From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3C4E2E7717F for ; Mon, 9 Dec 2024 02:09:21 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 4D2C48D0023; Sun, 8 Dec 2024 21:09:20 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 482088D0015; Sun, 8 Dec 2024 21:09:20 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 370FB8D0023; Sun, 8 Dec 2024 21:09:20 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0012.hostedemail.com [216.40.44.12]) by kanga.kvack.org (Postfix) with ESMTP id 151668D0015 for ; Sun, 8 Dec 2024 21:09:20 -0500 (EST) Received: from smtpin21.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay04.hostedemail.com (Postfix) with ESMTP id A16E51A0C26 for ; Mon, 9 Dec 2024 02:09:19 +0000 (UTC) X-FDA: 82873787766.21.EC777D7 Received: from mail-qt1-f181.google.com (mail-qt1-f181.google.com [209.85.160.181]) by imf12.hostedemail.com (Postfix) with ESMTP id 1CC1140003 for ; Mon, 9 Dec 2024 02:09:08 +0000 (UTC) Authentication-Results: imf12.hostedemail.com; dkim=pass header.d=google.com header.s=20230601 header.b=Iymx15h8; dmarc=pass (policy=reject) header.from=google.com; spf=pass (imf12.hostedemail.com: domain of surenb@google.com designates 209.85.160.181 as permitted sender) smtp.mailfrom=surenb@google.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1733710139; a=rsa-sha256; cv=none; b=DEJhef1kuYrjRDlZ8FMOw3i1SK3MycZ9Vz1yBh2CW9h9RjMXkMtNSes/wHoTyS6t/jf2AP gxMtKFzIpK0dcBFWCVO9pqe2YUMsptArQuSCqJTJisox/FiscL0PrsblC4m3mMKvpT9Ite 5tysW5SwwfzeCltq2Woz/E3Ur6nnvdU= ARC-Authentication-Results: i=1; imf12.hostedemail.com; dkim=pass header.d=google.com header.s=20230601 header.b=Iymx15h8; dmarc=pass (policy=reject) header.from=google.com; spf=pass (imf12.hostedemail.com: domain of surenb@google.com designates 209.85.160.181 as permitted sender) smtp.mailfrom=surenb@google.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1733710139; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=0Bo4HBWAqousHOYJdPF3EMPMGka7vrl2TiE+JGDByw8=; b=NTP/H872JHEUOfwDSL5hUVXjfmJ9QYsMwBm2P5R7diki7kTfogvUkHII8258S+HuPFG/FF BiFcp1TUoDcs/5g6Eyn3cfeGgxm125MN2qYwVDiqhrTJgX/ej7mEaoyWL+cuGSzS4+ytB4 yViYoPm4MQycEaj+nhlMaR1uv2+AaW8= Received: by mail-qt1-f181.google.com with SMTP id d75a77b69052e-467431402deso255781cf.0 for ; Sun, 08 Dec 2024 18:09:17 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1733710157; x=1734314957; darn=kvack.org; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=0Bo4HBWAqousHOYJdPF3EMPMGka7vrl2TiE+JGDByw8=; b=Iymx15h8nb/Pu3t5RhGHJKV72MEtKUlrvOicgDnaDI3pcSDeWmrOHzu36gvD+NZKB1 v7eSEMOL+OVEj+Est07gdi8Vu5TvNeiY1gEhiLuAudN4YjcIpWkuavE+4Si1bXTjT3v3 yjoDwbSibVoNSxoN91ohIuPVGo/PLo1JRmgbSUUGu57Y5OD+qEhPZQf0NvWWCjgvBRvM ibFGWMf43n37iuYlCVMI8T049FLJI0EL+s/iVUWYMXZTW2YmIBBjKnbFD9mCLfLrCqN2 HqErLyOxrHOJuRX0zLLLcBk7ZcSHzGICX10jQmZZUcFBA8bZYeeUfOHc2r5l73bKTV8M +R2g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1733710157; x=1734314957; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=0Bo4HBWAqousHOYJdPF3EMPMGka7vrl2TiE+JGDByw8=; b=GbZChbBR+HjF5gb0zH904whsH1pqnQYTQyEccGs6eXXyKPBK+/NpEMjGipwKZTB5bs BKIBXAPvFtTtVrqPRWDCkrz9gKDTRoL44PUvCjcLAKTnerFcYM1w7kjwoRPiuWSFT1DI MaMPscTo0iGQvjRDxmoePuYrWHdGk1puqjHjhQXI9+IHETBlk4glx8f84SQpz/cRlpGy Sn4GQ2CWGMe3XM3WzkOJduCmaESi7T3RpLYRufRyFDXVxG+eBizcg2QkP0pUZQEbfta+ 2+rRb1FBMS8hHav4AJmGZpGO/p3RiZbN201QQ1qF2HJj6lNLgf7lt2G4q623xG8l7gNl qS/w== X-Forwarded-Encrypted: i=1; AJvYcCUyzFQfY5CoT9oK8S++vQndB151AqrdHcK2sW55311tGQ29B+VSJmFjLtVvqAAaYPXdyvfZxdOirw==@kvack.org X-Gm-Message-State: AOJu0YwxiX+bgYdlzI0gynHVhYlfpgyXzu0ozpqSqVXX7228oHDAVUlG rqSHCLg0bGwj5IiqVqyVUv14JyqyXaBLbUnknnXW9ZgvxPabiTYUB9e9TI4H+fNXt/IqpTCDfT6 2mVl8atlzjf/g6efJKX2wGKC76q38IbESV+zk X-Gm-Gg: ASbGnctpxD/padaM0l3+mB8eXSczIELOgoL4J4tFui/WXS1iR0zfjPkmb88vCVoaC4j lOsQVdpGdBJJQUBEs8T1kktPfgUlnma0= X-Google-Smtp-Source: AGHT+IGyVdOaH3CJDTjUh7NqZc3tkr+a64QziAJ9EgHIPVClMGxk/UwhPqp5tjdHMLGCvGZgQ0jnVHdShP2JR9uzjpI= X-Received: by 2002:a05:622a:5e13:b0:466:a3bf:41ab with SMTP id d75a77b69052e-4674c9ac794mr5372731cf.21.1733710156700; Sun, 08 Dec 2024 18:09:16 -0800 (PST) MIME-Version: 1.0 References: <202412082208.db1fb2c9-lkp@intel.com> In-Reply-To: <202412082208.db1fb2c9-lkp@intel.com> From: Suren Baghdasaryan Date: Sun, 8 Dec 2024 18:09:05 -0800 Message-ID: Subject: Re: [akpm-mm:mm-unstable] [mm] 85ad413389: BUG:kernel_NULL_pointer_dereference,address To: kernel test robot Cc: oe-lkp@lists.linux.dev, lkp@intel.com, Andrew Morton , Christian Brauner , David Hildenbrand , David Howells , Davidlohr Bueso , Hillf Danton , Hugh Dickins , Jann Horn , Johannes Weiner , Jonathan Corbet , "Liam R. Howlett" , Lorenzo Stoakes , Mateusz Guzik , Matthew Wilcox , Mel Gorman , Michal Hocko , Minchan Kim , Oleg Nesterov , Pasha Tatashin , "Paul E. McKenney" , Peter Xu , Peter Zijlstra , Shakeel Butt , Sourav Panda , Vlastimil Babka , Wei Yang , linux-mm@kvack.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Rspamd-Server: rspam04 X-Rspamd-Queue-Id: 1CC1140003 X-Stat-Signature: zf8izocdjt1fguiu8r41i11pfibnci64 X-Rspam-User: X-HE-Tag: 1733710148-83116 X-HE-Meta: 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 cRNlp8+M OkV+mYox28rldeVcL/Ej2uWHz21dg+WOngdNxpd5My6Q2tHrFxmdwRV12FWE8CYN2/rDp+LT8arbwOGbOGdDEn1wMP2xBpThkmCFGnsZ4ojJvSXKC+Bqb7i/zEXfTehN+pbVdhsGjbiQegtwAul71GCtFBIG24BewetebX+7oS/grSFbdemmPXuJO54KpJU0Echp3pHKomOqj1M85YihH3/FYTa7A+650ghZnxoGKHmPvSaQtYOx5kA2NA2Z8Gyz8hJoGxwkMSfh/6e472HrjikqBLvKZ6+LV4avb0Mdia22Wp8dsukOdpRQo17xbZcHre8QK2CYwiLsd/SNtQJDWd0hi4NrW1EuAm8NPq2O0Rg5Y2mQkcHg6mxIZODnJ+Ks6qCB1 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: On Sun, Dec 8, 2024 at 7:26=E2=80=AFAM kernel test robot wrote: > > > > Hello, > > kernel test robot noticed "BUG:kernel_NULL_pointer_dereference,address" o= n: > > commit: 85ad413389aec04cfaaba043caa8128b76c6e491 ("mm: make vma cache SLA= B_TYPESAFE_BY_RCU") > https://git.kernel.org/cgit/linux/kernel/git/akpm/mm.git mm-unstable > > in testcase: boot > > config: i386-randconfig-141-20241208 > compiler: gcc-11 > test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 1= 6G > > (please refer to attached dmesg/kmsg for entire log/backtrace) > > > +------------------------------------------------+------------+----------= --+ > | | 98d5eefb97 | 85ad41338= 9 | > +------------------------------------------------+------------+----------= --+ > | BUG:kernel_NULL_pointer_dereference,address | 0 | 12 = | > | Oops | 0 | 12 = | > | EIP:lock_anon_vma_root | 0 | 12 = | > | Kernel_panic-not_syncing:Fatal_exception | 0 | 12 = | > +------------------------------------------------+------------+----------= --+ > > > If you fix the issue in a separate patch/commit (i.e. not just a new vers= ion of > the same patch/commit), kindly add following tags > | Reported-by: kernel test robot > | Closes: https://lore.kernel.org/oe-lkp/202412082208.db1fb2c9-lkp@intel.= com Thanks for the report! It looks like anon_vma passed to lock_anon_vma_root() is NULL but it's not obvious to me why my patch would cause that. Oliver, how can I reproduce this locally? > > > [ 6.680723][ T1] BUG: kernel NULL pointer dereference, address: 000= 00000 > [ 6.681291][ T1] #PF: supervisor read access in kernel mode > [ 6.681706][ T1] #PF: error_code(0x0000) - not-present page > [ 6.682122][ T1] *pde =3D 00000000 > [ 6.682389][ T1] Oops: Oops: 0000 [#1] PREEMPT > [ 6.682741][ T1] CPU: 0 UID: 0 PID: 1 Comm: init Tainted: G = T 6.13.0-rc1-00162-g85ad413389ae #1 b25e7d42bdbf00dd0b477b43b1be4c= 6af368b663 > [ 6.683729][ T1] Tainted: [T]=3DRANDSTRUCT > [ 6.684044][ T1] EIP: lock_anon_vma_root (mm/rmap.c:245) > [ 6.684422][ T1] Code: 31 d2 31 c9 c3 55 89 e5 e8 55 68 15 00 5d 31 c0 31= d2 31 c9 c3 55 8b 00 83 c0 04 89 e5 e8 64 5f f2 ff 5d 31 c0 c3 55 89 e5 53= <8b> 1a 39 c3 74 18 85 c0 74 0a 0f 0b 83 c0 04 e8 48 5f f2 ff 8d 43 > All code > =3D=3D=3D=3D=3D=3D=3D=3D > 0: 31 d2 xor %edx,%edx > 2: 31 c9 xor %ecx,%ecx > 4: c3 ret > 5: 55 push %rbp > 6: 89 e5 mov %esp,%ebp > 8: e8 55 68 15 00 call 0x156862 > d: 5d pop %rbp > e: 31 c0 xor %eax,%eax > 10: 31 d2 xor %edx,%edx > 12: 31 c9 xor %ecx,%ecx > 14: c3 ret > 15: 55 push %rbp > 16: 8b 00 mov (%rax),%eax > 18: 83 c0 04 add $0x4,%eax > 1b: 89 e5 mov %esp,%ebp > 1d: e8 64 5f f2 ff call 0xfffffffffff25f86 > 22: 5d pop %rbp > 23: 31 c0 xor %eax,%eax > 25: c3 ret > 26: 55 push %rbp > 27: 89 e5 mov %esp,%ebp > 29: 53 push %rbx > 2a:* 8b 1a mov (%rdx),%ebx <-- trapp= ing instruction > 2c: 39 c3 cmp %eax,%ebx > 2e: 74 18 je 0x48 > 30: 85 c0 test %eax,%eax > 32: 74 0a je 0x3e > 34: 0f 0b ud2 > 36: 83 c0 04 add $0x4,%eax > 39: e8 48 5f f2 ff call 0xfffffffffff25f86 > 3e: 8d .byte 0x8d > 3f: 43 rex.XB > > Code starting with the faulting instruction > =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D > 0: 8b 1a mov (%rdx),%ebx > 2: 39 c3 cmp %eax,%ebx > 4: 74 18 je 0x1e > 6: 85 c0 test %eax,%eax > 8: 74 0a je 0x14 > a: 0f 0b ud2 > c: 83 c0 04 add $0x4,%eax > f: e8 48 5f f2 ff call 0xfffffffffff25f5c > 14: 8d .byte 0x8d > 15: 43 rex.XB > [ 6.685810][ T1] EAX: 00000000 EBX: 4ccbd680 ECX: 00000000 EDX: 000= 00000 > [ 6.686314][ T1] ESI: 4ccbd678 EDI: 4ccbd800 EBP: 416e1c60 ESP: 416= e1c5c > [ 6.686817][ T1] DS: 007b ES: 007b FS: 0000 GS: 0000 SS: 0068 EFLAG= S: 00010202 > [ 6.687338][ T1] CR0: 80050033 CR2: 00000000 CR3: 0ccbc000 CR4: 000= 406d0 > [ 6.687821][ T1] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 000= 00000 > [ 6.688313][ T1] DR6: fffe0ff0 DR7: 00000400 > [ 6.688632][ T1] Call Trace: > [ 6.688880][ T1] ? show_regs (arch/x86/kernel/dumpstack.c:479 arch/x86/ke= rnel/dumpstack.c:465) > [ 6.689181][ T1] ? __die_body (arch/x86/kernel/dumpstack.c:421) > [ 6.689478][ T1] ? __die (arch/x86/kernel/dumpstack.c:435) > [ 6.689745][ T1] ? page_fault_oops (arch/x86/mm/fault.c:712) > [ 6.690080][ T1] ? lock_anon_vma_root (mm/rmap.c:245) > [ 6.690427][ T1] ? kernelmode_fixup_or_oops+0x50/0x5e > [ 6.690891][ T1] ? __bad_area_nosemaphore+0x2c/0x17c > [ 6.691343][ T1] ? bad_area_nosemaphore (arch/x86/mm/fault.c:835) > [ 6.691700][ T1] ? do_user_addr_fault (arch/x86/mm/fault.c:1280 (discrimi= nator 1)) > [ 6.692055][ T1] ? exc_page_fault (arch/x86/include/asm/irqflags.h:26 arc= h/x86/include/asm/irqflags.h:87 arch/x86/include/asm/irqflags.h:147 arch/x8= 6/mm/fault.c:1489 arch/x86/mm/fault.c:1539) > [ 6.692391][ T1] ? pvclock_clocksource_read_nowd (arch/x86/mm/fault.c:149= 4) > [ 6.692815][ T1] ? handle_exception (arch/x86/entry/entry_32.S:1048) > [ 6.693136][ T1] ? pvclock_clocksource_read_nowd (arch/x86/mm/fault.c:149= 4) > [ 6.693560][ T1] ? lock_anon_vma_root (mm/rmap.c:245) > [ 6.693913][ T1] ? pvclock_clocksource_read_nowd (arch/x86/mm/fault.c:149= 4) > [ 6.694352][ T1] ? lock_anon_vma_root (mm/rmap.c:245) > [ 6.694717][ T1] ? anon_vma_clone (mm/rmap.c:298) > [ 6.695053][ T1] ? __split_vma (mm/vma.c:486) > [ 6.695375][ T1] ? vms_gather_munmap_vmas (mm/vma.c:1289) > [ 6.695763][ T1] ? __mmap_prepare (mm/vma.c:2242) > [ 6.696108][ T1] ? __mmap_region (mm/vma.c:2443) > [ 6.696454][ T1] ? mmap_region (mm/mmap.c:1037) > [ 6.696782][ T1] ? do_mmap (mm/mmap.c:499) > [ 6.697091][ T1] ? vm_mmap_pgoff (mm/util.c:580) > [ 6.697433][ T1] ? ksys_mmap_pgoff (mm/mmap.c:545) > [ 6.697782][ T1] ? __ia32_sys_mmap_pgoff (mm/mmap.c:552) > [ 6.698159][ T1] ? ia32_sys_call (kbuild/obj/consumer/i386-randconfig-141= -20241208/./arch/x86/include/generated/asm/syscalls_32.h:193) > [ 6.698507][ T1] ? do_int80_syscall_32 (arch/x86/entry/common.c:165 arch/= x86/entry/common.c:339) > [ 6.698869][ T1] ? entry_INT80_32 (arch/x86/entry/entry_32.S:945) > [ 6.699231][ T1] Modules linked in: > [ 6.699518][ T1] CR2: 0000000000000000 > [ 6.699858][ T1] ---[ end trace 0000000000000000 ]--- > [ 6.700258][ T1] EIP: lock_anon_vma_root (mm/rmap.c:245) > [ 6.700625][ T1] Code: 31 d2 31 c9 c3 55 89 e5 e8 55 68 15 00 5d 31 c0 31= d2 31 c9 c3 55 8b 00 83 c0 04 89 e5 e8 64 5f f2 ff 5d 31 c0 c3 55 89 e5 53= <8b> 1a 39 c3 74 18 85 c0 74 0a 0f 0b 83 c0 04 e8 48 5f f2 ff 8d 43 > All code > =3D=3D=3D=3D=3D=3D=3D=3D > 0: 31 d2 xor %edx,%edx > 2: 31 c9 xor %ecx,%ecx > 4: c3 ret > 5: 55 push %rbp > 6: 89 e5 mov %esp,%ebp > 8: e8 55 68 15 00 call 0x156862 > d: 5d pop %rbp > e: 31 c0 xor %eax,%eax > 10: 31 d2 xor %edx,%edx > 12: 31 c9 xor %ecx,%ecx > 14: c3 ret > 15: 55 push %rbp > 16: 8b 00 mov (%rax),%eax > 18: 83 c0 04 add $0x4,%eax > 1b: 89 e5 mov %esp,%ebp > 1d: e8 64 5f f2 ff call 0xfffffffffff25f86 > 22: 5d pop %rbp > 23: 31 c0 xor %eax,%eax > 25: c3 ret > 26: 55 push %rbp > 27: 89 e5 mov %esp,%ebp > 29: 53 push %rbx > 2a:* 8b 1a mov (%rdx),%ebx <-- trapp= ing instruction > 2c: 39 c3 cmp %eax,%ebx > 2e: 74 18 je 0x48 > 30: 85 c0 test %eax,%eax > 32: 74 0a je 0x3e > 34: 0f 0b ud2 > 36: 83 c0 04 add $0x4,%eax > 39: e8 48 5f f2 ff call 0xfffffffffff25f86 > 3e: 8d .byte 0x8d > 3f: 43 rex.XB > > Code starting with the faulting instruction > =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D > 0: 8b 1a mov (%rdx),%ebx > 2: 39 c3 cmp %eax,%ebx > 4: 74 18 je 0x1e > 6: 85 c0 test %eax,%eax > 8: 74 0a je 0x14 > a: 0f 0b ud2 > c: 83 c0 04 add $0x4,%eax > f: e8 48 5f f2 ff call 0xfffffffffff25f5c > 14: 8d .byte 0x8d > 15: 43 rex.XB > > > > -- > 0-DAY CI Kernel Test Service > https://github.com/intel/lkp-tests/wiki > >