Hello, kernel test robot noticed "WARNING:at_mm/slab_common.c:#kmem_cache_sanity_check" on: commit: 75b56e556ea415e29a13a8b7e98d302fbbec4c01 ("cephsan new logger") https://github.com/ceph/ceph-client.git tls_logger in testcase: trinity version: with following parameters: runtime: 300s group: group-03 nr_groups: 5 config: x86_64-randconfig-072-20250331 compiler: gcc-12 test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G (please refer to attached dmesg/kmsg for entire log/backtrace) +------------------------------------------------------+------------+------------+ | | 7ef17a7413 | 75b56e556e | +------------------------------------------------------+------------+------------+ | WARNING:at_mm/slab_common.c:#kmem_cache_sanity_check | 0 | 12 | | RIP:kmem_cache_sanity_check | 0 | 12 | +------------------------------------------------------+------------+------------+ If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot <oliver.sang@xxxxxxxxx> | Closes: https://lore.kernel.org/oe-lkp/202504021147.a27c3dc8-lkp@xxxxxxxxx [ 52.283971][ T1] ------------[ cut here ]------------ [ 52.284905][ T1] kmem_cache of name 'ceph_san_magazine' already exists [ 52.286061][ T1] WARNING: CPU: 1 PID: 1 at mm/slab_common.c:107 kmem_cache_sanity_check (mm/slab_common.c:107 (discriminator 1)) [ 52.287476][ T1] Modules linked in: [ 52.288056][ T1] CPU: 1 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.13.0-rc7-00021-g75b56e556ea4 #1 [ 52.289426][ T1] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 [ 52.291004][ T1] RIP: 0010:kmem_cache_sanity_check (mm/slab_common.c:107 (discriminator 1)) [ 52.292069][ T1] Code: b6 dd 31 c9 31 d2 89 de 48 c7 c7 c8 a5 1a 89 e8 f0 71 d2 ff 45 84 ed 74 15 90 48 c7 c7 31 cc 1f 87 4c 89 e6 e8 85 d5 9f ff 90 <0f> 0b 90 90 31 c9 31 d2 89 de 48 c7 c7 98 a5 1a 89 e8 c4 71 d2 ff All code ======== 0: b6 dd mov $0xdd,%dh 2: 31 c9 xor %ecx,%ecx 4: 31 d2 xor %edx,%edx 6: 89 de mov %ebx,%esi 8: 48 c7 c7 c8 a5 1a 89 mov $0xffffffff891aa5c8,%rdi f: e8 f0 71 d2 ff call 0xffffffffffd27204 14: 45 84 ed test %r13b,%r13b 17: 74 15 je 0x2e 19: 90 nop 1a: 48 c7 c7 31 cc 1f 87 mov $0xffffffff871fcc31,%rdi 21: 4c 89 e6 mov %r12,%rsi 24: e8 85 d5 9f ff call 0xffffffffff9fd5ae 29: 90 nop 2a:* 0f 0b ud2 <-- trapping instruction 2c: 90 nop 2d: 90 nop 2e: 31 c9 xor %ecx,%ecx 30: 31 d2 xor %edx,%edx 32: 89 de mov %ebx,%esi 34: 48 c7 c7 98 a5 1a 89 mov $0xffffffff891aa598,%rdi 3b: e8 c4 71 d2 ff call 0xffffffffffd27204 Code starting with the faulting instruction =========================================== 0: 0f 0b ud2 2: 90 nop 3: 90 nop 4: 31 c9 xor %ecx,%ecx 6: 31 d2 xor %edx,%edx 8: 89 de mov %ebx,%esi a: 48 c7 c7 98 a5 1a 89 mov $0xffffffff891aa598,%rdi 11: e8 c4 71 d2 ff call 0xffffffffffd271da [ 52.294641][ T1] RSP: 0000:ffffc9000001fc18 EFLAGS: 00010286 [ 52.295579][ T1] RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000000 [ 52.296770][ T1] RDX: 0000000000000000 RSI: ffff888100350040 RDI: fffff52000003f77 [ 52.297942][ T1] RBP: ffffc9000001fc30 R08: fffffbfff0eb4f9d R09: 0000000000000000 [ 52.299159][ T1] R10: ffffffff81302352 R11: fffffbfff0eb4f9c R12: ffffffff86be5b60 [ 52.300383][ T1] R13: 0000000000000001 R14: 0000000000000118 R15: 0000000000000000 [ 52.301484][ T1] FS: 0000000000000000(0000) GS:ffff8883ae800000(0000) knlGS:0000000000000000 [ 52.302727][ T1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 52.303710][ T1] CR2: 0000000000000000 CR3: 00000000074c2000 CR4: 00000000000406b0 [ 52.304895][ T1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 52.306017][ T1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 52.307166][ T1] Call Trace: [ 52.307696][ T1] <TASK> [ 52.308112][ T1] ? show_regs (arch/x86/kernel/dumpstack.c:479) [ 52.308799][ T1] ? __warn (kernel/panic.c:748) [ 52.309515][ T1] ? kmem_cache_sanity_check (mm/slab_common.c:107 (discriminator 1)) [ 52.310375][ T1] ? report_bug (lib/bug.c:201 lib/bug.c:219) [ 52.311034][ T1] ? kmem_cache_sanity_check (mm/slab_common.c:107 (discriminator 1)) [ 52.311962][ T1] ? handle_bug (arch/x86/kernel/traps.c:285) [ 52.312664][ T1] ? exc_invalid_op (arch/x86/kernel/traps.c:309 (discriminator 1)) [ 52.313373][ T1] ? asm_exc_invalid_op (arch/x86/include/asm/idtentry.h:621) [ 52.314126][ T1] ? this_cpu_in_panic (arch/x86/include/asm/atomic.h:23 include/linux/atomic/atomic-arch-fallback.h:457 include/linux/atomic/atomic-instrumented.h:33 kernel/printk/printk.c:362) [ 52.314935][ T1] ? kmem_cache_sanity_check (mm/slab_common.c:107 (discriminator 1)) [ 52.315663][ T1] ? kmem_cache_sanity_check (mm/slab_common.c:107 (discriminator 1)) [ 52.316478][ T1] __kmem_cache_create_args (mm/slab_common.c:304) [ 52.317143][ T1] ? write_comp_data (kernel/kcov.c:246) [ 52.317722][ T1] ceph_san_batch_init (include/linux/slab.h:349 net/ceph/ceph_san_batch.c:48) [ 52.318321][ T1] ? ceph_san_batch_put (net/ceph/ceph_san_batch.c:38) [ 52.318957][ T1] ? write_comp_data (kernel/kcov.c:246) [ 52.319781][ T1] ? init_caches (fs/ceph/super.c:1636) [ 52.320509][ T1] ceph_san_logger_init (net/ceph/ceph_san_logger.c:190 net/ceph/ceph_san_logger.c:175) [ 52.321225][ T1] init_ceph (fs/ceph/super.c:1643) [ 52.321965][ T1] do_one_initcall (init/main.c:1266) [ 52.322674][ T1] ? __sanitizer_cov_trace_pc (kernel/kcov.c:217) [ 52.323556][ T1] ? trace_initcall_level (init/main.c:1257) [ 52.324442][ T1] ? ftrace_likely_update (arch/x86/include/asm/smap.h:56 kernel/trace/trace_branch.c:225) [ 52.325200][ T1] ? __sanitizer_cov_trace_pc (kernel/kcov.c:217) [ 52.326114][ T1] do_initcalls (init/main.c:1327 init/main.c:1344) [ 52.326879][ T1] kernel_init_freeable (init/main.c:1581) [ 52.327703][ T1] ? rest_init (init/main.c:1458) [ 52.328397][ T1] kernel_init (init/main.c:1468) [ 52.329013][ T1] ? rest_init (init/main.c:1458) [ 52.329718][ T1] ret_from_fork (arch/x86/kernel/process.c:147) [ 52.330422][ T1] ? rest_init (init/main.c:1458) [ 52.331069][ T1] ret_from_fork_asm (arch/x86/entry/entry_64.S:254) [ 52.331999][ T1] </TASK> [ 52.332475][ T1] irq event stamp: 475325 [ 52.333009][ T1] hardirqs last enabled at (475333): __up_console_sem (arch/x86/include/asm/irqflags.h:26 (discriminator 3) arch/x86/include/asm/irqflags.h:87 (discriminator 3) arch/x86/include/asm/irqflags.h:147 (discriminator 3) kernel/printk/printk.c:344 (discriminator 3)) [ 52.334393][ T1] hardirqs last disabled at (475342): __up_console_sem (kernel/printk/printk.c:342 (discriminator 1)) [ 52.335790][ T1] softirqs last enabled at (475186): handle_softirqs (arch/x86/include/asm/preempt.h:26 kernel/softirq.c:408 kernel/softirq.c:589) [ 52.337250][ T1] softirqs last disabled at (475165): __do_softirq (kernel/softirq.c:596) [ 52.338696][ T1] ---[ end trace 0000000000000000 ]--- [ 52.340184][ T1] ceph: loaded (mds proto 32) The kernel config and materials to reproduce are available at: https://download.01.org/0day-ci/archive/20250402/202504021147.a27c3dc8-lkp@xxxxxxxxx -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki