Greeting, FYI, we noticed the following commit (built with gcc-9): commit: 9d65c2929f9659438963254f1f96af2e91021b21 ("[PATCH] x86/PCI: Conditionally add a non-e820 mapped window to root bridge") url: https://github.com/0day-ci/linux/commits/Hui-Wang/x86-PCI-Conditionally-add-a-non-e820-mapped-window-to-root-bridge/20210624-175600 base: https://git.kernel.org/cgit/linux/kernel/git/helgaas/pci.git next in testcase: will-it-scale version: will-it-scale-x86_64-a34a85c-1_20210620 with following parameters: nr_task: 16 mode: thread test: pwrite1 cpufreq_governor: performance ucode: 0x16 test-description: Will It Scale takes a testcase and runs it from 1 through to n parallel copies to see if the testcase will scale. It builds both a process and threads based test in order to see any differences between the two. test-url: https://github.com/antonblanchard/will-it-scale on test machine: 144 threads 4 sockets Intel(R) Xeon(R) CPU E7-8890 v3 @ 2.50GHz with 512G memory caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace): If you fix the issue, kindly add following tag Reported-by: kernel test robot [ 10.903693] BUG: unable to handle page fault for address: 0000000700000006 [ 10.904665] #PF: supervisor read access in kernel mode [ 10.904665] #PF: error_code(0x0000) - not-present page [ 10.904665] PGD 0 P4D 0 [ 10.904665] Oops: 0000 [#1] SMP PTI [ 10.904665] CPU: 77 PID: 1 Comm: swapper/0 Not tainted 5.13.0-rc1-00050-g9d65c2929f96 #1 [ 10.904665] Hardware name: Intel Corporation BRICKLAND/BRICKLAND, BIOS BRHSXSD1.86B.0067.R02.1507221722 07/22/2015 [ 10.904665] RIP: 0010:iomem_map_sanity_check (kernel/resource.c:1675) [ 10.904665] Code: b5 5a 83 53 49 01 ee 48 89 eb 4d 8d 6e ff 48 c1 eb 0c 4d 89 ec e8 50 9d c0 00 48 8b 3d 21 72 75 01 49 c1 ec 0c 48 85 ff 74 3e <48> 8b 07 4c 39 f0 73 25 48 8b 57 08 48 39 ea 72 1c 48 c1 e8 0c 48 All code ======== 0: b5 5a mov $0x5a,%ch 2: 83 53 49 01 adcl $0x1,0x49(%rbx) 6: ee out %al,(%dx) 7: 48 89 eb mov %rbp,%rbx a: 4d 8d 6e ff lea -0x1(%r14),%r13 e: 48 c1 eb 0c shr $0xc,%rbx 12: 4d 89 ec mov %r13,%r12 15: e8 50 9d c0 00 callq 0xc09d6a 1a: 48 8b 3d 21 72 75 01 mov 0x1757221(%rip),%rdi # 0x1757242 21: 49 c1 ec 0c shr $0xc,%r12 25: 48 85 ff test %rdi,%rdi 28: 74 3e je 0x68 2a:* 48 8b 07 mov (%rdi),%rax <-- trapping instruction 2d: 4c 39 f0 cmp %r14,%rax 30: 73 25 jae 0x57 32: 48 8b 57 08 mov 0x8(%rdi),%rdx 36: 48 39 ea cmp %rbp,%rdx 39: 72 1c jb 0x57 3b: 48 c1 e8 0c shr $0xc,%rax 3f: 48 rex.W Code starting with the faulting instruction =========================================== 0: 48 8b 07 mov (%rdi),%rax 3: 4c 39 f0 cmp %r14,%rax 6: 73 25 jae 0x2d 8: 48 8b 57 08 mov 0x8(%rdi),%rdx c: 48 39 ea cmp %rbp,%rdx f: 72 1c jb 0x2d 11: 48 c1 e8 0c shr $0xc,%rax 15: 48 rex.W [ 10.904665] RSP: 0000:ffffc90000037d50 EFLAGS: 00010206 [ 10.904665] RAX: 0000000700000006 RBX: 0000000000074608 RCX: ffff888100000008 [ 10.904665] RDX: 0000000073becfff RSI: 00000000000033be RDI: 0000000700000006 [ 10.904665] RBP: 0000000074608000 R08: ffff88810e3e4e80 R09: 8000000000000063 [ 10.904665] R10: 0000000000004000 R11: 000000010e4be067 R12: 000000000007460b [ 10.904665] R13: 000000007460b3bd R14: 000000007460b3be R15: ffffffff812b3e6e [ 10.904665] FS: 0000000000000000(0000) GS:ffff889fff9c0000(0000) knlGS:0000000000000000 [ 10.904665] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 10.904665] CR2: 0000000700000006 CR3: 000000807e20a001 CR4: 00000000001706e0 [ 10.904665] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 10.904665] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 10.904665] Call Trace: [ 10.904665] __ioremap_caller (arch/x86/mm/ioremap.c:292) [ 10.904665] memremap (kernel/iomem.c:112) [ 10.904665] dmi_init (drivers/firmware/dmi_scan.c:776) [ 10.904665] ? count_mem_devices (drivers/firmware/dmi_scan.c:755) [ 10.904665] do_one_initcall (init/main.c:1249) [ 10.904665] kernel_init_freeable (init/main.c:1321 init/main.c:1338 init/main.c:1358 init/main.c:1560) [ 10.904665] ? rest_init (init/main.c:1444) [ 10.904665] kernel_init (init/main.c:1449) [ 10.904665] ret_from_fork (arch/x86/entry/entry_64.S:300) [ 10.904665] Modules linked in: [ 10.904665] CR2: 0000000700000006 [ 10.904665] ---[ end trace 72747cfc734ae856 ]--- [ 10.904665] RIP: 0010:iomem_map_sanity_check (kernel/resource.c:1675) [ 10.904665] Code: b5 5a 83 53 49 01 ee 48 89 eb 4d 8d 6e ff 48 c1 eb 0c 4d 89 ec e8 50 9d c0 00 48 8b 3d 21 72 75 01 49 c1 ec 0c 48 85 ff 74 3e <48> 8b 07 4c 39 f0 73 25 48 8b 57 08 48 39 ea 72 1c 48 c1 e8 0c 48 All code ======== 0: b5 5a mov $0x5a,%ch 2: 83 53 49 01 adcl $0x1,0x49(%rbx) 6: ee out %al,(%dx) 7: 48 89 eb mov %rbp,%rbx a: 4d 8d 6e ff lea -0x1(%r14),%r13 e: 48 c1 eb 0c shr $0xc,%rbx 12: 4d 89 ec mov %r13,%r12 15: e8 50 9d c0 00 callq 0xc09d6a 1a: 48 8b 3d 21 72 75 01 mov 0x1757221(%rip),%rdi # 0x1757242 21: 49 c1 ec 0c shr $0xc,%r12 25: 48 85 ff test %rdi,%rdi 28: 74 3e je 0x68 2a:* 48 8b 07 mov (%rdi),%rax <-- trapping instruction 2d: 4c 39 f0 cmp %r14,%rax 30: 73 25 jae 0x57 32: 48 8b 57 08 mov 0x8(%rdi),%rdx 36: 48 39 ea cmp %rbp,%rdx 39: 72 1c jb 0x57 3b: 48 c1 e8 0c shr $0xc,%rax 3f: 48 rex.W Code starting with the faulting instruction =========================================== 0: 48 8b 07 mov (%rdi),%rax 3: 4c 39 f0 cmp %r14,%rax 6: 73 25 jae 0x2d 8: 48 8b 57 08 mov 0x8(%rdi),%rdx c: 48 39 ea cmp %rbp,%rdx f: 72 1c jb 0x2d 11: 48 c1 e8 0c shr $0xc,%rax 15: 48 rex.W To reproduce: git clone https://github.com/intel/lkp-tests.git cd lkp-tests bin/lkp install job.yaml # job file is attached in this email bin/lkp split-job --compatible job.yaml # generate the yaml file for lkp run bin/lkp run generated-yaml-file --- 0DAY/LKP+ Test Infrastructure Open Source Technology Center https://lists.01.org/hyperkitty/list/lkp@lists.01.org Intel Corporation Thanks, Oliver Sang