages in thread
From: Matwey V. Kornilov @ 2016-03-07 13:10 UTC (permalink / raw)
  To: Russell King - ARM Linux
  Cc: Vlastimil Babka, linux-mm, Rusty Russell, linux-arm-kernel, LKML

2016-03-07 16:03 GMT+03:00 Russell King - ARM Linux <linux@arm.linux.org.uk>:
> On Mon, Mar 07, 2016 at 01:51:40PM +0100, Vlastimil Babka wrote:
>> [+CC ARM, module maintainers/lists]
>>
>> On 03/07/2016 12:14 PM, Matwey V. Kornilov wrote:
>> >
>> >Hello,
>> >
>> >I see the following when try to boot 4.5.0-rc6 on ARM TI AM33xx based board.
>> >
>> >     [   13.907631] ------------[ cut here ]------------
>> >     [   13.912323] kernel BUG at ../mm/memory.c:1879!
>>
>> That's:
>> BUG_ON(addr >= end);
>>
>> where:
>> end = addr + size;
>>
>> All these variables are unsigned long, so they overflown?
>>
>> I don't know ARM much, and there's no code for decodecode, but if I get the
>> calling convention correctly, and the registers didn't change, both addr is
>> r1 and size is r2, i.e. both bf006000. Weird.
>
> A fix has been recently merged for this.  Look out for
> "ARM: 8544/1: set_memory_xx fixes"
>

Many thanks, I'll try again with -rc7.

> --
> RMK's Patch system: http://www.arm.linux.org.uk/developer/patches/
> FTTC broadband for 0.8mile line: currently at 9.6Mbps down 400kbps up
> according to speedtest.net.



-- 
With best regards,
Matwey V. Kornilov
http://blog.matwey.name
xmpp://0x2207@jabber.ru

--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>

^ permalink raw reply	[flat|nested] 8+ messages in thread

end of thread, other threads:[~2016-03-07 13:11 UTC | newest]

Thread overview: 8+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2016-03-07 11:14 4.5.0-rc6: kernel BUG at ../mm/memory.c:1879 Matwey V. Kornilov
2016-03-07 12:46 ` Matwey V. Kornilov
2016-03-07 12:59   ` Matwey V. Kornilov
2016-03-07 13:03     ` Matwey V. Kornilov
2016-03-07 12:51 ` Vlastimil Babka
2016-03-07 12:53   ` Vlastimil Babka
2016-03-07 13:03   ` Russell King - ARM Linux
2016-03-07 13:10     ` Matwey V. Kornilov

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox