Hello, kernel test robot noticed "canonical_address#:#[##]" on: commit: 9a65885b675adcef145312ef0e2e9447194aecda ("KVM: x86/mmu: Dynamically allocate shadow MMU's hashed page list") https://github.com/sean-jc/linux x86/dynamic_mmu_page_hash in testcase: kvm-unit-tests-qemu version: with following parameters: compiler: gcc-12 test machine: 128 threads 2 sockets Intel(R) Xeon(R) Platinum 8358 CPU @ 2.60GHz (Ice Lake) with 128G memory (please refer to attached dmesg/kmsg for entire log/backtrace) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot <oliver.sang@xxxxxxxxx> | Closes: https://lore.kernel.org/oe-lkp/202308291427.85de5a98-oliver.sang@xxxxxxxxx [ 360.237618][ T1478] make[1]: Leaving directory '/lkp/benchmarks/qemu/build' [ 360.237641][ T1478] [ 360.294097][T15381] memfd_create() without MFD_EXEC nor MFD_NOEXEC_SEAL, pid=15381 'qemu-system-x86' [ 362.275836][ T1478] 2023-08-24 21:56:55 ./run_tests.sh [ 362.275856][ T1478] [ 363.747534][T15500] general protection fault, probably for non-canonical address 0xdffffc000000032b: 0000 [#1] PREEMPT SMP KASAN NOPTI [ 363.761514][T15500] KASAN: probably user-memory-access in range [0x0000000000001958-0x000000000000195f] [ 363.771827][T15500] CPU: 119 PID: 15500 Comm: qemu-system-x86 Tainted: G S 6.5.0-rc2-00178-g9a65885b675a #1 [ 363.783889][T15500] Hardware name: Intel Corporation M50CYP2SB1U/M50CYP2SB1U, BIOS SE5C620.86B.01.01.0003.2104260124 04/26/2021 [363.797245][T15500] RIP: kvm_uevent_notify_change+0x13e/0x350 kvm [ 363.805596][T15500] Code: c0 74 08 3c 03 0f 8e 91 01 00 00 48 8d bd 58 19 00 00 41 8b 95 50 09 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 f9 48 c1 e9 03 <0f> b6 04 01 84 c0 74 08 3c 03 0f 8e 6c 01 00 00 89 95 58 19 00 00 All code ======== 0: c0 74 08 3c 03 shlb $0x3,0x3c(%rax,%rcx,1) 5: 0f 8e 91 01 00 00 jle 0x19c b: 48 8d bd 58 19 00 00 lea 0x1958(%rbp),%rdi 12: 41 8b 95 50 09 00 00 mov 0x950(%r13),%edx 19: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 20: fc ff df 23: 48 89 f9 mov %rdi,%rcx 26: 48 c1 e9 03 shr $0x3,%rcx 2a:* 0f b6 04 01 movzbl (%rcx,%rax,1),%eax <-- trapping instruction 2e: 84 c0 test %al,%al 30: 74 08 je 0x3a 32: 3c 03 cmp $0x3,%al 34: 0f 8e 6c 01 00 00 jle 0x1a6 3a: 89 95 58 19 00 00 mov %edx,0x1958(%rbp) Code starting with the faulting instruction =========================================== 0: 0f b6 04 01 movzbl (%rcx,%rax,1),%eax 4: 84 c0 test %al,%al 6: 74 08 je 0x10 8: 3c 03 cmp $0x3,%al a: 0f 8e 6c 01 00 00 jle 0x17c 10: 89 95 58 19 00 00 mov %edx,0x1958(%rbp) [ 363.827013][T15500] RSP: 0018:ffa000002714fe48 EFLAGS: 00010206 [ 363.833927][T15500] RAX: dffffc0000000000 RBX: ff110010e99bc000 RCX: 000000000000032b [ 363.842760][T15500] RDX: 0000000000003c8c RSI: 1ff4000004e29f97 RDI: 0000000000001959 [ 363.851588][T15500] RBP: 0000000000000001 R08: ff110010e99bc218 R09: fff3fc0004e29f67 [ 363.860411][T15500] R10: 0000000000000003 R11: 000000000000000a R12: ffffffff8424d5d0 [ 363.869223][T15500] R13: ff11001211108000 R14: 0000000000000001 R15: 0000000000000001 [ 363.878032][T15500] FS: 00007fb8cd2b8c80(0000) GS:ff11002020380000(0000) knlGS:0000000000000000 [ 363.887789][T15500] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 363.895177][T15500] CR2: 000056119a3bc320 CR3: 00000011a77dc004 CR4: 0000000000771ee0 [ 363.903973][T15500] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 363.912759][T15500] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 363.921532][T15500] PKRU: 55555554 [ 363.925873][T15500] Call Trace: [ 363.929948][T15500] <TASK> [363.933659][T15500] ? die_addr (kbuild/src/consumer/arch/x86/kernel/dumpstack.c:421 kbuild/src/consumer/arch/x86/kernel/dumpstack.c:460) [363.938586][T15500] ? exc_general_protection (kbuild/src/consumer/arch/x86/kernel/traps.c:786 kbuild/src/consumer/arch/x86/kernel/traps.c:728) [363.944897][T15500] ? asm_exc_general_protection (kbuild/src/consumer/arch/x86/include/asm/idtentry.h:564) [363.951376][T15500] ? kvm_uevent_notify_change+0x13e/0x350 kvm The kernel config and materials to reproduce are available at: https://download.01.org/0day-ci/archive/20230829/202308291427.85de5a98-oliver.sang@xxxxxxxxx -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki