linux-mm.kvack.org archive mirror
 help / color / mirror / Atom feed
* [linus:master] [mm/slab]  4b87369646: WARNING:at_include/linux/alloc_tag.h:#slab_post_alloc_hook
@ 2024-09-29 13:05 kernel test robot
  0 siblings, 0 replies; only message in thread
From: kernel test robot @ 2024-09-29 13:05 UTC (permalink / raw)
  To: Suren Baghdasaryan
  Cc: oe-lkp, lkp, linux-kernel, Andrew Morton, Kent Overstreet,
	Kees Cook, Vlastimil Babka, Alexander Viro, Alex Gaynor,
	Alice Ryhl, Andreas Hindborg, Benno Lossin, Björn Roy Baron,
	Boqun Feng, Christoph Lameter, Dennis Zhou, Gary Guo,
	Miguel Ojeda, Pasha Tatashin, Peter Zijlstra, Tejun Heo,
	Wedson Almeida Filho, linux-mm, oliver.sang



Hello,

kernel test robot noticed "WARNING:at_include/linux/alloc_tag.h:#slab_post_alloc_hook" on:

commit: 4b8736964640fe160724e7135dc62883bddcdace ("mm/slab: add allocation accounting into slab allocation and free paths")
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master

[test failed on linus/master      075dbe9f6e3c21596c5245826a4ee1f1c1676eb8]
[test failed on linux-next/master 40e0c9d414f57d450e3ad03c12765e797fc3fede]
[test failed on fix               ab7ca09520e9c41c219a4427fe0dae24024bfe7f]

in testcase: trinity
version: 
with following parameters:

	runtime: 300s
	group: group-01
	nr_groups: 5



compiler: clang-18
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G

(please refer to attached dmesg/kmsg for entire log/backtrace)


+--------------------------------------------------------------------+------------+------------+
|                                                                    | c789b5fe38 | 4b87369646 |
+--------------------------------------------------------------------+------------+------------+
| WARNING:at_include/linux/alloc_tag.h:#slab_post_alloc_hook         | 0          | 24         |
| EIP:slab_post_alloc_hook                                           | 0          | 24         |
| WARNING:at_include/linux/alloc_tag.h:#alloc_tagging_slab_free_hook | 0          | 24         |
| EIP:alloc_tagging_slab_free_hook                                   | 0          | 24         |
+--------------------------------------------------------------------+------------+------------+


If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@intel.com>
| Closes: https://lore.kernel.org/oe-lkp/202409291608.d9846653-lkp@intel.com


[    4.475119][    T0] ------------[ cut here ]------------
[    4.475771][    T0] current->alloc_tag not set
[ 4.475804][ T0] WARNING: CPU: 0 PID: 0 at include/linux/alloc_tag.h:95 slab_post_alloc_hook (include/linux/alloc_tag.h:95 include/linux/alloc_tag.h:131 mm/slub.c:3957) 
[    4.477578][    T0] Modules linked in:
[    4.478054][    T0] CPU: 0 PID: 0 Comm: swapper Not tainted 6.9.0-rc4-00083-g4b8736964640 #1
[ 4.479166][ T0] EIP: slab_post_alloc_hook (include/linux/alloc_tag.h:95 include/linux/alloc_tag.h:131 mm/slub.c:3957) 
[ 4.479840][ T0] Code: c9 e8 5d 1e f3 ff c7 04 24 01 00 00 00 b8 a0 ad c9 c3 ba 01 00 00 00 31 c9 e8 45 1e f3 ff c7 04 24 3a 87 53 c3 e8 e9 3b dd ff <0f> 0b c7 04 24 01 00 00 00 b8 b8 ad c9 c3 ba 01 00 00 00 eb 0e c7
All code
========
   0:	c9                   	leave
   1:	e8 5d 1e f3 ff       	call   0xfffffffffff31e63
   6:	c7 04 24 01 00 00 00 	movl   $0x1,(%rsp)
   d:	b8 a0 ad c9 c3       	mov    $0xc3c9ada0,%eax
  12:	ba 01 00 00 00       	mov    $0x1,%edx
  17:	31 c9                	xor    %ecx,%ecx
  19:	e8 45 1e f3 ff       	call   0xfffffffffff31e63
  1e:	c7 04 24 3a 87 53 c3 	movl   $0xc353873a,(%rsp)
  25:	e8 e9 3b dd ff       	call   0xffffffffffdd3c13
  2a:*	0f 0b                	ud2		<-- trapping instruction
  2c:	c7 04 24 01 00 00 00 	movl   $0x1,(%rsp)
  33:	b8 b8 ad c9 c3       	mov    $0xc3c9adb8,%eax
  38:	ba 01 00 00 00       	mov    $0x1,%edx
  3d:	eb 0e                	jmp    0x4d
  3f:	c7                   	.byte 0xc7

Code starting with the faulting instruction
===========================================
   0:	0f 0b                	ud2
   2:	c7 04 24 01 00 00 00 	movl   $0x1,(%rsp)
   9:	b8 b8 ad c9 c3       	mov    $0xc3c9adb8,%eax
   e:	ba 01 00 00 00       	mov    $0x1,%edx
  13:	eb 0e                	jmp    0x23
  15:	c7                   	.byte 0xc7
[    4.482296][    T0] EAX: c3c5d12c EBX: c0100101 ECX: 00000000 EDX: 00000000
[    4.483216][    T0] ESI: 00000000 EDI: 00000001 EBP: c36b5efc ESP: c36b5ec0
[    4.484080][    T0] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00210086
[    4.485009][    T0] CR0: 80050033 CR2: ffcb2000 CR3: 04016000 CR4: 00000090
[    4.485867][    T0] Call Trace:
[ 4.486271][ T0] ? show_regs (arch/x86/kernel/dumpstack.c:478) 
[ 4.486815][ T0] ? slab_post_alloc_hook (include/linux/alloc_tag.h:95 include/linux/alloc_tag.h:131 mm/slub.c:3957) 
[ 4.487401][ T0] ? __warn (kernel/panic.c:240 kernel/panic.c:694) 
[ 4.487847][ T0] ? slab_post_alloc_hook (include/linux/alloc_tag.h:95 include/linux/alloc_tag.h:131 mm/slub.c:3957) 
[ 4.488481][ T0] ? report_bug (lib/bug.c:199) 
[ 4.489036][ T0] ? slab_post_alloc_hook (include/linux/alloc_tag.h:95 include/linux/alloc_tag.h:131 mm/slub.c:3957) 
[ 4.489677][ T0] ? exc_overflow (arch/x86/kernel/traps.c:252) 
[ 4.490224][ T0] ? handle_bug (arch/x86/kernel/traps.c:?) 
[ 4.490782][ T0] ? exc_invalid_op (arch/x86/kernel/traps.c:260) 
[ 4.491366][ T0] ? handle_exception (arch/x86/entry/entry_32.S:1047) 
[ 4.491992][ T0] ? exc_overflow (arch/x86/kernel/traps.c:252) 
[ 4.492524][ T0] ? slab_post_alloc_hook (include/linux/alloc_tag.h:95 include/linux/alloc_tag.h:131 mm/slub.c:3957) 
[ 4.493172][ T0] ? exc_overflow (arch/x86/kernel/traps.c:252) 
[ 4.493747][ T0] ? slab_post_alloc_hook (include/linux/alloc_tag.h:95 include/linux/alloc_tag.h:131 mm/slub.c:3957) 
[ 4.494448][ T0] slab_alloc_node (mm/slub.c:4000) 
[ 4.495089][ T0] kmem_cache_alloc (mm/slub.c:4007) 
[ 4.495671][ T0] ? debug_objects_replace_static_objects (lib/debugobjects.c:?) 
[ 4.496471][ T0] debug_objects_replace_static_objects (lib/debugobjects.c:?) 
[ 4.497281][ T0] debug_objects_mem_init (lib/debugobjects.c:1386) 
[ 4.497935][ T0] mm_core_init (mm/mm_init.c:2787) 
[ 4.498494][ T0] start_kernel (init/main.c:939) 
[ 4.499087][ T0] i386_start_kernel (arch/x86/kernel/head32.c:79) 
[ 4.499734][ T0] startup_32_smp (arch/x86/kernel/head_32.S:295) 
[    4.500372][    T0] irq event stamp: 0
[ 4.500862][ T0] hardirqs last enabled at (0): 0x0 
[ 4.501669][ T0] hardirqs last disabled at (0): 0x0 
[ 4.502475][ T0] softirqs last enabled at (0): 0x0 
[ 4.507414][ T0] softirqs last disabled at (0): 0x0 
[    4.508243][    T0] ---[ end trace 0000000000000000 ]---
[    4.563547][    T0] allocated 56623104 bytes of page_ext
[    4.576043][    T0] Node 0, zone   Normal: page owner found early allocated 13853 pages
[    4.577459][    T0] Node 0, zone  HighMem: page owner found early allocated 0 pages
[    4.578644][    T0] ftrace: allocating 69614 entries in 136 pages
[    4.602968][    T0] ftrace: allocated 136 pages with 2 groups



The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20240929/202409291608.d9846653-lkp@intel.com



-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki



^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2024-09-29 13:06 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2024-09-29 13:05 [linus:master] [mm/slab] 4b87369646: WARNING:at_include/linux/alloc_tag.h:#slab_post_alloc_hook kernel test robot

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox