[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20201206140750.GA19216@xsang-OptiPlex-9020>
Date: Sun, 6 Dec 2020 22:07:50 +0800
From: kernel test robot <oliver.sang@...el.com>
To: Hailong Liu <liu.hailong6@....com.cn>
Cc: Stephen Rothwell <sfr@...b.auug.org.au>,
Mike Rapoport <rppt@...nel.org>,
Andrew Morton <akpm@...ux-foundation.org>,
LKML <linux-kernel@...r.kernel.org>,
Linux Memory Management List <linux-mm@...ck.org>,
lkp@...ts.01.org, lkp@...el.com
Subject: [mm/memblock] 4df001639c: kernel_BUG_at_mm/page_alloc.c
Greeting,
FYI, we noticed the following commit (built with gcc-9):
commit: 4df001639c843ba69176833ddc6cc2631db8a2ab ("mm/memblock: use a more appropriate order calculation when free memblock pages")
https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git master
in testcase: locktorture
version:
with following parameters:
runtime: 300s
test: cpuhotplug
test-description: This torture test consists of creating a number of kernel threads which acquire the lock and hold it for specific amount of time, thus simulating different critical region behaviors.
test-url: https://www.kernel.org/doc/Documentation/locking/locktorture.txt
on test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 8G
caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):
+---------------------------------------------------------+------------+------------+
| | 15172221fb | 4df001639c |
+---------------------------------------------------------+------------+------------+
| boot_successes | 14 | 0 |
| kernel_BUG_at_mm/page_alloc.c | 0 | 28 |
| invalid_opcode:#[##] | 0 | 28 |
| EIP:__free_one_page | 0 | 28 |
| Kernel_panic-not_syncing:Fatal_exception | 0 | 28 |
+---------------------------------------------------------+------------+------------+
If you fix the issue, kindly add following tag
Reported-by: kernel test robot <oliver.sang@...el.com>
[ 0.189907] kernel BUG at mm/page_alloc.c:1008!
[ 0.190545] invalid opcode: 0000 [#1]
[ 0.191052] CPU: 0 PID: 0 Comm: swapper Not tainted 5.10.0-rc6-00271-g4df001639c84 #1
[ 0.192125] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 0.193240] EIP: __free_one_page+0x3c4/0x490
[ 0.193810] Code: dc b7 c2 89 f8 e8 3c 5a fe ff 0f 0b 8d b4 26 00 00 00 00 8d 76 00 0f 0b 8d b6 00 00 00 00 ba 90 dc b7 c2 89 f8 e8 1c 5a fe ff <0f> 0b 8d b4 26 00 00 00 00 8d 76 00 8b 55 f0 01 82 04 03 00 00 01
[ 0.196288] EAX: c2b7cd9e EBX: c32a7840 ECX: 00000000 EDX: c2b7dc90
[ 0.197169] ESI: 00000011 EDI: d7d3d220 EBP: c2dd3ea0 ESP: c2dd3e80
[ 0.198027] DS: 007b ES: 007b FS: 0000 GS: 0000 SS: 0068 EFLAGS: 00210002
[ 0.198964] CR0: 80050033 CR2: 00000000 CR3: 03429000 CR4: 000406b0
[ 0.199829] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[ 0.200701] DR6: fffe0ff0 DR7: 00000400
[ 0.201189] Call Trace:
[ 0.201497] free_one_page+0x44/0xc0
[ 0.201948] __free_pages_ok+0x16f/0x4e0
[ 0.202478] __free_pages_core+0xa6/0xe0
[ 0.203001] memblock_free_pages+0xf/0x11
[ 0.203479] memblock_free_all+0x11c/0x16e
[ 0.203989] mem_init+0x20/0x100
[ 0.204422] start_kernel+0x384/0x5ac
[ 0.204919] ? set_intr_gate+0x3b/0x3d
[ 0.205382] ? early_idt_handler_common+0x44/0x44
[ 0.205990] i386_start_kernel+0x47/0x49
[ 0.206481] startup_32_smp+0x164/0x168
[ 0.206985] Modules linked in:
[ 0.207413] random: get_random_bytes called from print_oops_end_marker+0x2c/0x50 with crng_init=0
[ 0.207417] ---[ end trace 4bc0c53f48cce3f8 ]---
To reproduce:
# build kernel
cd linux
cp config-5.10.0-rc6-00271-g4df001639c84 .config
make HOSTCC=gcc-9 CC=gcc-9 ARCH=i386 olddefconfig prepare modules_prepare bzImage modules
make HOSTCC=gcc-9 CC=gcc-9 ARCH=i386 INSTALL_MOD_PATH=<mod-install-dir> modules_install
cd <mod-install-dir>
find lib/ | cpio -o -H newc --quiet | gzip > modules.cgz
git clone https://github.com/intel/lkp-tests.git
cd lkp-tests
bin/lkp qemu -k <bzImage> -m modules.cgz job-script # job-script is attached in this email
Thanks,
Oliver Sang
View attachment "config-5.10.0-rc6-00271-g4df001639c84" of type "text/plain" (138630 bytes)
View attachment "job-script" of type "text/plain" (4466 bytes)
Download attachment "dmesg.xz" of type "application/x-xz" (4552 bytes)
Powered by blists - more mailing lists