From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933124AbcA3R6h (ORCPT ); Sat, 30 Jan 2016 12:58:37 -0500 Received: from arcturus.aphlor.org ([188.246.204.175]:36900 "EHLO arcturus.aphlor.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932420AbcA3R6e (ORCPT ); Sat, 30 Jan 2016 12:58:34 -0500 Date: Sat, 30 Jan 2016 12:58:31 -0500 From: Dave Jones To: linux-mm@kvack.org Cc: Linux Kernel Subject: 4.5-rc1: mm/gup.c warning when writing to /proc/self/mem Message-ID: <20160130175831.GA30571@codemonkey.org.uk> Mail-Followup-To: Dave Jones , linux-mm@kvack.org, Linux Kernel MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.24 (2015-08-30) X-Spam-Score: -2.9 (--) X-Spam-Report: Spam detection software, running on the system "arcturus.aphlor.org", has NOT identified this incoming email as spam. The original message has been attached to this so you can view it or label similar future email. If you have any questions, see the administrator of that system for details. Content preview: Hit this overnight. Just started seeing this after I added "create mmap's of fd's we open()'d" to trinity. Dave WARNING: CPU: 1 PID: 16733 at mm/gup.c:434 __get_user_pages+0x5f9/0x990() CPU: 1 PID: 16733 Comm: trinity-c30 Tainted: G W 4.5.0-rc1-think+ #12 0000000000000009 000000006648ff5c ffff88000f0779a0 ffffffff99565971 [ cut here ] WARNING: CPU: 0 PID: 16731 at mm/gup.c:434 __get_user_pages+0x5f9/0x990() 0000000000000000 ffff88000f0779e0 ffffffff990b168f ffffffff992aba69 ffff880450cf1000 0000000000000000 ffff88023780e600 0000000000000017 Call Trace: [] dump_stack+0x4e/0x7d [] warn_slowpath_common+0x9f/0xe0 [] ? __get_user_pages+0x5f9/0x990 [] warn_slowpath_null+0x1a/0x20 [] __get_user_pages+0x5f9/0x990 [] ? follow_page_mask+0x530/0x530 [] ? __access_remote_vm+0xca/0x340 [] get_user_pages+0x52/0x60 [] __access_remote_vm+0x190/0x340 [] ? preempt_count_sub+0xc1/0x120 [] ? __might_fault+0xf0/0xf0 [] ? __might_fault+0x87/0xf0 [] access_remote_vm+0x1f/0x30 [] mem_rw.isra.15+0xe3/0x1d0 [] mem_write+0x43/0x50 [] __vfs_write+0xdd/0x260 [] ? __vfs_read+0x260/0x260 [] ? mutex_lock_nested+0x38b/0x590 [] ? __lock_is_held+0x92/0xd0 [] ? preempt_count_sub+0xc1/0x120 [] ? update_fast_ctr+0x65/0x90 [] ? percpu_down_read+0x57/0xa0 [] ? __sb_start_write+0xb4/0xf0 [] vfs_write+0xf6/0x260 [] SyS_write+0xbf/0x160 [] ? SyS_read+0x160/0x160 [] ? trace_hardirqs_on_thunk+0x17/0x19 [] entry_SYSCALL_64_fastpath+0x12/0x6b CPU: 0 PID: 16731 Comm: trinity-c28 Tainted: G W 4.5.0-rc1-think+ #12 0000000000000009 000000002962eec9 ffff8802e7b7f8d8 ffffffff99565971 0000000000000000 ffff8802e7b7f918 ffffffff990b168f ffffffff992aba69 [...] Content analysis details: (-2.9 points, 5.0 required) pts rule name description ---- ---------------------- -------------------------------------------------- -1.0 ALL_TRUSTED Passed through trusted hosts only via SMTP -1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1% [score: 0.0000] Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hit this overnight. Just started seeing this after I added "create mmap's of fd's we open()'d" to trinity. Dave WARNING: CPU: 1 PID: 16733 at mm/gup.c:434 __get_user_pages+0x5f9/0x990() CPU: 1 PID: 16733 Comm: trinity-c30 Tainted: G W 4.5.0-rc1-think+ #12 0000000000000009 000000006648ff5c ffff88000f0779a0 ffffffff99565971 ------------[ cut here ]------------ WARNING: CPU: 0 PID: 16731 at mm/gup.c:434 __get_user_pages+0x5f9/0x990() 0000000000000000 ffff88000f0779e0 ffffffff990b168f ffffffff992aba69 ffff880450cf1000 0000000000000000 ffff88023780e600 0000000000000017 Call Trace: [] dump_stack+0x4e/0x7d [] warn_slowpath_common+0x9f/0xe0 [] ? __get_user_pages+0x5f9/0x990 [] warn_slowpath_null+0x1a/0x20 [] __get_user_pages+0x5f9/0x990 [] ? follow_page_mask+0x530/0x530 [] ? __access_remote_vm+0xca/0x340 [] get_user_pages+0x52/0x60 [] __access_remote_vm+0x190/0x340 [] ? preempt_count_sub+0xc1/0x120 [] ? __might_fault+0xf0/0xf0 [] ? __might_fault+0x87/0xf0 [] access_remote_vm+0x1f/0x30 [] mem_rw.isra.15+0xe3/0x1d0 [] mem_write+0x43/0x50 [] __vfs_write+0xdd/0x260 [] ? __vfs_read+0x260/0x260 [] ? mutex_lock_nested+0x38b/0x590 [] ? __lock_is_held+0x92/0xd0 [] ? preempt_count_sub+0xc1/0x120 [] ? update_fast_ctr+0x65/0x90 [] ? percpu_down_read+0x57/0xa0 [] ? __sb_start_write+0xb4/0xf0 [] vfs_write+0xf6/0x260 [] SyS_write+0xbf/0x160 [] ? SyS_read+0x160/0x160 [] ? trace_hardirqs_on_thunk+0x17/0x19 [] entry_SYSCALL_64_fastpath+0x12/0x6b CPU: 0 PID: 16731 Comm: trinity-c28 Tainted: G W 4.5.0-rc1-think+ #12 0000000000000009 000000002962eec9 ffff8802e7b7f8d8 ffffffff99565971 0000000000000000 ffff8802e7b7f918 ffffffff990b168f ffffffff992aba69 ffff8803ed6f1000 00000000000000a0 ffff88023780e600 0000000000000017 Call Trace: [] dump_stack+0x4e/0x7d [] warn_slowpath_common+0x9f/0xe0 [] ? __get_user_pages+0x5f9/0x990 [] warn_slowpath_null+0x1a/0x20 [] __get_user_pages+0x5f9/0x990 [] ? native_sched_clock+0x69/0x160 [] ? follow_page_mask+0x530/0x530 [] ? __access_remote_vm+0xca/0x340 [] get_user_pages+0x52/0x60 [] __access_remote_vm+0x190/0x340 [] ? preempt_count_sub+0xc1/0x120 [] ? __might_fault+0xf0/0xf0 [] ? __might_fault+0x87/0xf0 [] access_remote_vm+0x1f/0x30 [] mem_rw.isra.15+0xe3/0x1d0 [] mem_write+0x43/0x50 [] do_loop_readv_writev+0xe0/0x110 [] ? mem_rw.isra.15+0x1d0/0x1d0 [] do_readv_writev+0x38b/0x3c0 [] ? trace_hardirqs_off_caller+0x70/0x110 [] ? mem_rw.isra.15+0x1d0/0x1d0 [] ? vfs_write+0x260/0x260 [] ? debug_smp_processor_id+0x17/0x20 [] ? preempt_count_sub+0xc1/0x120 [] ? __lock_is_held+0x25/0xd0 [] ? mark_held_locks+0x23/0xc0 [] ? context_tracking_exit.part.5+0x2a/0x50 [] ? trace_hardirqs_on_caller+0x186/0x280 [] ? trace_hardirqs_on+0xd/0x10 [] vfs_writev+0x59/0x70 [] SyS_pwritev+0x15d/0x180 [] ? SyS_preadv+0x180/0x180 [] ? trace_hardirqs_on_thunk+0x17/0x19 [] entry_SYSCALL_64_fastpath+0x12/0x6b ---[ end trace 96115a52264cceaf ]--- ---[ end trace 96115a52264cceb0 ]---