From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755167AbbIRPNs (ORCPT ); Fri, 18 Sep 2015 11:13:48 -0400 Received: from bh-25.webhostbox.net ([208.91.199.152]:51054 "EHLO bh-25.webhostbox.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754684AbbIRPNj (ORCPT ); Fri, 18 Sep 2015 11:13:39 -0400 Subject: Re: crisv32 runtime failure in -next due to 'page-flags: define behavior SL*B-related flags on compound pages' To: Jesper Nilsson , "Kirill A. Shutemov" References: <55FAEA67.9000102@roeck-us.net> <20150918142507.GA30125@node.dhcp.inet.fi> <20150918145309.GG32685@axis.com> Cc: "linux-next@vger.kernel.org" , "linux-kernel@vger.kernel.org" , "Kirill A. Shutemov" , Andrew Morton , Mikael Starvik , Jesper Nilsson , Minchan Kim , linux-cris-kernel@axis.com From: Guenter Roeck Message-ID: <55FC2A1F.8050207@roeck-us.net> Date: Fri, 18 Sep 2015 08:13:35 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.2.0 MIME-Version: 1.0 In-Reply-To: <20150918145309.GG32685@axis.com> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit X-Authenticated_sender: linux@roeck-us.net X-OutGoing-Spam-Status: No, score=-1.0 X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - bh-25.webhostbox.net X-AntiAbuse: Original Domain - vger.kernel.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - roeck-us.net X-Get-Message-Sender-Via: bh-25.webhostbox.net: authenticated_id: linux@roeck-us.net X-Source: X-Source-Args: X-Source-Dir: Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 09/18/2015 07:53 AM, Jesper Nilsson wrote: > On Fri, Sep 18, 2015 at 05:25:07PM +0300, Kirill A. Shutemov wrote: >> On Thu, Sep 17, 2015 at 09:29:27AM -0700, Guenter Roeck wrote: >>> Hi, >>> >>> my crisv32 qemu test fails with next-20150917 as follows. >>> >>> NET: Registered protocol family 16 >>> kernel BUG at mm/slab.c:1648! >>> Linux 4.3.0-rc1-next-20150917 #1 Wed Sep 16 23:56:59 PDT 2015 >>> Oops: 0000 >>> >>> [ register dump follows ] >>> >>> See http://server.roeck-us.net:8010/builders/qemu-crisv32-next/builds/83/steps/qemubuildcommand/logs/stdio >>> for a complete log. >> >> Is there a chance to get proper backtrace? > > Yes, it should be possible with CONFIG_KALLSYMS=y in the kconfig. > Good to know. I added it to my configuration. Here it is: kernel BUG at mm/slab.c:1648! Linux 4.3.0-rc1-next-20150918 #1 Fri Sep 18 08:07:55 PDT 2015 Oops: 0000 CPU: 0 ERP: c0074c00 SRP: c0074c1e CCS: 00009408 USP: 00000000 MOF: 00000000 r0: 0000002a r1: ffffe000 r2: c000f2ca r3: c0074e40 r4: c0033d00 r5: 0000000a r6: 00000009 r7: 00000100 r8: 0000000a r9: c04a3254 r10: c1e97765 r11: c1fc1282 r12: c04a3240 r13: 00000000 oR10: c1e97765 acr: 00000001 sp: c046458c Data MMU Cause: 00000000 Instruction MMU Cause: 00000000 Process ksoftirqd/0 (pid: 3, stackpage=c1feb3a0) Stack from c1ff3e80: c0004a0e c004ba7c c04645e0 00000000 c04645d8 0000000a c00059e8 00000001 00000000 c046458c 00000000 c0341cfc c004ba7c c0033d00 c0004b52 0000002a ffffe000 c000f2ca c0074e40 c0005898 c0074c1e c1e97765 c0074c1e c0033bd2 Call Trace: [] show_stack+0x0/0x9e [] printk+0x0/0x2c [] show_registers+0x14a/0x1c2 [] printk+0x0/0x2c [] rcu_bh_qs+0x0/0x30 [] die_if_kernel+0x7c/0x9e [] __local_bh_enable_ip+0x0/0xb0 [] kfree+0x0/0x82 [] do_BUG+0x2a/0x30 [] kmem_rcu_free+0x18/0x1e [] kmem_rcu_free+0x18/0x1e [] __rcu_process_callbacks+0x80/0xaa [] __rcu_process_callbacks+0x0/0xaa [] rcu_process_callbacks+0x18/0x2a [] __do_softirq+0xbc/0x1c2 [] kthread_should_stop+0x0/0x18 [] kthread_should_park+0x0/0x18 [] schedule+0x0/0x7c [] run_ksoftirqd+0x22/0x32 [] smpboot_thread_fn+0xe4/0x12c [] smpboot_thread_fn+0x0/0x12c [] __init_waitqueue_head+0x0/0x8 [] kthread+0xb6/0xce [] kthread+0x0/0xce [] ret_from_kernel_thread+0xe/0x14 Code: 2a d6 6d da 87 d3 65 70 b0 05 3e e9 (7f) d2 65 e0 29 d6 84 e2 7e ba 6a c6 ---[ end trace cc289b1d61e6a9a8 ]--- Kernel panic - not syncing: Aiee, killing interrupt handler! CPU: 0 PID: 3 Comm: ksoftirqd/0 Not tainted 4.3.0-rc1-next-20150918 #1 Stack from c1ff3e28: c1feb3a0 0000000b c0341cfc c004ba7c c0033d00 0000000a c0177e2c c004b8fa c1feb3a0 0000000b c0341cfc c004ba7c c0033d00 0000000a 00000009 c000dd54 c0342a14 00000000 00000061 00000000 c046458c 00000000 c0341cfc c004ba7c Call Trace: [] printk+0x0/0x2c [] rcu_bh_qs+0x0/0x30 [] dump_stack+0x1c/0x22 [] panic+0x82/0x19c [] printk+0x0/0x2c [] rcu_bh_qs+0x0/0x30 [] do_exit+0x5e0/0x7da [] printk+0x0/0x2c [] rcu_bh_qs+0x0/0x30 [] printk+0x26/0x2c [] die_if_kernel+0x94/0x9e [] die_if_kernel+0x9c/0x9e [] __local_bh_enable_ip+0x0/0xb0 [] kfree+0x0/0x82 [] do_BUG+0x2a/0x30 [] kmem_rcu_free+0x18/0x1e [] kmem_rcu_free+0x18/0x1e [] __rcu_process_callbacks+0x80/0xaa [] __rcu_process_callbacks+0x0/0xaa [] rcu_process_callbacks+0x18/0x2a [] __do_softirq+0xbc/0x1c2 [] kthread_should_stop+0x0/0x18 [] kthread_should_park+0x0/0x18 [] schedule+0x0/0x7c [] run_ksoftirqd+0x22/0x32 [] smpboot_thread_fn+0xe4/0x12c [] smpboot_thread_fn+0x0/0x12c [] __init_waitqueue_head+0x0/0x8 [] kthread+0xb6/0xce [] kthread+0x0/0xce [] ret_from_kernel_thread+0xe/0x14 ---[ end Kernel panic - not syncing: Aiee, killing interrupt handler! Guenter