linux-sh.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [akpm-mm:mm-stable] [arch, mm]  8268af309d: kernel_BUG_at_include/linux/page-flags.h
@ 2025-03-24  6:14 kernel test robot
  0 siblings, 0 replies; only message in thread
From: kernel test robot @ 2025-03-24  6:14 UTC (permalink / raw)
  To: Mike Rapoport
  Cc: oe-lkp, lkp, Andrew Morton, Mark Brown, Alexander Gordeev,
	Andreas Larsson, Andy Lutomirski, Ard Biesheuvel, Arnd Bergmann,
	Borislav Betkov, Catalin Marinas, David S. Miller, Dinh Nguyen,
	Geert Uytterhoeven, Gerald Schaefer, Guo Ren, Heiko Carstens,
	Helge Deller, Huacai Chen, Ingo Molnar, Jiaxun Yang,
	Johannes Berg, John Paul Adrian Glaubitz, Madhavan Srinivasan,
	Matt Turner, Max Filippov, Michael Ellerman, Michal Simek,
	Palmer Dabbelt, Richard Weinberger, Russel King, Stafford Horne,
	Thomas Bogendoerfer, Thomas Gleinxer, Vasily Gorbik, Vineet Gupta,
	Will Deacon, linux-alpha, linux-snps-arc, linux-arm-kernel,
	linux-csky, loongarch, linux-kernel, linux-mips, linux-openrisc,
	linux-parisc, linuxppc-dev, linux-riscv, linux-s390, linux-sh,
	sparclinux, linux-um, linux-arch, linux-mm, oliver.sang



Hello,

kernel test robot noticed "kernel_BUG_at_include/linux/page-flags.h" on:

commit: 8268af309d07d1c6279080b4e6fd16ec75cc977c ("arch, mm: set max_mapnr when allocating memory map for FLATMEM")
https://git.kernel.org/cgit/linux/kernel/git/akpm/mm.git mm-stable

in testcase: boot

config: i386-randconfig-062-20250319
compiler: clang-20
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G

(please refer to attached dmesg/kmsg for entire log/backtrace)


+------------------------------------------+------------+------------+
|                                          | d319c8b491 | 8268af309d |
+------------------------------------------+------------+------------+
| boot_successes                           | 6          | 0          |
| boot_failures                            | 0          | 6          |
| kernel_BUG_at_include/linux/page-flags.h | 0          | 6          |
| Oops:invalid_opcode:#[##]PREEMPT_SMP     | 0          | 6          |
| EIP:reserve_bootmem_region               | 0          | 6          |
| Kernel_panic-not_syncing:Fatal_exception | 0          | 6          |
+------------------------------------------+------------+------------+


If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@intel.com>
| Closes: https://lore.kernel.org/oe-lkp/202503241424.d16223ec-lkp@intel.com


[    0.478410][    T0] ------------[ cut here ]------------
[    0.478822][    T0] kernel BUG at include/linux/page-flags.h:536!
[    0.479312][    T0] Oops: invalid opcode: 0000 [#1] PREEMPT SMP
[    0.479768][    T0] CPU: 0 UID: 0 PID: 0 Comm: swapper Not tainted 6.14.0-rc6-00357-g8268af309d07 #1
[    0.480470][    T0] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
[ 0.481260][ T0] EIP: reserve_bootmem_region (include/linux/page-flags.h:536) 
[ 0.481683][ T0] Code: 5d c3 01 f1 89 c8 ba e1 38 f4 c3 e8 1e 37 8e fc 0f 0b b8 90 e2 62 c4 e8 e2 05 5e fc 01 f1 89 c8 ba be 85 f7 c3 e8 04 37 8e fc <0f> 0b b8 80 e2 62 c4 e8 c8 05 5e fc 55 89 e5 53 57 56 83 ec 10 89
All code
========
   0:	5d                   	pop    %rbp
   1:	c3                   	ret
   2:	01 f1                	add    %esi,%ecx
   4:	89 c8                	mov    %ecx,%eax
   6:	ba e1 38 f4 c3       	mov    $0xc3f438e1,%edx
   b:	e8 1e 37 8e fc       	call   0xfffffffffc8e372e
  10:	0f 0b                	ud2
  12:	b8 90 e2 62 c4       	mov    $0xc462e290,%eax
  17:	e8 e2 05 5e fc       	call   0xfffffffffc5e05fe
  1c:	01 f1                	add    %esi,%ecx
  1e:	89 c8                	mov    %ecx,%eax
  20:	ba be 85 f7 c3       	mov    $0xc3f785be,%edx
  25:	e8 04 37 8e fc       	call   0xfffffffffc8e372e
  2a:*	0f 0b                	ud2		<-- trapping instruction
  2c:	b8 80 e2 62 c4       	mov    $0xc462e280,%eax
  31:	e8 c8 05 5e fc       	call   0xfffffffffc5e05fe
  36:	55                   	push   %rbp
  37:	89 e5                	mov    %esp,%ebp
  39:	53                   	push   %rbx
  3a:	57                   	push   %rdi
  3b:	56                   	push   %rsi
  3c:	83 ec 10             	sub    $0x10,%esp
  3f:	89                   	.byte 0x89

Code starting with the faulting instruction
===========================================
   0:	0f 0b                	ud2
   2:	b8 80 e2 62 c4       	mov    $0xc462e280,%eax
   7:	e8 c8 05 5e fc       	call   0xfffffffffc5e05d4
   c:	55                   	push   %rbp
   d:	89 e5                	mov    %esp,%ebp
   f:	53                   	push   %rbx
  10:	57                   	push   %rdi
  11:	56                   	push   %rsi
  12:	83 ec 10             	sub    $0x10,%esp
  15:	89                   	.byte 0x89
[    0.483177][    T0] EAX: 00000000 EBX: c425df50 ECX: 00000000 EDX: 00000000
[    0.483712][    T0] ESI: 017ffc00 EDI: ffffffff EBP: c425df34 ESP: c425df2c
[    0.484248][    T0] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00210046
[    0.484846][    T0] CR0: 80050033 CR2: 00000000 CR3: 04b48000 CR4: 00000090
[    0.485376][    T0] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[    0.485907][    T0] DR6: fffe0ff0 DR7: 00000400
[    0.486253][    T0] Call Trace:
[ 0.486494][ T0] ? __die_body (arch/x86/kernel/dumpstack.c:478) 
[ 0.486822][ T0] ? die (arch/x86/kernel/dumpstack.c:?) 
[ 0.487099][ T0] ? do_trap (arch/x86/kernel/traps.c:? arch/x86/kernel/traps.c:197) 
[ 0.487409][ T0] ? do_error_trap (arch/x86/kernel/traps.c:217) 
[ 0.487752][ T0] ? reserve_bootmem_region (include/linux/page-flags.h:536) 
[ 0.488153][ T0] ? exc_overflow (arch/x86/kernel/traps.c:301) 
[ 0.488490][ T0] ? handle_invalid_op (arch/x86/kernel/traps.c:254) 
[ 0.488869][ T0] ? reserve_bootmem_region (include/linux/page-flags.h:536) 
[ 0.489271][ T0] ? exc_invalid_op (arch/x86/kernel/traps.c:316) 
[ 0.489619][ T0] ? handle_exception (arch/x86/entry/entry_32.S:1055) 
[ 0.489996][ T0] ? exc_overflow (arch/x86/kernel/traps.c:301) 
[ 0.490332][ T0] ? reserve_bootmem_region (include/linux/page-flags.h:536) 
[ 0.490733][ T0] ? exc_overflow (arch/x86/kernel/traps.c:301) 
[ 0.491068][ T0] ? reserve_bootmem_region (include/linux/page-flags.h:536) 
[ 0.491470][ T0] memmap_init_reserved_pages (mm/memblock.c:2203) 
[ 0.491887][ T0] free_low_memory_core_early (mm/memblock.c:?) 
[ 0.492302][ T0] memblock_free_all (mm/memblock.c:2272 include/linux/atomic/atomic-arch-fallback.h:546 include/linux/atomic/atomic-long.h:123 include/linux/atomic/atomic-instrumented.h:3261 include/linux/mm.h:67 mm/memblock.c:2273) 
[ 0.492659][ T0] mem_init (arch/x86/mm/init_32.c:735) 
[ 0.492952][ T0] mm_core_init (mm/mm_init.c:2730) 
[ 0.493271][ T0] start_kernel (init/main.c:958) 
[ 0.493604][ T0] i386_start_kernel (arch/x86/kernel/head32.c:79) 
[ 0.493969][ T0] startup_32_smp (arch/x86/kernel/head_32.S:292) 
[    0.494317][    T0] Modules linked in:
[    0.494604][    T0] ---[ end trace 0000000000000000 ]---
[ 0.495009][ T0] EIP: reserve_bootmem_region (include/linux/page-flags.h:536) 
[ 0.495422][ T0] Code: 5d c3 01 f1 89 c8 ba e1 38 f4 c3 e8 1e 37 8e fc 0f 0b b8 90 e2 62 c4 e8 e2 05 5e fc 01 f1 89 c8 ba be 85 f7 c3 e8 04 37 8e fc <0f> 0b b8 80 e2 62 c4 e8 c8 05 5e fc 55 89 e5 53 57 56 83 ec 10 89
All code
========
   0:	5d                   	pop    %rbp
   1:	c3                   	ret
   2:	01 f1                	add    %esi,%ecx
   4:	89 c8                	mov    %ecx,%eax
   6:	ba e1 38 f4 c3       	mov    $0xc3f438e1,%edx
   b:	e8 1e 37 8e fc       	call   0xfffffffffc8e372e
  10:	0f 0b                	ud2
  12:	b8 90 e2 62 c4       	mov    $0xc462e290,%eax
  17:	e8 e2 05 5e fc       	call   0xfffffffffc5e05fe
  1c:	01 f1                	add    %esi,%ecx
  1e:	89 c8                	mov    %ecx,%eax
  20:	ba be 85 f7 c3       	mov    $0xc3f785be,%edx
  25:	e8 04 37 8e fc       	call   0xfffffffffc8e372e
  2a:*	0f 0b                	ud2		<-- trapping instruction
  2c:	b8 80 e2 62 c4       	mov    $0xc462e280,%eax
  31:	e8 c8 05 5e fc       	call   0xfffffffffc5e05fe
  36:	55                   	push   %rbp
  37:	89 e5                	mov    %esp,%ebp
  39:	53                   	push   %rbx
  3a:	57                   	push   %rdi
  3b:	56                   	push   %rsi
  3c:	83 ec 10             	sub    $0x10,%esp
  3f:	89                   	.byte 0x89

Code starting with the faulting instruction
===========================================
   0:	0f 0b                	ud2
   2:	b8 80 e2 62 c4       	mov    $0xc462e280,%eax
   7:	e8 c8 05 5e fc       	call   0xfffffffffc5e05d4
   c:	55                   	push   %rbp
   d:	89 e5                	mov    %esp,%ebp
   f:	53                   	push   %rbx
  10:	57                   	push   %rdi
  11:	56                   	push   %rsi
  12:	83 ec 10             	sub    $0x10,%esp
  15:	89                   	.byte 0x89


The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20250324/202503241424.d16223ec-lkp@intel.com



-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki


^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2025-03-24  6:15 UTC | newest]

Thread overview: (only message) (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-03-24  6:14 [akpm-mm:mm-stable] [arch, mm] 8268af309d: kernel_BUG_at_include/linux/page-flags.h kernel test robot

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).