* [bug report] kmemleak observed after system boots up with amd cpu
@ 2022-09-14 6:25 Yi Zhang
2022-09-14 6:31 ` Sandipan Das
0 siblings, 1 reply; 3+ messages in thread
From: Yi Zhang @ 2022-09-14 6:25 UTC (permalink / raw)
To: linux-perf-users, x86
Cc: ananth.narayan, ravi.bangoria, santosh.shukla, sandipan.das
Hello
Below kmemleak observed after the system boots up on 6.0.0-rc5, here
is the cpu and kmemleak info, feel free to let me know if you need
more info/test for it, thanks.
# lscpu
Architecture: x86_64
CPU op-mode(s): 32-bit, 64-bit
Byte Order: Little Endian
CPU(s): 16
On-line CPU(s) list: 0-15
Thread(s) per core: 2
Core(s) per socket: 8
Socket(s): 1
NUMA node(s): 1
Vendor ID: AuthenticAMD
BIOS Vendor ID: AMD
CPU family: 23
Model: 49
Model name: AMD EPYC 7232P 8-Core Processor
BIOS Model name: AMD EPYC 7232P 8-Core Processor
Stepping: 0
CPU MHz: 3100.000
CPU max MHz: 3100.0000
CPU min MHz: 1500.0000
BogoMIPS: 6188.28
Virtualization: AMD-V
L1d cache: 32K
L1i cache: 32K
L2 cache: 512K
L3 cache: 8192K
NUMA node0 CPU(s): 0-15
Flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr
pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ht syscall nx mmxext
fxsr_opt pdpe1gb rdtscp lm constant_tsc rep_good nopl nonstop_tsc
cpuid extd_apicid aperfmperf rapl pni pclmulqdq monitor ssse3 fma cx16
sse4_1 sse4_2 x2apic movbe popcnt aes xsave avx f16c rdrand lahf_lm
cmp_legacy svm extapic cr8_legacy abm sse4a misalignsse 3dnowprefetch
osvw ibs skinit wdt tce topoext perfctr_core perfctr_nb bpext
perfctr_llc mwaitx cpb cat_l3 cdp_l3 hw_pstate ssbd mba ibrs ibpb
stibp vmmcall fsgsbase bmi1 avx2 smep bmi2 cqm rdt_a rdseed adx smap
clflushopt clwb sha_ni xsaveopt xsavec xgetbv1 xsaves cqm_llc
cqm_occup_llc cqm_mbm_total cqm_mbm_local clzero irperf xsaveerptr
rdpru wbnoinvd amd_ppin arat npt lbrv svm_lock nrip_save tsc_scale
vmcb_clean flushbyasid decodeassists pausefilter pfthreshold avic
v_vmsave_vmload vgif v_spec_ctrl umip rdpid overflow_recov succor smca
sev sev_es
# cat /sys/kernel/debug/kmemleak
unreferenced object 0xffff888140be6540 (size 32):
comm "swapper/0", pid 1, jiffies 4294683141 (age 2488.140s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<000000009569963d>] __kmalloc_node+0x10e/0x270
[<000000005ec49251>] amd_uncore_cpu_up_prepare+0x1c3/0x780
[<00000000b48a1e7c>] cpuhp_invoke_callback+0x40e/0x1760
[<00000000555aab25>] cpuhp_issue_call+0x18f/0x6b0
[<00000000b4dd3935>] __cpuhp_setup_state_cpuslocked+0x2c0/0x8f0
[<0000000066ebf481>] __cpuhp_setup_state+0xbb/0x210
[<000000000949b7a4>] amd_uncore_init+0x385/0x46f
[<000000008505629b>] do_one_initcall+0xfc/0x580
[<00000000192522a5>] kernel_init_freeable+0x67d/0x710
[<00000000613746f8>] kernel_init+0x18/0x160
[<00000000813ba43a>] ret_from_fork+0x22/0x30
unreferenced object 0xffff888140bdd800 (size 64):
comm "swapper/0", pid 1, jiffies 4294683141 (age 2488.140s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<000000009569963d>] __kmalloc_node+0x10e/0x270
[<0000000037b0b577>] amd_uncore_cpu_up_prepare+0x41f/0x780
[<00000000b48a1e7c>] cpuhp_invoke_callback+0x40e/0x1760
[<00000000555aab25>] cpuhp_issue_call+0x18f/0x6b0
[<00000000b4dd3935>] __cpuhp_setup_state_cpuslocked+0x2c0/0x8f0
[<0000000066ebf481>] __cpuhp_setup_state+0xbb/0x210
[<000000000949b7a4>] amd_uncore_init+0x385/0x46f
[<000000008505629b>] do_one_initcall+0xfc/0x580
[<00000000192522a5>] kernel_init_freeable+0x67d/0x710
[<00000000613746f8>] kernel_init+0x18/0x160
[<00000000813ba43a>] ret_from_fork+0x22/0x30
--
Best Regards,
Yi Zhang
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [bug report] kmemleak observed after system boots up with amd cpu
2022-09-14 6:25 [bug report] kmemleak observed after system boots up with amd cpu Yi Zhang
@ 2022-09-14 6:31 ` Sandipan Das
2022-09-15 1:48 ` Yi Zhang
0 siblings, 1 reply; 3+ messages in thread
From: Sandipan Das @ 2022-09-14 6:31 UTC (permalink / raw)
To: Yi Zhang
Cc: linux-perf-users, x86, ananth.narayan, ravi.bangoria, santosh.shukla
Hi,
On 9/14/2022 11:55 AM, Yi Zhang wrote:
> Hello
> Below kmemleak observed after the system boots up on 6.0.0-rc5, here
> is the cpu and kmemleak info, feel free to let me know if you need
> more info/test for it, thanks.
>
> # lscpu
> Architecture: x86_64
> CPU op-mode(s): 32-bit, 64-bit
> Byte Order: Little Endian
> CPU(s): 16
> On-line CPU(s) list: 0-15
> Thread(s) per core: 2
> Core(s) per socket: 8
> Socket(s): 1
> NUMA node(s): 1
> Vendor ID: AuthenticAMD
> BIOS Vendor ID: AMD
> CPU family: 23
> Model: 49
> Model name: AMD EPYC 7232P 8-Core Processor
> BIOS Model name: AMD EPYC 7232P 8-Core Processor
> Stepping: 0
> CPU MHz: 3100.000
> CPU max MHz: 3100.0000
> CPU min MHz: 1500.0000
> BogoMIPS: 6188.28
> Virtualization: AMD-V
> L1d cache: 32K
> L1i cache: 32K
> L2 cache: 512K
> L3 cache: 8192K
> NUMA node0 CPU(s): 0-15
> Flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr
> pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ht syscall nx mmxext
> fxsr_opt pdpe1gb rdtscp lm constant_tsc rep_good nopl nonstop_tsc
> cpuid extd_apicid aperfmperf rapl pni pclmulqdq monitor ssse3 fma cx16
> sse4_1 sse4_2 x2apic movbe popcnt aes xsave avx f16c rdrand lahf_lm
> cmp_legacy svm extapic cr8_legacy abm sse4a misalignsse 3dnowprefetch
> osvw ibs skinit wdt tce topoext perfctr_core perfctr_nb bpext
> perfctr_llc mwaitx cpb cat_l3 cdp_l3 hw_pstate ssbd mba ibrs ibpb
> stibp vmmcall fsgsbase bmi1 avx2 smep bmi2 cqm rdt_a rdseed adx smap
> clflushopt clwb sha_ni xsaveopt xsavec xgetbv1 xsaves cqm_llc
> cqm_occup_llc cqm_mbm_total cqm_mbm_local clzero irperf xsaveerptr
> rdpru wbnoinvd amd_ppin arat npt lbrv svm_lock nrip_save tsc_scale
> vmcb_clean flushbyasid decodeassists pausefilter pfthreshold avic
> v_vmsave_vmload vgif v_spec_ctrl umip rdpid overflow_recov succor smca
> sev sev_es
>
> # cat /sys/kernel/debug/kmemleak
> unreferenced object 0xffff888140be6540 (size 32):
> comm "swapper/0", pid 1, jiffies 4294683141 (age 2488.140s)
> hex dump (first 32 bytes):
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
> backtrace:
> [<000000009569963d>] __kmalloc_node+0x10e/0x270
> [<000000005ec49251>] amd_uncore_cpu_up_prepare+0x1c3/0x780
> [<00000000b48a1e7c>] cpuhp_invoke_callback+0x40e/0x1760
> [<00000000555aab25>] cpuhp_issue_call+0x18f/0x6b0
> [<00000000b4dd3935>] __cpuhp_setup_state_cpuslocked+0x2c0/0x8f0
> [<0000000066ebf481>] __cpuhp_setup_state+0xbb/0x210
> [<000000000949b7a4>] amd_uncore_init+0x385/0x46f
> [<000000008505629b>] do_one_initcall+0xfc/0x580
> [<00000000192522a5>] kernel_init_freeable+0x67d/0x710
> [<00000000613746f8>] kernel_init+0x18/0x160
> [<00000000813ba43a>] ret_from_fork+0x22/0x30
> unreferenced object 0xffff888140bdd800 (size 64):
> comm "swapper/0", pid 1, jiffies 4294683141 (age 2488.140s)
> hex dump (first 32 bytes):
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
> backtrace:
> [<000000009569963d>] __kmalloc_node+0x10e/0x270
> [<0000000037b0b577>] amd_uncore_cpu_up_prepare+0x41f/0x780
> [<00000000b48a1e7c>] cpuhp_invoke_callback+0x40e/0x1760
> [<00000000555aab25>] cpuhp_issue_call+0x18f/0x6b0
> [<00000000b4dd3935>] __cpuhp_setup_state_cpuslocked+0x2c0/0x8f0
> [<0000000066ebf481>] __cpuhp_setup_state+0xbb/0x210
> [<000000000949b7a4>] amd_uncore_init+0x385/0x46f
> [<000000008505629b>] do_one_initcall+0xfc/0x580
> [<00000000192522a5>] kernel_init_freeable+0x67d/0x710
> [<00000000613746f8>] kernel_init+0x18/0x160
> [<00000000813ba43a>] ret_from_fork+0x22/0x30
>
Thanks for reporting this. A fix has already been sent and it can be found here:
https://lore.kernel.org/all/4fa9e5ac6d6e41fa889101e7af7e6ba372cfea52.1662613255.git.sandipan.das@amd.com/
It would be great if you can test it and report your findings.
- Sandipan
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [bug report] kmemleak observed after system boots up with amd cpu
2022-09-14 6:31 ` Sandipan Das
@ 2022-09-15 1:48 ` Yi Zhang
0 siblings, 0 replies; 3+ messages in thread
From: Yi Zhang @ 2022-09-15 1:48 UTC (permalink / raw)
To: Sandipan Das
Cc: linux-perf-users, x86, ananth.narayan, ravi.bangoria, santosh.shukla
Yeah, it was fixed by the patch, feel free to add:
Tested-by: Yi Zhang <yi.zhang@redhat.com>
On Wed, Sep 14, 2022 at 2:32 PM Sandipan Das <sandipan.das@amd.com> wrote:
>
> Hi,
>
> On 9/14/2022 11:55 AM, Yi Zhang wrote:
> > Hello
> > Below kmemleak observed after the system boots up on 6.0.0-rc5, here
> > is the cpu and kmemleak info, feel free to let me know if you need
> > more info/test for it, thanks.
> >
> > # lscpu
> > Architecture: x86_64
> > CPU op-mode(s): 32-bit, 64-bit
> > Byte Order: Little Endian
> > CPU(s): 16
> > On-line CPU(s) list: 0-15
> > Thread(s) per core: 2
> > Core(s) per socket: 8
> > Socket(s): 1
> > NUMA node(s): 1
> > Vendor ID: AuthenticAMD
> > BIOS Vendor ID: AMD
> > CPU family: 23
> > Model: 49
> > Model name: AMD EPYC 7232P 8-Core Processor
> > BIOS Model name: AMD EPYC 7232P 8-Core Processor
> > Stepping: 0
> > CPU MHz: 3100.000
> > CPU max MHz: 3100.0000
> > CPU min MHz: 1500.0000
> > BogoMIPS: 6188.28
> > Virtualization: AMD-V
> > L1d cache: 32K
> > L1i cache: 32K
> > L2 cache: 512K
> > L3 cache: 8192K
> > NUMA node0 CPU(s): 0-15
> > Flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr
> > pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ht syscall nx mmxext
> > fxsr_opt pdpe1gb rdtscp lm constant_tsc rep_good nopl nonstop_tsc
> > cpuid extd_apicid aperfmperf rapl pni pclmulqdq monitor ssse3 fma cx16
> > sse4_1 sse4_2 x2apic movbe popcnt aes xsave avx f16c rdrand lahf_lm
> > cmp_legacy svm extapic cr8_legacy abm sse4a misalignsse 3dnowprefetch
> > osvw ibs skinit wdt tce topoext perfctr_core perfctr_nb bpext
> > perfctr_llc mwaitx cpb cat_l3 cdp_l3 hw_pstate ssbd mba ibrs ibpb
> > stibp vmmcall fsgsbase bmi1 avx2 smep bmi2 cqm rdt_a rdseed adx smap
> > clflushopt clwb sha_ni xsaveopt xsavec xgetbv1 xsaves cqm_llc
> > cqm_occup_llc cqm_mbm_total cqm_mbm_local clzero irperf xsaveerptr
> > rdpru wbnoinvd amd_ppin arat npt lbrv svm_lock nrip_save tsc_scale
> > vmcb_clean flushbyasid decodeassists pausefilter pfthreshold avic
> > v_vmsave_vmload vgif v_spec_ctrl umip rdpid overflow_recov succor smca
> > sev sev_es
> >
> > # cat /sys/kernel/debug/kmemleak
> > unreferenced object 0xffff888140be6540 (size 32):
> > comm "swapper/0", pid 1, jiffies 4294683141 (age 2488.140s)
> > hex dump (first 32 bytes):
> > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
> > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
> > backtrace:
> > [<000000009569963d>] __kmalloc_node+0x10e/0x270
> > [<000000005ec49251>] amd_uncore_cpu_up_prepare+0x1c3/0x780
> > [<00000000b48a1e7c>] cpuhp_invoke_callback+0x40e/0x1760
> > [<00000000555aab25>] cpuhp_issue_call+0x18f/0x6b0
> > [<00000000b4dd3935>] __cpuhp_setup_state_cpuslocked+0x2c0/0x8f0
> > [<0000000066ebf481>] __cpuhp_setup_state+0xbb/0x210
> > [<000000000949b7a4>] amd_uncore_init+0x385/0x46f
> > [<000000008505629b>] do_one_initcall+0xfc/0x580
> > [<00000000192522a5>] kernel_init_freeable+0x67d/0x710
> > [<00000000613746f8>] kernel_init+0x18/0x160
> > [<00000000813ba43a>] ret_from_fork+0x22/0x30
> > unreferenced object 0xffff888140bdd800 (size 64):
> > comm "swapper/0", pid 1, jiffies 4294683141 (age 2488.140s)
> > hex dump (first 32 bytes):
> > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
> > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
> > backtrace:
> > [<000000009569963d>] __kmalloc_node+0x10e/0x270
> > [<0000000037b0b577>] amd_uncore_cpu_up_prepare+0x41f/0x780
> > [<00000000b48a1e7c>] cpuhp_invoke_callback+0x40e/0x1760
> > [<00000000555aab25>] cpuhp_issue_call+0x18f/0x6b0
> > [<00000000b4dd3935>] __cpuhp_setup_state_cpuslocked+0x2c0/0x8f0
> > [<0000000066ebf481>] __cpuhp_setup_state+0xbb/0x210
> > [<000000000949b7a4>] amd_uncore_init+0x385/0x46f
> > [<000000008505629b>] do_one_initcall+0xfc/0x580
> > [<00000000192522a5>] kernel_init_freeable+0x67d/0x710
> > [<00000000613746f8>] kernel_init+0x18/0x160
> > [<00000000813ba43a>] ret_from_fork+0x22/0x30
> >
>
> Thanks for reporting this. A fix has already been sent and it can be found here:
> https://lore.kernel.org/all/4fa9e5ac6d6e41fa889101e7af7e6ba372cfea52.1662613255.git.sandipan.das@amd.com/
>
> It would be great if you can test it and report your findings.
>
> - Sandipan
>
--
Best Regards,
Yi Zhang
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2022-09-15 1:49 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-09-14 6:25 [bug report] kmemleak observed after system boots up with amd cpu Yi Zhang
2022-09-14 6:31 ` Sandipan Das
2022-09-15 1:48 ` Yi Zhang
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.