On 02/12/2015 11:18 AM, Kirill A. Shutemov wrote: > +void __get_page_tail(struct page *page); > static inline void get_page(struct page *page) > { > - struct page *page_head = compound_head(page); > - VM_BUG_ON_PAGE(atomic_read(&page_head->_count) <= 0, page); > - atomic_inc(&page_head->_count); > + if (unlikely(PageTail(page))) > + return __get_page_tail(page); > + > + /* > + * Getting a normal page or the head of a compound page > + * requires to already have an elevated page->_count. > + */ > + VM_BUG_ON_PAGE(atomic_read(&page->_count) <= 0, page); This BUG_ON seems to get hit: [ 612.180784] page:ffffea00004cb180 count:0 mapcount:0 mapping: (null) index:0x2 [ 612.188538] flags: 0x1fffff80000000() [ 612.190452] page dumped because: VM_BUG_ON_PAGE(atomic_read(&page->_count) <= 0) [ 612.195857] ------------[ cut here ]------------ [ 612.196636] kernel BUG at include/linux/mm.h:463! [ 612.196636] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 612.196636] Dumping ftrace buffer: [ 612.196636] (ftrace buffer empty) [ 612.196636] Modules linked in: [ 612.196636] CPU: 21 PID: 16300 Comm: trinity-c99 Not tainted 3.19.0-next-20150212-sasha-00072-gdc1aa32 #1913 [ 612.196636] task: ffff880012dbb000 ti: ffff880012df8000 task.ti: ffff880012df8000 [ 612.196636] RIP: copy_page_range (include/linux/mm.h:463 mm/memory.c:921 mm/memory.c:971 mm/memory.c:993 mm/memory.c:1055) [ 612.196636] RSP: 0018:ffff880012dffad0 EFLAGS: 00010286 [ 612.196636] RAX: dffffc0000000000 RBX: 00000000132c6100 RCX: 0000000000000000 [ 612.196636] RDX: 1ffffd4000099637 RSI: 0000000000000000 RDI: ffffea00004cb1b8 [ 612.196636] RBP: ffff880012dffc60 R08: 0000000000000001 R09: 0000000000000000 [ 612.196636] R10: ffffffffa5875ce8 R11: 0000000000000001 R12: ffff880012df6630 [ 612.196636] R13: ffff880711fe6630 R14: 00007f33954c6000 R15: 0000000000000010 [ 612.196636] FS: 00007f33993b0700(0000) GS:ffff880712800000(0000) knlGS:0000000000000000 [ 612.196636] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b [ 612.196636] CR2: 00007f33993b06c8 CR3: 000000002ab33000 CR4: 00000000000007a0 [ 612.196636] DR0: ffffffff80000fff DR1: 0000000000000000 DR2: 0000000000000000 [ 612.196636] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000b1060a [ 612.196636] Stack: [ 612.196636] ffffffffa1937460 0000000000000002 ffff880012dffb30 ffffffff944141f6 [ 612.196636] ffff880012df8010 0000000000000020 ffff880012dffbf0 0000000000000000 [ 612.196636] 0000000008100073 1ffff100025bff7a ffff880012df1e50 1ffff100025bf002 [ 612.196636] Call Trace: [ 612.196636] ? __lock_is_held (kernel/locking/lockdep.c:3518) [ 612.196636] ? apply_to_page_range (mm/memory.c:1002) [ 612.196636] ? __vma_link_rb (mm/mmap.c:633) [ 612.196636] ? anon_vma_fork (mm/rmap.c:351) [ 612.196636] copy_process (kernel/fork.c:470 kernel/fork.c:869 kernel/fork.c:923 kernel/fork.c:1395) [ 612.196636] ? __cleanup_sighand (kernel/fork.c:1196) [ 612.196636] do_fork (kernel/fork.c:1659) [ 612.196636] ? trace_hardirqs_on_caller (kernel/locking/lockdep.c:2554 kernel/locking/lockdep.c:2601) [ 612.196636] ? fork_idle (kernel/fork.c:1636) [ 612.196636] ? syscall_trace_enter_phase2 (arch/x86/kernel/ptrace.c:1598) [ 612.196636] SyS_clone (kernel/fork.c:1748) [ 612.196636] stub_clone (arch/x86/kernel/entry_64.S:517) [ 612.196636] ? tracesys_phase2 (arch/x86/kernel/entry_64.S:422) [ 612.196636] Code: ff df 48 89 f9 48 c1 e9 03 80 3c 11 00 0f 85 4c 04 00 00 48 8b 48 30 e9 fe f9 ff ff 48 c7 c6 40 34 f4 9e 48 89 c7 e8 0e ca fe ff <0f> 0b 0f 0b 48 89 c7 e8 12 2a ff ff e9 df fb ff ff 0f 0b 0f 0b All code ======== 0: ff df lcallq *<internal disassembler error> 2: 48 89 f9 mov %rdi,%rcx 5: 48 c1 e9 03 shr $0x3,%rcx 9: 80 3c 11 00 cmpb $0x0,(%rcx,%rdx,1) d: 0f 85 4c 04 00 00 jne 0x45f 13: 48 8b 48 30 mov 0x30(%rax),%rcx 17: e9 fe f9 ff ff jmpq 0xfffffffffffffa1a 1c: 48 c7 c6 40 34 f4 9e mov $0xffffffff9ef43440,%rsi 23: 48 89 c7 mov %rax,%rdi 26: e8 0e ca fe ff callq 0xfffffffffffeca39 2b:* 0f 0b ud2 <-- trapping instruction 2d: 0f 0b ud2 2f: 48 89 c7 mov %rax,%rdi 32: e8 12 2a ff ff callq 0xffffffffffff2a49 37: e9 df fb ff ff jmpq 0xfffffffffffffc1b 3c: 0f 0b ud2 3e: 0f 0b ud2 ... Code starting with the faulting instruction =========================================== 0: 0f 0b ud2 2: 0f 0b ud2 4: 48 89 c7 mov %rax,%rdi 7: e8 12 2a ff ff callq 0xffffffffffff2a1e c: e9 df fb ff ff jmpq 0xfffffffffffffbf0 11: 0f 0b ud2 13: 0f 0b ud2 ... [ 612.196636] RIP copy_page_range (include/linux/mm.h:463 mm/memory.c:921 mm/memory.c:971 mm/memory.c:993 mm/memory.c:1055) [ 612.196636] RSP <ffff880012dffad0> Thanks, Sasha -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@xxxxxxxxx. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: <a href=mailto:"dont@xxxxxxxxx"> email@xxxxxxxxx </a>