linux-mm.kvack.org archive mirror
 help / color / mirror / Atom feed
From: kernel test robot <oliver.sang@intel.com>
To: Suren Baghdasaryan <surenb@google.com>
Cc: <oe-lkp@lists.linux.dev>, <lkp@intel.com>,
	<linux-kernel@vger.kernel.org>,
	Andrew Morton <akpm@linux-foundation.org>,
	Shakeel Butt <shakeel.butt@linux.dev>,
	David Wang <00107082@163.com>,
	Kent Overstreet <kent.overstreet@linux.dev>,
	Minchan Kim <minchan@google.com>,
	Pasha Tatashin <pasha.tatashin@soleen.com>,
	Peter Zijlstra <peterz@infradead.org>,
	"Sourav Panda" <souravpanda@google.com>,
	Steven Rostedt <rostedt@goodmis.org>,
	Vlastimil Babka <vbabka@suse.cz>, Yu Zhao <yuzhao@google.com>,
	Zhenhua Huang <quic_zhenhuah@quicinc.com>, <linux-mm@kvack.org>,
	<oliver.sang@intel.com>
Subject: [linus:master] [alloc_tag]  93d5440ece: WARNING:at_include/linux/alloc_tag.h:#__pgalloc_tag_sub
Date: Tue, 15 Apr 2025 16:35:47 +0800	[thread overview]
Message-ID: <202504151659.9b09c785-lkp@intel.com> (raw)



Hello,


seems one random WARN just changes the stat due to this commit.

a642b27b991fd663 93d5440ece3c0aa341fb02e3a44
---------------- ---------------------------
       fail:runs  %reproduction    fail:runs
           |             |             |
           :24          12%           3:24    dmesg.WARNING:at_include/linux/alloc_tag.h:#__pgalloc_tag_sub
          5:24         -21%            :24    dmesg.WARNING:at_include/linux/alloc_tag.h:#pgalloc_tag_sub


below report is just FYI what we observed in our tests.


kernel test robot noticed "WARNING:at_include/linux/alloc_tag.h:#__pgalloc_tag_sub" on:

commit: 93d5440ece3c0aa341fb02e3a44a1b7ab44304c8 ("alloc_tag: uninline code gated by mem_alloc_profiling_key in page allocator")
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master

[test failed on linus/master      900241a5cc15e6e0709a012051cc72d224cd6a6e]
[test failed on linux-next/master 01c6df60d5d4ae00cd5c1648818744838bba7763]

in testcase: trinity
version: trinity-x86_64-ba2360ed-1_20241228
with following parameters:

	runtime: 300s
	group: group-00
	nr_groups: 5



config: x86_64-randconfig-161-20250410
compiler: gcc-11
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G

(please refer to attached dmesg/kmsg for entire log/backtrace)



If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@intel.com>
| Closes: https://lore.kernel.org/oe-lkp/202504151659.9b09c785-lkp@intel.com


[  147.337988][ T2016] ------------[ cut here ]------------
[  147.338915][ T2016] alloc_tag was not set
[ 147.339502][ T2016] WARNING: CPU: 0 PID: 2016 at include/linux/alloc_tag.h:152 __pgalloc_tag_sub (include/linux/alloc_tag.h:152 include/linux/alloc_tag.h:195 mm/page_alloc.c:1089) 
[  147.341127][ T2016] Modules linked in:
[  147.341672][ T2016] CPU: 0 UID: 0 PID: 2016 Comm: grep Tainted: G                T  6.14.0-rc6-00062-g93d5440ece3c #1 c08622b3723459177a60d595773689e527750d0d
[  147.343295][ T2016] Tainted: [T]=RANDSTRUCT
[  147.343867][ T2016] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
[ 147.345236][ T2016] RIP: 0010:__pgalloc_tag_sub (include/linux/alloc_tag.h:152 include/linux/alloc_tag.h:195 mm/page_alloc.c:1089) 
[ 147.345982][ T2016] Code: 41 5e 41 5f 5d c3 49 c7 47 e0 00 00 00 00 80 3d 25 ef 66 0a 00 75 a9 48 c7 c7 e0 91 39 8e c6 05 15 ef 66 0a 01 e8 3f bb ad ff <0f> 0b eb 92 48 c7 c0 20 2b e6 90 48 ba 00 00 00 00 00 fc ff df 48
All code
========
   0:	41 5e                	pop    %r14
   2:	41 5f                	pop    %r15
   4:	5d                   	pop    %rbp
   5:	c3                   	ret
   6:	49 c7 47 e0 00 00 00 	movq   $0x0,-0x20(%r15)
   d:	00 
   e:	80 3d 25 ef 66 0a 00 	cmpb   $0x0,0xa66ef25(%rip)        # 0xa66ef3a
  15:	75 a9                	jne    0xffffffffffffffc0
  17:	48 c7 c7 e0 91 39 8e 	mov    $0xffffffff8e3991e0,%rdi
  1e:	c6 05 15 ef 66 0a 01 	movb   $0x1,0xa66ef15(%rip)        # 0xa66ef3a
  25:	e8 3f bb ad ff       	call   0xffffffffffadbb69
  2a:*	0f 0b                	ud2		<-- trapping instruction
  2c:	eb 92                	jmp    0xffffffffffffffc0
  2e:	48 c7 c0 20 2b e6 90 	mov    $0xffffffff90e62b20,%rax
  35:	48 ba 00 00 00 00 00 	movabs $0xdffffc0000000000,%rdx
  3c:	fc ff df 
  3f:	48                   	rex.W

Code starting with the faulting instruction
===========================================
   0:	0f 0b                	ud2
   2:	eb 92                	jmp    0xffffffffffffff96
   4:	48 c7 c0 20 2b e6 90 	mov    $0xffffffff90e62b20,%rax
   b:	48 ba 00 00 00 00 00 	movabs $0xdffffc0000000000,%rdx
  12:	fc ff df 
  15:	48                   	rex.W
[  147.348298][ T2016] RSP: 0018:ffffc90001def730 EFLAGS: 00010282
[  147.349063][ T2016] RAX: dffffc0000000000 RBX: 1ffff920003bdee7 RCX: 0000000000000001
[  147.350021][ T2016] RDX: 0000000000000027 RSI: 0000000000000004 RDI: ffffffff9059d5a8
[  147.354294][ T2016] RBP: ffffc90001def7a0 R08: ffffffff87fd99d0 R09: fffffbfff20b3ab5
[  147.355329][ T2016] R10: ffffffff9059d5ab R11: 0000000000000001 R12: ffff888106402c58
[  147.356345][ T2016] R13: 0000000000000000 R14: 0000000000000001 R15: ffffc90001def778
[  147.357317][ T2016] FS:  0000000000000000(0000) GS:ffffffff904be000(0000) knlGS:0000000000000000
[  147.358402][ T2016] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  147.359199][ T2016] CR2: 00007fedda922200 CR3: 0000000155129000 CR4: 00000000000406f0
[  147.360209][ T2016] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  147.361208][ T2016] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  147.362220][ T2016] Call Trace:
[  147.362713][ T2016]  <TASK>
[ 147.363178][ T2016] ? show_regs (arch/x86/kernel/dumpstack.c:479) 
[ 147.363763][ T2016] ? __warn (kernel/panic.c:748) 
[ 147.364366][ T2016] ? __wake_up_klogd (arch/x86/include/asm/preempt.h:94 kernel/printk/printk.c:4525) 
[ 147.365015][ T2016] ? __pgalloc_tag_sub (include/linux/alloc_tag.h:152 include/linux/alloc_tag.h:195 mm/page_alloc.c:1089) 
[ 147.365689][ T2016] ? report_bug (lib/bug.c:201 lib/bug.c:219) 
[ 147.366349][ T2016] ? page_ext_get (include/linux/rcupdate.h:337 include/linux/rcupdate.h:849 mm/page_ext.c:525) 
[ 147.366988][ T2016] ? handle_bug (arch/x86/kernel/traps.c:285) 
[ 147.367583][ T2016] ? exc_invalid_op (arch/x86/kernel/traps.c:309 (discriminator 1)) 
[ 147.368249][ T2016] ? asm_exc_invalid_op (arch/x86/include/asm/idtentry.h:574) 
[ 147.368921][ T2016] ? irq_work_queue (arch/x86/include/asm/atomic.h:23 arch/x86/include/asm/atomic.h:145 include/linux/atomic/atomic-arch-fallback.h:1690 include/linux/atomic/atomic-instrumented.h:954 kernel/irq_work.c:61 kernel/irq_work.c:119) 
[ 147.369562][ T2016] ? __pgalloc_tag_sub (include/linux/alloc_tag.h:152 include/linux/alloc_tag.h:195 mm/page_alloc.c:1089) 
[ 147.370244][ T2016] ? __alloc_contig_migrate_range (mm/page_alloc.c:1084) 
[ 147.371016][ T2016] free_frozen_pages (mm/page_alloc.c:1211 mm/page_alloc.c:2738) 
[ 147.371700][ T2016] __free_slab (mm/slub.c:2669) 
[ 147.372331][ T2016] free_slab (mm/slub.c:2692) 
[ 147.372900][ T2016] free_to_partial_list (mm/slub.c:4414) 
[ 147.373569][ T2016] ? qlist_free_all (mm/kasan/quarantine.c:163 mm/kasan/quarantine.c:179) 
[ 147.374213][ T2016] __slab_free (mm/slub.c:4534) 
[ 147.374819][ T2016] ? __kasan_check_read (mm/kasan/shadow.c:32) 
[ 147.375470][ T2016] ? mark_lock (arch/x86/include/asm/bitops.h:227 (discriminator 3) arch/x86/include/asm/bitops.h:239 (discriminator 3) include/asm-generic/bitops/instrumented-non-atomic.h:142 (discriminator 3) kernel/locking/lockdep.c:230 (discriminator 3) kernel/locking/lockdep.c:4729 (discriminator 3)) 
[ 147.376062][ T2016] ? mark_held_locks (kernel/locking/lockdep.c:4323) 
[ 147.376701][ T2016] ___cache_free (mm/slub.c:4681) 
[ 147.377248][ T2016] qlist_free_all (mm/kasan/quarantine.c:174) 
[ 147.377795][ T2016] kasan_quarantine_reduce (include/linux/srcu.h:357 mm/kasan/quarantine.c:287) 
[ 147.378470][ T2016] __kasan_slab_alloc (mm/kasan/common.c:329) 
[ 147.379088][ T2016] kmem_cache_alloc_noprof (include/linux/kasan.h:250 mm/slub.c:4128 mm/slub.c:4177 mm/slub.c:4184) 
[ 147.379784][ T2016] getname_flags (include/linux/sched.h:2248 fs/namei.c:139) 
[ 147.380436][ T2016] getname (fs/namei.c:224) 
[ 147.380969][ T2016] do_sys_openat2 (fs/open.c:1422) 
[ 147.381587][ T2016] ? build_open_flags (fs/open.c:1414) 
[ 147.382258][ T2016] __x64_sys_openat (fs/open.c:1454) 
[ 147.382899][ T2016] ? __ia32_compat_sys_open (fs/open.c:1454) 
[ 147.383611][ T2016] x64_sys_call (arch/x86/entry/syscall_64.c:36) 
[ 147.384281][ T2016] do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) 
[ 147.384977][ T2016] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) 
[  147.385724][ T2016] RIP: 0033:0x7fedda9e895d
[ 147.386333][ T2016] Code: 48 89 54 24 e0 41 83 e2 40 75 32 89 f0 25 00 00 41 00 3d 00 00 41 00 74 24 89 f2 b8 01 01 00 00 48 89 fe bf 9c ff ff ff 0f 05 <48> 3d 00 f0 ff ff 77 33 c3 66 2e 0f 1f 84 00 00 00 00 00 48 8d 44
All code
========
   0:	48 89 54 24 e0       	mov    %rdx,-0x20(%rsp)
   5:	41 83 e2 40          	and    $0x40,%r10d
   9:	75 32                	jne    0x3d
   b:	89 f0                	mov    %esi,%eax
   d:	25 00 00 41 00       	and    $0x410000,%eax
  12:	3d 00 00 41 00       	cmp    $0x410000,%eax
  17:	74 24                	je     0x3d
  19:	89 f2                	mov    %esi,%edx
  1b:	b8 01 01 00 00       	mov    $0x101,%eax
  20:	48 89 fe             	mov    %rdi,%rsi
  23:	bf 9c ff ff ff       	mov    $0xffffff9c,%edi
  28:	0f 05                	syscall
  2a:*	48 3d 00 f0 ff ff    	cmp    $0xfffffffffffff000,%rax		<-- trapping instruction
  30:	77 33                	ja     0x65
  32:	c3                   	ret
  33:	66 2e 0f 1f 84 00 00 	cs nopw 0x0(%rax,%rax,1)
  3a:	00 00 00 
  3d:	48                   	rex.W
  3e:	8d                   	.byte 0x8d
  3f:	44                   	rex.R

Code starting with the faulting instruction
===========================================
   0:	48 3d 00 f0 ff ff    	cmp    $0xfffffffffffff000,%rax
   6:	77 33                	ja     0x3b
   8:	c3                   	ret
   9:	66 2e 0f 1f 84 00 00 	cs nopw 0x0(%rax,%rax,1)
  10:	00 00 00 
  13:	48                   	rex.W
  14:	8d                   	.byte 0x8d
  15:	44                   	rex.R


The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20250415/202504151659.9b09c785-lkp@intel.com



-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki



             reply	other threads:[~2025-04-15  8:36 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-04-15  8:35 kernel test robot [this message]
2025-05-03 11:51 ` David Wang
2025-05-05 16:57   ` [linus:master] " Suren Baghdasaryan

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=202504151659.9b09c785-lkp@intel.com \
    --to=oliver.sang@intel.com \
    --cc=00107082@163.com \
    --cc=akpm@linux-foundation.org \
    --cc=kent.overstreet@linux.dev \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-mm@kvack.org \
    --cc=lkp@intel.com \
    --cc=minchan@google.com \
    --cc=oe-lkp@lists.linux.dev \
    --cc=pasha.tatashin@soleen.com \
    --cc=peterz@infradead.org \
    --cc=quic_zhenhuah@quicinc.com \
    --cc=rostedt@goodmis.org \
    --cc=shakeel.butt@linux.dev \
    --cc=souravpanda@google.com \
    --cc=surenb@google.com \
    --cc=vbabka@suse.cz \
    --cc=yuzhao@google.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox