Re: [PATCH v1 1/1] mm: report per-page metadata information

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




Hello,

kernel test robot noticed "WARNING:at_mm/vmstat.c:#__mod_node_page_state" on:

commit: af92fce0e99952613b7dac06b40a35decef4cad9 ("[PATCH v1 1/1] mm: report per-page metadata information")
url: https://github.com/intel-lab-lkp/linux/commits/Sourav-Panda/mm-report-per-page-metadata-information/20230914-013201
base: https://git.kernel.org/cgit/linux/kernel/git/akpm/mm.git mm-everything
patch link: https://lore.kernel.org/all/20230913173000.4016218-2-souravpanda@xxxxxxxxxx/
patch subject: [PATCH v1 1/1] mm: report per-page metadata information

in testcase: boot

compiler: gcc-12
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G

(please refer to attached dmesg/kmsg for entire log/backtrace)



If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@xxxxxxxxx>
| Closes: https://lore.kernel.org/oe-lkp/202309181546.fc42f414-oliver.sang@xxxxxxxxx


[    4.596915][    T1] ------------[ cut here ]------------
[ 4.597618][ T1] WARNING: CPU: 0 PID: 1 at mm/vmstat.c:393 __mod_node_page_state (kbuild/src/rand-x86_64-2/mm/vmstat.c:393) 
[    4.598717][    T1] Modules linked in:
[    4.598835][    T1] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 6.6.0-rc1-00154-gaf92fce0e999 #4
[    4.599915][    T1] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
[ 4.601238][ T1] RIP: 0010:__mod_node_page_state (kbuild/src/rand-x86_64-2/mm/vmstat.c:393) 
[ 4.602031][ T1] Code: 5e 41 5f 5d 31 c0 31 d2 31 c9 31 f6 31 ff c3 65 8b 0d bc 7e e0 7e 81 e1 ff ff ff 7f 75 b5 65 8b 0d 11 7c c3 7e 85 c9 74 aa 90 <0f> 0b 90 eb a4 49 83 fe 29 77 26 4e 8d 3c f5 88 33 00 00 f0 4b 01
All code
========
   0:	5e                   	pop    %rsi
   1:	41 5f                	pop    %r15
   3:	5d                   	pop    %rbp
   4:	31 c0                	xor    %eax,%eax
   6:	31 d2                	xor    %edx,%edx
   8:	31 c9                	xor    %ecx,%ecx
   a:	31 f6                	xor    %esi,%esi
   c:	31 ff                	xor    %edi,%edi
   e:	c3                   	ret
   f:	65 8b 0d bc 7e e0 7e 	mov    %gs:0x7ee07ebc(%rip),%ecx        # 0x7ee07ed2
  16:	81 e1 ff ff ff 7f    	and    $0x7fffffff,%ecx
  1c:	75 b5                	jne    0xffffffffffffffd3
  1e:	65 8b 0d 11 7c c3 7e 	mov    %gs:0x7ec37c11(%rip),%ecx        # 0x7ec37c36
  25:	85 c9                	test   %ecx,%ecx
  27:	74 aa                	je     0xffffffffffffffd3
  29:	90                   	nop
  2a:*	0f 0b                	ud2		<-- trapping instruction
  2c:	90                   	nop
  2d:	eb a4                	jmp    0xffffffffffffffd3
  2f:	49 83 fe 29          	cmp    $0x29,%r14
  33:	77 26                	ja     0x5b
  35:	4e 8d 3c f5 88 33 00 	lea    0x3388(,%r14,8),%r15
  3c:	00 
  3d:	f0                   	lock
  3e:	4b                   	rex.WXB
  3f:	01                   	.byte 0x1

Code starting with the faulting instruction
===========================================
   0:	0f 0b                	ud2
   2:	90                   	nop
   3:	eb a4                	jmp    0xffffffffffffffa9
   5:	49 83 fe 29          	cmp    $0x29,%r14
   9:	77 26                	ja     0x31
   b:	4e 8d 3c f5 88 33 00 	lea    0x3388(,%r14,8),%r15
  12:	00 
  13:	f0                   	lock
  14:	4b                   	rex.WXB
  15:	01                   	.byte 0x1
[    4.602165][    T1] RSP: 0000:ffff888100307e20 EFLAGS: 00010202
[    4.602954][    T1] RAX: 00000000001f2cc0 RBX: 0000000000000000 RCX: 0000000000000001
[    4.604020][    T1] RDX: 0000000000000240 RSI: 0000000000000023 RDI: ffffffff83c6ef00
[    4.605021][    T1] RBP: ffff888100307e48 R08: 0000000000000000 R09: 0000000000000000
[    4.605499][    T1] R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff83c6ef00
[    4.606507][    T1] R13: 00000000001f2ce9 R14: 0000000000000028 R15: 0000000000240000
[    4.607520][    T1] FS:  0000000000000000(0000) GS:ffff88842fa00000(0000) knlGS:0000000000000000
[    4.608632][    T1] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[    4.608832][    T1] CR2: ffff88843ffff000 CR3: 0000000003644000 CR4: 00000000000406b0
[    4.609842][    T1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[    4.612168][    T1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[    4.613186][    T1] Call Trace:
[    4.613606][    T1]  <TASK>
[ 4.613982][ T1] ? show_regs (kbuild/src/rand-x86_64-2/arch/x86/kernel/dumpstack.c:479) 
[ 4.614528][ T1] ? __warn (kbuild/src/rand-x86_64-2/kernel/panic.c:677) 
[ 4.615040][ T1] ? __mod_node_page_state (kbuild/src/rand-x86_64-2/mm/vmstat.c:393) 
[ 4.615501][ T1] ? report_bug (kbuild/src/rand-x86_64-2/lib/bug.c:180 kbuild/src/rand-x86_64-2/lib/bug.c:219) 
[ 4.616083][ T1] ? handle_bug (kbuild/src/rand-x86_64-2/arch/x86/kernel/traps.c:237) 
[ 4.616642][ T1] ? exc_invalid_op (kbuild/src/rand-x86_64-2/arch/x86/kernel/traps.c:258 (discriminator 1)) 
[ 4.617240][ T1] ? asm_exc_invalid_op (kbuild/src/rand-x86_64-2/arch/x86/include/asm/idtentry.h:568) 
[ 4.617895][ T1] ? __mod_node_page_state (kbuild/src/rand-x86_64-2/mm/vmstat.c:393) 
[ 4.618575][ T1] init_section_page_ext (kbuild/src/rand-x86_64-2/mm/page_ext.c:292) 
[ 4.618836][ T1] page_ext_init (kbuild/src/rand-x86_64-2/mm/page_ext.c:482) 
[ 4.619433][ T1] page_alloc_init_late (kbuild/src/rand-x86_64-2/mm/mm_init.c:2417) 
[ 4.620098][ T1] kernel_init_freeable (kbuild/src/rand-x86_64-2/init/main.c:1325 kbuild/src/rand-x86_64-2/init/main.c:1547) 
[ 4.620765][ T1] ? rest_init (kbuild/src/rand-x86_64-2/init/main.c:1429) 
[ 4.621325][ T1] kernel_init (kbuild/src/rand-x86_64-2/init/main.c:1439) 
[ 4.621880][ T1] ? schedule_tail (kbuild/src/rand-x86_64-2/kernel/sched/core.c:5318) 
[ 4.622167][ T1] ret_from_fork (kbuild/src/rand-x86_64-2/arch/x86/kernel/process.c:153) 
[ 4.622753][ T1] ? rest_init (kbuild/src/rand-x86_64-2/init/main.c:1429) 
[ 4.623314][ T1] ret_from_fork_asm (kbuild/src/rand-x86_64-2/arch/x86/entry/entry_64.S:312) 
[    4.623942][    T1]  </TASK>
[    4.624331][    T1] irq event stamp: 11857
[ 4.624861][ T1] hardirqs last enabled at (11865): __up_console_sem (kbuild/src/rand-x86_64-2/kernel/printk/printk.c:347 (discriminator 1)) 
[ 4.625498][ T1] hardirqs last disabled at (11874): __up_console_sem (kbuild/src/rand-x86_64-2/kernel/printk/printk.c:345 (discriminator 1)) 
[ 4.626689][ T1] softirqs last enabled at (11546): __do_softirq (kbuild/src/rand-x86_64-2/arch/x86/include/asm/preempt.h:27 kbuild/src/rand-x86_64-2/kernel/softirq.c:400 kbuild/src/rand-x86_64-2/kernel/softirq.c:582) 
[ 4.627866][ T1] softirqs last disabled at (11541): __irq_exit_rcu (kbuild/src/rand-x86_64-2/kernel/softirq.c:427 kbuild/src/rand-x86_64-2/kernel/softirq.c:632) 
[    4.628832][    T1] ---[ end trace 0000000000000000 ]---
[    4.694353][    T1] allocated 301989888 bytes of page_ext



The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20230918/202309181546.fc42f414-oliver.sang@xxxxxxxxx



-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki




[Index of Archives]     [Linux Ext4 Filesystem]     [Union Filesystem]     [Filesystem Testing]     [Ceph Users]     [Ecryptfs]     [NTFS 3]     [AutoFS]     [Kernel Newbies]     [Share Photos]     [Security]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux Cachefs]     [Reiser Filesystem]     [Linux RAID]     [NTFS 3]     [Samba]     [Device Mapper]     [CEPH Development]

  Powered by Linux