[linux-next:master] [alloc_tag] 0d1ae800a1: WARNING:at_include/linux/alloc_tag.h:#__pgalloc_tag_sub

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



hi, Suren Baghdasaryan and all,

we know that this commit is not the root cause of the WARNING. it just changes
the WARNING stats bot captured.

fd942e78294214c8 0d1ae800a1923762d8240dc4987
---------------- ---------------------------
       fail:runs  %reproduction    fail:runs
           |             |             |
           :6           50%           3:6     dmesg.WARNING:at_include/linux/alloc_tag.h:#__pgalloc_tag_sub
          6:6         -100%            :6     dmesg.WARNING:at_include/linux/alloc_tag.h:#pgalloc_tag_sub

we made out this report just FYI, in case anybody has interests to look further
about this existing WARNING.

below is full report.


Hello,

kernel test robot noticed "WARNING:at_include/linux/alloc_tag.h:#__pgalloc_tag_sub" on:

commit: 0d1ae800a1923762d8240dc4987761f29a35d1a9 ("alloc_tag: uninline code gated by mem_alloc_profiling_key in page allocator")
https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git master

[test failed on linux-next/master 7b7a883c7f4de1ee5040bd1c32aabaafde54d209]

in testcase: trinity
version: trinity-i386-abe9de86-1_20230429
with following parameters:

	runtime: 300s
	group: group-02
	nr_groups: 5



config: x86_64-randconfig-071-20250210
compiler: clang-19
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G

(please refer to attached dmesg/kmsg for entire log/backtrace)



If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@xxxxxxxxx>
| Closes: https://lore.kernel.org/oe-lkp/202502141006.21ae07ee-lkp@xxxxxxxxx


[  115.486807][ T6579] ------------[ cut here ]------------
[  115.487378][ T6579] alloc_tag was not set
[ 115.487709][ T6579] WARNING: CPU: 0 PID: 6579 at include/linux/alloc_tag.h:152 __pgalloc_tag_sub (include/linux/alloc_tag.h:152) 
[  115.488409][ T6579] Modules linked in: 8021q mrp garp stp qrtr nfc caif_socket caif phonet llc2 llc sha1_ssse3 serio_raw tiny_power_button button
[  115.489418][ T6579] CPU: 0 UID: 0 PID: 6579 Comm: date Tainted: G                T  6.14.0-rc2-00048-g0d1ae800a192 #1 2337137258306bf95f42324e33e4040ee055b8c6
[  115.490636][ T6579] Tainted: [T]=RANDSTRUCT
[  115.490962][ T6579] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
[ 115.491699][ T6579] RIP: 0010:__pgalloc_tag_sub (include/linux/alloc_tag.h:152) 
[ 115.492110][ T6579] Code: 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d c3 90 0f 0b 90 eb eb c6 05 0b ed 01 03 01 48 c7 c7 20 76 f2 ad 90 e8 81 7e c0 ff 90 <0f> 0b 90 90 4c 8b 7d d0 4d 85 ff 0f 85 25 ff ff ff e9 72 ff ff ff
All code
========
   0:	48 83 c4 08          	add    $0x8,%rsp
   4:	5b                   	pop    %rbx
   5:	41 5c                	pop    %r12
   7:	41 5d                	pop    %r13
   9:	41 5e                	pop    %r14
   b:	41 5f                	pop    %r15
   d:	5d                   	pop    %rbp
   e:	c3                   	ret
   f:	90                   	nop
  10:	0f 0b                	ud2
  12:	90                   	nop
  13:	eb eb                	jmp    0x0
  15:	c6 05 0b ed 01 03 01 	movb   $0x1,0x301ed0b(%rip)        # 0x301ed27
  1c:	48 c7 c7 20 76 f2 ad 	mov    $0xffffffffadf27620,%rdi
  23:	90                   	nop
  24:	e8 81 7e c0 ff       	call   0xffffffffffc07eaa
  29:	90                   	nop
  2a:*	0f 0b                	ud2		<-- trapping instruction
  2c:	90                   	nop
  2d:	90                   	nop
  2e:	4c 8b 7d d0          	mov    -0x30(%rbp),%r15
  32:	4d 85 ff             	test   %r15,%r15
  35:	0f 85 25 ff ff ff    	jne    0xffffffffffffff60
  3b:	e9 72 ff ff ff       	jmp    0xffffffffffffffb2

Code starting with the faulting instruction
===========================================
   0:	0f 0b                	ud2
   2:	90                   	nop
   3:	90                   	nop
   4:	4c 8b 7d d0          	mov    -0x30(%rbp),%r15
   8:	4d 85 ff             	test   %r15,%r15
   b:	0f 85 25 ff ff ff    	jne    0xffffffffffffff36
  11:	e9 72 ff ff ff       	jmp    0xffffffffffffff88
[  115.493423][ T6579] RSP: 0000:ffff888137d8f340 EFLAGS: 00010286
[  115.493859][ T6579] RAX: 0000000000000015 RBX: ffff8881064018f8 RCX: 0000000000000000
[  115.494407][ T6579] RDX: 0000000000000001 RSI: 0000000000000004 RDI: 0000000000000001
[  115.494963][ T6579] RBP: ffff888137d8f370 R08: ffffffffaef2cdb3 R09: 1ffffffff5de59b6
[  115.495520][ T6579] R10: dffffc0000000000 R11: fffffbfff5de59b7 R12: ffffea00040013d8
[  115.496063][ T6579] R13: dffffc0000000000 R14: 0000000000001000 R15: 0000000000000000
[  115.496621][ T6579] FS:  0000000000000000(0000) GS:ffffffffaeabf000(0000) knlGS:0000000000000000
[  115.497251][ T6579] CS:  0010 DS: 002b ES: 002b CR0: 0000000080050033
[  115.497706][ T6579] CR2: 00000000ff941ee0 CR3: 0000000127139000 CR4: 00000000000406b0
[  115.498261][ T6579] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  115.498840][ T6579] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  115.499429][ T6579] Call Trace:
[  115.499681][ T6579]  <TASK>
[ 115.499913][ T6579] ? show_regs (arch/x86/kernel/dumpstack.c:479) 
[ 115.500340][ T6579] ? __warn (kernel/panic.c:748) 
[ 115.500642][ T6579] ? __pgalloc_tag_sub (include/linux/alloc_tag.h:152) 
[ 115.501001][ T6579] ? __pgalloc_tag_sub (include/linux/alloc_tag.h:152) 
[ 115.501369][ T6579] ? report_bug (lib/bug.c:?) 
[ 115.501693][ T6579] ? handle_bug (arch/x86/kernel/traps.c:285) 
[ 115.502002][ T6579] ? exc_invalid_op (arch/x86/kernel/traps.c:309) 
[ 115.502337][ T6579] ? asm_exc_invalid_op (arch/x86/include/asm/idtentry.h:621) 
[ 115.502715][ T6579] ? __pgalloc_tag_sub (include/linux/alloc_tag.h:152) 
[ 115.503097][ T6579] free_frozen_pages (include/linux/mm.h:2250 mm/page_alloc.c:1210 mm/page_alloc.c:2738) 
[ 115.503472][ T6579] __free_slab (mm/slub.c:2669) 
[ 115.503801][ T6579] free_slab (mm/slub.c:2692) 
[ 115.504112][ T6579] discard_slab (mm/slub.c:2698) 
[ 115.504434][ T6579] __slab_free (mm/slub.c:?) 
[ 115.504772][ T6579] ? qlist_free_all (mm/kasan/quarantine.c:163) 
[ 115.505111][ T6579] ___cache_free (mm/slub.c:4575) 
[ 115.505447][ T6579] qlist_free_all (mm/kasan/quarantine.c:174) 
[ 115.505777][ T6579] kasan_quarantine_reduce (mm/kasan/quarantine.c:287) 
[ 115.506170][ T6579] __kasan_slab_alloc (mm/kasan/common.c:331) 
[ 115.506526][ T6579] kmem_cache_alloc_noprof (mm/slub.c:4129) 
[ 115.506911][ T6579] ? vm_area_dup (include/linux/sched.h:2248) 
[ 115.507234][ T6579] vm_area_dup (include/linux/sched.h:2248) 
[ 115.507551][ T6579] __split_vma (mm/vma.c:481) 
[ 115.507889][ T6579] vms_gather_munmap_vmas (mm/vma.c:1307) 
[ 115.508307][ T6579] mmap_region (mm/vma.c:2259) 
[ 115.508610][ T6579] ? __kasan_check_read (mm/kasan/shadow.c:31) 
[ 115.508961][ T6579] ? validate_chain (arch/x86/include/asm/bitops.h:227 arch/x86/include/asm/bitops.h:239 include/asm-generic/bitops/instrumented-non-atomic.h:142 kernel/locking/lockdep.c:230 kernel/locking/lockdep.c:3818 kernel/locking/lockdep.c:3874) 
[ 115.509301][ T6579] ? perf_event_mmap (kernel/events/core.c:9193) 
[ 115.509759][ T6579] do_mmap (mm/mmap.c:561) 
[ 115.510073][ T6579] vm_mmap_pgoff (mm/util.c:575) 
[ 115.510467][ T6579] ksys_mmap_pgoff (mm/mmap.c:607) 
[ 115.510820][ T6579] __ia32_sys_mmap_pgoff (mm/mmap.c:614) 
[ 115.511197][ T6579] ia32_sys_call (kbuild/obj/consumer/x86_64-randconfig-071-20250210/./arch/x86/include/generated/asm/syscalls_32.h:317) 
[ 115.511542][ T6579] do_int80_emulation (arch/x86/entry/common.c:?) 
[ 115.511914][ T6579] ? up_write (arch/x86/include/asm/preempt.h:103 kernel/locking/rwsem.c:1375 kernel/locking/rwsem.c:1630) 
[ 115.512237][ T6579] ? vm_mmap_pgoff (mm/util.c:579) 
[ 115.512587][ T6579] ? fput (arch/x86/include/asm/preempt.h:103 include/linux/preempt.h:480 include/linux/file_ref.h:161 fs/file_table.c:516) 
[ 115.512885][ T6579] ? __this_cpu_preempt_check (lib/smp_processor_id.c:67) 
[ 115.513279][ T6579] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4470) 
[ 115.513639][ T6579] ? syscall_exit_to_user_mode (kernel/entry/common.c:221) 
[ 115.514057][ T6579] ? do_int80_emulation (arch/x86/entry/common.c:257) 
[ 115.514418][ T6579] ? __this_cpu_preempt_check (lib/smp_processor_id.c:67) 
[ 115.514793][ T6579] ? trace_hardirqs_off_finish (include/trace/events/preemptirq.h:36) 
[ 115.515191][ T6579] ? do_int80_emulation (include/linux/entry-common.h:118) 
[ 115.515553][ T6579] asm_int80_emulation (arch/x86/include/asm/idtentry.h:626) 
[  115.515906][ T6579] RIP: 0023:0xf7f7ccb0
[ 115.516201][ T6579] Code: 4c 24 34 89 44 24 0c 8b 44 24 44 8b 54 24 38 8b 74 24 3c 8b 7c 24 40 a9 ff 0f 00 00 75 1c c1 e8 0c 89 c5 b8 c0 00 00 00 cd 80 <3d> 00 f0 ff ff 77 21 83 c4 1c 5b 5e 5f 5d c3 90 83 c4 1c b8 ea ff
All code
========
   0:	4c 24 34             	rex.WR and $0x34,%al
   3:	89 44 24 0c          	mov    %eax,0xc(%rsp)
   7:	8b 44 24 44          	mov    0x44(%rsp),%eax
   b:	8b 54 24 38          	mov    0x38(%rsp),%edx
   f:	8b 74 24 3c          	mov    0x3c(%rsp),%esi
  13:	8b 7c 24 40          	mov    0x40(%rsp),%edi
  17:	a9 ff 0f 00 00       	test   $0xfff,%eax
  1c:	75 1c                	jne    0x3a
  1e:	c1 e8 0c             	shr    $0xc,%eax
  21:	89 c5                	mov    %eax,%ebp
  23:	b8 c0 00 00 00       	mov    $0xc0,%eax
  28:	cd 80                	int    $0x80
  2a:*	3d 00 f0 ff ff       	cmp    $0xfffff000,%eax		<-- trapping instruction
  2f:	77 21                	ja     0x52
  31:	83 c4 1c             	add    $0x1c,%esp
  34:	5b                   	pop    %rbx
  35:	5e                   	pop    %rsi
  36:	5f                   	pop    %rdi
  37:	5d                   	pop    %rbp
  38:	c3                   	ret
  39:	90                   	nop
  3a:	83 c4 1c             	add    $0x1c,%esp
  3d:	b8                   	.byte 0xb8
  3e:	ea                   	(bad)
  3f:	ff                   	.byte 0xff

Code starting with the faulting instruction
===========================================
   0:	3d 00 f0 ff ff       	cmp    $0xfffff000,%eax
   5:	77 21                	ja     0x28
   7:	83 c4 1c             	add    $0x1c,%esp
   a:	5b                   	pop    %rbx
   b:	5e                   	pop    %rsi
   c:	5f                   	pop    %rdi
   d:	5d                   	pop    %rbp
   e:	c3                   	ret
   f:	90                   	nop
  10:	83 c4 1c             	add    $0x1c,%esp
  13:	b8                   	.byte 0xb8
  14:	ea                   	(bad)
  15:	ff                   	.byte 0xff


The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20250214/202502141006.21ae07ee-lkp@xxxxxxxxx



-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki





[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Bugtraq]     [Linux OMAP]     [Linux MIPS]     [eCos]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux