Received: by 2002:a05:7412:8521:b0:e2:908c:2ebd with SMTP id t33csp286755rdf; Thu, 2 Nov 2023 23:54:54 -0700 (PDT) X-Google-Smtp-Source: AGHT+IGT5Kmtm2ted3wRc08dVDTSeH3WRT0A2UAMPgQkuyfgI4iL1lMov/sJzTIpdX/w/HIbRVsq X-Received: by 2002:a17:90a:ca13:b0:27f:fce3:2266 with SMTP id x19-20020a17090aca1300b0027ffce32266mr18356415pjt.24.1698994494362; Thu, 02 Nov 2023 23:54:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1698994494; cv=none; d=google.com; s=arc-20160816; b=CVLICuWukXMUHqUvfiyKk+Lb+YSQBIguAQVAn52bvIMYtRbynexpr4pOBs3uyrZBED CxLJgDrn8JX9VUuxEmva5cRHi5DWmuC8gNCPT7frlanyliNrqTgBYqrPNlW3XO2XffTe zZz9atIrRcGL1An4PcOuXNEs53rYTdf/jb9GjHRix/r0ABFT1bTZ0TmhqzbMynPGibNb mRHnJEZjI6jTIEOnD9cn4B1gQeA7F9lcbrZV/ukAveuA2iUIzwSBF8ZFAq/5FAuCcM4x 2BGY53uWqctIpWRtp0TaYFryw9MY1tCITeh8PWaR8cWCVusOKAncUy+UGcOgNbK2a87h i2Cw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-language:content-transfer-encoding :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=Ezk3hSW80YzKko8u4j3zwmGVmBrn0Cjy4njMbRz5p04=; fh=SfUZBgLh5owBJcWXFZN9MUiw78sTynEx4Vb0L1Y3vZ0=; b=RuEqGTuyU0KL3B0kx4TRyp0DJ1jjGHpHUUu9GoyI7Wz5oXCJ/n4zmUAU96isxxE7tz ABVzae6hg6M8uqbvVVzff+UYlRCN1TKbfm2uwMmESjotPHmKHgbb1sKDvMKjKJ8/U4Iw QcRAZyVd8DbMMGLp+PKLBwVJhFJMv1XlYGCSvIwsjo41rhVSShxn+4rfuTELzxYd3r2v HXulQLctso9TOCXw5Pozn1ME1vMtFCUT/se1NvkDtl03sIbhwMlAcHyIhhKIodNKV4a0 pk6KxBPM/33ryaagF4VUDwAfdPnZLQVvDLLrqacntS/NjxNquIpcgYo7L1BDqs20vP7R XiEA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from agentk.vger.email (agentk.vger.email. [23.128.96.32]) by mx.google.com with ESMTPS id c21-20020a17090a8d1500b002631e44f48csi1045594pjo.179.2023.11.02.23.54.54 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 02 Nov 2023 23:54:54 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) client-ip=23.128.96.32; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id DDD9B81A5DE8; Thu, 2 Nov 2023 23:54:44 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232425AbjKCGya (ORCPT + 99 others); Fri, 3 Nov 2023 02:54:30 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53606 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231461AbjKCGy1 (ORCPT ); Fri, 3 Nov 2023 02:54:27 -0400 Received: from dggsgout11.his.huawei.com (dggsgout11.his.huawei.com [45.249.212.51]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 60545DC; Thu, 2 Nov 2023 23:54:21 -0700 (PDT) Received: from mail.maildlp.com (unknown [172.19.93.142]) by dggsgout11.his.huawei.com (SkyGuard) with ESMTP id 4SMBLD57Snz4f3lgC; Fri, 3 Nov 2023 14:54:12 +0800 (CST) Received: from mail02.huawei.com (unknown [10.116.40.112]) by mail.maildlp.com (Postfix) with ESMTP id 4DD271A0172; Fri, 3 Nov 2023 14:54:16 +0800 (CST) Received: from [10.174.176.117] (unknown [10.174.176.117]) by APP1 (Coremail) with SMTP id cCh0CgDXX7AMmURlIzzhEQ--.31337S2; Fri, 03 Nov 2023 14:54:08 +0800 (CST) Subject: Re: [linus:master] [bpf] c930472552: WARNING:at_kernel/bpf/memalloc.c:#bpf_mem_alloc_init To: Yonghong Song , Alexei Starovoitov , kernel test robot Cc: oe-lkp@lists.linux.dev, lkp@intel.com, linux-kernel@vger.kernel.org, bpf@vger.kernel.org, "houtao1@huawei.com" References: <202310302113.9f8fe705-oliver.sang@intel.com> <7506b682-3be3-fcd0-4bb4-c1db48f609a2@huaweicloud.com> <99e9d615-b720-7f33-3df0-9824a92f6644@huaweicloud.com> <52383a4f-6efd-43ce-bedb-a91e130850f3@linux.dev> From: Hou Tao Message-ID: <3629948c-793e-307b-6b6e-00557f3f6212@huaweicloud.com> Date: Fri, 3 Nov 2023 14:54:04 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.6.0 MIME-Version: 1.0 In-Reply-To: <52383a4f-6efd-43ce-bedb-a91e130850f3@linux.dev> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit Content-Language: en-US X-CM-TRANSID: cCh0CgDXX7AMmURlIzzhEQ--.31337S2 X-Coremail-Antispam: 1UD129KBjvAXoW3ZryDCrW3AF4fGF1rWw1UAwb_yoW8GFyfCo W8ur13Cr4rGFyUGr1UJw1UJr15Jw1UJrnrJr15Jw17GFyjy3WUJ348tryUG3y5tr1rGF4U Ar1jqw1UAa45Jr1kn29KB7ZKAUJUUUUU529EdanIXcx71UUUUU7v73VFW2AGmfu7bjvjm3 AaLaJ3UjIYCTnIWjp_UUU5R7kC6x804xWl14x267AKxVW8JVW5JwAFc2x0x2IEx4CE42xK 8VAvwI8IcIk0rVWrJVCq3wAFIxvE14AKwVWUJVWUGwA2ocxC64kIII0Yj41l84x0c7CEw4 AK67xGY2AK021l84ACjcxK6xIIjxv20xvE14v26w1j6s0DM28EF7xvwVC0I7IYx2IY6xkF 7I0E14v26r4UJVWxJr1l84ACjcxK6I8E87Iv67AKxVW0oVCq3wA2z4x0Y4vEx4A2jsIEc7 CjxVAFwI0_GcCE3s1le2I262IYc4CY6c8Ij28IcVAaY2xG8wAqx4xG64xvF2IEw4CE5I8C rVC2j2WlYx0E2Ix0cI8IcVAFwI0_Jr0_Jr4lYx0Ex4A2jsIE14v26r1j6r4UMcvjeVCFs4 IE7xkEbVWUJVW8JwACjcxG0xvEwIxGrwCYjI0SjxkI62AI1cAE67vIY487MxAIw28IcxkI 7VAKI48JMxC20s026xCaFVCjc4AY6r1j6r4UMI8I3I0E5I8CrVAFwI0_Jr0_Jr4lx2IqxV Cjr7xvwVAFwI0_JrI_JrWlx4CE17CEb7AF67AKxVWUtVW8ZwCIc40Y0x0EwIxGrwCI42IY 6xIIjxv20xvE14v26r1j6r1xMIIF0xvE2Ix0cI8IcVCY1x0267AKxVWUJVW8JwCI42IY6x AIw20EY4v20xvaj40_WFyUJVCq3wCI42IY6I8E87Iv67AKxVWUJVW8JwCI42IY6I8E87Iv 6xkF7I0E14v26r1j6r4UYxBIdaVFxhVjvjDU0xZFpf9x07UWE__UUUUU= X-CM-SenderInfo: xkrx3t3r6k3tpzhluzxrxghudrp/ X-Spam-Status: No, score=-4.5 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,NICE_REPLY_A,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Thu, 02 Nov 2023 23:54:45 -0700 (PDT) Hi, On 11/3/2023 12:08 AM, Yonghong Song wrote: > > On 11/2/23 6:40 AM, Hou Tao wrote: >> Hi Alexei, >> >> On 10/31/2023 4:01 PM, Hou Tao wrote: >>> Hi, >>> >>> On 10/30/2023 10:11 PM, kernel test robot wrote: >>>> hi, Hou Tao, >>>> >>>> we noticed a WARN_ONCE added in this commit was hit in our tests. FYI. >>>> >>>> >>>> Hello, >>>> >>>> kernel test robot noticed >>>> "WARNING:at_kernel/bpf/memalloc.c:#bpf_mem_alloc_init" on: >>>> >>>> commit: c930472552022bd09aab3cd946ba3f243070d5c7 ("bpf: Ensure >>>> unit_size is matched with slab cache object size") >>>> https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master >>>> >>>> [test failed on linus/master ffc253263a1375a65fa6c9f62a893e9767fbebfa] >>>> [test failed on linux-next/master >>>> c503e3eec382ac708ee7adf874add37b77c5d312] >>>> >>>> in testcase: boot >>>> >>>> compiler: gcc-12 >>>> test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp >>>> 2 -m 16G >>>> >>>> (please refer to attached dmesg/kmsg for entire log/backtrace) >>>> >>>> >>>> +-------------------------------------------------------------+------------+------------+ >>>> >>>> |                                                             | >>>> b1d53958b6 | c930472552 | >>>> +-------------------------------------------------------------+------------+------------+ >>>> >>>> | WARNING:at_kernel/bpf/memalloc.c:#bpf_mem_alloc_init        | >>>> 0          | 14         | >>>> | EIP:bpf_mem_alloc_init                                      | >>>> 0          | 14         | >>>> +-------------------------------------------------------------+------------+------------+ >>>> >>>> >>>> >>>> If you fix the issue in a separate patch/commit (i.e. not just a >>>> new version of >>>> the same patch/commit), kindly add following tags >>>> | Reported-by: kernel test robot >>>> | Closes: >>>> https://lore.kernel.org/oe-lkp/202310302113.9f8fe705-oliver.sang@intel.com >>>> >>>> >>>> [   32.249545][    T1] ------------[ cut here ]------------ >>>> [   32.250152][    T1] bpf_mem_cache[0]: unexpected object size >>>> 128, expect 96 >>>> [ 32.250953][ T1] WARNING: CPU: 1 PID: 1 at >>>> kernel/bpf/memalloc.c:500 bpf_mem_alloc_init >>>> (kernel/bpf/memalloc.c:500 kernel/bpf/memalloc.c:579) >>>> [   32.252065][    T1] Modules linked in: >>>> [   32.252548][    T1] CPU: 1 PID: 1 Comm: swapper/0 Tainted: >>>> G        W          6.5.0-12679-gc93047255202 #1 >>>> [ 32.253767][ T1] EIP: bpf_mem_alloc_init >>>> (kernel/bpf/memalloc.c:500 kernel/bpf/memalloc.c:579) >>>> [ 32.254439][ T1] Code: 30 e8 7e 22 04 00 8b 56 20 39 d0 74 24 80 >>>> 3d 18 c0 cc c2 00 75 3b c6 05 18 c0 cc c2 01 52 50 53 68 df 53 57 >>>> c2 e8 47 70 ef ff <0f> 0b 83 c4 10 eb 20 43 83 c6 74 83 fb 0b 0f 85 >>>> 6a ff ff ff 8b 45 >>> Thanks for the report. I also could reproduce the warning in v6.6 by >>> following the reproducing steps in the link below. >>> >>> According the reproduce job, it seems that the kernel is built for i386 >>> (make HOSTCC=gcc-12 CC=gcc-12 ARCH=i386 olddefconfig prepare >>> modules_prepare bzImage) and in .config CONFIG_SLAB instead of >>> CONFIG_SLUB is enabled, I will check whether or not these two setups >>> make any thing being different. >> I see what has happened. The problem is twofold: >> (1) The object_size of kmalloc-cg-96 is adjust from 96 to 128 due to >> slab merge in __kmem_cache_alias(). For SLAB, SLAB_HWCACHE_ALIGN is >> enabled by default for kmalloc slab, so align is 64 and size is 128 for >> kmalloc-cg-96. So when unit_alloc() does kmalloc_node(96, __GFP_ACCOUNT, >> node), ksize() will return 128 instead of 96 for the returned pointer. >> SLUB has a similar merge logic, but because its align is 8 under x86-64, >> so the warning doesn't happen for i386 + SLUB, but I think the similar >> problem may exist for other architectures. >> (2) kmalloc_size_roundup() returns the object_size of kmalloc-96 instead >> of kmalloc-cg-96, so bpf_mem_cache_adjust_size() doesn't adjust >> size_index accordingly. The reason why the object_size of kmalloc-96 is >> 96 instead of 128 is that there is slab merge for kmalloc-96. >> >> About how to fix the problem, I have two ideas: >> The first is to introduce kmalloc_size_roundup_flags(), so >> bpf_mem_cache_adjust_size() could use kmalloc_size_roundup_flags(size, >> __GFP_ACCOUNT) to get the object_size of kmalloc-cg-xxx. It could fix >> the warning for now, but the warning may pop-up occasionally due to SLUB >> merge and unusual slab align. The second is just using the bpf_mem_cache >> pointer to get the unit_size which is saved before the to-be-free >> pointer. Its downside is that it may can not be able to skip the free >> operation for pointer which is not allocated from bpf ma, but I think it >> is acceptable. I prefer the latter solution. What do you think ? > > > Is it possible that in bpf_mem_cache_adjust_size(), we do a series of > kmalloc (for supported bucket size) and call ksize() to get the actual > allocated object size. So eventually all possible allocated object sizes > will be used for size_index[]. This will avoid all kind of special > corner cases due to config/macro/arch etc. WDYT? It is basically the same as the first proposed solution and it has the same flaw. The problem is that slab merge can happen in any time, so the return value of ksize() may change even all passed pointers are allocated from the same slab. Considering the following case: during the invocation of bpf_mem_cache_adjust_size() or the initialization of bpf_global_ma, there is no slab merge and ksize() for a 96-bytes object returns 96. But after these invocations, a new slab created by a kernel module is merged to kmalloc-cg-96 and the object_size of kmalloc-cg-96 is adjust from 96 to 128 (which is possible for x86-64 + CONFIG_SLAB, because it is alignment requirement is 64 for 96-bytes slab). So soon or later, when bpf_global_ma frees a 96-byte-sized pointer which is allocated from a bpf_mem_cache in which unit_size is 96, bpf_mem_free() will free the pointer through a bpf_mem_cache in which unit_size is 128, because the return value of ksize() changes. Maybe we should introduce a new API in mm which returns size instead of object_size of underlying slab, so the return value will not change due to slab merge. Regards, Tao > > >>> Regards, >>> Tao >>>> All code >>>> ======== >>>>     0:    30 e8                    xor    %ch,%al >>>>     2:    7e 22                    jle    0x26 >>>>     4:    04 00                    add    $0x0,%al >>>>     6:    8b 56 20                 mov    0x20(%rsi),%edx >>>>     9:    39 d0                    cmp    %edx,%eax >>>>     b:    74 24                    je     0x31 >>>>     d:    80 3d 18 c0 cc c2 00     cmpb   >>>> $0x0,-0x3d333fe8(%rip)        # 0xffffffffc2ccc02c >>>>    14:    75 3b                    jne    0x51 >>>>    16:    c6 05 18 c0 cc c2 01     movb   >>>> $0x1,-0x3d333fe8(%rip)        # 0xffffffffc2ccc035 >>>>    1d:    52                       push   %rdx >>>>    1e:    50                       push   %rax >>>>    1f:    53                       push   %rbx >>>>    20:    68 df 53 57 c2           push   $0xffffffffc25753df >>>>    25:    e8 47 70 ef ff           call   0xffffffffffef7071 >>>>    2a:*    0f 0b                    ud2        <-- trapping >>>> instruction >>>>    2c:    83 c4 10                 add    $0x10,%esp >>>>    2f:    eb 20                    jmp    0x51 >>>>    31:    43 83 c6 74              rex.XB add $0x74,%r14d >>>>    35:    83 fb 0b                 cmp    $0xb,%ebx >>>>    38:    0f 85 6a ff ff ff        jne    0xffffffffffffffa8 >>>>    3e:    8b                       .byte 0x8b >>>>    3f:    45                       rex.RB >>>> >>>> Code starting with the faulting instruction >>>> =========================================== >>>>     0:    0f 0b                    ud2 >>>>     2:    83 c4 10                 add    $0x10,%esp >>>>     5:    eb 20                    jmp    0x27 >>>>     7:    43 83 c6 74              rex.XB add $0x74,%r14d >>>>     b:    83 fb 0b                 cmp    $0xb,%ebx >>>>     e:    0f 85 6a ff ff ff        jne    0xffffffffffffff7e >>>>    14:    8b                       .byte 0x8b >>>>    15:    45                       rex.RB >>>> [   32.256641][    T1] EAX: 00000037 EBX: 00000000 ECX: 00000002 >>>> EDX: 80000002 >>>> [   32.257402][    T1] ESI: fefbda30 EDI: da953a30 EBP: c3d49ef0 >>>> ESP: c3d49ec0 >>>> [   32.258176][    T1] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 >>>> EFLAGS: 00010286 >>>> [   32.259000][    T1] CR0: 80050033 CR2: 00000000 CR3: 02dd5000 >>>> CR4: 000406d0 >>>> [   32.259768][    T1] DR0: 00000000 DR1: 00000000 DR2: 00000000 >>>> DR3: 00000000 >>>> [   32.260526][    T1] DR6: fffe0ff0 DR7: 00000400 >>>> [   32.261021][    T1] Call Trace: >>>> [ 32.261376][ T1] ? show_regs (arch/x86/kernel/dumpstack.c:479 >>>> arch/x86/kernel/dumpstack.c:465) >>>> [ 32.261835][ T1] ? bpf_mem_alloc_init (kernel/bpf/memalloc.c:500 >>>> kernel/bpf/memalloc.c:579) >>>> [ 32.262395][ T1] ? __warn (kernel/panic.c:673) >>>> [ 32.262840][ T1] ? report_bug (lib/bug.c:201 lib/bug.c:219) >>>> [ 32.263327][ T1] ? bpf_mem_alloc_init (kernel/bpf/memalloc.c:500 >>>> kernel/bpf/memalloc.c:579) >>>> [ 32.263884][ T1] ? exc_overflow (arch/x86/kernel/traps.c:250) >>>> [ 32.264368][ T1] ? handle_bug (arch/x86/kernel/traps.c:237) >>>> [ 32.264833][ T1] ? exc_invalid_op (arch/x86/kernel/traps.c:258 >>>> (discriminator 1)) >>>> [ 32.265333][ T1] ? handle_exception (arch/x86/entry/entry_32.S:1056) >>>> [ 32.265903][ T1] ? exc_overflow (arch/x86/kernel/traps.c:250) >>>> [ 32.266392][ T1] ? bpf_mem_alloc_init (kernel/bpf/memalloc.c:500 >>>> kernel/bpf/memalloc.c:579) >>>> [ 32.266982][ T1] ? exc_overflow (arch/x86/kernel/traps.c:250) >>>> [ 32.267476][ T1] ? bpf_mem_alloc_init (kernel/bpf/memalloc.c:500 >>>> kernel/bpf/memalloc.c:579) >>>> [ 32.268050][ T1] ? irq_work_init_threads (kernel/bpf/core.c:2919) >>>> [ 32.268610][ T1] bpf_global_ma_init (kernel/bpf/core.c:2923) >>>> [ 32.269142][ T1] do_one_initcall (init/main.c:1232) >>>> [ 32.269657][ T1] ? debug_smp_processor_id (lib/smp_processor_id.c:61) >>>> [ 32.270243][ T1] ? rcu_is_watching >>>> (include/linux/context_tracking.h:122 kernel/rcu/tree.c:699) >>>> [ 32.270770][ T1] do_initcalls (init/main.c:1293 init/main.c:1310) >>>> [ 32.271275][ T1] kernel_init_freeable (init/main.c:1549) >>>> [ 32.271841][ T1] ? rest_init (init/main.c:1429) >>>> [ 32.272324][ T1] kernel_init (init/main.c:1439) >>>> [ 32.272785][ T1] ret_from_fork (arch/x86/kernel/process.c:153) >>>> [ 32.273272][ T1] ? rest_init (init/main.c:1429) >>>> [ 32.273752][ T1] ret_from_fork_asm (arch/x86/entry/entry_32.S:741) >>>> [ 32.274272][ T1] entry_INT80_32 (arch/x86/entry/entry_32.S:947) >>>> [   32.274803][    T1] irq event stamp: 16968005 >>>> [ 32.275293][ T1] hardirqs last enabled at (16968013): >>>> console_unlock (arch/x86/include/asm/irqflags.h:26 >>>> arch/x86/include/asm/irqflags.h:67 >>>> arch/x86/include/asm/irqflags.h:127 kernel/printk/printk.c:347 >>>> kernel/printk/printk.c:2720 kernel/printk/printk.c:3039) >>>> [ 32.276277][ T1] hardirqs last disabled at (16968022): >>>> console_unlock (kernel/printk/printk.c:345 >>>> kernel/printk/printk.c:2720 kernel/printk/printk.c:3039) >>>> [ 32.277242][ T1] softirqs last enabled at (16967866): __do_softirq >>>> (arch/x86/include/asm/preempt.h:27 kernel/softirq.c:400 >>>> kernel/softirq.c:582) >>>> [ 32.278202][ T1] softirqs last disabled at (16967861): >>>> do_softirq_own_stack (arch/x86/kernel/irq_32.c:57 >>>> arch/x86/kernel/irq_32.c:147) >>>> [   32.279228][    T1] ---[ end trace 0000000000000000 ]--- >>>> [   32.280294][    T1] kmemleak: Kernel memory leak detector >>>> initialized (mem pool available: 15783) >>>> [   32.281276][    T1] debug_vm_pgtable: [debug_vm_pgtable         >>>> ]: Validating architecture page table helpers >>>> [   32.285847][   T74] kmemleak: Automatic memory scanning thread >>>> started >>>> [   32.290289][    T1] UBI error: cannot create "ubi" debugfs >>>> directory, error -2 >>>> [   32.291558][    T1] UBI error: cannot initialize UBI, error -2 >>>> >>>> >>>> >>>> The kernel config and materials to reproduce are available at: >>>> https://download.01.org/0day-ci/archive/20231030/202310302113.9f8fe705-oliver.sang@intel.com >>>> >>>> >>>> >>>> >>