lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <789c17e6-5ebc-4e37-93cd-19d24f148fd8@redhat.com>
Date: Wed, 19 Feb 2025 09:40:17 -0500
From: Luiz Capitulino <luizcap@...hat.com>
To: Ryan Roberts <ryan.roberts@....com>, LKML <linux-kernel@...r.kernel.org>,
 linux-mm@...ck.org
Cc: ardb@...nel.org
Subject: Re: kernel BUG at arch/arm64/mm/mmu.c:185!

On 2025-02-19 09:26, Ryan Roberts wrote:
> On 19/02/2025 14:16, Luiz Capitulino wrote:
>> On 2025-02-19 03:41, Ryan Roberts wrote:
>>> On 19/02/2025 02:27, Luiz Capitulino wrote:
>>>> Hi,
>>>>
>>>> I'm getting the crash below with Linus tree commit
>>>> 2408a807bfc3f738850ef5ad5e3fd59d66168996 on a Ampere Mt. Jade with two sockets
>>>> (backtrace below).
>>>
>>> Thanks for the bug report, I'll take a look this morning, but I'm off work
>>> tomorrow and Friday so if I can't figure it out before end of day I won't be
>>> able to look again until Monday, unless someone can pick it up in the meantime.
>>
>> No rush at all. Please, enjoy your time off :)
> 
> Afraid I've run out of time on this for today, so adding some details below.
> I'll come back to it next week unless someone else steps in.
> 
>>
>>> Anyway, is there a specific config you're compiling for? And what about kernel
>>> command line args?
>>
>> Config is attached. The kernel command-line is:
>>
>> """
>> ro crashkernel=1G-4G:406M,4G-64G:470M,64G-:726M rd.lvm.lv=cs_ampere-mtjade-
>> altra-03/root rd.lvm.lv=cs_ampere-mtjade-altra-03/swap
>> earlycon=pl011,mmio,0x100002600000
>> """
>>
>>> Is it 100% reproducible for you?
>>
>> That is a good question. Right now it is (just tried again with latest Linus
>> tree 6537cfb395f352782918d8ee7b7f10ba2cc3cbf2). But I do have the recollection
>> that I was able to boot a bad kernel a few times.
>>
>> Btw, I'll try to bisect again and will also try to update the system's firmware
>> just in case.
>>
>>> How much RAM does your system have? (I have 2
>>> socket Mt. Jade with 512G; I'll try to repro on that).
>>
>> Mine is 512G, maybe we're lucky and it's the same system.
>>
>>>> It happens very early during boot. Passing 'nokaslr' in the command-line works
>>>> around the issue (ie. I can boot and use the system normally). Doesn't seem to
>>>> happen with 6.13. I tried bisecting it but got nowhere...
>>>>
>>>> [    0.000000] ------------[ cut here ]------------
>>>> [    0.000000] kernel BUG at arch/arm64/mm/mmu.c:185!
>>>
>>> This is:
>>>
>>> /*
>>>    * After the PTE entry has been populated once, we
>>>    * only allow updates to the permission attributes.
>>>    */
>>> BUG_ON(!pgattr_change_is_safe(pte_val(old_pte), pte_val(__ptep_get(ptep))));
>>>
>>> So we have a valid -> valid PTE transition where either the PFNs are changing,
>>> we are trying to change permissions on a contiguous entry, we are trying to
>>> transition from non-global to global, or we are trying to change other
>>> explicitly disallowed bits.
>>>
>>>> [    0.000000] Internal error: Oops - BUG: 00000000f2000800 [#1] SMP
>>>> [    0.000000] Modules linked in:
>>>> [    0.000000] CPU: 0 UID: 0 PID: 0 Comm: swapper Not tainted 6.14.0-rc3+ #8
>>>> [    0.000000] pstate: 400000c9 (nZcv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
>>>> [    0.000000] pc : alloc_init_cont_pte+0x20c/0x3d0
>>>> [    0.000000] lr : alloc_init_cont_pte+0x204/0x3d0
>>>> [    0.000000] sp : ffffb45836ec78b0
>>>> [    0.000000] x29: ffffb45836ec7940 x28: ffff6fea00000000 x27: 0068000000000f07
>>>> [    0.000000] x26: ffff6fea00200000 x25: 0000400000000000 x24: ffffffffff433000
>>>> [    0.000000] x23: dfff800000000000 x22: 0000d01600000000 x21: 0068000000000f07
>>>> [    0.000000] x20: ffff6fea00000000 x19: ffff6fea00010000 x18: 00000000ae5a3fb1
>>>> [    0.000000] x17: 0000000000001114 x16: 00000000bfc60000 x15: 0000000000000200
>>>> [    0.000000] x14: 0000000000000000 x13: 1ffff68b06dd8f1c x12: 00000000f1f1f1f1
>>>> [    0.000000] x11: ffff768b06dd8f1c x10: ffffb45835a1ca38 x9 : 0000000000000000
>>>> [    0.000000] x8 : 0000000041b58ab3 x7 : 0000000000000000 x6 : 0000000000000000
>>>> [    0.000000] x5 : 006840000a861f07 x4 : 000000000000a861 x3 : 000000000000a861
>>>> [    0.000000] x2 : 006840000a861f03 x1 : 0068400000000f07 x0 : 0000000000000000
>>>> [    0.000000] Call trace:
>>>> [    0.000000]  alloc_init_cont_pte+0x20c/0x3d0 (P)
>>>> [    0.000000]  alloc_init_cont_pmd+0x20c/0x4d0
>>>> [    0.000000]  alloc_init_pud+0x244/0x400
>>>> [    0.000000]  create_kpti_ng_temp_pgd+0xf8/0x1c8
>>>
>>> This is an alias for __create_pgd_mapping_locked() so I suspect we are actually
>>> in __map_memblock().
>>>
>>>> [    0.000000]  map_mem.constprop.0+0x1d8/0x3b8
>>>> [    0.000000]  paging_init+0x98/0x330
>>>> [    0.000000]  setup_arch+0xac/0x170
>>>> [    0.000000]  start_kernel+0x74/0x3c8
>>>> [    0.000000]  __primary_switched+0x8c/0xa0
>>>> [    0.000000] Code: f9400301 97ffff64 72001c1f 54fffe21 (d4210000)
>>>> [    0.000000] ---[ end trace 0000000000000000 ]---
>>>> [    0.000000] Kernel panic - not syncing: Oops - BUG: Fatal exception
>>>> [    0.000000] ---[ end Kernel panic - not syncing: Oops - BUG: Fatal
>>>> exception ]---
>>>>
>>>
>>> So I guess either we are setting a PTE entry into a table for the first time,
>>> where somehow the table has not been initially cleared (very unlikely) or we are
>>> trying to update the permissions of an already mapped pte. In that latter case,
>>> I think we should only be remapping the kernel image portion of the linear map.
>>>
>>> I can't see any obvious recent changes in this area. I'll see if I can repro and
>>> poke around a bit more.
>>
>> OK, maybe you'll be able to reproduce with the config I'm attaching.
> 
> I can reproduce _a_ panic, but it's different from the one you shared. I'm
> running defconfig on Ampere Altra with 2 sockets and 512G RAM. It appears to
> repro reliably as long as kaslr is enabled.

Well, after I pasted my kernel command-line to you I wondered why I didn't
have a console= option. So, I added console=ttyAMA0,115200n8 and it changed
the crash for me (see below).

> I tried reproduing on VM, but with no luck. I suspect there is something about
> the physical layout of memory that provokes the bug. I tried to force the memory
> layout to match Altra using kvmtool but it only supports a single physical
> region currently. And merging all the regions into 1 uber region is too big and
> the VMM fails. So I think we are stuck having to keep rebooting the bare metal.

Yes, I forgot to say that I've been using KVM guests for my kernel work on this
same system and I never saw this crash on those guests (they're NUMA guests).

Here's my new crash:

[    0.000000] Booting Linux on physical CPU 0x0000120000 [0x413fd0c1]
[    0.000000] Linux version 6.14.0-rc3-00060-g6537cfb395f3 (luizcap@...ere-mtjade-altra-03.khw.eng.rdu2.dc.redhat.com) (gcc (GCC) 11.5.0 20240719 (Red Hat 11.5.0-5), GNU ld version 2.35.2-60.el9) #1 SMP PREEMPT_DYNAMIC Wed Feb 19 08:39:20 EST 2025
[    0.000000] KASLR enabled
[    0.000000] earlycon: pl11 at MMIO 0x0000100002600000 (options '')
[    0.000000] printk: legacy bootconsole [pl11] enabled
[    0.000000] efi: EFI v2.7 by American Megatrends
[    0.000000] efi: ACPI 2.0=0xbfc30000 TPMFinalLog=0xbfc60000 SMBIOS 3.0=0xb93dff98 MEMATTR=0xb8e3a018 ESRT=0xbb242298 TPMEventLog=0xb2da7518 RNG=0xb2dafe98 MEMRESERVE=0xb5482818
[    0.000000] random: crng init done
[    0.000000] esrt: Reserving ESRT space from 0x00000000bb242298 to 0x00000000bb2422f8.
[    0.000000] ACPI: Early table checksum verification disabled
[    0.000000] ACPI: RSDP 0x00000000BFC30000 000024 (v02 Ampere)
[    0.000000] ACPI: XSDT 0x00000000BB300000 0000E4 (v01 Ampere Altra    00000000 AMI  01000013)
[    0.000000] ACPI: FACP 0x00000000BB1A0000 000114 (v06 Ampere Altra    00000000 INTL 20190509)
[    0.000000] ACPI: DSDT 0x00000000BB0B0000 02F09A (v02 Ampere Jade     00000001 INTL 20200717)
[    0.000000] ACPI: FACS 0x00000000BFC50000 000040
[    0.000000] ACPI: DBG2 0x00000000BB1B0000 00005C (v00 Ampere Altra    00000000 INTL 20190509)
[    0.000000] ACPI: GTDT 0x00000000BB190000 000110 (v03 Ampere Altra    00000000 INTL 20190509)
[    0.000000] ACPI: SSDT 0x00000000BB180000 00002D (v02 Ampere Altra    00000001 INTL 20190509)
[    0.000000] ACPI: EINJ 0x00000000BB150000 000150 (v01 Ampere Altra    00000001 INTL 20200717)
[    0.000000] ACPI: SDEI 0x00000000BB140000 000024 (v01 Ampere Altra    00000001 INTL 20200717)
[    0.000000] ACPI: SPMI 0x00000000BB130000 000041 (v05 ALASKA A M I    00000000 AMI. 00000000)
[    0.000000] ACPI: SPMI 0x00000000BB120000 000041 (v05 ALASKA A M I    00000000 AMI. 00000000)
[    0.000000] ACPI: SPMI 0x00000000BB110000 000041 (v05 ALASKA A M I    00000000 AMI. 00000000)
[    0.000000] ACPI: FIDT 0x00000000BA5F0000 00009C (v01 ALASKA A M I    01072009 AMI  00010013)
[    0.000000] ACPI: SPCR 0x00000000B8E10000 000050 (v02 A M I  APTIO V  01072009 AMI. 0005000F)
[    0.000000] ACPI: TPM2 0x00000000B3050000 000064 (v04 ALASKA A M I    00000001 AMI  00000000)
[    0.000000] ACPI: PPTT 0x00000000B2F50000 006E60 (v02 Ampere Altra    00000000 AMP. 01000013)
[    0.000000] ACPI: SLIT 0x00000000B2F90000 000030 (v01 Ampere Altra    00000000 AMP. 01000013)
[    0.000000] ACPI: SRAT 0x00000000B2F40000 000CF0 (v03 Ampere Altra    00000000 AMP. 01000013)
[    0.000000] ACPI: HEST 0x00000000B2F30000 0008D8 (v01 Ampere Altra    00000001 ARM  00000099)
[    0.000000] ACPI: BERT 0x00000000BB160000 000030 (v01 Ampere Altra    00000001 INTL 20200717)
[    0.000000] ACPI: MCFG 0x00000000B2F20000 0000EC (v01 Ampere Altra    00000001 AMP. 01000013)
[    0.000000] ACPI: IORT 0x00000000B2F10000 000900 (v00 Ampere Altra    00000000 AMP. 01000013)
[    0.000000] ACPI: APIC 0x00000000B2F60000 003354 (v05 Ampere Altra    00000003 AMI  01000013)
[    0.000000] ACPI: PCCT 0x00000000B2E80000 000ABC (v02 Ampere Altra    00000003 AMP. 01000013)
[    0.000000] ACPI: FPDT 0x00000000B2E50000 000044 (v01 ALASKA A M I    01072009 AMI  01000013)
[    0.000000] ACPI: WSMT 0x00000000B8090000 000028 (v01 ALASKA A M I    01072009 AMI  00010013)
[    0.000000] ACPI: BGRT 0x00000000B8DB0000 000038 (v01 ALASKA A M I    01072009 AMI  00010013)
[    0.000000] ACPI: SPCR: console: pl011,mmio32,0x100002600000,115200
[    0.000000] ACPI: Use ACPI SPCR as default console: Yes
[    0.000000] ACPI: SRAT: Node 0 PXM 0 [mem 0x88300000-0x883fffff]
[    0.000000] ACPI: SRAT: Node 0 PXM 0 [mem 0x90000000-0xbfffffff]
[    0.000000] ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0x8007fffffff]
[    0.000000] ACPI: SRAT: Node 0 PXM 0 [mem 0x800c0000000-0x83fffffffff]
[    0.000000] ACPI: SRAT: Node 1 PXM 1 [mem 0x400000000000-0x4000bfffffff]
[    0.000000] ACPI: SRAT: Node 1 PXM 1 [mem 0x400100000000-0x403fffffffff]
[    0.000000] NUMA: Node 0 [mem 0x88300000-0x883fffff] + [mem 0x90000000-0xbfffffff] -> [mem 0x88300000-0xbfffffff]
[    0.000000] NUMA: Node 0 [mem 0x88300000-0xbfffffff] + [mem 0x80000000000-0x8007fffffff] -> [mem 0x88300000-0x8007fffffff]
[    0.000000] NUMA: Node 0 [mem 0x88300000-0x8007fffffff] + [mem 0x800c0000000-0x83fffffffff] -> [mem 0x88300000-0x83fffffffff]
[    0.000000] NUMA: Node 1 [mem 0x400000000000-0x4000bfffffff] + [mem 0x400100000000-0x403fffffffff] -> [mem 0x400000000000-0x403fffffffff]
[    0.000000] NODE_DATA(0) allocated [mem 0x83ffffe92c0-0x83fffffffff]
[    0.000000] NODE_DATA(1) allocated [mem 0x403fc00b22c0-0x403fc00c8fff]
[    0.000000] ------------[ cut here ]------------
[    0.000000] WARNING: CPU: 0 PID: 0 at mm/sparse.c:142 memblocks_present+0x154/0x3f0
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 UID: 0 PID: 0 Comm: swapper Not tainted 6.14.0-rc3-00060-g6537cfb395f3 #1
[    0.000000] pstate: 600000c9 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    0.000000] pc : memblocks_present+0x154/0x3f0
[    0.000000] lr : memblocks_present+0x168/0x3f0
[    0.000000] sp : ffffd58845d17b30
[    0.000000] x29: ffffd58845d17c20 x28: 00000000c4b40000 x27: 0000000400000000
[    0.000000] x26: dfff800000000000 x25: 00000000001fffff x24: 00000004000c0000
[    0.000000] x23: 0000000000000001 x22: 0000000000000004 x21: ffffd58846cd81e0
[    0.000000] x20: 0000000000001078 x19: 000000000000020f x18: 0000000000000003
[    0.000000] x17: 0000000000000004 x16: 0000403fc00c9000 x15: 0000020000000000
[    0.000000] x14: 0000000000036d40 x13: 0000000100000000 x12: ffff6b7e97ffb258
[    0.000000] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[    0.000000] x8 : 0000000000000000 x7 : ffffd58846ca8424 x6 : 1ffffab108d95082
[    0.000000] x5 : 00000000000000de x4 : 1ffffab108ba2f7c x3 : 1ffffab108ba2f76
[    0.000000] x2 : 0000000000000001 x1 : 0000000000000000 x0 : 0000000000000000
[    0.000000] Call trace:
[    0.000000]  memblocks_present+0x154/0x3f0 (P)
[    0.000000]  sparse_init+0x40/0x340
[    0.000000]  bootmem_init+0x134/0x360
[    0.000000]  setup_arch+0xc0/0x170
[    0.000000]  start_kernel+0x74/0x3c8
[    0.000000]  __primary_switched+0x8c/0xa0
[    0.000000] ---[ end trace 0000000000000000 ]---
[    0.000000] Zone ranges:
[    0.000000]   DMA      [mem 0x0000000088300000-0x00000000ffffffff]
[    0.000000]   DMA32    empty
[    0.000000]   Normal   [mem 0x0000000100000000-0x0000403fffffffff]
[    0.000000]   Device   empty
[    0.000000] Movable zone start for each node
[    0.000000] Early memory node ranges
[    0.000000]   node   0: [mem 0x0000000088300000-0x00000000883fffff]
[    0.000000]   node   0: [mem 0x0000000090000000-0x0000000091ceffff]
[    0.000000]   node   0: [mem 0x0000000091cf0000-0x0000000091deffff]
[    0.000000]   node   0: [mem 0x0000000091df0000-0x0000000091ffffff]
[    0.000000]   node   0: [mem 0x0000000092000000-0x000000009277ffff]
[    0.000000]   node   0: [mem 0x0000000092780000-0x00000000b1085fff]
[    0.000000]   node   0: [mem 0x00000000b1086000-0x00000000b134ffff]
[    0.000000]   node   0: [mem 0x00000000b1350000-0x00000000b15effff]
[    0.000000]   node   0: [mem 0x00000000b15f0000-0x00000000b25fffff]
[    0.000000]   node   0: [mem 0x00000000b2600000-0x00000000b2e8ffff]
[    0.000000]   node   0: [mem 0x00000000b2e90000-0x00000000b2f0ffff]
[    0.000000]   node   0: [mem 0x00000000b2f10000-0x00000000b308ffff]
[    0.000000]   node   0: [mem 0x00000000b3090000-0x00000000b30effff]
[    0.000000]   node   0: [mem 0x00000000b30f0000-0x00000000b310ffff]
[    0.000000]   node   0: [mem 0x00000000b3110000-0x00000000b315ffff]
[    0.000000]   node   0: [mem 0x00000000b3160000-0x00000000b3d2ffff]
[    0.000000]   node   0: [mem 0x00000000b3d30000-0x00000000b3d3ffff]
[    0.000000]   node   0: [mem 0x00000000b3d40000-0x00000000b402ffff]
[    0.000000]   node   0: [mem 0x00000000b4030000-0x00000000b403ffff]
[    0.000000]   node   0: [mem 0x00000000b4040000-0x00000000b433ffff]
[    0.000000]   node   0: [mem 0x00000000b4340000-0x00000000b547ffff]
[    0.000000]   node   0: [mem 0x00000000b5480000-0x00000000b8e3ffff]
[    0.000000]   node   0: [mem 0x00000000b8e40000-0x00000000b8e4ffff]
[    0.000000]   node   0: [mem 0x00000000b8e50000-0x00000000b8feffff]
[    0.000000]   node   0: [mem 0x00000000b8ff0000-0x00000000b900ffff]
[    0.000000]   node   0: [mem 0x00000000b9010000-0x00000000b93affff]
[    0.000000]   node   0: [mem 0x00000000b93b0000-0x00000000b94fffff]
[    0.000000]   node   0: [mem 0x00000000b9500000-0x00000000b953ffff]
[    0.000000]   node   0: [mem 0x00000000b9540000-0x00000000b955ffff]
[    0.000000]   node   0: [mem 0x00000000b9560000-0x00000000b957ffff]
[    0.000000]   node   0: [mem 0x00000000b9580000-0x00000000ba5affff]
[    0.000000]   node   0: [mem 0x00000000ba5b0000-0x00000000ba64ffff]
[    0.000000]   node   0: [mem 0x00000000ba650000-0x00000000ba66ffff]
[    0.000000]   node   0: [mem 0x00000000ba670000-0x00000000ba85ffff]
[    0.000000]   node   0: [mem 0x00000000ba860000-0x00000000ba8cffff]
[    0.000000]   node   0: [mem 0x00000000ba8d0000-0x00000000ba99ffff]
[    0.000000]   node   0: [mem 0x00000000ba9a0000-0x00000000bab2ffff]
[    0.000000]   node   0: [mem 0x00000000bab30000-0x00000000bab7ffff]
[    0.000000]   node   0: [mem 0x00000000bab80000-0x00000000bac1ffff]
[    0.000000]   node   0: [mem 0x00000000bac20000-0x00000000bac6ffff]
[    0.000000]   node   0: [mem 0x00000000bac70000-0x00000000bad0ffff]
[    0.000000]   node   0: [mem 0x00000000bad10000-0x00000000bad9ffff]
[    0.000000]   node   0: [mem 0x00000000bada0000-0x00000000bae3ffff]
[    0.000000]   node   0: [mem 0x00000000bae40000-0x00000000bae4ffff]
[    0.000000]   node   0: [mem 0x00000000bae50000-0x00000000baf2ffff]
[    0.000000]   node   0: [mem 0x00000000baf30000-0x00000000baf7ffff]
[    0.000000]   node   0: [mem 0x00000000baf80000-0x00000000bb01ffff]
[    0.000000]   node   0: [mem 0x00000000bb020000-0x00000000bb0dffff]
[    0.000000]   node   0: [mem 0x00000000bb0e0000-0x00000000bb0effff]
[    0.000000]   node   0: [mem 0x00000000bb0f0000-0x00000000bb25ffff]
[    0.000000]   node   0: [mem 0x00000000bb260000-0x00000000bb28ffff]
[    0.000000]   node   0: [mem 0x00000000bb290000-0x00000000bb7affff]
[    0.000000]   node   0: [mem 0x00000000bb7b0000-0x00000000bb84ffff]
[    0.000000]   node   0: [mem 0x00000000bb850000-0x00000000bb8dffff]
[    0.000000]   node   0: [mem 0x00000000bb8e0000-0x00000000bb97ffff]
[    0.000000]   node   0: [mem 0x00000000bb980000-0x00000000bb99ffff]
[    0.000000]   node   0: [mem 0x00000000bb9a0000-0x00000000bb9bffff]
[    0.000000]   node   0: [mem 0x00000000bb9c0000-0x00000000bba0ffff]
[    0.000000]   node   0: [mem 0x00000000bba10000-0x00000000bde4ffff]
[    0.000000]   node   0: [mem 0x00000000bde50000-0x00000000bdebffff]
[    0.000000]   node   0: [mem 0x00000000bdec0000-0x00000000bf05ffff]
[    0.000000]   node   0: [mem 0x00000000bf060000-0x00000000bf0effff]
[    0.000000]   node   0: [mem 0x00000000bf0f0000-0x00000000bf1cffff]
[    0.000000]   node   0: [mem 0x00000000bf1d0000-0x00000000bf21ffff]
[    0.000000]   node   0: [mem 0x00000000bf220000-0x00000000bf2bffff]
[    0.000000]   node   0: [mem 0x00000000bf2c0000-0x00000000bf2dffff]
[    0.000000]   node   0: [mem 0x00000000bf2e0000-0x00000000bf2fffff]
[    0.000000]   node   0: [mem 0x00000000bf300000-0x00000000bfc2dfff]
[    0.000000]   node   0: [mem 0x00000000bfc2e000-0x00000000bfc2ffff]
[    0.000000]   node   0: [mem 0x00000000bfc30000-0x00000000bfc4ffff]
[    0.000000]   node   0: [mem 0x00000000bfc50000-0x00000000bfcbffff]
[    0.000000]   node   0: [mem 0x00000000bfcc0000-0x00000000bfffffff]
[    0.000000]   node   0: [mem 0x0000080000000000-0x000008007fffffff]
[    0.000000]   node   0: [mem 0x00000800c0000000-0x0000083fffffffff]
[    0.000000]   node   1: [mem 0x0000400000000000-0x00004000bfffffff]
[    0.000000] Unable to handle kernel paging request at virtual address dfff800000000001
[    0.000000] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
[    0.000000] Mem abort info:
[    0.000000]   ESR = 0x0000000096000004
[    0.000000]   EC = 0x25: DABT (current EL), IL = 32 bits
[    0.000000]   SET = 0, FnV = 0
[    0.000000]   EA = 0, S1PTW = 0
[    0.000000]   FSC = 0x04: level 0 translation fault
[    0.000000] Data abort info:
[    0.000000]   ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000
[    0.000000]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[    0.000000]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[    0.000000] [dfff800000000001] address between user and kernel address ranges
[    0.000000] Internal error: Oops: 0000000096000004 [#1] SMP
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 UID: 0 PID: 0 Comm: swapper Tainted: G        W          6.14.0-rc3-00060-g6537cfb395f3 #1
[    0.000000] Tainted: [W]=WARN
[    0.000000] pstate: 800000c9 (Nzcv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    0.000000] pc : subsection_map_init+0xb4/0x160
[    0.000000] lr : free_area_init+0x368/0xd08
[    0.000000] sp : ffffd58845d17a90
[    0.000000] x29: ffffd58845d17a90 x28: 00000000000c0000 x27: 0000000400000000
[    0.000000] x26: 0000000000080000 x25: ffffd58843f11d60 x24: ffffd58843f11920
[    0.000000] x23: 0000000000008000 x22: 0000000000080017 x21: dfff800000000000
[    0.000000] x20: 0000000000000000 x19: 0000000000008000 x18: 0000000000000003
[    0.000000] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[    0.000000] x14: 0000000000000000 x13: 0000000000000001 x12: ffff7ab108bb333d
[    0.000000] x11: 1ffffab108bb333c x10: ffff7ab108bb333c x9 : dfff800000000000
[    0.000000] x8 : 0000854ef744ccc4 x7 : ffffd58845d999e3 x6 : 0000000000000001
[    0.000000] x5 : ffffd58845d999e0 x4 : ffff7ab108bb333d x3 : 0000000000000000
[    0.000000] x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000008
[    0.000000] Call trace:
[    0.000000]  subsection_map_init+0xb4/0x160 (P)
[    0.000000]  free_area_init+0x368/0xd08
[    0.000000]  bootmem_init+0x208/0x360
[    0.000000]  setup_arch+0xc0/0x170
[    0.000000]  start_kernel+0x74/0x3c8
[    0.000000]  __primary_switched+0x8c/0xa0
[    0.000000] Code: d37b1b40 8b000294 91002280 d343fc01 (38f56821)
[    0.000000] ---[ end trace 0000000000000000 ]---
[    0.000000] Kernel panic - not syncing: Oops: Fatal exception
[    0.000000] ---[ end Kernel panic - not syncing: Oops: Fatal exception ]---


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ