Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp10558537rwr; Fri, 12 May 2023 09:37:29 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ5QaDf78KAxZWp5SUoc8joMyBy1mYyew5qoHnjyddcDXM30bM7fN2MBwqkeqmWLxDeSvVyf X-Received: by 2002:a17:902:e786:b0:1ac:7543:bcdf with SMTP id cp6-20020a170902e78600b001ac7543bcdfmr17963071plb.31.1683909449363; Fri, 12 May 2023 09:37:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1683909449; cv=none; d=google.com; s=arc-20160816; b=jOclRyBXHl59u+7I4y8S0UtJTAVshGHmG+HRX+eLIwAYQAkCshbUEWikksTKFh+JOR 8TH/VnsHN0uJFbLiZJ+SyfDaXtrnYzyXoaeqOwzLt3ePWy9aciSNCX1rytf+BuaKttph DV2vHwl/JGrAGWrQXCOEqA/WUnKLj+0Ng9dXju+rnf33NWbPlKT/fADi1IMAEL6F/Rv3 9wtUluygBgoKPj+rxbf8kwaZlhZFYJiZFWn6SjDoxB1rtFgqVJ2T35Y4XzMmDmsKjq+c LNC/LdHgR13DK5V3XCnzY94HemueJLgs5Bu1y7heANQu876ooSDO3KMA8QrYoOFxRrzd mZAA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=Cb8gfCtT31tl0Hd05HJ61jy3YwTBles2tWwg6XzjYyc=; b=vq2W7az9+Q3JNGSeN23Q06TiZCZkt+yGQmn3QdgLNTRlH/wPf0Kg7LUKGFTzGll+do f4UsJra+Upe24w6+VZBv1ammIbz8N45O0JvFa0hIueVGIi59frTf1zegLZPs3VsZ97DV HRRB9PkDdSjc2EbUqgOGavEoXjh0Lecw6sE0p3Sj+k0oJ2W6XOcxmhueXc64ihoy2+yu ccaOQ4Nm0JCUIs887stag6zur/InADRwXF4N4Zu4Jb2Vk4Qrd4iWemREMLMrTxS3VqO7 RQog5WqvThmVfYaGt4qvK7MTz0Gfop/lIkoaSAVdEN2r2g7B3SfEgjFvtmcWkzFVI6HU 9Xew== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=YtE3ivUR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id i18-20020a17090332d200b001a4ee96c00bsi10571991plr.357.2023.05.12.09.37.17; Fri, 12 May 2023 09:37:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=YtE3ivUR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232426AbjELQRM (ORCPT + 99 others); Fri, 12 May 2023 12:17:12 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50628 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229736AbjELQRL (ORCPT ); Fri, 12 May 2023 12:17:11 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1294E19A6 for ; Fri, 12 May 2023 09:17:10 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id A311C60B0A for ; Fri, 12 May 2023 16:17:09 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id A1018C433EF; Fri, 12 May 2023 16:17:08 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1683908229; bh=YXjigyn+19IMlO1lxf+cPZbQn+E2eUsALzNv3T3dLFw=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=YtE3ivURWUhoyS8qYTqGdYjUELGLzAv+pDTUshqp4PZ2u60B2PHJok2E0kC9kTYHC n5ovJwgjekFwHRcoJQeozrYZbKNEglW8CmiWHXc8ejouScq1FApUpW6wUCHCF/syKw z7kHbtRvgHqFp0ORTXsbbb4r+MyliVJe5RSNy4tKN4A3eGoNBp0AuylLFy8Al1zY2W CrgDqGMcqWZkkE8o6C6UMqDuHT+eVszokhcX4DsIK8vLoWLKKZZywJWKqH9SfUg1hM 7RbV6SM5er894efNVDvAacRvK1O461BMjPg9drEauUfpci0OSJyhLRmQMc2InDrXAg GESkWXaJdeYWQ== Date: Fri, 12 May 2023 09:17:07 -0700 From: Mike Rapoport To: Chuck Lever III Cc: Dan Carpenter , Naresh Kamboju , open list , linux-mm , kasan-dev , "kunit-dev@googlegroups.com" , "lkft-triage@lists.linaro.org" , Marco Elver , Andrew Morton , Mel Gorman , Andrey Ryabinin Subject: Re: next: WARNING: CPU: 0 PID: 1200 at mm/page_alloc.c:4744 __alloc_pages+0x2e8/0x3a0 Message-ID: <20230512161707.GH4135@kernel.org> References: <6c7a89ba-1253-41e0-82d0-74a67a2e414e@kili.mountain> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, May 12, 2023 at 01:56:30PM +0000, Chuck Lever III wrote: > > > > On May 12, 2023, at 6:32 AM, Dan Carpenter wrote: > > > > I'm pretty sure Chuck Lever did this intentionally, but he's not on the > > CC list. Let's add him. > > > > regards, > > dan carpenter > > > > On Fri, May 12, 2023 at 06:15:04PM +0530, Naresh Kamboju wrote: > >> Following kernel warning has been noticed on qemu-arm64 while running kunit > >> tests while booting Linux 6.4.0-rc1-next-20230512 and It was started from > >> 6.3.0-rc7-next-20230420. > >> > >> Reported-by: Linux Kernel Functional Testing > >> > >> This is always reproducible on qemu-arm64, qemu-arm, qemu-x86 and qemu-i386. > >> Is this expected warning as a part of kunit tests ? > > Dan's correct, this Kunit test is supposed to check the > behavior of the API when a too-large privsize is specified. > > I'm not sure how to make this work without the superfluous > warning. Would adding GFP_NOWARN to the allocation help? Yes, it should. > >> Crash log: > >> ----------- > >> > >> [ 663.530868] KTAP version 1 > >> [ 663.531545] # Subtest: Handshake API tests > >> [ 663.533521] 1..11 > >> [ 663.534424] KTAP version 1 > >> [ 663.535406] # Subtest: req_alloc API fuzzing > >> [ 663.542460] ok 1 handshake_req_alloc NULL proto > >> [ 663.550345] ok 2 handshake_req_alloc CLASS_NONE > >> [ 663.558041] ok 3 handshake_req_alloc CLASS_MAX > >> [ 663.565790] ok 4 handshake_req_alloc no callbacks > >> [ 663.573882] ok 5 handshake_req_alloc no done callback > >> [ 663.580284] ------------[ cut here ]------------ > >> [ 663.582129] WARNING: CPU: 0 PID: 1200 at mm/page_alloc.c:4744 > >> __alloc_pages+0x2e8/0x3a0 > >> [ 663.585675] Modules linked in: > >> [ 663.587808] CPU: 0 PID: 1200 Comm: kunit_try_catch Tainted: G > >> N 6.4.0-rc1-next-20230512 #1 > >> [ 663.589817] Hardware name: linux,dummy-virt (DT) > >> [ 663.591426] pstate: 22400005 (nzCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) > >> [ 663.592978] pc : __alloc_pages+0x2e8/0x3a0 > >> [ 663.594236] lr : __kmalloc_large_node+0xbc/0x160 > >> [ 663.595548] sp : ffff80000a317bc0 > >> [ 663.596577] x29: ffff80000a317bc0 x28: 0000000000000000 x27: 0000000000000000 > >> [ 663.598863] x26: ffff0000c8925b20 x25: 0000000000000000 x24: 0000000000000015 > >> [ 663.601098] x23: 0000000000040dc0 x22: ffffbf424e7420c8 x21: ffffbf424e7420c8 > >> [ 663.603100] x20: 1ffff00001462f88 x19: 0000000000040dc0 x18: 0000000078b4155a > >> [ 663.605582] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 > >> [ 663.607328] x14: 0000000000000000 x13: 6461657268745f68 x12: ffff60001913bc5a > >> [ 663.609355] x11: 1fffe0001913bc59 x10: ffff60001913bc59 x9 : 1fffe0001913bc59 > >> [ 663.611004] x8 : 0000000041b58ab3 x7 : ffff700001462f88 x6 : dfff800000000000 > >> [ 663.613556] x5 : 00000000f1f1f1f1 x4 : 00000000f2f2f200 x3 : 0000000000000000 > >> [ 663.615364] x2 : 0000000000000000 x1 : 0000000000000001 x0 : ffffbf42516818e2 > >> [ 663.617753] Call trace: > >> [ 663.618486] __alloc_pages+0x2e8/0x3a0 > >> [ 663.619613] __kmalloc_large_node+0xbc/0x160 > >> [ 663.621454] __kmalloc+0x84/0x94 > >> [ 663.622551] handshake_req_alloc+0x74/0xe8 > >> [ 663.623801] handshake_req_alloc_case+0xa0/0x170 > >> [ 663.625467] kunit_try_run_case+0x7c/0x100 > >> [ 663.626592] kunit_generic_run_threadfn_adapter+0x30/0x4c > >> [ 663.628998] kthread+0x1d4/0x1e4 > >> [ 663.629715] ret_from_fork+0x10/0x20 > >> [ 663.631094] ---[ end trace 0000000000000000 ]--- > >> [ 663.643101] ok 6 handshake_req_alloc excessive privsize > >> [ 663.649446] ok 7 handshake_req_alloc all good > >> [ 663.651032] # req_alloc API fuzzing: pass:7 fail:0 skip:0 total:7 > >> [ 663.653941] ok 1 req_alloc API fuzzing > >> [ 663.665951] ok 2 req_submit NULL req arg > >> [ 663.674278] ok 3 req_submit NULL sock arg > >> [ 663.682968] ok 4 req_submit NULL sock->file > >> [ 663.694323] ok 5 req_lookup works > >> [ 663.703604] ok 6 req_submit max pending > >> [ 663.714655] ok 7 req_submit multiple > >> [ 663.725174] ok 8 req_cancel before accept > >> [ 663.733780] ok 9 req_cancel after accept > >> [ 663.742528] ok 10 req_cancel after done > >> [ 663.750637] ok 11 req_destroy works > >> [ 663.751884] # Handshake API tests: pass:11 fail:0 skip:0 total:11 > >> [ 663.753579] # Totals: pass:17 fail:0 skip:0 total:17 > >> > >> links: > >> ------ > >> > >> - https://qa-reports.linaro.org/lkft/linux-next-master/build/next-20230512/testrun/16901289/suite/log-parser-boot/test/check-kernel-exception/log > >> - https://qa-reports.linaro.org/lkft/linux-next-master/build/next-20230512/testrun/16901289/suite/log-parser-boot/tests/ > >> - https://qa-reports.linaro.org/lkft/linux-next-master/build/next-20230420/testrun/16385677/suite/log-parser-boot/test/check-kernel-warning-ac79d2ca0f443d407d9749244f1738c9a2b123c609820f82d9e8907c756f5340/log > >> - https://qa-reports.linaro.org/lkft/linux-next-master/build/next-20230512/testrun/16901289/suite/log-parser-boot/test/check-kernel-warning-ac79d2ca0f443d407d9749244f1738c9a2b123c609820f82d9e8907c756f5340/history/ > >> > >> > >> -- > >> Linaro LKFT > >> https://lkft.linaro.org > > -- > Chuck Lever > > > -- Sincerely yours, Mike.