2021-06-27 14:38:42

by kernel test robot

[permalink] [raw]
Subject: [x86/PCI] 9d65c2929f: BUG:unable_to_handle_page_fault_for_address



Greeting,

FYI, we noticed the following commit (built with gcc-9):

commit: 9d65c2929f9659438963254f1f96af2e91021b21 ("[PATCH] x86/PCI: Conditionally add a non-e820 mapped window to root bridge")
url: https://github.com/0day-ci/linux/commits/Hui-Wang/x86-PCI-Conditionally-add-a-non-e820-mapped-window-to-root-bridge/20210624-175600
base: https://git.kernel.org/cgit/linux/kernel/git/helgaas/pci.git next

in testcase: will-it-scale
version: will-it-scale-x86_64-a34a85c-1_20210620
with following parameters:

nr_task: 16
mode: thread
test: pwrite1
cpufreq_governor: performance
ucode: 0x16

test-description: Will It Scale takes a testcase and runs it from 1 through to n parallel copies to see if the testcase will scale. It builds both a process and threads based test in order to see any differences between the two.
test-url: https://github.com/antonblanchard/will-it-scale


on test machine: 144 threads 4 sockets Intel(R) Xeon(R) CPU E7-8890 v3 @ 2.50GHz with 512G memory

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):



If you fix the issue, kindly add following tag
Reported-by: kernel test robot <[email protected]>


[ 10.903693] BUG: unable to handle page fault for address: 0000000700000006
[ 10.904665] #PF: supervisor read access in kernel mode
[ 10.904665] #PF: error_code(0x0000) - not-present page
[ 10.904665] PGD 0 P4D 0
[ 10.904665] Oops: 0000 [#1] SMP PTI
[ 10.904665] CPU: 77 PID: 1 Comm: swapper/0 Not tainted 5.13.0-rc1-00050-g9d65c2929f96 #1
[ 10.904665] Hardware name: Intel Corporation BRICKLAND/BRICKLAND, BIOS BRHSXSD1.86B.0067.R02.1507221722 07/22/2015
[ 10.904665] RIP: 0010:iomem_map_sanity_check (kernel/resource.c:1675)
[ 10.904665] Code: b5 5a 83 53 49 01 ee 48 89 eb 4d 8d 6e ff 48 c1 eb 0c 4d 89 ec e8 50 9d c0 00 48 8b 3d 21 72 75 01 49 c1 ec 0c 48 85 ff 74 3e <48> 8b 07 4c 39 f0 73 25 48 8b 57 08 48 39 ea 72 1c 48 c1 e8 0c 48
All code
========
0: b5 5a mov $0x5a,%ch
2: 83 53 49 01 adcl $0x1,0x49(%rbx)
6: ee out %al,(%dx)
7: 48 89 eb mov %rbp,%rbx
a: 4d 8d 6e ff lea -0x1(%r14),%r13
e: 48 c1 eb 0c shr $0xc,%rbx
12: 4d 89 ec mov %r13,%r12
15: e8 50 9d c0 00 callq 0xc09d6a
1a: 48 8b 3d 21 72 75 01 mov 0x1757221(%rip),%rdi # 0x1757242
21: 49 c1 ec 0c shr $0xc,%r12
25: 48 85 ff test %rdi,%rdi
28: 74 3e je 0x68
2a:* 48 8b 07 mov (%rdi),%rax <-- trapping instruction
2d: 4c 39 f0 cmp %r14,%rax
30: 73 25 jae 0x57
32: 48 8b 57 08 mov 0x8(%rdi),%rdx
36: 48 39 ea cmp %rbp,%rdx
39: 72 1c jb 0x57
3b: 48 c1 e8 0c shr $0xc,%rax
3f: 48 rex.W

Code starting with the faulting instruction
===========================================
0: 48 8b 07 mov (%rdi),%rax
3: 4c 39 f0 cmp %r14,%rax
6: 73 25 jae 0x2d
8: 48 8b 57 08 mov 0x8(%rdi),%rdx
c: 48 39 ea cmp %rbp,%rdx
f: 72 1c jb 0x2d
11: 48 c1 e8 0c shr $0xc,%rax
15: 48 rex.W
[ 10.904665] RSP: 0000:ffffc90000037d50 EFLAGS: 00010206
[ 10.904665] RAX: 0000000700000006 RBX: 0000000000074608 RCX: ffff888100000008
[ 10.904665] RDX: 0000000073becfff RSI: 00000000000033be RDI: 0000000700000006
[ 10.904665] RBP: 0000000074608000 R08: ffff88810e3e4e80 R09: 8000000000000063
[ 10.904665] R10: 0000000000004000 R11: 000000010e4be067 R12: 000000000007460b
[ 10.904665] R13: 000000007460b3bd R14: 000000007460b3be R15: ffffffff812b3e6e
[ 10.904665] FS: 0000000000000000(0000) GS:ffff889fff9c0000(0000) knlGS:0000000000000000
[ 10.904665] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 10.904665] CR2: 0000000700000006 CR3: 000000807e20a001 CR4: 00000000001706e0
[ 10.904665] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 10.904665] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 10.904665] Call Trace:
[ 10.904665] __ioremap_caller (arch/x86/mm/ioremap.c:292)
[ 10.904665] memremap (kernel/iomem.c:112)
[ 10.904665] dmi_init (drivers/firmware/dmi_scan.c:776)
[ 10.904665] ? count_mem_devices (drivers/firmware/dmi_scan.c:755)
[ 10.904665] do_one_initcall (init/main.c:1249)
[ 10.904665] kernel_init_freeable (init/main.c:1321 init/main.c:1338 init/main.c:1358 init/main.c:1560)
[ 10.904665] ? rest_init (init/main.c:1444)
[ 10.904665] kernel_init (init/main.c:1449)
[ 10.904665] ret_from_fork (arch/x86/entry/entry_64.S:300)
[ 10.904665] Modules linked in:
[ 10.904665] CR2: 0000000700000006
[ 10.904665] ---[ end trace 72747cfc734ae856 ]---
[ 10.904665] RIP: 0010:iomem_map_sanity_check (kernel/resource.c:1675)
[ 10.904665] Code: b5 5a 83 53 49 01 ee 48 89 eb 4d 8d 6e ff 48 c1 eb 0c 4d 89 ec e8 50 9d c0 00 48 8b 3d 21 72 75 01 49 c1 ec 0c 48 85 ff 74 3e <48> 8b 07 4c 39 f0 73 25 48 8b 57 08 48 39 ea 72 1c 48 c1 e8 0c 48
All code
========
0: b5 5a mov $0x5a,%ch
2: 83 53 49 01 adcl $0x1,0x49(%rbx)
6: ee out %al,(%dx)
7: 48 89 eb mov %rbp,%rbx
a: 4d 8d 6e ff lea -0x1(%r14),%r13
e: 48 c1 eb 0c shr $0xc,%rbx
12: 4d 89 ec mov %r13,%r12
15: e8 50 9d c0 00 callq 0xc09d6a
1a: 48 8b 3d 21 72 75 01 mov 0x1757221(%rip),%rdi # 0x1757242
21: 49 c1 ec 0c shr $0xc,%r12
25: 48 85 ff test %rdi,%rdi
28: 74 3e je 0x68
2a:* 48 8b 07 mov (%rdi),%rax <-- trapping instruction
2d: 4c 39 f0 cmp %r14,%rax
30: 73 25 jae 0x57
32: 48 8b 57 08 mov 0x8(%rdi),%rdx
36: 48 39 ea cmp %rbp,%rdx
39: 72 1c jb 0x57
3b: 48 c1 e8 0c shr $0xc,%rax
3f: 48 rex.W

Code starting with the faulting instruction
===========================================
0: 48 8b 07 mov (%rdi),%rax
3: 4c 39 f0 cmp %r14,%rax
6: 73 25 jae 0x2d
8: 48 8b 57 08 mov 0x8(%rdi),%rdx
c: 48 39 ea cmp %rbp,%rdx
f: 72 1c jb 0x2d
11: 48 c1 e8 0c shr $0xc,%rax
15: 48 rex.W


To reproduce:

git clone https://github.com/intel/lkp-tests.git
cd lkp-tests
bin/lkp install job.yaml # job file is attached in this email
bin/lkp split-job --compatible job.yaml # generate the yaml file for lkp run
bin/lkp run generated-yaml-file



---
0DAY/LKP+ Test Infrastructure Open Source Technology Center
https://lists.01.org/hyperkitty/list/[email protected] Intel Corporation

Thanks,
Oliver Sang


Attachments:
(No filename) (7.09 kB)
config-5.13.0-rc1-00050-g9d65c2929f96 (176.78 kB)
job-script (8.33 kB)
dmesg.xz (14.98 kB)
job.yaml (5.29 kB)
Download all attachments