linux-mm.kvack.org archive mirror
 help / color / mirror / Atom feed
From: Hyeonggon Yoo <42.hyeyoo@gmail.com>
To: kernel test robot <oliver.sang@intel.com>
Cc: Vlastimil Babka <vbabka@suse.cz>,
	oe-lkp@lists.linux.dev, lkp@intel.com,
	Mike Rapoport <rppt@linux.ibm.com>,
	Christoph Lameter <cl@linux.com>,
	linux-kernel@vger.kernel.org, linux-mm@kvack.org
Subject: BUG: unable to handle page fault for address: f6ffe000
Date: Wed, 11 Jan 2023 09:44:05 +0000	[thread overview]
Message-ID: <Y76E5WPTP86nUezT@localhost> (raw)
In-Reply-To: <202212312021.bc1efe86-oliver.sang@intel.com>

On Sat, Dec 31, 2022 at 11:26:25PM +0800, kernel test robot wrote:
> 
> Greeting,
> 
> FYI, we noticed kernel_BUG_at_include/linux/mm.h due to commit (built with gcc-11):
> 
> commit: 0af8489b0216fa1dd83e264bef8063f2632633d7 ("mm, slub: remove percpu slabs with CONFIG_SLUB_TINY")
> https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master
> 
> [test failed on linux-next/master c76083fac3bae1a87ae3d005b5cb1cbc761e31d5]
> 
> in testcase: rcutorture
> version: 
> with following parameters:
> 
> 	runtime: 300s
> 	test: default
> 	torture_type: tasks-tracing
> 
> test-description: rcutorture is rcutorture kernel module load/unload test.
> test-url: https://www.kernel.org/doc/Documentation/RCU/torture.txt
> 
> 
> on test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G
> 
> caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):
> 
> 
> If you fix the issue, kindly add following tag
> | Reported-by: kernel test robot <oliver.sang@intel.com>
> | Link: https://lore.kernel.org/oe-lkp/202212312021.bc1efe86-oliver.sang@intel.com
> 
> 
> [   25.804432][  T214] ------------[ cut here ]------------
> [   25.804917][  T214] kernel BUG at include/linux/mm.h:825!
> [   25.805402][  T214] invalid opcode: 0000 [#1] SMP
> [   25.805820][  T214] CPU: 0 PID: 214 Comm: udevadm Tainted: G S                 6.1.0-rc2-00014-g0af8489b0216 #2 1c4d7707ec0ce574ed62a77e82a8580202758048
> [ 25.806944][ T214] EIP: __dump_page.cold (include/linux/mm.h:825 mm/debug.c:97) 
> [ 25.807376][ T214] Code: ff ff 83 05 e8 5d bb c5 01 ba 4c c4 2f c4 89 f8 83 15 ec 5d bb c5 00 e8 f2 92 ed fd 83 05 f8 5d bb c5 01 83 15 fc 5d bb c5 00 <0f> 0b 83 05 00 5e bb c5 01 b8 ac 85 a3 c4 83 15 04 5e bb c5 00 e8


FYI, I found a panic from trying to read non-present page,
on the same commit.

I'm not sure if this BUG is related to what we're looking at.

[   26.970492][  T180] systemd-journald[180]: Received request to flush runtime journal from PID 1
[   28.117157][  T187] BUG: unable to handle page fault for address: f6ffe000
[   28.117686][  T187] #PF: supervisor read access in kernel mode
[   28.117686][  T187] #PF: error_code(0x0000) - not-present page
[   28.117686][  T187] *pde = 065b9067 *pte = 00000000 
[   28.117686][  T187] Oops: 0000 [#1] SMP
[   28.117686][  T187] CPU: 0 PID: 187 Comm: udevadm Tainted: G S                 6.1.0-rc2-00014-g0af8489b0216 #13 6ab653106aca2d29fecfea6da29eac9984fd4186
[   28.117686][  T187] EIP: kernfs_name_hash+0x60/0xe0
[   28.117686][  T187] Code: c6 01 83 d7 00 31 d2 01 c6 89 c8 89 75 ec 11 d7 8b 35 f0 9e c1 c5 89 7d f0 8b 3d f4 9e c1 c5 29 f0 8d b4 26 00 00 00 00 66 90 <0f> be 0c 30 89 ca c1 e2 04 c1 e9 04 01 d1 01 cb 8b 4d f0 83 c6 01
[   28.117686][  T187] EAX: f0eadd57 EBX: ec9ced85 ECX: 05c29e82 EDX: 05c29e82
[   28.117686][  T187] ESI: 061502a9 EDI: 00000000 EBP: f5fe1c88 ESP: f5fe1c70
[   28.117686][  T187] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 00010206
[   28.117686][  T187] CR0: 80050033 CR2: f6ffe000 CR3: 35f29000 CR4: 000406d0
[   28.117686][  T187] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[   28.117686][  T187] DR6: fffe0ff0 DR7: 00000400
[   28.117686][  T187] Call Trace:
[   28.117686][  T187]  kernfs_find_ns+0xb3/0x200
[   28.117686][  T187]  ? kernfs_iop_lookup+0x3c/0x1a0
[   28.117686][  T187]  kernfs_iop_lookup+0x76/0x1a0
[   28.117686][  T187]  lookup_open+0x308/0x970
[   28.117686][  T187]  open_last_lookups+0xa4/0x680
[   28.117686][  T187]  path_openat+0xa9/0x410
[   28.117686][  T187]  do_filp_open+0x99/0x180
[   28.117686][  T187]  ? lock_release+0xe8/0x350
[   28.117686][  T187]  ? _raw_spin_unlock+0x50/0x90
[   28.117686][  T187]  ? alloc_fd+0x252/0x3e0
[   28.117686][  T187]  do_sys_openat2+0xf3/0x2e0
[   28.117686][  T187]  ? find_held_lock+0x37/0x110
[   28.117686][  T187]  do_sys_open+0x8e/0xe0
[   28.117686][  T187]  __ia32_sys_open+0x2a/0x40
[   28.117686][  T187]  __do_fast_syscall_32+0x72/0xd0
[   28.117686][  T187]  ? lockdep_hardirqs_on_prepare+0x232/0x3f0
[   28.117686][  T187]  ? syscall_exit_to_user_mode+0x35/0x50
[   28.117686][  T187]  ? __do_fast_syscall_32+0x7c/0xd0
[   28.117686][  T187]  ? lockdep_hardirqs_on_prepare+0x232/0x3f0
[   28.117686][  T187]  ? irqentry_exit_to_user_mode+0x23/0x30
[   28.117686][  T187]  ? irqentry_exit+0x7d/0xc0
[   28.117686][  T187]  do_fast_syscall_32+0x32/0x70
[   28.117686][  T187]  do_SYSENTER_32+0x15/0x20
[   28.117686][  T187]  entry_SYSENTER_32+0xa2/0xfb
[   28.117686][  T187] EIP: 0xb7f26549
[   28.117686][  T187] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d 76 00 58 b8 77 00 00 00 cd 80 90 8d 76
[   28.117686][  T187] EAX: ffffffda EBX: bf83a680 ECX: 00088000 EDX: 000001b6
[   28.117686][  T187] ESI: 00ab30b0 EDI: 00000008 EBP: b7e31000 ESP: bf83a4c8
[   28.117686][  T187] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b EFLAGS: 00000246
[   28.117686][  T187] Modules linked in:
[   28.117686][  T187] CR2: 00000000f6ffe000
[   28.117686][  T187] ---[ end trace 0000000000000000 ]---
[   28.117686][  T187] EIP: kernfs_name_hash+0x60/0xe0
[   28.117686][  T187] Code: c6 01 83 d7 00 31 d2 01 c6 89 c8 89 75 ec 11 d7 8b 35 f0 9e c1 c5 89 7d f0 8b 3d f4 9e c1 c5 29 f0 8d b4 26 00 00 00 00 66 90 <0f> be 0c 30 89 ca c1 e2 04 c1 e9 04 01 d1 01 cb 8b 4d f0 83 c6 01


      parent reply	other threads:[~2023-01-11  9:44 UTC|newest]

Thread overview: 32+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-12-31 15:26 [linus:master] [mm, slub] 0af8489b02: kernel_BUG_at_include/linux/mm.h kernel test robot
2023-01-01  5:30 ` Hyeonggon Yoo
2023-01-01  6:50 ` Hyeonggon Yoo
2023-01-01  7:37   ` supervisor write access in kernel mode in __pv_queued_spin_unlock_slowpath Hyeonggon Yoo
2023-01-01 11:08     ` Maxim Levitsky
2023-01-02 11:17       ` Hyeonggon Yoo
2023-01-03 10:42 ` [linus:master] [mm, slub] 0af8489b02: kernel_BUG_at_include/linux/mm.h Vlastimil Babka
2023-01-03 13:46   ` Oliver Sang
2023-01-03 14:36     ` Vlastimil Babka
2023-01-04  9:04     ` Hyeonggon Yoo
2023-01-05  1:46       ` Oliver Sang
2023-01-05 13:59         ` Hyeonggon Yoo
2023-01-05 14:47         ` Hyeonggon Yoo
2023-01-09 14:16           ` Oliver Sang
2023-01-06 10:13         ` Vlastimil Babka
2023-01-09 14:01           ` Oliver Sang
2023-01-09 14:04             ` Oliver Sang
2023-01-10 13:53             ` Oliver Sang
2023-01-10 14:09               ` Vlastimil Babka
2023-01-11  2:26                 ` Feng Tang
2023-01-11 10:52                   ` Vlastimil Babka
2023-01-12  7:47                 ` Oliver Sang
2023-01-12  7:56                   ` Vlastimil Babka
2023-01-17  7:19                     ` Oliver Sang
2023-01-12  8:49                   ` Vlastimil Babka
2023-01-03 15:31   ` A better dump_page() Matthew Wilcox
2023-01-03 23:07     ` David Rientjes
2023-01-03 23:29       ` Matthew Wilcox
2023-01-05 15:19         ` Vlastimil Babka
2023-01-05 15:35           ` Matthew Wilcox
2023-01-06 17:28 ` [linus:master] [mm, slub] 0af8489b02: kernel_BUG_at_include/linux/mm.h Hyeonggon Yoo
2023-01-11  9:44 ` Hyeonggon Yoo [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=Y76E5WPTP86nUezT@localhost \
    --to=42.hyeyoo@gmail.com \
    --cc=cl@linux.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-mm@kvack.org \
    --cc=lkp@intel.com \
    --cc=oe-lkp@lists.linux.dev \
    --cc=oliver.sang@intel.com \
    --cc=rppt@linux.ibm.com \
    --cc=vbabka@suse.cz \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox