Linux Trace Kernel
 help / color / mirror / Atom feed
* [BUG] v6.12.4 copy_page_to_iter WARNING
@ 2024-12-10 15:20 Vincent Donnefort
  2025-05-23 18:45 ` Steven Rostedt
  0 siblings, 1 reply; 2+ messages in thread
From: Vincent Donnefort @ 2024-12-10 15:20 UTC (permalink / raw)
  To: linux-trace-kernel, rostedt, mhiramat

Hi,

Running v6.12.4, I can trigger the following WARNING

[   62.374530] WARNING: CPU: 0 PID: 133 at lib/iov_iter.c:344 copy_page_to_iter+0x44/0x148
[   62.375388] Modules linked in:
[   62.375747] CPU: 0 UID: 0 PID: 133 Comm: grep Tainted: G      D 6.12.4 #51
[   62.376452] Tainted: [D]=DIE
[   62.376732] Hardware name: linux,dummy-virt (DT)
[   62.377147] pstate: 21400005 (nzCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
[   62.377794] pc : copy_page_to_iter+0x44/0x148
[   62.378196] lr : pipe_read+0x104/0x3d0
[   62.378530] sp : ffff800083b7bc00
[   62.378816] x29: ffff800083b7bc00 x28: 0000000000001000 x27: fff00000c21f73c0
[   62.379494] x26: ffff800083b7bd60 x25: 0000000000000014 x24: 0000000000001000
[   62.380171] x23: 0000000000000000 x22: fff00000c21f73e0 x21: 0000000000000015
[   62.380891] x20: 0000000000001000 x19: 0000000000000000 x18: 0000000000000000
[   62.381536] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   62.382185] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[   62.382831] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[   62.383478] x8 : fff00000c1603400 x7 : 0000000000000000 x6 : 00000000000000a0
[   62.384153] x5 : 0000000000000000 x4 : ffffc1ffc30867c0 x3 : 0000000000001000
[   62.384798] x2 : 000000000000103f x1 : 000000000000003f x0 : ffffc1ffc30867c0
[   62.385441] Call trace:
[   62.385684]  copy_page_to_iter+0x44/0x148
[   62.386091]  pipe_read+0x104/0x3d0
[   62.386413]  vfs_read+0x294/0x2fc
[   62.386728]  ksys_read+0xdc/0xf4
[   62.387025]  __arm64_sys_read+0x1c/0x28
[   62.387400]  invoke_syscall+0x48/0x110
[   62.387759]  el0_svc_common.constprop.0+0x40/0xe0
[   62.388178]  do_el0_svc+0x1c/0x28
[   62.388525]  el0_svc+0x30/0xd0
[   62.388818]  el0t_64_sync_handler+0xc0/0xc4
[   62.389233]  el0t_64_sync+0x190/0x194
[   62.389663] ---[ end trace 0000000000000000 ]---                 

With trace_pipe and grep.

 $ cat trace_pipe | grep foo

   and 

 $ while true; do echo "foo" > trace_marker; done

Is that a known problem? Eventually this ends up in a more serious BUG such as

   BUG: Bad page map in process cat  pte:72616d5f676e6963 pmd:800000102279003

Or.

   Unable to handle kernel paging request at virtual address fff82e2dee2e2d80

^ permalink raw reply	[flat|nested] 2+ messages in thread

* Re: [BUG] v6.12.4 copy_page_to_iter WARNING
  2024-12-10 15:20 [BUG] v6.12.4 copy_page_to_iter WARNING Vincent Donnefort
@ 2025-05-23 18:45 ` Steven Rostedt
  0 siblings, 0 replies; 2+ messages in thread
From: Steven Rostedt @ 2025-05-23 18:45 UTC (permalink / raw)
  To: Vincent Donnefort; +Cc: linux-trace-kernel, mhiramat

On Tue, 10 Dec 2024 15:20:25 +0000
Vincent Donnefort <vdonnefort@google.com> wrote:

> Hi,
> 
> Running v6.12.4, I can trigger the following WARNING

Hi Vincent,

This is a very old email, but I just found it buried in my inbox ;-)

Are you still able to hit this? I just tried, and can't on the latest
kernel.

-- Steve

> 
> [   62.374530] WARNING: CPU: 0 PID: 133 at lib/iov_iter.c:344 copy_page_to_iter+0x44/0x148
> [   62.375388] Modules linked in:
> [   62.375747] CPU: 0 UID: 0 PID: 133 Comm: grep Tainted: G      D 6.12.4 #51
> [   62.376452] Tainted: [D]=DIE
> [   62.376732] Hardware name: linux,dummy-virt (DT)
> [   62.377147] pstate: 21400005 (nzCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
> [   62.377794] pc : copy_page_to_iter+0x44/0x148
> [   62.378196] lr : pipe_read+0x104/0x3d0
> [   62.378530] sp : ffff800083b7bc00
> [   62.378816] x29: ffff800083b7bc00 x28: 0000000000001000 x27: fff00000c21f73c0
> [   62.379494] x26: ffff800083b7bd60 x25: 0000000000000014 x24: 0000000000001000
> [   62.380171] x23: 0000000000000000 x22: fff00000c21f73e0 x21: 0000000000000015
> [   62.380891] x20: 0000000000001000 x19: 0000000000000000 x18: 0000000000000000
> [   62.381536] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
> [   62.382185] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
> [   62.382831] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
> [   62.383478] x8 : fff00000c1603400 x7 : 0000000000000000 x6 : 00000000000000a0
> [   62.384153] x5 : 0000000000000000 x4 : ffffc1ffc30867c0 x3 : 0000000000001000
> [   62.384798] x2 : 000000000000103f x1 : 000000000000003f x0 : ffffc1ffc30867c0
> [   62.385441] Call trace:
> [   62.385684]  copy_page_to_iter+0x44/0x148
> [   62.386091]  pipe_read+0x104/0x3d0
> [   62.386413]  vfs_read+0x294/0x2fc
> [   62.386728]  ksys_read+0xdc/0xf4
> [   62.387025]  __arm64_sys_read+0x1c/0x28
> [   62.387400]  invoke_syscall+0x48/0x110
> [   62.387759]  el0_svc_common.constprop.0+0x40/0xe0
> [   62.388178]  do_el0_svc+0x1c/0x28
> [   62.388525]  el0_svc+0x30/0xd0
> [   62.388818]  el0t_64_sync_handler+0xc0/0xc4
> [   62.389233]  el0t_64_sync+0x190/0x194
> [   62.389663] ---[ end trace 0000000000000000 ]---                 
> 
> With trace_pipe and grep.
> 
>  $ cat trace_pipe | grep foo
> 
>    and 
> 
>  $ while true; do echo "foo" > trace_marker; done
> 
> Is that a known problem? Eventually this ends up in a more serious BUG such as
> 
>    BUG: Bad page map in process cat  pte:72616d5f676e6963 pmd:800000102279003
> 
> Or.
> 
>    Unable to handle kernel paging request at virtual address fff82e2dee2e2d80


^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2025-05-23 18:44 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2024-12-10 15:20 [BUG] v6.12.4 copy_page_to_iter WARNING Vincent Donnefort
2025-05-23 18:45 ` Steven Rostedt

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox