From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 26487C433EF for ; Fri, 8 Apr 2022 14:41:41 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id A6CA56B0072; Fri, 8 Apr 2022 10:41:40 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 9F2286B0073; Fri, 8 Apr 2022 10:41:40 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 845706B0074; Fri, 8 Apr 2022 10:41:40 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (relay.hostedemail.com [64.99.140.26]) by kanga.kvack.org (Postfix) with ESMTP id 6E0DF6B0072 for ; Fri, 8 Apr 2022 10:41:40 -0400 (EDT) Received: from smtpin18.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay06.hostedemail.com (Postfix) with ESMTP id 40DB025BC6 for ; Fri, 8 Apr 2022 14:41:40 +0000 (UTC) X-FDA: 79333975560.18.7E3785D Received: from mga02.intel.com (mga02.intel.com [134.134.136.20]) by imf08.hostedemail.com (Postfix) with ESMTP id 9CD21160009 for ; Fri, 8 Apr 2022 14:41:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1649428898; x=1680964898; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=gKPuDMxPwwImVaSWhf/GrWbTRZ/GhJoq+Oz10aC1ezE=; b=gvCz7b7MV8HyB5MTpSVKXsOvaZBa8i2A5PVd09+MXJEsA4zQigPv8JF+ SiV3QlFLsFwfHOZ1FpfUd92CtOSVtSloeJzxoL6f53c+pYnNB8zpNYy0H ce9yCoUUrU3y2xx/0Vei+3BYwsdy5HeDmzMakyANrRO8SZKKjXgXwzLyS n5YIcsx+VN8J0k4Vk2Zb8aYgNMGtCvNfZ6DyzzXVL0mTW6zv0UWt/OPBj AYs0AMbny1BlMy/t21muxMGb34GURu/XOD6SjJeolsScMhj0PEP0QDgEM EI0akVgMpnMksCy/I/PHFOgzs+d+JeZ/PEmS8tVvQ7pKy8TKKdqoX2mNI Q==; X-IronPort-AV: E=McAfee;i="6400,9594,10310"; a="249136717" X-IronPort-AV: E=Sophos;i="5.90,245,1643702400"; d="scan'208";a="249136717" Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by orsmga101.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 08 Apr 2022 07:41:36 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.90,245,1643702400"; d="scan'208";a="653285516" Received: from lkp-server02.sh.intel.com (HELO 7e80bc2a00a0) ([10.239.97.151]) by fmsmga002.fm.intel.com with ESMTP; 08 Apr 2022 07:41:32 -0700 Received: from kbuild by 7e80bc2a00a0 with local (Exim 4.95) (envelope-from ) id 1ncpnn-0000MI-Eq; Fri, 08 Apr 2022 14:41:31 +0000 Date: Fri, 8 Apr 2022 22:41:17 +0800 From: kernel test robot To: Nico Pache , linux-mm@kvack.org, linux-kernel@vger.kernel.org Cc: kbuild-all@lists.01.org, Rafael Aquini , Waiman Long , Baoquan He , Christoph von Recklinghausen , Don Dutile , "Herton R . Krzesinski" , David Rientjes , Michal Hocko , Andrea Arcangeli , Andrew Morton , Linux Memory Management List , Davidlohr Bueso , Thomas Gleixner , Peter Zijlstra , Ingo Molnar , Joel Savitz , Darren Hart , stable@kernel.org Subject: Re: [PATCH v8] oom_kill.c: futex: Don't OOM reap the VMA containing the robust_list_head Message-ID: <202204082258.E7EPbAYz-lkp@intel.com> References: <20220408032809.3696798-1-npache@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220408032809.3696798-1-npache@redhat.com> User-Agent: Mutt/1.10.1 (2018-07-13) X-Stat-Signature: ic1cnf9f583bygcaj4cwhhnbgnbdzicr X-Rspamd-Server: rspam07 X-Rspamd-Queue-Id: 9CD21160009 Authentication-Results: imf08.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=gvCz7b7M; dmarc=pass (policy=none) header.from=intel.com; spf=none (imf08.hostedemail.com: domain of lkp@intel.com has no SPF policy when checking 134.134.136.20) smtp.mailfrom=lkp@intel.com X-Rspam-User: X-HE-Tag: 1649428898-206194 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: Hi Nico, Thank you for the patch! Perhaps something to improve: [auto build test WARNING on hnaz-mm/master] [also build test WARNING on linus/master v5.18-rc1 next-20220408] [cannot apply to linux/master] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch, we suggest to use '--base' as documented in https://git-scm.com/docs/git-format-patch] url: https://github.com/intel-lab-lkp/linux/commits/Nico-Pache/oom_kill-c-futex-Don-t-OOM-reap-the-VMA-containing-the-robust_list_head/20220408-112952 base: https://github.com/hnaz/linux-mm master config: x86_64-randconfig-s022 (https://download.01.org/0day-ci/archive/20220408/202204082258.E7EPbAYz-lkp@intel.com/config) compiler: gcc-11 (Debian 11.2.0-19) 11.2.0 reproduce: # apt-get install sparse # sparse version: v0.6.4-dirty # https://github.com/intel-lab-lkp/linux/commit/70c1e2a404ac47b7c9b8bd1e9c4d3e72f19e6c62 git remote add linux-review https://github.com/intel-lab-lkp/linux git fetch --no-tags linux-review Nico-Pache/oom_kill-c-futex-Don-t-OOM-reap-the-VMA-containing-the-robust_list_head/20220408-112952 git checkout 70c1e2a404ac47b7c9b8bd1e9c4d3e72f19e6c62 # save the config file to linux build tree mkdir build_dir make W=1 C=1 CF='-fdiagnostic-prefix -D__CHECK_ENDIAN__' O=build_dir ARCH=x86_64 SHELL=/bin/bash If you fix the issue, kindly add following tag as appropriate Reported-by: kernel test robot sparse warnings: (new ones prefixed by >>) >> mm/oom_kill.c:606:21: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected void *robust_list @@ got struct robust_list_head [noderef] __user *robust_list @@ mm/oom_kill.c:606:21: sparse: expected void *robust_list mm/oom_kill.c:606:21: sparse: got struct robust_list_head [noderef] __user *robust_list mm/oom_kill.c: note: in included file (through include/linux/rculist.h, include/linux/sched/signal.h, include/linux/oom.h): include/linux/rcupdate.h:726:9: sparse: sparse: context imbalance in 'find_lock_task_mm' - wrong count at exit mm/oom_kill.c:222:28: sparse: sparse: context imbalance in 'oom_badness' - unexpected unlock include/linux/rcupdate.h:726:9: sparse: sparse: context imbalance in 'dump_task' - unexpected unlock include/linux/rcupdate.h:726:9: sparse: sparse: context imbalance in '__oom_kill_process' - unexpected unlock mm/oom_kill.c:1243:21: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected void *robust_list @@ got struct robust_list_head [noderef] __user *robust_list @@ mm/oom_kill.c:1243:21: sparse: expected void *robust_list mm/oom_kill.c:1243:21: sparse: got struct robust_list_head [noderef] __user *robust_list mm/oom_kill.c:1232:20: sparse: sparse: context imbalance in '__se_sys_process_mrelease' - unexpected unlock -- >> mm/mmap.c:3138:21: sparse: sparse: incorrect type in assignment (different address spaces) @@ expected void *robust_list @@ got struct robust_list_head [noderef] __user *robust_list @@ mm/mmap.c:3138:21: sparse: expected void *robust_list mm/mmap.c:3138:21: sparse: got struct robust_list_head [noderef] __user *robust_list vim +606 mm/oom_kill.c 575 576 /* 577 * Reaps the address space of the give task. 578 * 579 * Returns true on success and false if none or part of the address space 580 * has been reclaimed and the caller should retry later. 581 */ 582 static bool oom_reap_task_mm(struct task_struct *tsk, struct mm_struct *mm) 583 { 584 bool ret = true; 585 void *robust_list = NULL; 586 587 if (!mmap_read_trylock(mm)) { 588 trace_skip_task_reaping(tsk->pid); 589 return false; 590 } 591 592 /* 593 * MMF_OOM_SKIP is set by exit_mmap when the OOM reaper can't 594 * work on the mm anymore. The check for MMF_OOM_SKIP must run 595 * under mmap_lock for reading because it serializes against the 596 * mmap_write_lock();mmap_write_unlock() cycle in exit_mmap(). 597 */ 598 if (test_bit(MMF_OOM_SKIP, &mm->flags)) { 599 trace_skip_task_reaping(tsk->pid); 600 goto out_unlock; 601 } 602 603 trace_start_task_reaping(tsk->pid); 604 605 #ifdef CONFIG_FUTEX > 606 robust_list = tsk->robust_list; 607 #endif 608 /* failed to reap part of the address space. Try again later */ 609 ret = __oom_reap_task_mm(mm, robust_list); 610 if (!ret) 611 goto out_finish; 612 613 pr_info("oom_reaper: reaped process %d (%s), now anon-rss:%lukB, file-rss:%lukB, shmem-rss:%lukB\n", 614 task_pid_nr(tsk), tsk->comm, 615 K(get_mm_counter(mm, MM_ANONPAGES)), 616 K(get_mm_counter(mm, MM_FILEPAGES)), 617 K(get_mm_counter(mm, MM_SHMEMPAGES))); 618 out_finish: 619 trace_finish_task_reaping(tsk->pid); 620 out_unlock: 621 mmap_read_unlock(mm); 622 623 return ret; 624 } 625 -- 0-DAY CI Kernel Test Service https://01.org/lkp