lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Mon, 13 Sep 2021 22:49:18 +0800
From:   kernel test robot <oliver.sang@...el.com>
To:     Rongwei Wang <rongwei.wang@...ux.alibaba.com>
Cc:     0day robot <lkp@...el.com>, Xu Yu <xuyu@...ux.alibaba.com>,
        LKML <linux-kernel@...r.kernel.org>, lkp@...ts.01.org,
        linux-mm@...ck.org, akpm@...ux-foundation.org,
        cfijalkovich@...gle.com, song@...nel.org,
        william.kucharski@...cle.com, hughd@...gle.com
Subject: [mm, thp]  20753096b6: BUG:unable_to_handle_page_fault_for_address



Greeting,

FYI, we noticed the following commit (built with gcc-9):

commit: 20753096b67c9e841862c4f6f984aaac7dbe7183 ("[PATCH 1/2] mm, thp: check page mapping when truncating page cache")
url: https://github.com/0day-ci/linux/commits/Rongwei-Wang/mm-thp-fix-file-backed-THP-race-in-collapse_file/20210906-201318
base: https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git 27151f177827d478508e756c7657273261aaf8a9

in testcase: nvml
version: nvml-x86_64-ff6f0f125-1_20210908
with following parameters:

	test: pmem
	group: pmem
	nr_pmem: 1
	fs: ext4
	mount_option: dax
	bp_memmap: 32G!4G
	ucode: 0x7000019



on test machine: 16 threads 1 sockets Intel(R) Xeon(R) CPU D-1541 @ 2.10GHz with 48G memory

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):



If you fix the issue, kindly add following tag
Reported-by: kernel test robot <oliver.sang@...el.com>


[  491.999010][T20052] BUG: unable to handle page fault for address: 00000000131ac00d
[  492.019156][T20052] #PF: supervisor read access in kernel mode
[  492.024977][T20052] #PF: error_code(0x0000) - not-present page
[  492.030802][T20052] PGD 0 P4D 0
[  492.034026][T20052] Oops: 0000 [#1] SMP PTI
[  492.038204][T20052] CPU: 11 PID: 20052 Comm: rm Not tainted 5.14.0-09688-g20753096b67c #1
[  492.046370][T20052] Hardware name: Supermicro SYS-5018D-FN4T/X10SDV-8C-TLN4F, BIOS 1.1 03/02/2016
[  492.055225][T20052] RIP: 0010:truncate_inode_pages_range+0xd3/0x7c0
[  492.061490][T20052] Code: 89 fa 48 89 ee 4c 89 e7 e8 0a 05 ff ff 85 c0 0f 84 de 00 00 00 0f b6 84 24 90 00 00 00 8d 48 ff 89 c2 48 8b 84 cc 98 00 00 00 <48> 8b 00 48 c1 e8 10 83 e0 01 3c 01 48 19 ed 48 81 e5 01 fe ff ff
[  492.080932][T20052] RSP: 0018:ffffc900014e7d10 EFLAGS: 00010202
[  492.086850][T20052] RAX: 00000000131ac00d RBX: ffffc900014e7da0 RCX: 0000000000000000
[  492.094668][T20052] RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffffc900014e7ca0
[  492.102485][T20052] RBP: 0000000000000000 R08: 0000000000000000 R09: fffffffffffffffe
[  492.110301][T20052] R10: 0000000000001000 R11: ffff888977af07f0 R12: ffff88891aa77010
[  492.118119][T20052] R13: ffffc900014e7d28 R14: ffff88891aa76e98 R15: fffffffffffffffe
[  492.125937][T20052] FS:  00007f546799d580(0000) GS:ffff888c4aac0000(0000) knlGS:0000000000000000
[  492.134715][T20052] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  492.141147][T20052] CR2: 00000000131ac00d CR3: 000000098d508002 CR4: 00000000003706e0
[  492.148962][T20052] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  492.156781][T20052] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  492.164597][T20052] Call Trace:
[  492.167737][T20052]  ? __wake_up_common_lock+0x8a/0xc0
[  492.172880][T20052]  ? jbd2_journal_stop+0x14e/0x300
[  492.177840][T20052]  ext4_evict_inode+0x113/0x6c0
[  492.182537][T20052]  evict+0xd8/0x180
[  492.186194][T20052]  do_unlinkat+0x1d8/0x300
[  492.190459][T20052]  __x64_sys_unlinkat+0x34/0x80
[  492.195155][T20052]  do_syscall_64+0x3b/0xc0
[  492.199421][T20052]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[  492.205166][T20052] RIP: 0033:0x7f54678beff7
[  492.209430][T20052] Code: 73 01 c3 48 8b 0d 99 ee 0c 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 07 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 69 ee 0c 00 f7 d8 64 89 01 48
[  492.228885][T20052] RSP: 002b:00007ffc1b088f18 EFLAGS: 00000206 ORIG_RAX: 0000000000000107
[  492.237145][T20052] RAX: ffffffffffffffda RBX: 00005638f43dd6d0 RCX: 00007f54678beff7
[  492.244964][T20052] RDX: 0000000000000000 RSI: 00005638f43dd7d8 RDI: 0000000000000005
[  492.252779][T20052] RBP: 00005638f43dc2b0 R08: 0000000000000003 R09: 0000000000000000
[  492.260597][T20052] R10: fffffffffffffbd8 R11: 0000000000000206 R12: 00007ffc1b089100
[  492.268413][T20052] R13: 0000000000000000 R14: 00005638f43dd6d0 R15: 0000000000000000
[  492.276233][T20052] Modules linked in: dm_mod xfs intel_rapl_msr intel_rapl_common btrfs blake2b_generic xor zstd_compress raid6_pq libcrc32c sb_edac x86_pkg_temp_thermal intel_powerclamp sd_mod t10_pi sg coretemp ast drm_vram_helper kvm_intel drm_ttm_helper ttm kvm drm_kms_helper irqbypass ipmi_ssif crct10dif_pclmul dax_pmem_compat crc32_pclmul crc32c_intel syscopyarea ghash_clmulni_intel sysfillrect device_dax sysimgblt rapl nd_pmem ahci dax_pmem_core nd_btt fb_sys_fops libahci intel_cstate acpi_ipmi mxm_wmi nd_e820 drm mei_me libata ipmi_si gpio_ich intel_pch_thermal intel_uncore libnvdimm ioatdma mei joydev ipmi_devintf dca ipmi_msghandler wmi acpi_pad ip_tables
[  492.335150][T20052] CR2: 00000000131ac00d
[  492.339162][T20052] ---[ end trace 0052004592872eb3 ]---
[  492.360394][T20052] RIP: 0010:truncate_inode_pages_range+0xd3/0x7c0
[  492.366659][T20052] Code: 89 fa 48 89 ee 4c 89 e7 e8 0a 05 ff ff 85 c0 0f 84 de 00 00 00 0f b6 84 24 90 00 00 00 8d 48 ff 89 c2 48 8b 84 cc 98 00 00 00 <48> 8b 00 48 c1 e8 10 83 e0 01 3c 01 48 19 ed 48 81 e5 01 fe ff ff
[  492.386097][T20052] RSP: 0018:ffffc900014e7d10 EFLAGS: 00010202
[  492.392008][T20052] RAX: 00000000131ac00d RBX: ffffc900014e7da0 RCX: 0000000000000000
[  492.399827][T20052] RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffffc900014e7ca0
[  492.407651][T20052] RBP: 0000000000000000 R08: 0000000000000000 R09: fffffffffffffffe
[  492.415468][T20052] R10: 0000000000001000 R11: ffff888977af07f0 R12: ffff88891aa77010
[  492.423286][T20052] R13: ffffc900014e7d28 R14: ffff88891aa76e98 R15: fffffffffffffffe
[  492.431102][T20052] FS:  00007f546799d580(0000) GS:ffff888c4aac0000(0000) knlGS:0000000000000000
[  492.439879][T20052] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  492.446313][T20052] CR2: 00000000131ac00d CR3: 000000098d508002 CR4: 00000000003706e0
[  492.454129][T20052] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  492.461947][T20052] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  492.469766][T20052] Kernel panic - not syncing: Fatal exception
[  492.601630][T20052] Kernel Offset: disabled



To reproduce:

        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        bin/lkp install                job.yaml  # job file is attached in this email
        bin/lkp split-job --compatible job.yaml  # generate the yaml file for lkp run
        bin/lkp run                    generated-yaml-file



---
0DAY/LKP+ Test Infrastructure                   Open Source Technology Center
https://lists.01.org/hyperkitty/list/lkp@lists.01.org       Intel Corporation

Thanks,
Oliver Sang


View attachment "config-5.14.0-09688-g20753096b67c" of type "text/plain" (174915 bytes)

View attachment "job-script" of type "text/plain" (5929 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (34512 bytes)

View attachment "job.yaml" of type "text/plain" (4621 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ