Hello, kernel test robot noticed "WARNING:at_lib/debugobjects.c:#debug_print_object" on: commit: 7b59fb4e4fe7542ba1360cb804b62b72d72edf36 ("maple_tree: use percpu sheaves for maple_node_cache") https://git.kernel.org/cgit/linux/kernel/git/vbabka/linux.git slub-percpu-sheaves-v1r1 in testcase: boot compiler: clang-18 test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G (please refer to attached dmesg/kmsg for entire log/backtrace) +---------------------------------------------------+------------+------------+ | | 721996749f | 7b59fb4e4f | +---------------------------------------------------+------------+------------+ | WARNING:at_lib/debugobjects.c:#debug_print_object | 0 | 6 | | RIP:debug_print_object | 0 | 6 | | WARNING:at_kernel/rcu/tree.c:#kvfree_call_rcu | 0 | 6 | | RIP:kvfree_call_rcu | 0 | 6 | +---------------------------------------------------+------------+------------+ If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot <oliver.sang@xxxxxxxxx> | Closes: https://lore.kernel.org/oe-lkp/202407241540.e3e27bab-lkp@xxxxxxxxx [ 48.462124][ T136] ------------[ cut here ]------------ [ 48.462654][ T136] ODEBUG: activate active (active state 1) object: ffff888171f5d900 object type: rcu_head hint: 0x0 [ 48.463489][ T136] WARNING: CPU: 0 PID: 136 at lib/debugobjects.c:517 debug_print_object (lib/debugobjects.c:514) [ 48.464448][ T136] Modules linked in: intel_agp intel_gtt ppdev tiny_power_button processor parport_pc button evbug evdev fuse qemu_fw_cfg [ 48.465997][ T136] CPU: 0 PID: 136 Comm: cron Not tainted 6.10.0-rc1-00010-g7b59fb4e4fe7 #1 [ 48.467033][ T136] RIP: 0010:debug_print_object (lib/debugobjects.c:514) [ 48.467764][ T136] Code: 4c 89 ff e8 39 71 b7 ff 4d 8b 0f 48 c7 c7 80 4d 99 83 48 8b 34 24 4c 89 ea 89 e9 4d 89 f0 41 54 e8 dc fa 5a ff 48 83 c4 08 90 <0f> 0b 90 90 ff 05 91 98 ea 02 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 All code ======== 0: 4c 89 ff mov %r15,%rdi 3: e8 39 71 b7 ff call 0xffffffffffb77141 8: 4d 8b 0f mov (%r15),%r9 b: 48 c7 c7 80 4d 99 83 mov $0xffffffff83994d80,%rdi 12: 48 8b 34 24 mov (%rsp),%rsi 16: 4c 89 ea mov %r13,%rdx 19: 89 e9 mov %ebp,%ecx 1b: 4d 89 f0 mov %r14,%r8 1e: 41 54 push %r12 20: e8 dc fa 5a ff call 0xffffffffff5afb01 25: 48 83 c4 08 add $0x8,%rsp 29: 90 nop 2a:* 0f 0b ud2 <-- trapping instruction 2c: 90 nop 2d: 90 nop 2e: ff 05 91 98 ea 02 incl 0x2ea9891(%rip) # 0x2ea98c5 34: 48 83 c4 08 add $0x8,%rsp 38: 5b pop %rbx 39: 41 5c pop %r12 3b: 41 5d pop %r13 3d: 41 5e pop %r14 3f: 41 rex.B Code starting with the faulting instruction =========================================== 0: 0f 0b ud2 2: 90 nop 3: 90 nop 4: ff 05 91 98 ea 02 incl 0x2ea9891(%rip) # 0x2ea989b a: 48 83 c4 08 add $0x8,%rsp e: 5b pop %rbx f: 41 5c pop %r12 11: 41 5d pop %r13 13: 41 5e pop %r14 15: 41 rex.B [ 48.470027][ T136] RSP: 0018:ffffc9000105f2e8 EFLAGS: 00010286 [ 48.470784][ T136] RAX: ffffffff81167f7f RBX: dffffc0000000000 RCX: ffff8881720ca9c0 [ 48.471718][ T136] RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffffffff844e1270 [ 48.472687][ T136] RBP: 0000000000000001 R08: ffffffff844e1273 R09: 1ffffffff089c24e [ 48.473612][ T136] R10: dffffc0000000000 R11: fffffbfff089c24f R12: 0000000000000000 [ 48.474563][ T136] R13: ffffffff83994f00 R14: ffff888171f5d900 R15: ffffffff8345e2c0 [ 48.475499][ T136] FS: 0000000000000000(0000) GS:ffffffff8408f000(0000) knlGS:0000000000000000 [ 48.476563][ T136] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 48.477329][ T136] CR2: 00007fbe470c4790 CR3: 0000000176132000 CR4: 00000000000406b0 [ 48.478250][ T136] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 48.479206][ T136] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 48.480141][ T136] Call Trace: [ 48.480566][ T136] <TASK> [ 48.480935][ T136] ? __warn (kernel/panic.c:239) [ 48.481460][ T136] ? debug_print_object (lib/debugobjects.c:514) [ 48.482092][ T136] ? report_bug (lib/bug.c:?) [ 48.482697][ T136] ? handle_bug (arch/x86/kernel/traps.c:239) [ 48.483222][ T136] ? exc_invalid_op (arch/x86/kernel/traps.c:260) [ 48.483814][ T136] ? asm_exc_invalid_op (arch/x86/include/asm/idtentry.h:621) [ 48.484438][ T136] ? __warn_printk (include/linux/context_tracking.h:155) [ 48.485022][ T136] ? debug_print_object (lib/debugobjects.c:514) [ 48.485668][ T136] debug_object_activate (lib/debugobjects.c:?) [ 48.486321][ T136] kvfree_call_rcu (kernel/rcu/rcu.h:227 kernel/rcu/tree.c:3773) [ 48.486946][ T136] mas_wr_modify (lib/maple_tree.c:?) [ 48.487578][ T136] ? stack_depot_save_flags (lib/stackdepot.c:609) [ 48.488296][ T136] ? kasan_save_track (arch/x86/include/asm/current.h:49 mm/kasan/common.c:60 mm/kasan/common.c:69) [ 48.488884][ T136] ? kasan_save_track (mm/kasan/common.c:48 mm/kasan/common.c:68) [ 48.489473][ T136] ? __kasan_slab_alloc (mm/kasan/common.c:341) [ 48.490077][ T136] ? kmem_cache_alloc_noprof (include/linux/kasan.h:201 mm/slub.c:4356 mm/slub.c:4587 mm/slub.c:4594) [ 48.490795][ T136] ? mmap_region (mm/mmap.c:2952) [ 48.491373][ T136] ? do_mmap (mm/mmap.c:1398) [ 48.491924][ T136] ? vm_mmap_pgoff (mm/util.c:573) [ 48.492499][ T136] ? elf_load (fs/binfmt_elf.c:?) [ 48.493024][ T136] ? load_elf_binary (fs/binfmt_elf.c:1132) [ 48.493638][ T136] ? bprm_execve (fs/exec.c:1797) [ 48.494211][ T136] ? do_execveat_common (fs/exec.c:1998) [ 48.494851][ T136] ? __x64_sys_execve (fs/exec.c:2072 fs/exec.c:2148 fs/exec.c:2143 fs/exec.c:2143) [ 48.495429][ T136] ? do_syscall_64 (arch/x86/entry/common.c:?) [ 48.495992][ T136] ? entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 48.496761][ T136] ? mas_wr_walk_descend (lib/maple_tree.c:? lib/maple_tree.c:3573) [ 48.497396][ T136] ? mas_wr_walk (lib/maple_tree.c:?) [ 48.497932][ T136] ? mas_wr_end_piv (lib/maple_tree.c:4067) [ 48.498564][ T136] ? mas_wr_store_entry (lib/maple_tree.c:?) [ 48.499210][ T136] mas_store_prealloc (include/linux/maple_tree.h:548) [ 48.499874][ T136] mmap_region (mm/mmap.c:2958) [ 48.500496][ T136] do_mmap (mm/mmap.c:1398) [ 48.501032][ T136] vm_mmap_pgoff (mm/util.c:573) [ 48.501633][ T136] elf_load (fs/binfmt_elf.c:?) [ 48.502175][ T136] load_elf_binary (fs/binfmt_elf.c:1132) [ 48.502821][ T136] ? load_elf_binary (fs/binfmt_elf.c:?) [ 48.503468][ T136] bprm_execve (fs/exec.c:1797) [ 48.504087][ T136] do_execveat_common (fs/exec.c:1998) [ 48.504722][ T136] __x64_sys_execve (fs/exec.c:2072 fs/exec.c:2148 fs/exec.c:2143 fs/exec.c:2143) [ 48.505309][ T136] do_syscall_64 (arch/x86/entry/common.c:?) [ 48.505891][ T136] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 48.506649][ T136] RIP: 0033:0x7fbe46ee4a17 [ 48.507204][ T136] Code: Unable to access opcode bytes at 0x7fbe46ee49ed. Code starting with the faulting instruction =========================================== [ 48.508094][ T136] RSP: 002b:00007ffdccfdf008 EFLAGS: 00000202 ORIG_RAX: 000000000000003b [ 48.509076][ T136] RAX: ffffffffffffffda RBX: 000056370a8ab230 RCX: 00007fbe46ee4a17 [ 48.510011][ T136] RDX: 000056370a807780 RSI: 000056370a8ab230 RDI: 000056370a8a6900 [ 48.510962][ T136] RBP: 00007ffdccfdf2d0 R08: 00007fbe46fe2c60 R09: 000056370a80c7e0 [ 48.511901][ T136] R10: 000056370a787200 R11: 0000000000000202 R12: 00007ffdccfdf0cc [ 48.512793][ T136] R13: 00000000ffffffff R14: 00007ffdccfdf550 R15: 000056370a7ec560 [ 48.513756][ T136] </TASK> [ 48.514149][ T136] irq event stamp: 3365 [ 48.514667][ T136] hardirqs last enabled at (3375): console_unlock (kernel/printk/printk.c:341 arch/x86/include/asm/irqflags.h:127 kernel/printk/printk.c:341 kernel/printk/printk.c:2746 kernel/printk/printk.c:3065) [ 48.515701][ T136] hardirqs last disabled at (3382): console_unlock (kernel/printk/printk.c:339 kernel/printk/printk.c:2746 kernel/printk/printk.c:3065) [ 48.516417][ T136] softirqs last enabled at (3330): __irq_exit_rcu (include/linux/sched.h:2189 kernel/softirq.c:620 kernel/softirq.c:639) [ 48.517085][ T136] softirqs last disabled at (3319): __irq_exit_rcu (include/linux/sched.h:2189 kernel/softirq.c:620 kernel/softirq.c:639) [ 48.517749][ T136] ---[ end trace 0000000000000000 ]--- The kernel config and materials to reproduce are available at: https://download.01.org/0day-ci/archive/20240724/202407241540.e3e27bab-lkp@xxxxxxxxx -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki