All of lore.kernel.org
 help / color / mirror / Atom feed
* [bug report] kmemleak observed after system boots up with amd cpu
@ 2022-09-14  6:25 Yi Zhang
  2022-09-14  6:31 ` Sandipan Das
  0 siblings, 1 reply; 3+ messages in thread
From: Yi Zhang @ 2022-09-14  6:25 UTC (permalink / raw)
  To: linux-perf-users, x86
  Cc: ananth.narayan, ravi.bangoria, santosh.shukla, sandipan.das

Hello
Below kmemleak observed after the system boots up on 6.0.0-rc5, here
is the cpu and kmemleak info, feel free to let me know if you need
more info/test for it, thanks.

# lscpu
Architecture:        x86_64
CPU op-mode(s):      32-bit, 64-bit
Byte Order:          Little Endian
CPU(s):              16
On-line CPU(s) list: 0-15
Thread(s) per core:  2
Core(s) per socket:  8
Socket(s):           1
NUMA node(s):        1
Vendor ID:           AuthenticAMD
BIOS Vendor ID:      AMD
CPU family:          23
Model:               49
Model name:          AMD EPYC 7232P 8-Core Processor
BIOS Model name:     AMD EPYC 7232P 8-Core Processor
Stepping:            0
CPU MHz:             3100.000
CPU max MHz:         3100.0000
CPU min MHz:         1500.0000
BogoMIPS:            6188.28
Virtualization:      AMD-V
L1d cache:           32K
L1i cache:           32K
L2 cache:            512K
L3 cache:            8192K
NUMA node0 CPU(s):   0-15
Flags:               fpu vme de pse tsc msr pae mce cx8 apic sep mtrr
pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ht syscall nx mmxext
fxsr_opt pdpe1gb rdtscp lm constant_tsc rep_good nopl nonstop_tsc
cpuid extd_apicid aperfmperf rapl pni pclmulqdq monitor ssse3 fma cx16
sse4_1 sse4_2 x2apic movbe popcnt aes xsave avx f16c rdrand lahf_lm
cmp_legacy svm extapic cr8_legacy abm sse4a misalignsse 3dnowprefetch
osvw ibs skinit wdt tce topoext perfctr_core perfctr_nb bpext
perfctr_llc mwaitx cpb cat_l3 cdp_l3 hw_pstate ssbd mba ibrs ibpb
stibp vmmcall fsgsbase bmi1 avx2 smep bmi2 cqm rdt_a rdseed adx smap
clflushopt clwb sha_ni xsaveopt xsavec xgetbv1 xsaves cqm_llc
cqm_occup_llc cqm_mbm_total cqm_mbm_local clzero irperf xsaveerptr
rdpru wbnoinvd amd_ppin arat npt lbrv svm_lock nrip_save tsc_scale
vmcb_clean flushbyasid decodeassists pausefilter pfthreshold avic
v_vmsave_vmload vgif v_spec_ctrl umip rdpid overflow_recov succor smca
sev sev_es

# cat /sys/kernel/debug/kmemleak
unreferenced object 0xffff888140be6540 (size 32):
  comm "swapper/0", pid 1, jiffies 4294683141 (age 2488.140s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<000000009569963d>] __kmalloc_node+0x10e/0x270
    [<000000005ec49251>] amd_uncore_cpu_up_prepare+0x1c3/0x780
    [<00000000b48a1e7c>] cpuhp_invoke_callback+0x40e/0x1760
    [<00000000555aab25>] cpuhp_issue_call+0x18f/0x6b0
    [<00000000b4dd3935>] __cpuhp_setup_state_cpuslocked+0x2c0/0x8f0
    [<0000000066ebf481>] __cpuhp_setup_state+0xbb/0x210
    [<000000000949b7a4>] amd_uncore_init+0x385/0x46f
    [<000000008505629b>] do_one_initcall+0xfc/0x580
    [<00000000192522a5>] kernel_init_freeable+0x67d/0x710
    [<00000000613746f8>] kernel_init+0x18/0x160
    [<00000000813ba43a>] ret_from_fork+0x22/0x30
unreferenced object 0xffff888140bdd800 (size 64):
  comm "swapper/0", pid 1, jiffies 4294683141 (age 2488.140s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<000000009569963d>] __kmalloc_node+0x10e/0x270
    [<0000000037b0b577>] amd_uncore_cpu_up_prepare+0x41f/0x780
    [<00000000b48a1e7c>] cpuhp_invoke_callback+0x40e/0x1760
    [<00000000555aab25>] cpuhp_issue_call+0x18f/0x6b0
    [<00000000b4dd3935>] __cpuhp_setup_state_cpuslocked+0x2c0/0x8f0
    [<0000000066ebf481>] __cpuhp_setup_state+0xbb/0x210
    [<000000000949b7a4>] amd_uncore_init+0x385/0x46f
    [<000000008505629b>] do_one_initcall+0xfc/0x580
    [<00000000192522a5>] kernel_init_freeable+0x67d/0x710
    [<00000000613746f8>] kernel_init+0x18/0x160
    [<00000000813ba43a>] ret_from_fork+0x22/0x30

-- 
Best Regards,
  Yi Zhang


^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [bug report] kmemleak observed after system boots up with amd cpu
  2022-09-14  6:25 [bug report] kmemleak observed after system boots up with amd cpu Yi Zhang
@ 2022-09-14  6:31 ` Sandipan Das
  2022-09-15  1:48   ` Yi Zhang
  0 siblings, 1 reply; 3+ messages in thread
From: Sandipan Das @ 2022-09-14  6:31 UTC (permalink / raw)
  To: Yi Zhang
  Cc: linux-perf-users, x86, ananth.narayan, ravi.bangoria, santosh.shukla

Hi,

On 9/14/2022 11:55 AM, Yi Zhang wrote:
> Hello
> Below kmemleak observed after the system boots up on 6.0.0-rc5, here
> is the cpu and kmemleak info, feel free to let me know if you need
> more info/test for it, thanks.
> 
> # lscpu
> Architecture:        x86_64
> CPU op-mode(s):      32-bit, 64-bit
> Byte Order:          Little Endian
> CPU(s):              16
> On-line CPU(s) list: 0-15
> Thread(s) per core:  2
> Core(s) per socket:  8
> Socket(s):           1
> NUMA node(s):        1
> Vendor ID:           AuthenticAMD
> BIOS Vendor ID:      AMD
> CPU family:          23
> Model:               49
> Model name:          AMD EPYC 7232P 8-Core Processor
> BIOS Model name:     AMD EPYC 7232P 8-Core Processor
> Stepping:            0
> CPU MHz:             3100.000
> CPU max MHz:         3100.0000
> CPU min MHz:         1500.0000
> BogoMIPS:            6188.28
> Virtualization:      AMD-V
> L1d cache:           32K
> L1i cache:           32K
> L2 cache:            512K
> L3 cache:            8192K
> NUMA node0 CPU(s):   0-15
> Flags:               fpu vme de pse tsc msr pae mce cx8 apic sep mtrr
> pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ht syscall nx mmxext
> fxsr_opt pdpe1gb rdtscp lm constant_tsc rep_good nopl nonstop_tsc
> cpuid extd_apicid aperfmperf rapl pni pclmulqdq monitor ssse3 fma cx16
> sse4_1 sse4_2 x2apic movbe popcnt aes xsave avx f16c rdrand lahf_lm
> cmp_legacy svm extapic cr8_legacy abm sse4a misalignsse 3dnowprefetch
> osvw ibs skinit wdt tce topoext perfctr_core perfctr_nb bpext
> perfctr_llc mwaitx cpb cat_l3 cdp_l3 hw_pstate ssbd mba ibrs ibpb
> stibp vmmcall fsgsbase bmi1 avx2 smep bmi2 cqm rdt_a rdseed adx smap
> clflushopt clwb sha_ni xsaveopt xsavec xgetbv1 xsaves cqm_llc
> cqm_occup_llc cqm_mbm_total cqm_mbm_local clzero irperf xsaveerptr
> rdpru wbnoinvd amd_ppin arat npt lbrv svm_lock nrip_save tsc_scale
> vmcb_clean flushbyasid decodeassists pausefilter pfthreshold avic
> v_vmsave_vmload vgif v_spec_ctrl umip rdpid overflow_recov succor smca
> sev sev_es
> 
> # cat /sys/kernel/debug/kmemleak
> unreferenced object 0xffff888140be6540 (size 32):
>   comm "swapper/0", pid 1, jiffies 4294683141 (age 2488.140s)
>   hex dump (first 32 bytes):
>     00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
>     00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
>   backtrace:
>     [<000000009569963d>] __kmalloc_node+0x10e/0x270
>     [<000000005ec49251>] amd_uncore_cpu_up_prepare+0x1c3/0x780
>     [<00000000b48a1e7c>] cpuhp_invoke_callback+0x40e/0x1760
>     [<00000000555aab25>] cpuhp_issue_call+0x18f/0x6b0
>     [<00000000b4dd3935>] __cpuhp_setup_state_cpuslocked+0x2c0/0x8f0
>     [<0000000066ebf481>] __cpuhp_setup_state+0xbb/0x210
>     [<000000000949b7a4>] amd_uncore_init+0x385/0x46f
>     [<000000008505629b>] do_one_initcall+0xfc/0x580
>     [<00000000192522a5>] kernel_init_freeable+0x67d/0x710
>     [<00000000613746f8>] kernel_init+0x18/0x160
>     [<00000000813ba43a>] ret_from_fork+0x22/0x30
> unreferenced object 0xffff888140bdd800 (size 64):
>   comm "swapper/0", pid 1, jiffies 4294683141 (age 2488.140s)
>   hex dump (first 32 bytes):
>     00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
>     00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
>   backtrace:
>     [<000000009569963d>] __kmalloc_node+0x10e/0x270
>     [<0000000037b0b577>] amd_uncore_cpu_up_prepare+0x41f/0x780
>     [<00000000b48a1e7c>] cpuhp_invoke_callback+0x40e/0x1760
>     [<00000000555aab25>] cpuhp_issue_call+0x18f/0x6b0
>     [<00000000b4dd3935>] __cpuhp_setup_state_cpuslocked+0x2c0/0x8f0
>     [<0000000066ebf481>] __cpuhp_setup_state+0xbb/0x210
>     [<000000000949b7a4>] amd_uncore_init+0x385/0x46f
>     [<000000008505629b>] do_one_initcall+0xfc/0x580
>     [<00000000192522a5>] kernel_init_freeable+0x67d/0x710
>     [<00000000613746f8>] kernel_init+0x18/0x160
>     [<00000000813ba43a>] ret_from_fork+0x22/0x30
> 

Thanks for reporting this. A fix has already been sent and it can be found here:
https://lore.kernel.org/all/4fa9e5ac6d6e41fa889101e7af7e6ba372cfea52.1662613255.git.sandipan.das@amd.com/

It would be great if you can test it and report your findings.

- Sandipan


^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [bug report] kmemleak observed after system boots up with amd cpu
  2022-09-14  6:31 ` Sandipan Das
@ 2022-09-15  1:48   ` Yi Zhang
  0 siblings, 0 replies; 3+ messages in thread
From: Yi Zhang @ 2022-09-15  1:48 UTC (permalink / raw)
  To: Sandipan Das
  Cc: linux-perf-users, x86, ananth.narayan, ravi.bangoria, santosh.shukla

Yeah, it was fixed by the patch, feel free to add:
Tested-by: Yi Zhang <yi.zhang@redhat.com>

On Wed, Sep 14, 2022 at 2:32 PM Sandipan Das <sandipan.das@amd.com> wrote:
>
> Hi,
>
> On 9/14/2022 11:55 AM, Yi Zhang wrote:
> > Hello
> > Below kmemleak observed after the system boots up on 6.0.0-rc5, here
> > is the cpu and kmemleak info, feel free to let me know if you need
> > more info/test for it, thanks.
> >
> > # lscpu
> > Architecture:        x86_64
> > CPU op-mode(s):      32-bit, 64-bit
> > Byte Order:          Little Endian
> > CPU(s):              16
> > On-line CPU(s) list: 0-15
> > Thread(s) per core:  2
> > Core(s) per socket:  8
> > Socket(s):           1
> > NUMA node(s):        1
> > Vendor ID:           AuthenticAMD
> > BIOS Vendor ID:      AMD
> > CPU family:          23
> > Model:               49
> > Model name:          AMD EPYC 7232P 8-Core Processor
> > BIOS Model name:     AMD EPYC 7232P 8-Core Processor
> > Stepping:            0
> > CPU MHz:             3100.000
> > CPU max MHz:         3100.0000
> > CPU min MHz:         1500.0000
> > BogoMIPS:            6188.28
> > Virtualization:      AMD-V
> > L1d cache:           32K
> > L1i cache:           32K
> > L2 cache:            512K
> > L3 cache:            8192K
> > NUMA node0 CPU(s):   0-15
> > Flags:               fpu vme de pse tsc msr pae mce cx8 apic sep mtrr
> > pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ht syscall nx mmxext
> > fxsr_opt pdpe1gb rdtscp lm constant_tsc rep_good nopl nonstop_tsc
> > cpuid extd_apicid aperfmperf rapl pni pclmulqdq monitor ssse3 fma cx16
> > sse4_1 sse4_2 x2apic movbe popcnt aes xsave avx f16c rdrand lahf_lm
> > cmp_legacy svm extapic cr8_legacy abm sse4a misalignsse 3dnowprefetch
> > osvw ibs skinit wdt tce topoext perfctr_core perfctr_nb bpext
> > perfctr_llc mwaitx cpb cat_l3 cdp_l3 hw_pstate ssbd mba ibrs ibpb
> > stibp vmmcall fsgsbase bmi1 avx2 smep bmi2 cqm rdt_a rdseed adx smap
> > clflushopt clwb sha_ni xsaveopt xsavec xgetbv1 xsaves cqm_llc
> > cqm_occup_llc cqm_mbm_total cqm_mbm_local clzero irperf xsaveerptr
> > rdpru wbnoinvd amd_ppin arat npt lbrv svm_lock nrip_save tsc_scale
> > vmcb_clean flushbyasid decodeassists pausefilter pfthreshold avic
> > v_vmsave_vmload vgif v_spec_ctrl umip rdpid overflow_recov succor smca
> > sev sev_es
> >
> > # cat /sys/kernel/debug/kmemleak
> > unreferenced object 0xffff888140be6540 (size 32):
> >   comm "swapper/0", pid 1, jiffies 4294683141 (age 2488.140s)
> >   hex dump (first 32 bytes):
> >     00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
> >     00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
> >   backtrace:
> >     [<000000009569963d>] __kmalloc_node+0x10e/0x270
> >     [<000000005ec49251>] amd_uncore_cpu_up_prepare+0x1c3/0x780
> >     [<00000000b48a1e7c>] cpuhp_invoke_callback+0x40e/0x1760
> >     [<00000000555aab25>] cpuhp_issue_call+0x18f/0x6b0
> >     [<00000000b4dd3935>] __cpuhp_setup_state_cpuslocked+0x2c0/0x8f0
> >     [<0000000066ebf481>] __cpuhp_setup_state+0xbb/0x210
> >     [<000000000949b7a4>] amd_uncore_init+0x385/0x46f
> >     [<000000008505629b>] do_one_initcall+0xfc/0x580
> >     [<00000000192522a5>] kernel_init_freeable+0x67d/0x710
> >     [<00000000613746f8>] kernel_init+0x18/0x160
> >     [<00000000813ba43a>] ret_from_fork+0x22/0x30
> > unreferenced object 0xffff888140bdd800 (size 64):
> >   comm "swapper/0", pid 1, jiffies 4294683141 (age 2488.140s)
> >   hex dump (first 32 bytes):
> >     00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
> >     00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
> >   backtrace:
> >     [<000000009569963d>] __kmalloc_node+0x10e/0x270
> >     [<0000000037b0b577>] amd_uncore_cpu_up_prepare+0x41f/0x780
> >     [<00000000b48a1e7c>] cpuhp_invoke_callback+0x40e/0x1760
> >     [<00000000555aab25>] cpuhp_issue_call+0x18f/0x6b0
> >     [<00000000b4dd3935>] __cpuhp_setup_state_cpuslocked+0x2c0/0x8f0
> >     [<0000000066ebf481>] __cpuhp_setup_state+0xbb/0x210
> >     [<000000000949b7a4>] amd_uncore_init+0x385/0x46f
> >     [<000000008505629b>] do_one_initcall+0xfc/0x580
> >     [<00000000192522a5>] kernel_init_freeable+0x67d/0x710
> >     [<00000000613746f8>] kernel_init+0x18/0x160
> >     [<00000000813ba43a>] ret_from_fork+0x22/0x30
> >
>
> Thanks for reporting this. A fix has already been sent and it can be found here:
> https://lore.kernel.org/all/4fa9e5ac6d6e41fa889101e7af7e6ba372cfea52.1662613255.git.sandipan.das@amd.com/
>
> It would be great if you can test it and report your findings.
>
> - Sandipan
>


-- 
Best Regards,
  Yi Zhang


^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2022-09-15  1:49 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-09-14  6:25 [bug report] kmemleak observed after system boots up with amd cpu Yi Zhang
2022-09-14  6:31 ` Sandipan Das
2022-09-15  1:48   ` Yi Zhang

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.