[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <57fd4fd5.kG/XPlHvJ/oBp+pH%xiaolong.ye@intel.com>
Date: Wed, 12 Oct 2016 04:47:17 +0800
From: kernel test robot <xiaolong.ye@...el.com>
To: "Aneesh Kumar K.V" <aneesh.kumar@...ux.vnet.ibm.com>
Cc: lkp@...org, "Aneesh Kumar K.V" <aneesh.kumar@...ux.vnet.ibm.com>,
linuxppc-dev@...ts.ozlabs.org, linux-kernel@...r.kernel.org,
linux-mm@...ck.org, akpm@...ux-foundation.org
Subject: [mm] c4344e8035: WARNING: CPU: 0 PID: 101 at mm/memory.c:303
__tlb_remove_page_size+0x25/0x99
FYI, we noticed the following commit:
https://github.com/0day-ci/linux Aneesh-Kumar-K-V/mm-Use-the-correct-page-size-when-removing-the-page/20161012-013446
commit c4344e80359420d7574b3b90fddf53311f1d24e6 ("mm: Remove the page size change check in tlb_remove_page")
in testcase: boot
on test machine: qemu-system-i386 -enable-kvm -cpu Haswell,+smep,+smap -m 360M
caused below changes:
+------------------------------------------------+------------+------------+
| | eff764128d | c4344e8035 |
+------------------------------------------------+------------+------------+
| boot_successes | 59 | 0 |
| boot_failures | 0 | 43 |
| WARNING:at_mm/memory.c:#__tlb_remove_page_size | 0 | 43 |
| calltrace:SyS_execve | 0 | 43 |
| calltrace:run_init_process | 0 | 21 |
+------------------------------------------------+------------+------------+
[ 4.096204] Write protecting the kernel text: 3148k
[ 4.096911] Write protecting the kernel read-only data: 1444k
[ 4.120357] ------------[ cut here ]------------
[ 4.121078] WARNING: CPU: 0 PID: 101 at mm/memory.c:303 __tlb_remove_page_size+0x25/0x99
[ 4.122380] Modules linked in:
[ 4.122788] CPU: 0 PID: 101 Comm: run-parts Not tainted 4.8.0-mm1-00315-gc4344e8 #5
[ 4.123956] bd145dc4 b111e5e6 bd145de0 b10320dc 0000012f b10974d1 bd145e70 c4954170
[ 4.125277] c4954170 bd145df4 b103215f 00000009 00000000 00000000 bd145e04 b10974d1
[ 4.126424] c4954170 bd145e70 bd145e14 b10263ca bd145e70 bd47bafc bd145e40 b109767a
[ 4.127622] Call Trace:
[ 4.128255] ------------[ cut here ]------------
[ 4.128261] WARNING: CPU: 0 PID: 103 at mm/memory.c:303 __tlb_remove_page_size+0x25/0x99
[ 4.128261] Modules linked in:
[ 4.128264] CPU: 0 PID: 103 Comm: sh Not tainted 4.8.0-mm1-00315-gc4344e8 #5
[ 4.128268] bd143dc4 b111e5e6 bd143de0 b10320dc 0000012f b10974d1 bd143e70 c494cd00
[ 4.128271] c494cd00 bd143df4 b103215f 00000009 00000000 00000000 bd143e04 b10974d1
[ 4.128274] c494cd00 bd143e70 bd143e14 b10263ca bd143e70 bd47dafc bd143e40 b109767a
[ 4.128275] Call Trace:
[ 4.128281] [<b111e5e6>] dump_stack+0x16/0x18
[ 4.128284] [<b10320dc>] __warn+0xa5/0xbc
[ 4.128286] [<b10974d1>] ? __tlb_remove_page_size+0x25/0x99
[ 4.128288] [<b103215f>] warn_slowpath_null+0x11/0x16
[ 4.128290] [<b10974d1>] __tlb_remove_page_size+0x25/0x99
[ 4.128293] [<b10263ca>] ___pte_free_tlb+0x57/0x66
[ 4.128295] [<b109767a>] free_pgd_range+0x135/0x1d0
[ 4.128298] [<b10b6ad7>] setup_arg_pages+0x219/0x29a
[ 4.128302] [<b10db3a6>] load_elf_binary+0x2ad/0x94a
[ 4.128305] [<b11266fe>] ? _copy_from_user+0x49/0x5c
[ 4.128307] [<b10b6015>] search_binary_handler+0x106/0x159
[ 4.128309] [<b10b7558>] do_execveat_common+0x3bf/0x4dc
[ 4.128311] [<b10b7689>] do_execve+0x14/0x16
[ 4.128313] [<b10b780a>] SyS_execve+0x16/0x18
[ 4.128316] [<b1000d90>] do_fast_syscall_32+0x8f/0xce
[ 4.128320] [<b131145e>] sysenter_past_esp+0x47/0x75
[ 4.128322] ---[ end trace 816334aebb0eaffe ]---
[ 4.132981] ------------[ cut here ]------------
Thanks,
Kernel Test Robot
View attachment "config-4.8.0-mm1-00315-gc4344e8" of type "text/plain" (95852 bytes)
View attachment "job-script" of type "text/plain" (3964 bytes)
Download attachment "dmesg.xz" of type "application/octet-stream" (29392 bytes)
Powered by blists - more mailing lists