Re: [PATCH v5 1/1] mm: report per-page metadata information

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 





On Thu, Nov 16, 2023 at 6:43 PM kernel test robot <oliver.sang@xxxxxxxxx> wrote:

hi, Sourav Panda,

we are not sure if this patch is NACKed since
https://lore.kernel.org/all/2023110205-enquirer-sponge-4f35@gregkh/

but seems you still have plan for next version
https://lore.kernel.org/all/CA+CK2bCFgwLXp=pUTKezWtRoCKiDC41DqGXx_kahg0UcB53sPw@xxxxxxxxxxxxxx/

so still send below report to you FYI about what we observed in our tests.


Hello,

kernel test robot noticed "WARNING:at_mm/vmstat.c:#__mod_node_page_state" on:

commit: 77348e22542ef30ac2e12e111fdbe2debe4c8bf7 ("[PATCH v5 1/1] mm: report per-page metadata information")
url: https://github.com/intel-lab-lkp/linux/commits/Sourav-Panda/mm-report-per-page-metadata-information/20231102-071047
base: https://git.kernel.org/cgit/linux/kernel/git/gregkh/driver-core.git effd7c70eaa0440688b60b9d419243695ede3c45
patch link: https://lore.kernel.org/all/20231101230816.1459373-2-souravpanda@xxxxxxxxxx/
patch subject: [PATCH v5 1/1] mm: report per-page metadata information

in testcase: kernel-selftests
version: kernel-selftests-x86_64-60acb023-1_20230329
with following parameters:

        sc_nr_hugepages: 2
        group: mm



compiler: gcc-12
test machine: 36 threads 1 sockets Intel(R) Core(TM) i9-10980XE CPU @ 3.00GHz (Cascade Lake) with 32G memory

(please refer to attached dmesg/kmsg for entire log/backtrace)



If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@xxxxxxxxx>
| Closes: https://lore.kernel.org/oe-lkp/202311171013.fb3e52d3-oliver.sang@xxxxxxxxx


kern  :warn  : [  625.944628] ------------[ cut here ]------------
kern :warn : [  625.945623] WARNING: CPU: 30 PID: 16422 at mm/vmstat.c:393 __mod_node_page_state (mm/vmstat.c:393)
kern  :warn  : [  625.946550] Modules linked in: test_hmm(+) netconsole openvswitch nf_conncount nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 intel_rapl_msr intel_rapl_common nfit libnvdimm x86_pkg_temp_thermal intel_powerclamp btrfs blake2b_generic xor coretemp kvm_intel raid6_pq zstd_compress kvm libcrc32c irqbypass crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel sha512_ssse3 rapl intel_cstate nvme nvme_core ahci t10_pi ipmi_devintf libahci ipmi_msghandler wmi_bmof mxm_wmi intel_wmi_thunderbolt crc64_rocksoft_generic i2c_i801 crc64_rocksoft intel_uncore wdat_wdt crc64 libata mei_me i2c_smbus ioatdma mei dca wmi binfmt_misc fuse drm ip_tables
kern  :warn  : [  625.951800] CPU: 30 PID: 16422 Comm: modprobe Not tainted 6.6.0-rc4-00022-g77348e22542e #1
kern  :warn  : [  625.952689] Hardware name: Gigabyte Technology Co., Ltd. X299 UD4 Pro/X299 UD4 Pro-CF, BIOS F8a 04/27/2021
kern :warn : [  625.953692] RIP: 0010:__mod_node_page_state (mm/vmstat.c:393)
kern :warn : [ 625.954310] Code: 1c 24 48 83 c4 08 5b 5d 41 5c 41 5d 41 5e 41 5f c3 65 8b 05 78 ad 77 7e a9 ff ff ff 7f 75 bb 65 8b 05 9e 79 76 7e 85 c0 74 b0 <0f> 0b eb ac 49 83 fd 2c 77 7b 4e 8d 34 ed c8 a5 02 00 be 08 00 00
All code
========
   0:   1c 24                   sbb    $0x24,%al
   2:   48 83 c4 08             add    $0x8,%rsp
   6:   5b                      pop    %rbx
   7:   5d                      pop    %rbp
   8:   41 5c                   pop    %r12
   a:   41 5d                   pop    %r13
   c:   41 5e                   pop    %r14
   e:   41 5f                   pop    %r15
  10:   c3                      retq   
  11:   65 8b 05 78 ad 77 7e    mov    %gs:0x7e77ad78(%rip),%eax        # 0x7e77ad90
  18:   a9 ff ff ff 7f          test   $0x7fffffff,%eax
  1d:   75 bb                   jne    0xffffffffffffffda
  1f:   65 8b 05 9e 79 76 7e    mov    %gs:0x7e76799e(%rip),%eax        # 0x7e7679c4
  26:   85 c0                   test   %eax,%eax
  28:   74 b0                   je     0xffffffffffffffda
  2a:*  0f 0b                   ud2             <-- trapping instruction
  2c:   eb ac                   jmp    0xffffffffffffffda
  2e:   49 83 fd 2c             cmp    $0x2c,%r13
  32:   77 7b                   ja     0xaf
  34:   4e 8d 34 ed c8 a5 02    lea    0x2a5c8(,%r13,8),%r14
  3b:   00
  3c:   be                      .byte 0xbe
  3d:   08 00                   or     %al,(%rax)
        ...

Code starting with the faulting instruction
===========================================
   0:   0f 0b                   ud2   
   2:   eb ac                   jmp    0xffffffffffffffb0
   4:   49 83 fd 2c             cmp    $0x2c,%r13
   8:   77 7b                   ja     0x85
   a:   4e 8d 34 ed c8 a5 02    lea    0x2a5c8(,%r13,8),%r14
  11:   00
  12:   be                      .byte 0xbe
  13:   08 00                   or     %al,(%rax)
        ...
kern  :warn  : [  625.956115] RSP: 0018:ffffc90000d7f548 EFLAGS: 00010202
kern  :warn  : [  625.956726] RAX: 0000000000000001 RBX: 00000003ffff8000 RCX: 1ffffffff0aeddef
kern  :warn  : [  625.957526] RDX: 0000000000000000 RSI: 0000000000000026 RDI: ffff88889fffe5c0
kern  :warn  : [  625.958414] RBP: ffff88889ffd4000 R08: 0000000000000007 R09: fffffbfff091ebd4
kern  :warn  : [  625.959207] R10: ffffffff848f5ea3 R11: 0000000000000001 R12: 00000000000427ec
kern  :warn  : [  625.960008] R13: 000000000000002b R14: 0000000000000200 R15: 00000000000427c0
kern  :warn  : [  625.960786] FS:  00007fca350f5740(0000) GS:ffff88880f100000(0000) knlGS:0000000000000000
kern  :warn  : [  625.961664] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
kern  :warn  : [  625.962342] CR2: 00007f643c75d000 CR3: 00000002c7c44003 CR4: 00000000003706e0
kern  :warn  : [  625.963132] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
kern  :warn  : [  625.963923] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
kern  :warn  : [  625.964702] Call Trace:
kern  :warn  : [  625.965089]  <TASK>
kern :warn : [  625.965436] ? __warn (kernel/panic.c:673)
kern :warn : [  625.965898] ? __mod_node_page_state (mm/vmstat.c:393)
kern :warn : [  625.966450] ? report_bug (lib/bug.c:180 lib/bug.c:219)
kern :warn : [  625.966947] ? handle_bug (arch/x86/kernel/traps.c:237)
kern :warn : [  625.967409] ? exc_invalid_op (arch/x86/kernel/traps.c:258 (discriminator 1))
kern :warn : [  625.967914] ? asm_exc_invalid_op (arch/x86/include/asm/idtentry.h:568)
kern :warn : [  625.968445] ? __mod_node_page_state (mm/vmstat.c:393)
kern :warn : [  625.969014] __populate_section_memmap (mm/sparse-vmemmap.c:475)
kern :warn : [  625.969591] ? kasan_set_track (mm/kasan/common.c:52)
kern :warn : [  625.970103] sparse_add_section (mm/sparse.c:867 mm/sparse.c:907)
kern :warn : [  625.970628] ? sparse_buffer_alloc (mm/sparse.c:897)
kern :warn : [  625.971177] __add_pages (mm/memory_hotplug.c:403)
kern :warn : [  625.971650] add_pages (arch/x86/mm/init_64.c:956)
kern :warn : [  625.972113] pagemap_range (mm/memremap.c:250)
kern :warn : [  625.972609] ? memremap_compat_align (mm/memremap.c:163)
kern :warn : [  625.973162] ? percpu_ref_init (arch/x86/include/asm/atomic64_64.h:20 include/linux/atomic/atomic-arch-fallback.h:2602 include/linux/atomic/atomic-long.h:79 include/linux/atomic/atomic-instrumented.h:3196 lib/percpu-refcount.c:98)
kern :warn : [  625.973678] memremap_pages (mm/memremap.c:367)
kern :warn : [  625.974187] ? pagemap_range (mm/memremap.c:292)
kern :warn : [  625.974697] ? kasan_set_track (mm/kasan/common.c:52)
kern :warn : [  625.975209] ? __kmalloc_node_track_caller (include/trace/events/kmem.h:54 include/trace/events/kmem.h:54 mm/slab_common.c:1024 mm/slab_common.c:1043)
kern :warn : [  625.975802] dmirror_allocate_chunk (include/linux/err.h:72 lib/test_hmm.c:552) test_hmm
kern :warn : [  625.976483] hmm_dmirror_init (lib/test_hmm.c:267) test_hmm
kern  :warn  : [  625.977092]  ? 0xffffffffc14b1000
kern :warn : [  625.977539] do_one_initcall (init/main.c:1232)
kern :warn : [  625.978044] ? trace_event_raw_event_initcall_level (init/main.c:1223)
kern :warn : [  625.978718] ? kasan_unpoison (mm/kasan/shadow.c:160 mm/kasan/shadow.c:194)
kern :warn : [  625.979261] do_init_module (kernel/module/main.c:2530)
kern :warn : [  625.979761] load_module (kernel/module/main.c:2981)
kern :warn : [  625.980267] ? post_relocation (kernel/module/main.c:2830)
kern :warn : [  625.980782] ? kernel_read_file (arch/x86/include/asm/atomic.h:53 include/linux/atomic/atomic-arch-fallback.h:979 include/linux/atomic/atomic-instrumented.h:436 include/linux/fs.h:2740 fs/kernel_read_file.c:122)
kern :warn : [  625.981318] ? __x64_sys_fspick (fs/kernel_read_file.c:38)
kern :warn : [  625.981858] ? init_module_from_file (kernel/module/main.c:3148)
kern :warn : [  625.982408] init_module_from_file (kernel/module/main.c:3148)
kern :warn : [  625.982959] ? __ia32_sys_init_module (kernel/module/main.c:3124)
kern :warn : [  625.983508] ? __lock_release+0x111/0x440
kern :warn : [  625.984078] ? idempotent_init_module (kernel/module/main.c:3094 kernel/module/main.c:3159)
kern :warn : [  625.984743] ? idempotent_init_module (kernel/module/main.c:3094 kernel/module/main.c:3159)
kern :warn : [  625.985347] ? do_raw_spin_unlock (arch/x86/include/asm/atomic.h:23 include/linux/atomic/atomic-arch-fallback.h:444 include/linux/atomic/atomic-instrumented.h:33 include/asm-generic/qspinlock.h:57 kernel/locking/spinlock_debug.c:100 kernel/locking/spinlock_debug.c:140)
kern :warn : [  625.985895] idempotent_init_module (kernel/module/main.c:3165)
kern :warn : [  625.986448] ? init_module_from_file (kernel/module/main.c:3152)
kern :warn : [  625.987029] ? security_capable (security/security.c:946 (discriminator 13))
kern :warn : [  625.987540] __x64_sys_finit_module (include/linux/file.h:45 kernel/module/main.c:3187 kernel/module/main.c:3169 kernel/module/main.c:3169)
kern :warn : [  625.988090] do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80)
kern :warn : [  625.988576] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:120)
kern  :warn  : [  625.989174] RIP: 0033:0x7fca352005a9
kern :warn : [ 625.989645] Code: 08 89 e8 5b 5d c3 66 2e 0f 1f 84 00 00 00 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 27 08 0d 00 f7 d8 64 89 01 48
All code
========
   0:   08 89 e8 5b 5d c3       or     %cl,-0x3ca2a418(%rcx)
   6:   66 2e 0f 1f 84 00 00    nopw   %cs:0x0(%rax,%rax,1)
   d:   00 00 00
  10:   90                      nop
  11:   48 89 f8                mov    %rdi,%rax
  14:   48 89 f7                mov    %rsi,%rdi
  17:   48 89 d6                mov    %rdx,%rsi
  1a:   48 89 ca                mov    %rcx,%rdx
  1d:   4d 89 c2                mov    %r8,%r10
  20:   4d 89 c8                mov    %r9,%r8
  23:   4c 8b 4c 24 08          mov    0x8(%rsp),%r9
  28:   0f 05                   syscall
  2a:*  48 3d 01 f0 ff ff       cmp    $0xfffffffffffff001,%rax         <-- trapping instruction
  30:   73 01                   jae    0x33
  32:   c3                      retq   
  33:   48 8b 0d 27 08 0d 00    mov    0xd0827(%rip),%rcx        # 0xd0861
  3a:   f7 d8                   neg    %eax
  3c:   64 89 01                mov    %eax,%fs:(%rcx)
  3f:   48                      rex.W

Code starting with the faulting instruction
===========================================
   0:   48 3d 01 f0 ff ff       cmp    $0xfffffffffffff001,%rax
   6:   73 01                   jae    0x9
   8:   c3                      retq   
   9:   48 8b 0d 27 08 0d 00    mov    0xd0827(%rip),%rcx        # 0xd0837
  10:   f7 d8                   neg    %eax
  12:   64 89 01                mov    %eax,%fs:(%rcx)
  15:   48                      rex.W


The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20231117/202311171013.fb3e52d3-oliver.sang@xxxxxxxxx



--
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki


Thank you for pointing this out. This will be fixed with the next patch along with the several interface changes proposed by the community.

Thank you again.
With regards,
Sourav Panda



[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Bugtraq]     [Linux OMAP]     [Linux MIPS]     [eCos]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux