[<prev] [next>] [day] [month] [year] [list]
Message-ID: <202409291608.d9846653-lkp@intel.com>
Date: Sun, 29 Sep 2024 21:05:42 +0800
From: kernel test robot <oliver.sang@...el.com>
To: Suren Baghdasaryan <surenb@...gle.com>
CC: <oe-lkp@...ts.linux.dev>, <lkp@...el.com>, <linux-kernel@...r.kernel.org>,
Andrew Morton <akpm@...ux-foundation.org>, Kent Overstreet
<kent.overstreet@...ux.dev>, Kees Cook <keescook@...omium.org>, "Vlastimil
Babka" <vbabka@...e.cz>, Alexander Viro <viro@...iv.linux.org.uk>, "Alex
Gaynor" <alex.gaynor@...il.com>, Alice Ryhl <aliceryhl@...gle.com>, "Andreas
Hindborg" <a.hindborg@...sung.com>, Benno Lossin <benno.lossin@...ton.me>,
Björn Roy Baron <bjorn3_gh@...tonmail.com>, Boqun Feng
<boqun.feng@...il.com>, Christoph Lameter <cl@...ux.com>, Dennis Zhou
<dennis@...nel.org>, Gary Guo <gary@...yguo.net>, Miguel Ojeda
<ojeda@...nel.org>, Pasha Tatashin <pasha.tatashin@...een.com>, "Peter
Zijlstra" <peterz@...radead.org>, Tejun Heo <tj@...nel.org>, "Wedson Almeida
Filho" <wedsonaf@...il.com>, <linux-mm@...ck.org>, <oliver.sang@...el.com>
Subject: [linus:master] [mm/slab] 4b87369646:
WARNING:at_include/linux/alloc_tag.h:#slab_post_alloc_hook
Hello,
kernel test robot noticed "WARNING:at_include/linux/alloc_tag.h:#slab_post_alloc_hook" on:
commit: 4b8736964640fe160724e7135dc62883bddcdace ("mm/slab: add allocation accounting into slab allocation and free paths")
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master
[test failed on linus/master 075dbe9f6e3c21596c5245826a4ee1f1c1676eb8]
[test failed on linux-next/master 40e0c9d414f57d450e3ad03c12765e797fc3fede]
[test failed on fix ab7ca09520e9c41c219a4427fe0dae24024bfe7f]
in testcase: trinity
version:
with following parameters:
runtime: 300s
group: group-01
nr_groups: 5
compiler: clang-18
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G
(please refer to attached dmesg/kmsg for entire log/backtrace)
+--------------------------------------------------------------------+------------+------------+
| | c789b5fe38 | 4b87369646 |
+--------------------------------------------------------------------+------------+------------+
| WARNING:at_include/linux/alloc_tag.h:#slab_post_alloc_hook | 0 | 24 |
| EIP:slab_post_alloc_hook | 0 | 24 |
| WARNING:at_include/linux/alloc_tag.h:#alloc_tagging_slab_free_hook | 0 | 24 |
| EIP:alloc_tagging_slab_free_hook | 0 | 24 |
+--------------------------------------------------------------------+------------+------------+
If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@...el.com>
| Closes: https://lore.kernel.org/oe-lkp/202409291608.d9846653-lkp@intel.com
[ 4.475119][ T0] ------------[ cut here ]------------
[ 4.475771][ T0] current->alloc_tag not set
[ 4.475804][ T0] WARNING: CPU: 0 PID: 0 at include/linux/alloc_tag.h:95 slab_post_alloc_hook (include/linux/alloc_tag.h:95 include/linux/alloc_tag.h:131 mm/slub.c:3957)
[ 4.477578][ T0] Modules linked in:
[ 4.478054][ T0] CPU: 0 PID: 0 Comm: swapper Not tainted 6.9.0-rc4-00083-g4b8736964640 #1
[ 4.479166][ T0] EIP: slab_post_alloc_hook (include/linux/alloc_tag.h:95 include/linux/alloc_tag.h:131 mm/slub.c:3957)
[ 4.479840][ T0] Code: c9 e8 5d 1e f3 ff c7 04 24 01 00 00 00 b8 a0 ad c9 c3 ba 01 00 00 00 31 c9 e8 45 1e f3 ff c7 04 24 3a 87 53 c3 e8 e9 3b dd ff <0f> 0b c7 04 24 01 00 00 00 b8 b8 ad c9 c3 ba 01 00 00 00 eb 0e c7
All code
========
0: c9 leave
1: e8 5d 1e f3 ff call 0xfffffffffff31e63
6: c7 04 24 01 00 00 00 movl $0x1,(%rsp)
d: b8 a0 ad c9 c3 mov $0xc3c9ada0,%eax
12: ba 01 00 00 00 mov $0x1,%edx
17: 31 c9 xor %ecx,%ecx
19: e8 45 1e f3 ff call 0xfffffffffff31e63
1e: c7 04 24 3a 87 53 c3 movl $0xc353873a,(%rsp)
25: e8 e9 3b dd ff call 0xffffffffffdd3c13
2a:* 0f 0b ud2 <-- trapping instruction
2c: c7 04 24 01 00 00 00 movl $0x1,(%rsp)
33: b8 b8 ad c9 c3 mov $0xc3c9adb8,%eax
38: ba 01 00 00 00 mov $0x1,%edx
3d: eb 0e jmp 0x4d
3f: c7 .byte 0xc7
Code starting with the faulting instruction
===========================================
0: 0f 0b ud2
2: c7 04 24 01 00 00 00 movl $0x1,(%rsp)
9: b8 b8 ad c9 c3 mov $0xc3c9adb8,%eax
e: ba 01 00 00 00 mov $0x1,%edx
13: eb 0e jmp 0x23
15: c7 .byte 0xc7
[ 4.482296][ T0] EAX: c3c5d12c EBX: c0100101 ECX: 00000000 EDX: 00000000
[ 4.483216][ T0] ESI: 00000000 EDI: 00000001 EBP: c36b5efc ESP: c36b5ec0
[ 4.484080][ T0] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00210086
[ 4.485009][ T0] CR0: 80050033 CR2: ffcb2000 CR3: 04016000 CR4: 00000090
[ 4.485867][ T0] Call Trace:
[ 4.486271][ T0] ? show_regs (arch/x86/kernel/dumpstack.c:478)
[ 4.486815][ T0] ? slab_post_alloc_hook (include/linux/alloc_tag.h:95 include/linux/alloc_tag.h:131 mm/slub.c:3957)
[ 4.487401][ T0] ? __warn (kernel/panic.c:240 kernel/panic.c:694)
[ 4.487847][ T0] ? slab_post_alloc_hook (include/linux/alloc_tag.h:95 include/linux/alloc_tag.h:131 mm/slub.c:3957)
[ 4.488481][ T0] ? report_bug (lib/bug.c:199)
[ 4.489036][ T0] ? slab_post_alloc_hook (include/linux/alloc_tag.h:95 include/linux/alloc_tag.h:131 mm/slub.c:3957)
[ 4.489677][ T0] ? exc_overflow (arch/x86/kernel/traps.c:252)
[ 4.490224][ T0] ? handle_bug (arch/x86/kernel/traps.c:?)
[ 4.490782][ T0] ? exc_invalid_op (arch/x86/kernel/traps.c:260)
[ 4.491366][ T0] ? handle_exception (arch/x86/entry/entry_32.S:1047)
[ 4.491992][ T0] ? exc_overflow (arch/x86/kernel/traps.c:252)
[ 4.492524][ T0] ? slab_post_alloc_hook (include/linux/alloc_tag.h:95 include/linux/alloc_tag.h:131 mm/slub.c:3957)
[ 4.493172][ T0] ? exc_overflow (arch/x86/kernel/traps.c:252)
[ 4.493747][ T0] ? slab_post_alloc_hook (include/linux/alloc_tag.h:95 include/linux/alloc_tag.h:131 mm/slub.c:3957)
[ 4.494448][ T0] slab_alloc_node (mm/slub.c:4000)
[ 4.495089][ T0] kmem_cache_alloc (mm/slub.c:4007)
[ 4.495671][ T0] ? debug_objects_replace_static_objects (lib/debugobjects.c:?)
[ 4.496471][ T0] debug_objects_replace_static_objects (lib/debugobjects.c:?)
[ 4.497281][ T0] debug_objects_mem_init (lib/debugobjects.c:1386)
[ 4.497935][ T0] mm_core_init (mm/mm_init.c:2787)
[ 4.498494][ T0] start_kernel (init/main.c:939)
[ 4.499087][ T0] i386_start_kernel (arch/x86/kernel/head32.c:79)
[ 4.499734][ T0] startup_32_smp (arch/x86/kernel/head_32.S:295)
[ 4.500372][ T0] irq event stamp: 0
[ 4.500862][ T0] hardirqs last enabled at (0): 0x0
[ 4.501669][ T0] hardirqs last disabled at (0): 0x0
[ 4.502475][ T0] softirqs last enabled at (0): 0x0
[ 4.507414][ T0] softirqs last disabled at (0): 0x0
[ 4.508243][ T0] ---[ end trace 0000000000000000 ]---
[ 4.563547][ T0] allocated 56623104 bytes of page_ext
[ 4.576043][ T0] Node 0, zone Normal: page owner found early allocated 13853 pages
[ 4.577459][ T0] Node 0, zone HighMem: page owner found early allocated 0 pages
[ 4.578644][ T0] ftrace: allocating 69614 entries in 136 pages
[ 4.602968][ T0] ftrace: allocated 136 pages with 2 groups
The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20240929/202409291608.d9846653-lkp@intel.com
--
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki
Powered by blists - more mailing lists