Hi Matthew,
On Fri, 13 Jan 2023 at 19:32, Matthew Wilcox willy@infradead.org wrote:
On Fri, Jan 13, 2023 at 06:53:01PM +0530, Naresh Kamboju wrote:
Linux next tag 20230113 boot failed on x86_64, arm64, arm and i386.
Why are you still not running these stack dumps through scripts/decode_stacktrace.sh ? That seems like it's much easier for you to do than expecting everybody who might be interested in investigating your reports to pull down enough of the build artifacts to make it work.
Hope this will help you.
# ./scripts/decode_stacktrace.sh vmlinux < input.txt > output.txt
stack dumps: ------------------ [ 15.945626] BUG: kernel NULL pointer dereference, address: 0000000000000008 [ 15.952588] #PF: supervisor read access in kernel mode [ 15.957720] #PF: error_code(0x0000) - not-present page [ 15.962850] PGD 8000000103213067 P4D 8000000103213067 PUD 103212067 PMD 0 [ 15.969724] Oops: 0000 [#1] PREEMPT SMP PTI [ 15.973909] CPU: 3 PID: 1 Comm: init Not tainted 6.2.0-rc3-next-20230113 #1 [ 15.980869] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS 2.0b 07/27/2017 [ 15.988336] RIP: 0010:do_wp_page (memory.c:?) [ 15.992611] Code: 83 ea 01 49 89 d7 48 85 d2 0f 85 00 ff ff ff 49 8b 7c 24 60 e8 0b f2 e9 00 41 8b 44 24 28 4d 8b 74 24 50 4d 8b 2c 24 89 45 88 <49> 8b 46 08 49 8b 5d 10 a8 01 0f 85 78 02 00 00 0f 1f 44 00 00 4c All code ======== 0: 83 ea 01 sub $0x1,%edx 3: 49 89 d7 mov %rdx,%r15 6: 48 85 d2 test %rdx,%rdx 9: 0f 85 00 ff ff ff jne 0xffffffffffffff0f f: 49 8b 7c 24 60 mov 0x60(%r12),%rdi 14: e8 0b f2 e9 00 callq 0xe9f224 19: 41 8b 44 24 28 mov 0x28(%r12),%eax 1e: 4d 8b 74 24 50 mov 0x50(%r12),%r14 23: 4d 8b 2c 24 mov (%r12),%r13 27: 89 45 88 mov %eax,-0x78(%rbp) 2a:* 49 8b 46 08 mov 0x8(%r14),%rax <-- trapping instruction 2e: 49 8b 5d 10 mov 0x10(%r13),%rbx 32: a8 01 test $0x1,%al 34: 0f 85 78 02 00 00 jne 0x2b2 3a: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 3f: 4c rex.WR
Code starting with the faulting instruction =========================================== 0: 49 8b 46 08 mov 0x8(%r14),%rax 4: 49 8b 5d 10 mov 0x10(%r13),%rbx 8: a8 01 test $0x1,%al a: 0f 85 78 02 00 00 jne 0x288 10: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 15: 4c rex.WR [ 16.011356] RSP: 0000:ffffb3f640027d18 EFLAGS: 00010286 [ 16.016583] RAX: 0000000000000a55 RBX: 0400000000000080 RCX: 0000000000000000 [ 16.023715] RDX: 0000000000000000 RSI: ffffffff8d3d2bd5 RDI: ffffffff8e271dfa [ 16.030838] RBP: ffffb3f640027db0 R08: 8000000432ee9225 R09: ffff8ac3431e3100 [ 16.037962] R10: 0000000000000000 R11: 00007fe169f2f598 R12: ffffb3f640027de0 [ 16.045087] R13: ffff8ac3431e2000 R14: 0000000000000000 R15: 0400000000000000 [ 16.052211] FS: 00007fe16973e800(0000) GS:ffff8ac69fd80000(0000) knlGS:0000000000000000 [ 16.060319] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 16.066060] CR2: 0000000000000008 CR3: 00000001008d4002 CR4: 00000000003706e0 [ 16.073183] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 16.080322] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 16.087446] Call Trace: [ 16.089893] <TASK> [ 16.091991] ? trace_preempt_off (??:?) [ 16.096087] ? __handle_mm_fault (memory.c:?) [ 16.100439] __handle_mm_fault (memory.c:?) [ 16.104617] handle_mm_fault (??:?) [ 16.108457] do_user_addr_fault (fault.c:?) [ 16.112642] exc_page_fault (??:?) [ 16.116394] asm_exc_page_fault (??:?) [ 16.120408] RIP: 0033:0x7fe169dbf31e [ 16.123986] Code: ba ff ff ff ff 0f 9f c0 0f b6 c0 0f 4c c2 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 41 54 31 c0 ba ff ff ff ff 53 48 83 ec 08 <f0> 0f b1 15 72 02 17 00 83 f8 ff 74 35 41 89 c4 85 c0 75 21 31 c0 All code ======== 0: ba ff ff ff ff mov $0xffffffff,%edx 5: 0f 9f c0 setg %al 8: 0f b6 c0 movzbl %al,%eax b: 0f 4c c2 cmovl %edx,%eax e: c3 retq f: 66 2e 0f 1f 84 00 00 nopw %cs:0x0(%rax,%rax,1) 16: 00 00 00 19: 0f 1f 00 nopl (%rax) 1c: 41 54 push %r12 1e: 31 c0 xor %eax,%eax 20: ba ff ff ff ff mov $0xffffffff,%edx 25: 53 push %rbx 26: 48 83 ec 08 sub $0x8,%rsp 2a:* f0 0f b1 15 72 02 17 lock cmpxchg %edx,0x170272(%rip) # 0x1702a4 <-- trapping instruction 31: 00 32: 83 f8 ff cmp $0xffffffff,%eax 35: 74 35 je 0x6c 37: 41 89 c4 mov %eax,%r12d 3a: 85 c0 test %eax,%eax 3c: 75 21 jne 0x5f 3e: 31 c0 xor %eax,%eax
Code starting with the faulting instruction =========================================== 0: f0 0f b1 15 72 02 17 lock cmpxchg %edx,0x170272(%rip) # 0x17027a 7: 00 8: 83 f8 ff cmp $0xffffffff,%eax b: 74 35 je 0x42 d: 41 89 c4 mov %eax,%r12d 10: 85 c0 test %eax,%eax 12: 75 21 jne 0x35 14: 31 c0 xor %eax,%eax [ 16.142724] RSP: 002b:00007ffcd0edec80 EFLAGS: 00010202 [ 16.147948] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000555bd8 [ 16.155074] RDX: 00000000ffffffff RSI: 00007ffcd0edefa8 RDI: 0000000000000001 [ 16.162198] RBP: 00007ffcd0edefa8 R08: 00007fe169bc5a10 R09: 00007fe169f37a10 [ 16.169319] R10: 00007fe169adf3ee R11: 0000000000000246 R12: 00007ffcd0edefa8 [ 16.176445] R13: 000000000041b9a0 R14: 0000000000555bd8 R15: 00007fe169f69000 [ 16.183569] </TASK> [ 16.185752] Modules linked in: [ 16.188803] CR2: 0000000000000008 [ 16.192114] ---[ end trace 0000000000000000 ]---
ref: https://lore.kernel.org/linux-next/CA+G9fYt_b04YNCCv-iTZTtwb5fmNEQ0abiO46qW_...
- Naresh