[<prev] [next>] [day] [month] [year] [list]
Message-ID: <c89ce73b-ae3f-b24e-e515-5634e25d2eea@candelatech.com>
Date: Thu, 26 Oct 2023 12:30:11 -0700
From: Ben Greear <greearb@...delatech.com>
To: LKML <linux-kernel@...r.kernel.org>
Subject: KASAN splat and crash related to remove_entity_load_avg,
wireless-next tree
Hello,
While testing wifi today on a wireless-next + local hacks tree,
I saw this splat and crash.
The wireless-next I'm using is based on 6.6.0-rc5.
Let me know if you have any suggestions for debugging this further. I think
it is probably not directly related to wifi or networking, but system was under
heavy network churn (wifi radios going up and down due to other issue)
when it happened.
==================================================================
BUG: KASAN: user-memory-access in remove_entity_load_avg+0x31/0x100
Read of size 8 at addr 00000ff81e1bc400 by task swapper/4/0
CPU: 4 PID: 0 Comm: swapper/4 Tainted: G W 6.6.0-rc5+ #2
Hardware name: Default string Default string/SKYBAY, BIOS 5.12 02/21/2023
Call Trace:
<IRQ>
dump_stack_lvl+0x57/0x90
kasan_report+0xb9/0xf0
? remove_entity_load_avg+0x31/0x100
remove_entity_load_avg+0x31/0x100
unregister_fair_sched_group+0x195/0x3c0
sched_unregister_group_rcu+0x14/0x30
? rcu_core+0x52e/0xd70
rcu_core+0x56e/0xd70
? rcu_core+0x52e/0xd70
? rcu_gp_kthread+0x230/0x230
? ktime_get+0x51/0xb0
? mark_held_locks+0x24/0x90
__do_softirq+0x100/0x51c
__irq_exit_rcu+0x81/0xa0
irq_exit_rcu+0x5/0x10
sysvec_apic_timer_interrupt+0x6b/0x80
</IRQ>
<TASK>
asm_sysvec_apic_timer_interrupt+0x16/0x20
RIP: 0010:cpuidle_enter_state+0x28c/0x320
Code: 04 86 4c 8d 6c c5 18 41 f6 45 40 20 0f 84 d3 fd ff ff 8b 7b 04 e8 f4 d4 9f fe e9 c6 fd ff ff e8 0a 05 d0 fe fb 0f 1f 44 00 00 <e9> 3e fe ff ff e8 8a 6b
RSP: 0018:ffff888112d17db8 EFLAGS: 00000202
RAX: 000000000298b5e9 RBX: ffffe8ffffc00d30 RCX: dffffc0000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff826d55c6
RBP: ffffffff83ad5a00 R08: 0000000000000001 R09: 0000000000000001
R10: ffffffff83f1ae57 R11: 0000000000000001 R12: 0000000000000004
R13: 000002a8d053572f R14: 0000000000000004 R15: 0000000000000000
? cpuidle_enter_state+0x286/0x320
? cpuidle_enter_state+0x286/0x320
cpuidle_enter+0x37/0x60
do_idle+0x28b/0x2f0
? arch_cpu_idle_exit+0x30/0x30
? schedule_idle+0x32/0x40
cpu_startup_entry+0x2b/0x30
start_secondary+0x197/0x1c0
? set_cpu_sibling_map+0xc20/0xc20
secondary_startup_64_no_verify+0x166/0x16b
</TASK>
==================================================================
BUG: unable to handle page fault for address: 00000ff81e1bc400
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0
Oops: 0000 [#1] PREEMPT SMP KASAN
CPU: 4 PID: 0 Comm: swapper/4 Tainted: G B W 6.6.0-rc5+ #2
Hardware name: Default string Default string/SKYBAY, BIOS 5.12 02/21/2023
RIP: 0010:remove_entity_load_avg+0x31/0x100
Code: 48 89 fd 48 8d bf 98 00 00 00 53 e8 99 de 3a 00 48 8b 9d 98 00 00 00 48 8d bb 80 00 00 00 4c 8d b3 c0 00 00 00 e8 7f de 3a 00 <48> 8b bb 80 00 00 00 49
RSP: 0018:ffff88841e009db0 EFLAGS: 00010286
RAX: 0000000000000001 RBX: 00000ff81e1bc380 RCX: ffffffff811dcb11
RDX: fffffbfff0922fc1 RSI: 0000000000000008 RDI: ffffffff84917e00
RBP: ffff888129f77000 R08: 0000000000000001 R09: fffffbfff0922fc0
R10: ffffffff84917e07 R11: fffffffffffe0f90 R12: ffff88813ce614b8
R13: ffff888128ba8120 R14: 00000ff81e1bc440 R15: 0000000000000007
FS: 0000000000000000(0000) GS:ffff88841e000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000ff81e1bc400 CR3: 0000000003696001 CR4: 00000000003706e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<IRQ>
? __die+0x1a/0x60
? page_fault_oops+0x1ea/0x550
? remove_entity_load_avg+0x31/0x100
? dump_pagetable+0x410/0x410
? syslog_print+0x3c0/0x3c0
? do_user_addr_fault+0x47f/0x8d0
? exc_page_fault+0x5d/0xf0
? asm_exc_page_fault+0x22/0x30
? add_taint+0x21/0x90
? remove_entity_load_avg+0x31/0x100
unregister_fair_sched_group+0x195/0x3c0
sched_unregister_group_rcu+0x14/0x30
? rcu_core+0x52e/0xd70
rcu_core+0x56e/0xd70
? rcu_core+0x52e/0xd70
? rcu_gp_kthread+0x230/0x230
? ktime_get+0x51/0xb0
? mark_held_locks+0x24/0x90
__do_softirq+0x100/0x51c
__irq_exit_rcu+0x81/0xa0
irq_exit_rcu+0x5/0x10
sysvec_apic_timer_interrupt+0x6b/0x80
</IRQ>
<TASK>
asm_sysvec_apic_timer_interrupt+0x16/0x20
RIP: 0010:cpuidle_enter_state+0x28c/0x320
Code: 04 86 4c 8d 6c c5 18 41 f6 45 40 20 0f 84 d3 fd ff ff 8b 7b 04 e8 f4 d4 9f fe e9 c6 fd ff ff e8 0a 05 d0 fe fb 0f 1f 44 00 00 <e9> 3e fe ff ff e8 8a 6b
RSP: 0018:ffff888112d17db8 EFLAGS: 00000202
RAX: 000000000298b5e9 RBX: ffffe8ffffc00d30 RCX: dffffc0000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff826d55c6
RBP: ffffffff83ad5a00 R08: 0000000000000001 R09: 0000000000000001
R10: ffffffff83f1ae57 R11: 0000000000000001 R12: 0000000000000004
Thanks,
Ben
--
Ben Greear <greearb@...delatech.com>
Candela Technologies Inc http://www.candelatech.com
Powered by blists - more mailing lists