[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <202410251024.eb4a89f1-oliver.sang@intel.com>
Date: Fri, 25 Oct 2024 10:13:05 +0800
From: kernel test robot <oliver.sang@...el.com>
To: Hua Su <suhua.tanke@...il.com>
CC: <oe-lkp@...ts.linux.dev>, <lkp@...el.com>, <linux-mm@...ck.org>,
<rppt@...nel.org>, <akpm@...ux-foundation.org>,
<linux-kernel@...r.kernel.org>, Hua Su <suhua.tanke@...il.com>,
<oliver.sang@...el.com>
Subject: Re: [PATCH] memblock: uniformly initialize all reserved pages to
MIGRATE_MOVABLE
Hello,
kernel test robot noticed "kernel_BUG_at_include/linux/mm.h" on:
commit: 0a19e28247d042d639e5a46c3698adeda268a7a2 ("[PATCH] memblock: uniformly initialize all reserved pages to MIGRATE_MOVABLE")
url: https://github.com/intel-lab-lkp/linux/commits/Hua-Su/memblock-uniformly-initialize-all-reserved-pages-to-MIGRATE_MOVABLE/20241021-131358
base: https://git.kernel.org/cgit/linux/kernel/git/akpm/mm.git mm-everything
patch link: https://lore.kernel.org/all/20241021051151.4664-1-suhua.tanke@gmail.com/
patch subject: [PATCH] memblock: uniformly initialize all reserved pages to MIGRATE_MOVABLE
in testcase: boot
config: x86_64-randconfig-012-20241023
compiler: gcc-12
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G
(please refer to attached dmesg/kmsg for entire log/backtrace)
+------------------------------------------+------------+------------+
| | a8883372ec | 0a19e28247 |
+------------------------------------------+------------+------------+
| boot_successes | 18 | 0 |
| boot_failures | 0 | 18 |
| kernel_BUG_at_include/linux/mm.h | 0 | 18 |
| Oops:invalid_opcode:#[##]SMP_PTI | 0 | 18 |
| RIP:page_zone | 0 | 18 |
| Kernel_panic-not_syncing:Fatal_exception | 0 | 18 |
+------------------------------------------+------------+------------+
If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@...el.com>
| Closes: https://lore.kernel.org/oe-lkp/202410251024.eb4a89f1-oliver.sang@intel.com
[ 0.262363][ T0] ------------[ cut here ]------------
[ 0.262921][ T0] kernel BUG at include/linux/mm.h:1637!
[ 0.263532][ T0] Oops: invalid opcode: 0000 [#1] SMP PTI
[ 0.264140][ T0] CPU: 0 UID: 0 PID: 0 Comm: swapper Tainted: G T 6.12.0-rc3-00235-g0a19e28247d0 #1
[ 0.265300][ T0] Tainted: [T]=RANDSTRUCT
[ 0.265762][ T0] RIP: 0010:page_zone (include/linux/mm.h:1858)
[ 0.266284][ T0] Code: 43 08 89 ee 48 89 df 31 d2 5b 5d 41 5c 41 5d 41 5e e9 f1 08 02 00 48 8b 07 48 ff c0 75 0e 48 c7 c6 27 2e 99 ac e8 42 73 fd ff <0f> 0b 48 8b 07 48 c1 e8 3e 48 69 c0 40 06 00 00 48 05 c0 63 6c ad
All code
========
0: 43 08 89 ee 48 89 df rex.XB or %cl,-0x2076b712(%r9)
7: 31 d2 xor %edx,%edx
9: 5b pop %rbx
a: 5d pop %rbp
b: 41 5c pop %r12
d: 41 5d pop %r13
f: 41 5e pop %r14
11: e9 f1 08 02 00 jmpq 0x20907
16: 48 8b 07 mov (%rdi),%rax
19: 48 ff c0 inc %rax
1c: 75 0e jne 0x2c
1e: 48 c7 c6 27 2e 99 ac mov $0xffffffffac992e27,%rsi
25: e8 42 73 fd ff callq 0xfffffffffffd736c
2a:* 0f 0b ud2 <-- trapping instruction
2c: 48 8b 07 mov (%rdi),%rax
2f: 48 c1 e8 3e shr $0x3e,%rax
33: 48 69 c0 40 06 00 00 imul $0x640,%rax,%rax
3a: 48 05 c0 63 6c ad add $0xffffffffad6c63c0,%rax
Code starting with the faulting instruction
===========================================
0: 0f 0b ud2
2: 48 8b 07 mov (%rdi),%rax
5: 48 c1 e8 3e shr $0x3e,%rax
9: 48 69 c0 40 06 00 00 imul $0x640,%rax,%rax
10: 48 05 c0 63 6c ad add $0xffffffffad6c63c0,%rax
[ 0.268346][ T0] RSP: 0000:fffffffface03dc0 EFLAGS: 00010046
[ 0.268988][ T0] RAX: 0000000000000000 RBX: 0000000000000007 RCX: 0000000000000000
[ 0.269844][ T0] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 0.270685][ T0] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[ 0.271486][ T0] R10: 0000000000000000 R11: 6d75642065676170 R12: 0000000000000001
[ 0.272336][ T0] R13: 0000000000159400 R14: fffff7bb05650000 R15: ffff9bfa1ffff178
[ 0.273172][ T0] FS: 0000000000000000(0000) GS:ffff9bfcefa00000(0000) knlGS:0000000000000000
[ 0.274145][ T0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 0.274817][ T0] CR2: ffff9bfcfffff000 CR3: 000000015c2b2000 CR4: 00000000000000b0
[ 0.275658][ T0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 0.276502][ T0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 0.277343][ T0] Call Trace:
[ 0.277691][ T0] <TASK>
[ 0.277992][ T0] ? __die_body (arch/x86/kernel/dumpstack.c:421)
[ 0.278448][ T0] ? die (arch/x86/kernel/dumpstack.c:449)
[ 0.278838][ T0] ? do_trap (arch/x86/kernel/traps.c:156 arch/x86/kernel/traps.c:197)
[ 0.279276][ T0] ? page_zone (include/linux/mm.h:1858)
[ 0.279720][ T0] ? page_zone (include/linux/mm.h:1858)
[ 0.280170][ T0] ? do_error_trap (arch/x86/kernel/traps.c:218)
[ 0.280648][ T0] ? page_zone (include/linux/mm.h:1858)
[ 0.281095][ T0] ? exc_invalid_op (arch/x86/kernel/traps.c:316)
[ 0.281597][ T0] ? page_zone (include/linux/mm.h:1858)
[ 0.282041][ T0] ? asm_exc_invalid_op (arch/x86/include/asm/idtentry.h:621)
[ 0.282582][ T0] ? page_zone (include/linux/mm.h:1858)
[ 0.283027][ T0] set_pfnblock_flags_mask (mm/page_alloc.c:408)
[ 0.283583][ T0] reserve_bootmem_region (mm/mm_init.c:729 mm/mm_init.c:765)
[ 0.284142][ T0] free_low_memory_core_early (mm/memblock.c:2192 mm/memblock.c:2205)
[ 0.284736][ T0] ? swiotlb_init_io_tlb_pool+0x86/0x133
[ 0.285419][ T0] memblock_free_all (mm/memblock.c:2252)
[ 0.285925][ T0] mem_init (arch/x86/mm/init_64.c:1360)
[ 0.286332][ T0] mm_core_init (mm/mm_init.c:2658)
[ 0.286790][ T0] start_kernel (init/main.c:965)
[ 0.287272][ T0] x86_64_start_reservations (arch/x86/kernel/head64.c:381)
[ 0.287850][ T0] x86_64_start_kernel (arch/x86/kernel/ebda.c:57)
[ 0.288377][ T0] common_startup_64 (arch/x86/kernel/head_64.S:414)
[ 0.288899][ T0] </TASK>
[ 0.289213][ T0] Modules linked in:
[ 0.289626][ T0] ---[ end trace 0000000000000000 ]---
[ 0.290175][ T0] RIP: 0010:page_zone (include/linux/mm.h:1858)
[ 0.290680][ T0] Code: 43 08 89 ee 48 89 df 31 d2 5b 5d 41 5c 41 5d 41 5e e9 f1 08 02 00 48 8b 07 48 ff c0 75 0e 48 c7 c6 27 2e 99 ac e8 42 73 fd ff <0f> 0b 48 8b 07 48 c1 e8 3e 48 69 c0 40 06 00 00 48 05 c0 63 6c ad
All code
========
0: 43 08 89 ee 48 89 df rex.XB or %cl,-0x2076b712(%r9)
7: 31 d2 xor %edx,%edx
9: 5b pop %rbx
a: 5d pop %rbp
b: 41 5c pop %r12
d: 41 5d pop %r13
f: 41 5e pop %r14
11: e9 f1 08 02 00 jmpq 0x20907
16: 48 8b 07 mov (%rdi),%rax
19: 48 ff c0 inc %rax
1c: 75 0e jne 0x2c
1e: 48 c7 c6 27 2e 99 ac mov $0xffffffffac992e27,%rsi
25: e8 42 73 fd ff callq 0xfffffffffffd736c
2a:* 0f 0b ud2 <-- trapping instruction
2c: 48 8b 07 mov (%rdi),%rax
2f: 48 c1 e8 3e shr $0x3e,%rax
33: 48 69 c0 40 06 00 00 imul $0x640,%rax,%rax
3a: 48 05 c0 63 6c ad add $0xffffffffad6c63c0,%rax
Code starting with the faulting instruction
===========================================
0: 0f 0b ud2
2: 48 8b 07 mov (%rdi),%rax
5: 48 c1 e8 3e shr $0x3e,%rax
9: 48 69 c0 40 06 00 00 imul $0x640,%rax,%rax
10: 48 05 c0 63 6c ad add $0xffffffffad6c63c0,%rax
The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20241025/202410251024.eb4a89f1-oliver.sang@intel.com
--
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki
Powered by blists - more mailing lists