From: Hyeonggon Yoo <42.hyeyoo@gmail.com>
To: kernel test robot <oliver.sang@intel.com>
Cc: Vlastimil Babka <vbabka@suse.cz>,
oe-lkp@lists.linux.dev, lkp@intel.com,
Mike Rapoport <rppt@linux.ibm.com>,
Christoph Lameter <cl@linux.com>,
linux-kernel@vger.kernel.org, linux-mm@kvack.org
Subject: BUG: unable to handle page fault for address: f6ffe000
Date: Wed, 11 Jan 2023 09:44:05 +0000 [thread overview]
Message-ID: <Y76E5WPTP86nUezT@localhost> (raw)
In-Reply-To: <202212312021.bc1efe86-oliver.sang@intel.com>
On Sat, Dec 31, 2022 at 11:26:25PM +0800, kernel test robot wrote:
>
> Greeting,
>
> FYI, we noticed kernel_BUG_at_include/linux/mm.h due to commit (built with gcc-11):
>
> commit: 0af8489b0216fa1dd83e264bef8063f2632633d7 ("mm, slub: remove percpu slabs with CONFIG_SLUB_TINY")
> https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master
>
> [test failed on linux-next/master c76083fac3bae1a87ae3d005b5cb1cbc761e31d5]
>
> in testcase: rcutorture
> version:
> with following parameters:
>
> runtime: 300s
> test: default
> torture_type: tasks-tracing
>
> test-description: rcutorture is rcutorture kernel module load/unload test.
> test-url: https://www.kernel.org/doc/Documentation/RCU/torture.txt
>
>
> on test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G
>
> caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):
>
>
> If you fix the issue, kindly add following tag
> | Reported-by: kernel test robot <oliver.sang@intel.com>
> | Link: https://lore.kernel.org/oe-lkp/202212312021.bc1efe86-oliver.sang@intel.com
>
>
> [ 25.804432][ T214] ------------[ cut here ]------------
> [ 25.804917][ T214] kernel BUG at include/linux/mm.h:825!
> [ 25.805402][ T214] invalid opcode: 0000 [#1] SMP
> [ 25.805820][ T214] CPU: 0 PID: 214 Comm: udevadm Tainted: G S 6.1.0-rc2-00014-g0af8489b0216 #2 1c4d7707ec0ce574ed62a77e82a8580202758048
> [ 25.806944][ T214] EIP: __dump_page.cold (include/linux/mm.h:825 mm/debug.c:97)
> [ 25.807376][ T214] Code: ff ff 83 05 e8 5d bb c5 01 ba 4c c4 2f c4 89 f8 83 15 ec 5d bb c5 00 e8 f2 92 ed fd 83 05 f8 5d bb c5 01 83 15 fc 5d bb c5 00 <0f> 0b 83 05 00 5e bb c5 01 b8 ac 85 a3 c4 83 15 04 5e bb c5 00 e8
FYI, I found a panic from trying to read non-present page,
on the same commit.
I'm not sure if this BUG is related to what we're looking at.
[ 26.970492][ T180] systemd-journald[180]: Received request to flush runtime journal from PID 1
[ 28.117157][ T187] BUG: unable to handle page fault for address: f6ffe000
[ 28.117686][ T187] #PF: supervisor read access in kernel mode
[ 28.117686][ T187] #PF: error_code(0x0000) - not-present page
[ 28.117686][ T187] *pde = 065b9067 *pte = 00000000
[ 28.117686][ T187] Oops: 0000 [#1] SMP
[ 28.117686][ T187] CPU: 0 PID: 187 Comm: udevadm Tainted: G S 6.1.0-rc2-00014-g0af8489b0216 #13 6ab653106aca2d29fecfea6da29eac9984fd4186
[ 28.117686][ T187] EIP: kernfs_name_hash+0x60/0xe0
[ 28.117686][ T187] Code: c6 01 83 d7 00 31 d2 01 c6 89 c8 89 75 ec 11 d7 8b 35 f0 9e c1 c5 89 7d f0 8b 3d f4 9e c1 c5 29 f0 8d b4 26 00 00 00 00 66 90 <0f> be 0c 30 89 ca c1 e2 04 c1 e9 04 01 d1 01 cb 8b 4d f0 83 c6 01
[ 28.117686][ T187] EAX: f0eadd57 EBX: ec9ced85 ECX: 05c29e82 EDX: 05c29e82
[ 28.117686][ T187] ESI: 061502a9 EDI: 00000000 EBP: f5fe1c88 ESP: f5fe1c70
[ 28.117686][ T187] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 00010206
[ 28.117686][ T187] CR0: 80050033 CR2: f6ffe000 CR3: 35f29000 CR4: 000406d0
[ 28.117686][ T187] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[ 28.117686][ T187] DR6: fffe0ff0 DR7: 00000400
[ 28.117686][ T187] Call Trace:
[ 28.117686][ T187] kernfs_find_ns+0xb3/0x200
[ 28.117686][ T187] ? kernfs_iop_lookup+0x3c/0x1a0
[ 28.117686][ T187] kernfs_iop_lookup+0x76/0x1a0
[ 28.117686][ T187] lookup_open+0x308/0x970
[ 28.117686][ T187] open_last_lookups+0xa4/0x680
[ 28.117686][ T187] path_openat+0xa9/0x410
[ 28.117686][ T187] do_filp_open+0x99/0x180
[ 28.117686][ T187] ? lock_release+0xe8/0x350
[ 28.117686][ T187] ? _raw_spin_unlock+0x50/0x90
[ 28.117686][ T187] ? alloc_fd+0x252/0x3e0
[ 28.117686][ T187] do_sys_openat2+0xf3/0x2e0
[ 28.117686][ T187] ? find_held_lock+0x37/0x110
[ 28.117686][ T187] do_sys_open+0x8e/0xe0
[ 28.117686][ T187] __ia32_sys_open+0x2a/0x40
[ 28.117686][ T187] __do_fast_syscall_32+0x72/0xd0
[ 28.117686][ T187] ? lockdep_hardirqs_on_prepare+0x232/0x3f0
[ 28.117686][ T187] ? syscall_exit_to_user_mode+0x35/0x50
[ 28.117686][ T187] ? __do_fast_syscall_32+0x7c/0xd0
[ 28.117686][ T187] ? lockdep_hardirqs_on_prepare+0x232/0x3f0
[ 28.117686][ T187] ? irqentry_exit_to_user_mode+0x23/0x30
[ 28.117686][ T187] ? irqentry_exit+0x7d/0xc0
[ 28.117686][ T187] do_fast_syscall_32+0x32/0x70
[ 28.117686][ T187] do_SYSENTER_32+0x15/0x20
[ 28.117686][ T187] entry_SYSENTER_32+0xa2/0xfb
[ 28.117686][ T187] EIP: 0xb7f26549
[ 28.117686][ T187] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d 76 00 58 b8 77 00 00 00 cd 80 90 8d 76
[ 28.117686][ T187] EAX: ffffffda EBX: bf83a680 ECX: 00088000 EDX: 000001b6
[ 28.117686][ T187] ESI: 00ab30b0 EDI: 00000008 EBP: b7e31000 ESP: bf83a4c8
[ 28.117686][ T187] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b EFLAGS: 00000246
[ 28.117686][ T187] Modules linked in:
[ 28.117686][ T187] CR2: 00000000f6ffe000
[ 28.117686][ T187] ---[ end trace 0000000000000000 ]---
[ 28.117686][ T187] EIP: kernfs_name_hash+0x60/0xe0
[ 28.117686][ T187] Code: c6 01 83 d7 00 31 d2 01 c6 89 c8 89 75 ec 11 d7 8b 35 f0 9e c1 c5 89 7d f0 8b 3d f4 9e c1 c5 29 f0 8d b4 26 00 00 00 00 66 90 <0f> be 0c 30 89 ca c1 e2 04 c1 e9 04 01 d1 01 cb 8b 4d f0 83 c6 01
prev parent reply other threads:[~2023-01-11 9:44 UTC|newest]
Thread overview: 32+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-12-31 15:26 [linus:master] [mm, slub] 0af8489b02: kernel_BUG_at_include/linux/mm.h kernel test robot
2023-01-01 5:30 ` Hyeonggon Yoo
2023-01-01 6:50 ` Hyeonggon Yoo
2023-01-01 7:37 ` supervisor write access in kernel mode in __pv_queued_spin_unlock_slowpath Hyeonggon Yoo
2023-01-01 11:08 ` Maxim Levitsky
2023-01-02 11:17 ` Hyeonggon Yoo
2023-01-03 10:42 ` [linus:master] [mm, slub] 0af8489b02: kernel_BUG_at_include/linux/mm.h Vlastimil Babka
2023-01-03 13:46 ` Oliver Sang
2023-01-03 14:36 ` Vlastimil Babka
2023-01-04 9:04 ` Hyeonggon Yoo
2023-01-05 1:46 ` Oliver Sang
2023-01-05 13:59 ` Hyeonggon Yoo
2023-01-05 14:47 ` Hyeonggon Yoo
2023-01-09 14:16 ` Oliver Sang
2023-01-06 10:13 ` Vlastimil Babka
2023-01-09 14:01 ` Oliver Sang
2023-01-09 14:04 ` Oliver Sang
2023-01-10 13:53 ` Oliver Sang
2023-01-10 14:09 ` Vlastimil Babka
2023-01-11 2:26 ` Feng Tang
2023-01-11 10:52 ` Vlastimil Babka
2023-01-12 7:47 ` Oliver Sang
2023-01-12 7:56 ` Vlastimil Babka
2023-01-17 7:19 ` Oliver Sang
2023-01-12 8:49 ` Vlastimil Babka
2023-01-03 15:31 ` A better dump_page() Matthew Wilcox
2023-01-03 23:07 ` David Rientjes
2023-01-03 23:29 ` Matthew Wilcox
2023-01-05 15:19 ` Vlastimil Babka
2023-01-05 15:35 ` Matthew Wilcox
2023-01-06 17:28 ` [linus:master] [mm, slub] 0af8489b02: kernel_BUG_at_include/linux/mm.h Hyeonggon Yoo
2023-01-11 9:44 ` Hyeonggon Yoo [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=Y76E5WPTP86nUezT@localhost \
--to=42.hyeyoo@gmail.com \
--cc=cl@linux.com \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-mm@kvack.org \
--cc=lkp@intel.com \
--cc=oe-lkp@lists.linux.dev \
--cc=oliver.sang@intel.com \
--cc=rppt@linux.ibm.com \
--cc=vbabka@suse.cz \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox