On Tue, 10 Dec 2024 15:20:25 +0000 Vincent Donnefort <vdonnef...@google.com> wrote:
> Hi, > > Running v6.12.4, I can trigger the following WARNING Hi Vincent, This is a very old email, but I just found it buried in my inbox ;-) Are you still able to hit this? I just tried, and can't on the latest kernel. -- Steve > > [ 62.374530] WARNING: CPU: 0 PID: 133 at lib/iov_iter.c:344 > copy_page_to_iter+0x44/0x148 > [ 62.375388] Modules linked in: > [ 62.375747] CPU: 0 UID: 0 PID: 133 Comm: grep Tainted: G D 6.12.4 #51 > [ 62.376452] Tainted: [D]=DIE > [ 62.376732] Hardware name: linux,dummy-virt (DT) > [ 62.377147] pstate: 21400005 (nzCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) > [ 62.377794] pc : copy_page_to_iter+0x44/0x148 > [ 62.378196] lr : pipe_read+0x104/0x3d0 > [ 62.378530] sp : ffff800083b7bc00 > [ 62.378816] x29: ffff800083b7bc00 x28: 0000000000001000 x27: > fff00000c21f73c0 > [ 62.379494] x26: ffff800083b7bd60 x25: 0000000000000014 x24: > 0000000000001000 > [ 62.380171] x23: 0000000000000000 x22: fff00000c21f73e0 x21: > 0000000000000015 > [ 62.380891] x20: 0000000000001000 x19: 0000000000000000 x18: > 0000000000000000 > [ 62.381536] x17: 0000000000000000 x16: 0000000000000000 x15: > 0000000000000000 > [ 62.382185] x14: 0000000000000000 x13: 0000000000000000 x12: > 0000000000000000 > [ 62.382831] x11: 0000000000000000 x10: 0000000000000000 x9 : > 0000000000000000 > [ 62.383478] x8 : fff00000c1603400 x7 : 0000000000000000 x6 : > 00000000000000a0 > [ 62.384153] x5 : 0000000000000000 x4 : ffffc1ffc30867c0 x3 : > 0000000000001000 > [ 62.384798] x2 : 000000000000103f x1 : 000000000000003f x0 : > ffffc1ffc30867c0 > [ 62.385441] Call trace: > [ 62.385684] copy_page_to_iter+0x44/0x148 > [ 62.386091] pipe_read+0x104/0x3d0 > [ 62.386413] vfs_read+0x294/0x2fc > [ 62.386728] ksys_read+0xdc/0xf4 > [ 62.387025] __arm64_sys_read+0x1c/0x28 > [ 62.387400] invoke_syscall+0x48/0x110 > [ 62.387759] el0_svc_common.constprop.0+0x40/0xe0 > [ 62.388178] do_el0_svc+0x1c/0x28 > [ 62.388525] el0_svc+0x30/0xd0 > [ 62.388818] el0t_64_sync_handler+0xc0/0xc4 > [ 62.389233] el0t_64_sync+0x190/0x194 > [ 62.389663] ---[ end trace 0000000000000000 ]--- > > With trace_pipe and grep. > > $ cat trace_pipe | grep foo > > and > > $ while true; do echo "foo" > trace_marker; done > > Is that a known problem? Eventually this ends up in a more serious BUG such as > > BUG: Bad page map in process cat pte:72616d5f676e6963 pmd:800000102279003 > > Or. > > Unable to handle kernel paging request at virtual address fff82e2dee2e2d80