From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 516C5E7717D for ; Wed, 11 Dec 2024 23:37:37 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id DA98F6B009F; Wed, 11 Dec 2024 18:37:36 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id D5A3F6B00AE; Wed, 11 Dec 2024 18:37:36 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id C213C6B00AF; Wed, 11 Dec 2024 18:37:36 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0011.hostedemail.com [216.40.44.11]) by kanga.kvack.org (Postfix) with ESMTP id A4FB46B009F for ; Wed, 11 Dec 2024 18:37:36 -0500 (EST) Received: from smtpin15.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay08.hostedemail.com (Postfix) with ESMTP id 537EA1414C5 for ; Wed, 11 Dec 2024 23:37:36 +0000 (UTC) X-FDA: 82884291924.15.EF5B653 Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.16]) by imf06.hostedemail.com (Postfix) with ESMTP id 3F5A518000E for ; Wed, 11 Dec 2024 23:37:17 +0000 (UTC) Authentication-Results: imf06.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=XCvVcze7; spf=pass (imf06.hostedemail.com: domain of lkp@intel.com designates 192.198.163.16 as permitted sender) smtp.mailfrom=lkp@intel.com; dmarc=pass (policy=none) header.from=intel.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1733960229; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=tvmwLvyNz5cIUVZ8Vw71xIU0DDXlZQWO+85KfuOm9UI=; b=RsRAiAcfVLnk/2cCEOo+gDYMQj6P4WHcbE3jgHpMbk9w8+9D3Zt9FXbQY3ALTGJC3Sz3EK vEJA6G5IfFcYlUEBGLG+4II1OmDtINJVgk8fOTvMwNA/gL1lQ0QTGI6JcB721Y1qOX7FSp aNC70Z1wNguTE6OaV34sDS0kwMC7oRo= ARC-Authentication-Results: i=1; imf06.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=XCvVcze7; spf=pass (imf06.hostedemail.com: domain of lkp@intel.com designates 192.198.163.16 as permitted sender) smtp.mailfrom=lkp@intel.com; dmarc=pass (policy=none) header.from=intel.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1733960229; a=rsa-sha256; cv=none; b=EB9wfal4PMBqEjsqnacxkwdNaKVA2UBuMKQdaGjE53exGUGftDy06zY2APOaOa7yNJnf6D gM7v4PpYZGSXpvMhaadaT/mSX4WkVK0t/eJHWXxrNPVI4U5uqWnyTwnRZsn89LNQKwvT4f YbBgH1BRc1ZgT6FZn/vWo4Sxwk3ONXQ= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1733960254; x=1765496254; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=utgvRHnj1gJiZOnHD5B9sfHVvbJudFuB2vzSHjnVxu8=; b=XCvVcze7ybw9InOPDjkP0y1xU3t8keU2MJiIuNOwL3n3l8W9ILahGlWM aoGiEQbStUrEUAHBjF+N50nC9XFoX1+UEiqRpq6TFmF6uh37hucmJY8cV qMDK8etYEtLxYU4zIFdVx6wMiUWiLJOh4MKsl/PFt0l3TpMkzLyKnwbb/ IxC5fb/p08sqaRD5waesd718VDt9yIl9OSoWYSaiksSpOciynnExKg83c I00U1rUr5Q3RFWCjrBJOZzQCVB7u1zytoyZzd5oZh3WtmeYJsC1iyoVV2 ppyCcRyLAJpkDJFDepopxMyBnAFHuz04L3lzqr0ZmoNMxnChMMbxSVntO g==; X-CSE-ConnectionGUID: U9XaTrY+RBGPT0TXe2I2uw== X-CSE-MsgGUID: s/R50OYDQHqKH+hqLJVDlQ== X-IronPort-AV: E=McAfee;i="6700,10204,11283"; a="21944861" X-IronPort-AV: E=Sophos;i="6.12,226,1728975600"; d="scan'208";a="21944861" Received: from orviesa010.jf.intel.com ([10.64.159.150]) by fmvoesa110.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 11 Dec 2024 15:37:32 -0800 X-CSE-ConnectionGUID: xCKDKHoOQui+/6SOMOPh1w== X-CSE-MsgGUID: Jg0/3VBrSXecJmDkOFjPMQ== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.12,224,1728975600"; d="scan'208";a="95846851" Received: from lkp-server01.sh.intel.com (HELO 82a3f569d0cb) ([10.239.97.150]) by orviesa010.jf.intel.com with ESMTP; 11 Dec 2024 15:37:30 -0800 Received: from kbuild by 82a3f569d0cb with local (Exim 4.96) (envelope-from ) id 1tLWGl-0007DJ-0s; Wed, 11 Dec 2024 23:37:27 +0000 Date: Thu, 12 Dec 2024 07:36:43 +0800 From: kernel test robot To: "Matthew Wilcox (Oracle)" , Andrew Morton Cc: oe-kbuild-all@lists.linux.dev, Linux Memory Management List , "Matthew Wilcox (Oracle)" , Christoph Hellwig , Johannes Weiner , Michal Hocko , Roman Gushchin , Shakeel Butt , Muchun Song , cgroups@vger.kernel.org, stable@vger.kernel.org Subject: Re: [PATCH 2/2] vmalloc: Account memcg per vmalloc Message-ID: <202412120722.YWlWwpqk-lkp@intel.com> References: <20241211043252.3295947-2-willy@infradead.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20241211043252.3295947-2-willy@infradead.org> X-Rspamd-Server: rspam06 X-Rspamd-Queue-Id: 3F5A518000E X-Rspam-User: X-Stat-Signature: sbfnyiuxwndyworgs9tn7r6hn11och64 X-HE-Tag: 1733960237-350121 X-HE-Meta: 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 c54PGQ96 SS5vfTPrH8Pb5MQ35mM1xGr3q/SHTa3mJ/LxvjvlBKd8NI9Scj/5z535Z/Oia+u3NPRSQTZI1tlCTn9YExpCun469+zw/rUWBp2xS/kT54KErsWEDDS19l7JOBJ5KJBIPar7LrcM5SQJRBJqDo979cPKmKj/9yG2pm8fSZ8t5kMF5DuEjh33G67zg16X0dPGpQh3beJMlkIlrerOJvRVNB1acVIzqWHDFvdNtOKc+2CPVratRQ5hwgxt7uASbGjFLKyFYrDdksr1/EaeUS8aEoCBLNKbmZ1J23HGvVgU1scJ4xKOV0TQVcFonAdPobHF4Uz8YBqV2mfuzP5oyCOb+DXcNKl858VUO19/bm2pppxwODsRGQlhYyZoiqYvvqxAyCRkhB3/zmPGyw19KvSDMv9S/xvqxUQDLr5Mo X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Hi Matthew, kernel test robot noticed the following build errors: [auto build test ERROR on akpm-mm/mm-everything] [also build test ERROR on linus/master v6.13-rc2 next-20241211] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch, we suggest to use '--base' as documented in https://git-scm.com/docs/git-format-patch#_base_tree_information] url: https://github.com/intel-lab-lkp/linux/commits/Matthew-Wilcox-Oracle/vmalloc-Account-memcg-per-vmalloc/20241211-123433 base: https://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm.git mm-everything patch link: https://lore.kernel.org/r/20241211043252.3295947-2-willy%40infradead.org patch subject: [PATCH 2/2] vmalloc: Account memcg per vmalloc config: sparc64-randconfig-001-20241212 (https://download.01.org/0day-ci/archive/20241212/202412120722.YWlWwpqk-lkp@intel.com/config) compiler: sparc64-linux-gcc (GCC) 14.2.0 reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20241212/202412120722.YWlWwpqk-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202412120722.YWlWwpqk-lkp@intel.com/ All errors (new ones prefixed by >>): sparc64-linux-ld: mm/vmalloc.o: in function `vfree': >> mm/vmalloc.c:3386:(.text+0x6bbc): undefined reference to `obj_cgroup_uncharge_vmalloc' sparc64-linux-ld: mm/vmalloc.o: in function `__vmalloc_area_node': >> mm/vmalloc.c:3676:(.text+0x6f94): undefined reference to `obj_cgroup_charge_vmalloc' vim +3386 mm/vmalloc.c 3329 3330 /** 3331 * vfree - Release memory allocated by vmalloc() 3332 * @addr: Memory base address 3333 * 3334 * Free the virtually continuous memory area starting at @addr, as obtained 3335 * from one of the vmalloc() family of APIs. This will usually also free the 3336 * physical memory underlying the virtual allocation, but that memory is 3337 * reference counted, so it will not be freed until the last user goes away. 3338 * 3339 * If @addr is NULL, no operation is performed. 3340 * 3341 * Context: 3342 * May sleep if called *not* from interrupt context. 3343 * Must not be called in NMI context (strictly speaking, it could be 3344 * if we have CONFIG_ARCH_HAVE_NMI_SAFE_CMPXCHG, but making the calling 3345 * conventions for vfree() arch-dependent would be a really bad idea). 3346 */ 3347 void vfree(const void *addr) 3348 { 3349 struct vm_struct *vm; 3350 int i; 3351 3352 if (unlikely(in_interrupt())) { 3353 vfree_atomic(addr); 3354 return; 3355 } 3356 3357 BUG_ON(in_nmi()); 3358 kmemleak_free(addr); 3359 might_sleep(); 3360 3361 if (!addr) 3362 return; 3363 3364 vm = remove_vm_area(addr); 3365 if (unlikely(!vm)) { 3366 WARN(1, KERN_ERR "Trying to vfree() nonexistent vm area (%p)\n", 3367 addr); 3368 return; 3369 } 3370 3371 if (unlikely(vm->flags & VM_FLUSH_RESET_PERMS)) 3372 vm_reset_perms(vm); 3373 for (i = 0; i < vm->nr_pages; i++) { 3374 struct page *page = vm->pages[i]; 3375 3376 BUG_ON(!page); 3377 /* 3378 * High-order allocs for huge vmallocs are split, so 3379 * can be freed as an array of order-0 allocations 3380 */ 3381 __free_page(page); 3382 cond_resched(); 3383 } 3384 if (!(vm->flags & VM_MAP_PUT_PAGES)) 3385 atomic_long_sub(vm->nr_pages, &nr_vmalloc_pages); > 3386 obj_cgroup_uncharge_vmalloc(vm->objcg, vm->nr_pages); 3387 kvfree(vm->pages); 3388 kfree(vm); 3389 } 3390 EXPORT_SYMBOL(vfree); 3391 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki