On Sat, Dec 31, 2022 at 11:26:25PM +0800, kernel test robot wrote: > > Greeting, > > FYI, we noticed kernel_BUG_at_include/linux/mm.h due to commit (built with gcc-11): > > commit: 0af8489b0216fa1dd83e264bef8063f2632633d7 ("mm, slub: remove percpu slabs with CONFIG_SLUB_TINY") > https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master > > [test failed on linux-next/master c76083fac3bae1a87ae3d005b5cb1cbc761e31d5] > > in testcase: rcutorture > version: > with following parameters: > > runtime: 300s > test: default > torture_type: tasks-tracing > > test-description: rcutorture is rcutorture kernel module load/unload test. > test-url: https://www.kernel.org/doc/Documentation/RCU/torture.txt > > > on test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G > > caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace): > > > If you fix the issue, kindly add following tag > | Reported-by: kernel test robot <oliver.sang@xxxxxxxxx> > | Link: https://lore.kernel.org/oe-lkp/202212312021.bc1efe86-oliver.sang@xxxxxxxxx > > > [ 25.804432][ T214] ------------[ cut here ]------------ > [ 25.804917][ T214] kernel BUG at include/linux/mm.h:825! > [ 25.805402][ T214] invalid opcode: 0000 [#1] SMP > [ 25.805820][ T214] CPU: 0 PID: 214 Comm: udevadm Tainted: G S 6.1.0-rc2-00014-g0af8489b0216 #2 1c4d7707ec0ce574ed62a77e82a8580202758048 > [ 25.806944][ T214] EIP: __dump_page.cold (include/linux/mm.h:825 mm/debug.c:97) > [ 25.807376][ T214] Code: ff ff 83 05 e8 5d bb c5 01 ba 4c c4 2f c4 89 f8 83 15 ec 5d bb c5 00 e8 f2 92 ed fd 83 05 f8 5d bb c5 01 83 15 fc 5d bb c5 00 <0f> 0b 83 05 00 5e bb c5 01 b8 ac 85 a3 c4 83 15 04 5e bb c5 00 e8 FYI, I found a panic from trying to read non-present page, on the same commit. I'm not sure if this BUG is related to what we're looking at. [ 26.970492][ T180] systemd-journald[180]: Received request to flush runtime journal from PID 1 [ 28.117157][ T187] BUG: unable to handle page fault for address: f6ffe000 [ 28.117686][ T187] #PF: supervisor read access in kernel mode [ 28.117686][ T187] #PF: error_code(0x0000) - not-present page [ 28.117686][ T187] *pde = 065b9067 *pte = 00000000 [ 28.117686][ T187] Oops: 0000 [#1] SMP [ 28.117686][ T187] CPU: 0 PID: 187 Comm: udevadm Tainted: G S 6.1.0-rc2-00014-g0af8489b0216 #13 6ab653106aca2d29fecfea6da29eac9984fd4186 [ 28.117686][ T187] EIP: kernfs_name_hash+0x60/0xe0 [ 28.117686][ T187] Code: c6 01 83 d7 00 31 d2 01 c6 89 c8 89 75 ec 11 d7 8b 35 f0 9e c1 c5 89 7d f0 8b 3d f4 9e c1 c5 29 f0 8d b4 26 00 00 00 00 66 90 <0f> be 0c 30 89 ca c1 e2 04 c1 e9 04 01 d1 01 cb 8b 4d f0 83 c6 01 [ 28.117686][ T187] EAX: f0eadd57 EBX: ec9ced85 ECX: 05c29e82 EDX: 05c29e82 [ 28.117686][ T187] ESI: 061502a9 EDI: 00000000 EBP: f5fe1c88 ESP: f5fe1c70 [ 28.117686][ T187] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 EFLAGS: 00010206 [ 28.117686][ T187] CR0: 80050033 CR2: f6ffe000 CR3: 35f29000 CR4: 000406d0 [ 28.117686][ T187] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000 [ 28.117686][ T187] DR6: fffe0ff0 DR7: 00000400 [ 28.117686][ T187] Call Trace: [ 28.117686][ T187] kernfs_find_ns+0xb3/0x200 [ 28.117686][ T187] ? kernfs_iop_lookup+0x3c/0x1a0 [ 28.117686][ T187] kernfs_iop_lookup+0x76/0x1a0 [ 28.117686][ T187] lookup_open+0x308/0x970 [ 28.117686][ T187] open_last_lookups+0xa4/0x680 [ 28.117686][ T187] path_openat+0xa9/0x410 [ 28.117686][ T187] do_filp_open+0x99/0x180 [ 28.117686][ T187] ? lock_release+0xe8/0x350 [ 28.117686][ T187] ? _raw_spin_unlock+0x50/0x90 [ 28.117686][ T187] ? alloc_fd+0x252/0x3e0 [ 28.117686][ T187] do_sys_openat2+0xf3/0x2e0 [ 28.117686][ T187] ? find_held_lock+0x37/0x110 [ 28.117686][ T187] do_sys_open+0x8e/0xe0 [ 28.117686][ T187] __ia32_sys_open+0x2a/0x40 [ 28.117686][ T187] __do_fast_syscall_32+0x72/0xd0 [ 28.117686][ T187] ? lockdep_hardirqs_on_prepare+0x232/0x3f0 [ 28.117686][ T187] ? syscall_exit_to_user_mode+0x35/0x50 [ 28.117686][ T187] ? __do_fast_syscall_32+0x7c/0xd0 [ 28.117686][ T187] ? lockdep_hardirqs_on_prepare+0x232/0x3f0 [ 28.117686][ T187] ? irqentry_exit_to_user_mode+0x23/0x30 [ 28.117686][ T187] ? irqentry_exit+0x7d/0xc0 [ 28.117686][ T187] do_fast_syscall_32+0x32/0x70 [ 28.117686][ T187] do_SYSENTER_32+0x15/0x20 [ 28.117686][ T187] entry_SYSENTER_32+0xa2/0xfb [ 28.117686][ T187] EIP: 0xb7f26549 [ 28.117686][ T187] Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d 76 00 58 b8 77 00 00 00 cd 80 90 8d 76 [ 28.117686][ T187] EAX: ffffffda EBX: bf83a680 ECX: 00088000 EDX: 000001b6 [ 28.117686][ T187] ESI: 00ab30b0 EDI: 00000008 EBP: b7e31000 ESP: bf83a4c8 [ 28.117686][ T187] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b EFLAGS: 00000246 [ 28.117686][ T187] Modules linked in: [ 28.117686][ T187] CR2: 00000000f6ffe000 [ 28.117686][ T187] ---[ end trace 0000000000000000 ]--- [ 28.117686][ T187] EIP: kernfs_name_hash+0x60/0xe0 [ 28.117686][ T187] Code: c6 01 83 d7 00 31 d2 01 c6 89 c8 89 75 ec 11 d7 8b 35 f0 9e c1 c5 89 7d f0 8b 3d f4 9e c1 c5 29 f0 8d b4 26 00 00 00 00 66 90 <0f> be 0c 30 89 ca c1 e2 04 c1 e9 04 01 d1 01 cb 8b 4d f0 83 c6 01