Re: [PATCH v1 1/1] mm: report per-page metadata information
From: kernel test robot
Date: Mon Sep 18 2023 - 04:17:51 EST
Hello,
kernel test robot noticed "WARNING:at_mm/vmstat.c:#__mod_node_page_state" on:
commit: af92fce0e99952613b7dac06b40a35decef4cad9 ("[PATCH v1 1/1] mm: report per-page metadata information")
url: https://github.com/intel-lab-lkp/linux/commits/Sourav-Panda/mm-report-per-page-metadata-information/20230914-013201
base: https://git.kernel.org/cgit/linux/kernel/git/akpm/mm.git mm-everything
patch link: https://lore.kernel.org/all/20230913173000.4016218-2-souravpanda@xxxxxxxxxx/
patch subject: [PATCH v1 1/1] mm: report per-page metadata information
in testcase: boot
compiler: gcc-12
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G
(please refer to attached dmesg/kmsg for entire log/backtrace)
If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@xxxxxxxxx>
| Closes: https://lore.kernel.org/oe-lkp/202309181546.fc42f414-oliver.sang@xxxxxxxxx
[ 4.596915][ T1] ------------[ cut here ]------------
[ 4.597618][ T1] WARNING: CPU: 0 PID: 1 at mm/vmstat.c:393 __mod_node_page_state (kbuild/src/rand-x86_64-2/mm/vmstat.c:393)
[ 4.598717][ T1] Modules linked in:
[ 4.598835][ T1] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 6.6.0-rc1-00154-gaf92fce0e999 #4
[ 4.599915][ T1] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
[ 4.601238][ T1] RIP: 0010:__mod_node_page_state (kbuild/src/rand-x86_64-2/mm/vmstat.c:393)
[ 4.602031][ T1] Code: 5e 41 5f 5d 31 c0 31 d2 31 c9 31 f6 31 ff c3 65 8b 0d bc 7e e0 7e 81 e1 ff ff ff 7f 75 b5 65 8b 0d 11 7c c3 7e 85 c9 74 aa 90 <0f> 0b 90 eb a4 49 83 fe 29 77 26 4e 8d 3c f5 88 33 00 00 f0 4b 01
All code
========
0: 5e pop %rsi
1: 41 5f pop %r15
3: 5d pop %rbp
4: 31 c0 xor %eax,%eax
6: 31 d2 xor %edx,%edx
8: 31 c9 xor %ecx,%ecx
a: 31 f6 xor %esi,%esi
c: 31 ff xor %edi,%edi
e: c3 ret
f: 65 8b 0d bc 7e e0 7e mov %gs:0x7ee07ebc(%rip),%ecx # 0x7ee07ed2
16: 81 e1 ff ff ff 7f and $0x7fffffff,%ecx
1c: 75 b5 jne 0xffffffffffffffd3
1e: 65 8b 0d 11 7c c3 7e mov %gs:0x7ec37c11(%rip),%ecx # 0x7ec37c36
25: 85 c9 test %ecx,%ecx
27: 74 aa je 0xffffffffffffffd3
29: 90 nop
2a:* 0f 0b ud2 <-- trapping instruction
2c: 90 nop
2d: eb a4 jmp 0xffffffffffffffd3
2f: 49 83 fe 29 cmp $0x29,%r14
33: 77 26 ja 0x5b
35: 4e 8d 3c f5 88 33 00 lea 0x3388(,%r14,8),%r15
3c: 00
3d: f0 lock
3e: 4b rex.WXB
3f: 01 .byte 0x1
Code starting with the faulting instruction
===========================================
0: 0f 0b ud2
2: 90 nop
3: eb a4 jmp 0xffffffffffffffa9
5: 49 83 fe 29 cmp $0x29,%r14
9: 77 26 ja 0x31
b: 4e 8d 3c f5 88 33 00 lea 0x3388(,%r14,8),%r15
12: 00
13: f0 lock
14: 4b rex.WXB
15: 01 .byte 0x1
[ 4.602165][ T1] RSP: 0000:ffff888100307e20 EFLAGS: 00010202
[ 4.602954][ T1] RAX: 00000000001f2cc0 RBX: 0000000000000000 RCX: 0000000000000001
[ 4.604020][ T1] RDX: 0000000000000240 RSI: 0000000000000023 RDI: ffffffff83c6ef00
[ 4.605021][ T1] RBP: ffff888100307e48 R08: 0000000000000000 R09: 0000000000000000
[ 4.605499][ T1] R10: 0000000000000000 R11: 0000000000000000 R12: ffffffff83c6ef00
[ 4.606507][ T1] R13: 00000000001f2ce9 R14: 0000000000000028 R15: 0000000000240000
[ 4.607520][ T1] FS: 0000000000000000(0000) GS:ffff88842fa00000(0000) knlGS:0000000000000000
[ 4.608632][ T1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 4.608832][ T1] CR2: ffff88843ffff000 CR3: 0000000003644000 CR4: 00000000000406b0
[ 4.609842][ T1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 4.612168][ T1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 4.613186][ T1] Call Trace:
[ 4.613606][ T1] <TASK>
[ 4.613982][ T1] ? show_regs (kbuild/src/rand-x86_64-2/arch/x86/kernel/dumpstack.c:479)
[ 4.614528][ T1] ? __warn (kbuild/src/rand-x86_64-2/kernel/panic.c:677)
[ 4.615040][ T1] ? __mod_node_page_state (kbuild/src/rand-x86_64-2/mm/vmstat.c:393)
[ 4.615501][ T1] ? report_bug (kbuild/src/rand-x86_64-2/lib/bug.c:180 kbuild/src/rand-x86_64-2/lib/bug.c:219)
[ 4.616083][ T1] ? handle_bug (kbuild/src/rand-x86_64-2/arch/x86/kernel/traps.c:237)
[ 4.616642][ T1] ? exc_invalid_op (kbuild/src/rand-x86_64-2/arch/x86/kernel/traps.c:258 (discriminator 1))
[ 4.617240][ T1] ? asm_exc_invalid_op (kbuild/src/rand-x86_64-2/arch/x86/include/asm/idtentry.h:568)
[ 4.617895][ T1] ? __mod_node_page_state (kbuild/src/rand-x86_64-2/mm/vmstat.c:393)
[ 4.618575][ T1] init_section_page_ext (kbuild/src/rand-x86_64-2/mm/page_ext.c:292)
[ 4.618836][ T1] page_ext_init (kbuild/src/rand-x86_64-2/mm/page_ext.c:482)
[ 4.619433][ T1] page_alloc_init_late (kbuild/src/rand-x86_64-2/mm/mm_init.c:2417)
[ 4.620098][ T1] kernel_init_freeable (kbuild/src/rand-x86_64-2/init/main.c:1325 kbuild/src/rand-x86_64-2/init/main.c:1547)
[ 4.620765][ T1] ? rest_init (kbuild/src/rand-x86_64-2/init/main.c:1429)
[ 4.621325][ T1] kernel_init (kbuild/src/rand-x86_64-2/init/main.c:1439)
[ 4.621880][ T1] ? schedule_tail (kbuild/src/rand-x86_64-2/kernel/sched/core.c:5318)
[ 4.622167][ T1] ret_from_fork (kbuild/src/rand-x86_64-2/arch/x86/kernel/process.c:153)
[ 4.622753][ T1] ? rest_init (kbuild/src/rand-x86_64-2/init/main.c:1429)
[ 4.623314][ T1] ret_from_fork_asm (kbuild/src/rand-x86_64-2/arch/x86/entry/entry_64.S:312)
[ 4.623942][ T1] </TASK>
[ 4.624331][ T1] irq event stamp: 11857
[ 4.624861][ T1] hardirqs last enabled at (11865): __up_console_sem (kbuild/src/rand-x86_64-2/kernel/printk/printk.c:347 (discriminator 1))
[ 4.625498][ T1] hardirqs last disabled at (11874): __up_console_sem (kbuild/src/rand-x86_64-2/kernel/printk/printk.c:345 (discriminator 1))
[ 4.626689][ T1] softirqs last enabled at (11546): __do_softirq (kbuild/src/rand-x86_64-2/arch/x86/include/asm/preempt.h:27 kbuild/src/rand-x86_64-2/kernel/softirq.c:400 kbuild/src/rand-x86_64-2/kernel/softirq.c:582)
[ 4.627866][ T1] softirqs last disabled at (11541): __irq_exit_rcu (kbuild/src/rand-x86_64-2/kernel/softirq.c:427 kbuild/src/rand-x86_64-2/kernel/softirq.c:632)
[ 4.628832][ T1] ---[ end trace 0000000000000000 ]---
[ 4.694353][ T1] allocated 301989888 bytes of page_ext
The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20230918/202309181546.fc42f414-oliver.sang@xxxxxxxxx
--
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki