From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-5.2 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,UNPARSEABLE_RELAY, USER_AGENT_SANE_1 autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id CB6F5C7618F for ; Tue, 16 Jul 2019 00:22:08 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id 6DC542080A for ; Tue, 16 Jul 2019 00:22:08 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 6DC542080A Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=linux.alibaba.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id 081C86B0005; Mon, 15 Jul 2019 20:22:08 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 032586B0006; Mon, 15 Jul 2019 20:22:07 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id E62A66B0007; Mon, 15 Jul 2019 20:22:07 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from mail-pf1-f198.google.com (mail-pf1-f198.google.com [209.85.210.198]) by kanga.kvack.org (Postfix) with ESMTP id A9F816B0005 for ; Mon, 15 Jul 2019 20:22:07 -0400 (EDT) Received: by mail-pf1-f198.google.com with SMTP id 6so11231194pfi.6 for ; Mon, 15 Jul 2019 17:22:07 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-original-authentication-results:x-gm-message-state:subject:to:cc :references:from:message-id:date:user-agent:mime-version:in-reply-to :content-transfer-encoding:content-language; bh=RWg60Rjw8mI22LuFMoN6Zd6GUjoES0kKfcgDo1a8GK8=; b=TUrPROdIbs0O588n6BZ7pVTCzoRWiA0ot3dr+tAd3OdTu035yheXjOU4tBB86l1DqK LwSYfaDjm0LpRdGpWZYD0FydMK6kWXhScim5usmenCHiKropBpZLIMBKNRZ+oQdMAxLM fmfKtMhj/FBYUPxMPC9DI3rGGVRZU4DzI/KVPo8R1Phiyrr8iG8ZE7+uJ9x1BJLcenFm cQs4bAAXW0Ed2dgBYbKvv2I/POcOxheXQIRBSjYADOXfv91k8hpyr6/XMENfMAyyfEjV WpEg9lyMliQaHawEOdlSptEBVUg/m3GECFi/3x6bPcePpN6/36UhkxhLCu9l6nfFcCTT YLWQ== X-Original-Authentication-Results: mx.google.com; spf=pass (google.com: domain of yang.shi@linux.alibaba.com designates 115.124.30.132 as permitted sender) smtp.mailfrom=yang.shi@linux.alibaba.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alibaba.com X-Gm-Message-State: APjAAAWRKzxxag/vT146Ramhm/5liS8wyZZzzRDjFVmHxW+HI9FDyVon zAazKhe3aRA5zSdIV0wfs8UFBNXqJPuHYyNWCn4ISCyk+WwQY8xLW4ADohW6hO6CQtDJqAd6k5F mma/eylaxlKFvHlSOJtj3Fv2XGMAxJh6F0kQ1WL/PPFIczNLisVXsAauAs2Mjv3bSzA== X-Received: by 2002:a17:902:8548:: with SMTP id d8mr31567321plo.100.1563236527315; Mon, 15 Jul 2019 17:22:07 -0700 (PDT) X-Google-Smtp-Source: APXvYqwwEwygqMCvnjD4zQb2En3OtsTR07MtbHr96Ea+EEQJxYMrbeyjzBlU0U8zxb/DAsQPkNDr X-Received: by 2002:a17:902:8548:: with SMTP id d8mr31567215plo.100.1563236526073; Mon, 15 Jul 2019 17:22:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1563236526; cv=none; d=google.com; s=arc-20160816; b=AmW+yWE+YAfPCSd3YCmjf4Q2gmQcLAqvGodBTJsBDycrn4bCAy9S+HjIKowpNFH1Xt laHsKDlOJcUhAdk1I2wWRQViyWPvIAbJE6DqnkIbtoFKXU7NUUdNTnh4oo2gr77qe6Py MW9ipYiOYL79RLaz7OhMJtwnOVcUtTKsmeSKzy/hWnFdlrwkRz/U7XdD7ra6O2I4CSbm HSiHQiJlIyB7oD1iC7PShWSJcL7MgVccvdESy0hz8bl3ncpqlsaCPZrBlYHTimbR2FpQ sWINZ46FU1xQUNQx+uyusid08B+Ow0sLKJ9schIsqiycSB2WxcduLmD9cRXxT6uaN9hf L3gw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-language:content-transfer-encoding:in-reply-to:mime-version :user-agent:date:message-id:from:references:cc:to:subject; bh=RWg60Rjw8mI22LuFMoN6Zd6GUjoES0kKfcgDo1a8GK8=; b=vXxIDJzWy4IdNLbKHOmhy2hp/HIKWZwkdWG2rGGX/3lU65yPONPHICOIhZbJyrCr5c nDfGHevSjT4/KrPEygZ186w15XAzRY4icxDSMlovfGcqNVS1v0l+cQvELp9BUZXeMLxA DiFoewlon5PiGKPGqIomqz0AWWQ9t0+QIiGZimMDZXoRJkXomZ+tWdcXOcCeNLWH7EUC zGS9WbVBTpQ7Q1vnlqKVeBVY9+Vn5s3ng2twsHb59gKMVOsi8k/hj+hu2xg8ZzoyUdKg G4i2zdhgrX1v3B4oPxq0LMPjjJjc0V4dA5Kbkdp2Q+pJO7T1jV15su23OP+7dPgG0Qqi bu0g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of yang.shi@linux.alibaba.com designates 115.124.30.132 as permitted sender) smtp.mailfrom=yang.shi@linux.alibaba.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: from out30-132.freemail.mail.aliyun.com (out30-132.freemail.mail.aliyun.com. [115.124.30.132]) by mx.google.com with ESMTPS id ci5si16875496plb.45.2019.07.15.17.22.05 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 15 Jul 2019 17:22:05 -0700 (PDT) Received-SPF: pass (google.com: domain of yang.shi@linux.alibaba.com designates 115.124.30.132 as permitted sender) client-ip=115.124.30.132; Authentication-Results: mx.google.com; spf=pass (google.com: domain of yang.shi@linux.alibaba.com designates 115.124.30.132 as permitted sender) smtp.mailfrom=yang.shi@linux.alibaba.com; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alibaba.com X-Alimail-AntiSpam:AC=PASS;BC=-1|-1;BR=01201311R531e4;CH=green;DM=||false|;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01f04446;MF=yang.shi@linux.alibaba.com;NM=1;PH=DS;RN=5;SR=0;TI=SMTPD_---0TX0LOhC_1563236521; Received: from US-143344MP.local(mailfrom:yang.shi@linux.alibaba.com fp:SMTPD_---0TX0LOhC_1563236521) by smtp.aliyun-inc.com(127.0.0.1); Tue, 16 Jul 2019 08:22:03 +0800 Subject: Re: list corruption in deferred_split_scan() To: Qian Cai Cc: "Kirill A. Shutemov" , akpm@linux-foundation.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org References: <1562795006.8510.19.camel@lca.pw> <1562879229.8510.24.camel@lca.pw> <1563225798.4610.5.camel@lca.pw> From: Yang Shi Message-ID: <5c853e6e-6367-d83c-bb97-97cd67320126@linux.alibaba.com> Date: Mon, 15 Jul 2019 17:22:00 -0700 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:52.0) Gecko/20100101 Thunderbird/52.7.0 MIME-Version: 1.0 In-Reply-To: <1563225798.4610.5.camel@lca.pw> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Content-Language: en-US X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On 7/15/19 2:23 PM, Qian Cai wrote: > On Fri, 2019-07-12 at 12:12 -0700, Yang Shi wrote: >>> Another possible lead is that without reverting the those commits below, >>> kdump >>> kernel would always also crash in shrink_slab_memcg() at this line, >>> >>> map = rcu_dereference_protected(memcg->nodeinfo[nid]->shrinker_map, true); >> This looks a little bit weird. It seems nodeinfo[nid] is NULL? I didn't >> think of where nodeinfo was freed but memcg was still online. Maybe a >> check is needed: > Actually, "memcg" is NULL. It sounds weird. shrink_slab() is called in mem_cgroup_iter which does pin the memcg. So, the memcg should not go away. > >> diff --git a/mm/vmscan.c b/mm/vmscan.c >> index a0301ed..bacda49 100644 >> --- a/mm/vmscan.c >> +++ b/mm/vmscan.c >> @@ -602,6 +602,9 @@ static unsigned long shrink_slab_memcg(gfp_t >> gfp_mask, int nid, >>          if (!mem_cgroup_online(memcg)) >>                  return 0; >> >> +       if (!memcg->nodeinfo[nid]) >> +               return 0; >> + >>          if (!down_read_trylock(&shrinker_rwsem)) >>                  return 0; >> >>> [    9.072036][    T1] BUG: KASAN: null-ptr-deref in shrink_slab+0x111/0x440 >>> [    9.072036][    T1] Read of size 8 at addr 0000000000000dc8 by task >>> swapper/0/1 >>> [    9.072036][    T1] >>> [    9.072036][    T1] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 5.2.0-next- >>> 20190711+ #10 >>> [    9.072036][    T1] Hardware name: HPE ProLiant DL385 Gen10/ProLiant >>> DL385 >>> Gen10, BIOS A40 01/25/2019 >>> [    9.072036][    T1] Call Trace: >>> [    9.072036][    T1]  dump_stack+0x62/0x9a >>> [    9.072036][    T1]  __kasan_report.cold.4+0xb0/0xb4 >>> [    9.072036][    T1]  ? unwind_get_return_address+0x40/0x50 >>> [    9.072036][    T1]  ? shrink_slab+0x111/0x440 >>> [    9.072036][    T1]  kasan_report+0xc/0xe >>> [    9.072036][    T1]  __asan_load8+0x71/0xa0 >>> [    9.072036][    T1]  shrink_slab+0x111/0x440 >>> [    9.072036][    T1]  ? mem_cgroup_iter+0x98/0x840 >>> [    9.072036][    T1]  ? unregister_shrinker+0x110/0x110 >>> [    9.072036][    T1]  ? kasan_check_read+0x11/0x20 >>> [    9.072036][    T1]  ? mem_cgroup_protected+0x39/0x260 >>> [    9.072036][    T1]  shrink_node+0x31e/0xa30 >>> [    9.072036][    T1]  ? shrink_node_memcg+0x1560/0x1560 >>> [    9.072036][    T1]  ? ktime_get+0x93/0x110 >>> [    9.072036][    T1]  do_try_to_free_pages+0x22f/0x820 >>> [    9.072036][    T1]  ? shrink_node+0xa30/0xa30 >>> [    9.072036][    T1]  ? kasan_check_read+0x11/0x20 >>> [    9.072036][    T1]  ? check_chain_key+0x1df/0x2e0 >>> [    9.072036][    T1]  try_to_free_pages+0x242/0x4d0 >>> [    9.072036][    T1]  ? do_try_to_free_pages+0x820/0x820 >>> [    9.072036][    T1]  __alloc_pages_nodemask+0x9ce/0x1bc0 >>> [    9.072036][    T1]  ? gfp_pfmemalloc_allowed+0xc0/0xc0 >>> [    9.072036][    T1]  ? unwind_dump+0x260/0x260 >>> [    9.072036][    T1]  ? kernel_text_address+0x33/0xc0 >>> [    9.072036][    T1]  ? arch_stack_walk+0x8f/0xf0 >>> [    9.072036][    T1]  ? ret_from_fork+0x22/0x40 >>> [    9.072036][    T1]  alloc_page_interleave+0x18/0x130 >>> [    9.072036][    T1]  alloc_pages_current+0xf6/0x110 >>> [    9.072036][    T1]  allocate_slab+0x600/0x11f0 >>> [    9.072036][    T1]  new_slab+0x46/0x70 >>> [    9.072036][    T1]  ___slab_alloc+0x5d4/0x9c0 >>> [    9.072036][    T1]  ? create_object+0x3a/0x3e0 >>> [    9.072036][    T1]  ? fs_reclaim_acquire.part.15+0x5/0x30 >>> [    9.072036][    T1]  ? ___might_sleep+0xab/0xc0 >>> [    9.072036][    T1]  ? create_object+0x3a/0x3e0 >>> [    9.072036][    T1]  __slab_alloc+0x12/0x20 >>> [    9.072036][    T1]  ? __slab_alloc+0x12/0x20 >>> [    9.072036][    T1]  kmem_cache_alloc+0x32a/0x400 >>> [    9.072036][    T1]  create_object+0x3a/0x3e0 >>> [    9.072036][    T1]  kmemleak_alloc+0x71/0xa0 >>> [    9.072036][    T1]  kmem_cache_alloc+0x272/0x400 >>> [    9.072036][    T1]  ? kasan_check_read+0x11/0x20 >>> [    9.072036][    T1]  ? do_raw_spin_unlock+0xa8/0x140 >>> [    9.072036][    T1]  acpi_ps_alloc_op+0x76/0x122 >>> [    9.072036][    T1]  acpi_ds_execute_arguments+0x2f/0x18d >>> [    9.072036][    T1]  acpi_ds_get_package_arguments+0x7d/0x84 >>> [    9.072036][    T1]  acpi_ns_init_one_package+0x33/0x61 >>> [    9.072036][    T1]  acpi_ns_init_one_object+0xfc/0x189 >>> [    9.072036][    T1]  acpi_ns_walk_namespace+0x114/0x1f2 >>> [    9.072036][    T1]  ? acpi_ns_init_one_package+0x61/0x61 >>> [    9.072036][    T1]  ? acpi_ns_init_one_package+0x61/0x61 >>> [    9.072036][    T1]  acpi_walk_namespace+0x9e/0xcb >>> [    9.072036][    T1]  ? acpi_sleep_proc_init+0x36/0x36 >>> [    9.072036][    T1]  acpi_ns_initialize_objects+0x99/0xed >>> [    9.072036][    T1]  ? acpi_ns_find_ini_methods+0xa2/0xa2 >>> [    9.072036][    T1]  ? acpi_tb_load_namespace+0x2dc/0x2eb >>> [    9.072036][    T1]  acpi_load_tables+0x61/0x80 >>> [    9.072036][    T1]  acpi_init+0x10d/0x44b >>> [    9.072036][    T1]  ? acpi_sleep_proc_init+0x36/0x36 >>> [    9.072036][    T1]  ? bus_uevent_filter+0x16/0x30 >>> [    9.072036][    T1]  ? kobject_uevent_env+0x109/0x980 >>> [    9.072036][    T1]  ? kernfs_get+0x13/0x20 >>> [    9.072036][    T1]  ? kobject_uevent+0xb/0x10 >>> [    9.072036][    T1]  ? kset_register+0x31/0x50 >>> [    9.072036][    T1]  ? kset_create_and_add+0x9f/0xd0 >>> [    9.072036][    T1]  ? acpi_sleep_proc_init+0x36/0x36 >>> [    9.072036][    T1]  do_one_initcall+0xfe/0x45a >>> [    9.072036][    T1]  ? initcall_blacklisted+0x150/0x150 >>> [    9.072036][    T1]  ? rwsem_down_read_slowpath+0x930/0x930 >>> [    9.072036][    T1]  ? kasan_check_write+0x14/0x20 >>> [    9.072036][    T1]  ? up_write+0x6b/0x190 >>> [    9.072036][    T1]  kernel_init_freeable+0x614/0x6a7 >>> [    9.072036][    T1]  ? rest_init+0x188/0x188 >>> [    9.072036][    T1]  kernel_init+0x11/0x138 >>> [    9.072036][    T1]  ? rest_init+0x188/0x188 >>> [    9.072036][    T1]  ret_from_fork+0x22/0x40 >>> [    9.072036][    T1] >>> ================================================================== >>> [    9.072036][    T1] Disabling lock debugging due to kernel taint >>> [    9.145712][    T1] BUG: kernel NULL pointer dereference, address: >>> 0000000000000dc8 >>> [    9.152036][    T1] #PF: supervisor read access in kernel mode >>> [    9.152036][    T1] #PF: error_code(0x0000) - not-present page >>> [    9.152036][    T1] PGD 0 P4D 0 >>> [    9.152036][    T1] Oops: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN NOPTI >>> [    9.152036][    T1] CPU: 0 PID: 1 Comm: swapper/0 Tainted: >>> G    B             5.2.0-next-20190711+ #10 >>> [    9.152036][    T1] Hardware name: HPE ProLiant DL385 Gen10/ProLiant >>> DL385 >>> Gen10, BIOS A40 01/25/2019 >>> [    9.152036][    T1] RIP: 0010:shrink_slab+0x111/0x440 >>> [    9.152036][    T1] Code: c7 20 8d 44 82 e8 7f 8b e8 ff 85 c0 0f 84 e2 02 >>> 00 >>> 00 4c 63 a5 4c ff ff ff 49 81 c4 b8 01 00 00 4b 8d 7c e6 08 e8 3f 07 0e 00 >>> <4f> >>> 8b 64 e6 08 49 8d bc 24 20 03 00 00 e8 2d 07 0e 00 49 8b 84 24 >>> [    9.152036][    T1] RSP: 0018:ffff88905757f100 EFLAGS: 00010282 >>> [    9.152036][    T1] RAX: 0000000000000000 RBX: ffff88905757f1b0 RCX: >>> ffffffff8112f288 >>> [    9.152036][    T1] RDX: 1ffffffff049c088 RSI: dffffc0000000000 RDI: >>> ffffffff824e0440 >>> [    9.152036][    T1] RBP: ffff88905757f1d8 R08: fffffbfff049c089 R09: >>> fffffbfff049c088 >>> [    9.152036][    T1] R10: fffffbfff049c088 R11: ffffffff824e0443 R12: >>> 00000000000001b8 >>> [    9.152036][    T1] R13: 0000000000000000 R14: 0000000000000000 R15: >>> ffff88905757f440 >>> [    9.152036][    T1] FS:  0000000000000000(0000) GS:ffff889062800000(0000) >>> knlGS:0000000000000000 >>> [    9.152036][    T1] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033 >>> [    9.152036][    T1] CR2: 0000000000000dc8 CR3: 0000001070212000 CR4: >>> 00000000001406b0 >>> [    9.152036][    T1] Call Trace: >>> [    9.152036][    T1]  ? mem_cgroup_iter+0x98/0x840 >>> [    9.152036][    T1]  ? unregister_shrinker+0x110/0x110 >>> [    9.152036][    T1]  ? kasan_check_read+0x11/0x20 >>> [    9.152036][    T1]  ? mem_cgroup_protected+0x39/0x260 >>> [    9.152036][    T1]  shrink_node+0x31e/0xa30 >>> [    9.152036][    T1]  ? shrink_node_memcg+0x1560/0x1560 >>> [    9.152036][    T1]  ? ktime_get+0x93/0x110 >>> [    9.152036][    T1]  do_try_to_free_pages+0x22f/0x820 >>> [    9.152036][    T1]  ? shrink_node+0xa30/0xa30 >>> [    9.152036][    T1]  ? kasan_check_read+0x11/0x20 >>> [    9.152036][    T1]  ? check_chain_key+0x1df/0x2e0 >>> [    9.152036][    T1]  try_to_free_pages+0x242/0x4d0 >>> [    9.152036][    T1]  ? do_try_to_free_pages+0x820/0x820 >>> [    9.152036][    T1]  __alloc_pages_nodemask+0x9ce/0x1bc0 >>> [    9.152036][    T1]  ? gfp_pfmemalloc_allowed+0xc0/0xc0 >>> [    9.152036][    T1]  ? unwind_dump+0x260/0x260 >>> [    9.152036][    T1]  ? kernel_text_address+0x33/0xc0 >>> [    9.152036][    T1]  ? arch_stack_walk+0x8f/0xf0 >>> [    9.152036][    T1]  ? ret_from_fork+0x22/0x40 >>> [    9.152036][    T1]  alloc_page_interleave+0x18/0x130 >>> [    9.152036][    T1]  alloc_pages_current+0xf6/0x110 >>> [    9.152036][    T1]  allocate_slab+0x600/0x11f0 >>> [    9.152036][    T1]  new_slab+0x46/0x70 >>> [    9.152036][    T1]  ___slab_alloc+0x5d4/0x9c0 >>> [    9.152036][    T1]  ? create_object+0x3a/0x3e0 >>> [    9.152036][    T1]  ? fs_reclaim_acquire.part.15+0x5/0x30 >>> [    9.152036][    T1]  ? ___might_sleep+0xab/0xc0 >>> [    9.152036][    T1]  ? create_object+0x3a/0x3e0 >>> [    9.152036][    T1]  __slab_alloc+0x12/0x20 >>> [    9.152036][    T1]  ? __slab_alloc+0x12/0x20 >>> [    9.152036][    T1]  kmem_cache_alloc+0x32a/0x400 >>> [    9.152036][    T1]  create_object+0x3a/0x3e0 >>> [    9.152036][    T1]  kmemleak_alloc+0x71/0xa0 >>> [    9.152036][    T1]  kmem_cache_alloc+0x272/0x400 >>> [    9.152036][    T1]  ? kasan_check_read+0x11/0x20 >>> [    9.152036][    T1]  ? do_raw_spin_unlock+0xa8/0x140 >>> [    9.152036][    T1]  acpi_ps_alloc_op+0x76/0x122 >>> [    9.152036][    T1]  acpi_ds_execute_arguments+0x2f/0x18d >>> [    9.152036][    T1]  acpi_ds_get_package_arguments+0x7d/0x84 >>> [    9.152036][    T1]  acpi_ns_init_one_package+0x33/0x61 >>> [    9.152036][    T1]  acpi_ns_init_one_object+0xfc/0x189 >>> [    9.152036][    T1]  acpi_ns_walk_namespace+0x114/0x1f2 >>> [    9.152036][    T1]  ? acpi_ns_init_one_package+0x61/0x61 >>> [    9.152036][    T1]  ? acpi_ns_init_one_package+0x61/0x61 >>> [    9.152036][    T1]  acpi_walk_namespace+0x9e/0xcb >>> [    9.152036][    T1]  ? acpi_sleep_proc_init+0x36/0x36 >>> [    9.152036][    T1]  acpi_ns_initialize_objects+0x99/0xed >>> [    9.152036][    T1]  ? acpi_ns_find_ini_methods+0xa2/0xa2 >>> [    9.152036][    T1]  ? acpi_tb_load_namespace+0x2dc/0x2eb >>> [    9.152036][    T1]  acpi_load_tables+0x61/0x80 >>> [    9.152036][    T1]  acpi_init+0x10d/0x44b >>> [    9.152036][    T1]  ? acpi_sleep_proc_init+0x36/0x36 >>> [    9.152036][    T1]  ? bus_uevent_filter+0x16/0x30 >>> [    9.152036][    T1]  ? kobject_uevent_env+0x109/0x980 >>> [    9.152036][    T1]  ? kernfs_get+0x13/0x20 >>> [    9.152036][    T1]  ? kobject_uevent+0xb/0x10 >>> [    9.152036][    T1]  ? kset_register+0x31/0x50 >>> [    9.152036][    T1]  ? kset_create_and_add+0x9f/0xd0 >>> [    9.152036][    T1]  ? acpi_sleep_proc_init+0x36/0x36 >>> [    9.152036][    T1]  do_one_initcall+0xfe/0x45a >>> [    9.152036][    T1]  ? initcall_blacklisted+0x150/0x150 >>> [    9.152036][    T1]  ? rwsem_down_read_slowpath+0x930/0x930 >>> [    9.152036][    T1]  ? kasan_check_write+0x14/0x20 >>> [    9.152036][    T1]  ? up_write+0x6b/0x190 >>> [    9.152036][    T1]  kernel_init_freeable+0x614/0x6a7 >>> [    9.152036][    T1]  ? rest_init+0x188/0x188 >>> [    9.152036][    T1]  kernel_init+0x11/0x138 >>> [    9.152036][    T1]  ? rest_init+0x188/0x188 >>> [    9.152036][    T1]  ret_from_fork+0x22/0x40 >>> [    9.152036][    T1] Modules linked in: >>> [    9.152036][    T1] CR2: 0000000000000dc8 >>> [    9.152036][    T1] ---[ end trace 568acce4eca01945 ]--- >>> [    9.152036][    T1] RIP: 0010:shrink_slab+0x111/0x440 >>> [    9.152036][    T1] Code: c7 20 8d 44 82 e8 7f 8b e8 ff 85 c0 0f 84 e2 02 >>> 00 >>> 00 4c 63 a5 4c ff ff ff 49 81 c4 b8 01 00 00 4b 8d 7c e6 08 e8 3f 07 0e 00 >>> <4f> >>> 8b 64 e6 08 49 8d bc 24 20 03 00 00 e8 2d 07 0e 00 49 8b 84 24 >>> [    9.152036][    T1] RSP: 0018:ffff88905757f100 EFLAGS: 00010282 >>> [    9.152036][    T1] RAX: 0000000000000000 RBX: ffff88905757f1b0 RCX: >>> ffffffff8112f288 >>> [    9.152036][    T1] RDX: 1ffffffff049c088 RSI: dffffc0000000000 RDI: >>> ffffffff824e0440 >>> [    9.152036][    T1] RBP: ffff88905757f1d8 R08: fffffbfff049c089 R09: >>> fffffbfff049c088 >>> [    9.152036][    T1] R10: fffffbfff049c088 R11: ffffffff824e0443 R12: >>> 00000000000001b8 >>> [    9.152036][    T1] R13: 0000000000000000 R14: 0000000000000000 R15: >>> ffff88905757f440 >>> [    9.152036][    T1] FS:  0000000000000000(0000) GS:ffff889062800000(0000) >>> knlGS:00000000 >>>