Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp117590ybv; Wed, 5 Feb 2020 02:21:55 -0800 (PST) X-Google-Smtp-Source: APXvYqw2pb2333If8RSlYbtm/PVqcg9CWz2jqMYRuy55Rf9UENlqXKQYEkGFZEXU0hsC2upQ0yh9 X-Received: by 2002:a05:6808:64e:: with SMTP id z14mr2181139oih.79.1580898115872; Wed, 05 Feb 2020 02:21:55 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580898115; cv=none; d=google.com; s=arc-20160816; b=gp+sIohLr+dk/D+nYFj0XtGXgh52nyVlsGarnXnCcC7LDBJ2QA1SrT6E/T5egf6Vsk zccaGcvzAHOCHVbRW/GoAULMBaovXxumCcveOn2+Tp73ip/dSOwHjS7w6nz7NRjJgsdE tpuavElQ4cDKRG3EF9IHqCk/Z8Ij6yr3vehfXon/9mF6jDq2x15Z3WWi2lRI9W62qui3 5EmV43IvigrM5MDK+j6CvnJ6VSklhMHXhQT0NgRheBalyvP/G4y1ahTQ/20Kpj6eqCsk AkZw4WToLFKen5bzA9T2KqNSn0wH/DsXYnuLUkT4+Go/HxAzPZWGrpLmkeIo+ZPsvGef vfsg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=uhG9+u+26CC0Y3oe69s3gSW9WPcu2HiE40iJD/rIxZs=; b=BfacWy1JXZCHgtfYHX/7V8Sz3VlP0muzZa4f1XA380StXqyZTLhz6e7KnTn5aeHFl/ kaSN1XbF9a4m8GgqJvu+uZeouW62+TSK1t/IzfsZ/YrgGuHNFbQ62+S6GYAO6gGCC/vg LJtC5o0cnVIOvqyn8NMaNDulfxls/IM/1mRB61HeFQOEv1gehwaOIHnq1epZA4MxegCm gKO1cnkBBVbL4ssI3bYninAIwCw5ZVTpbLqxKHJlurvA2ouCSKuORybc1wYrKMj+E8qi Y3ujkfM7WEUuASLwTgn04akIJBx8H1I/RrVs1T7z8LS0ijkGuAHfRWY4UrqDoAsVms3V NqPQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=N6uQFYPs; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j1si12636189otr.207.2020.02.05.02.21.25; Wed, 05 Feb 2020 02:21:55 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=N6uQFYPs; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727790AbgBEKTU (ORCPT + 99 others); Wed, 5 Feb 2020 05:19:20 -0500 Received: from us-smtp-delivery-1.mimecast.com ([205.139.110.120]:57973 "EHLO us-smtp-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727231AbgBEKTT (ORCPT ); Wed, 5 Feb 2020 05:19:19 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1580897958; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=uhG9+u+26CC0Y3oe69s3gSW9WPcu2HiE40iJD/rIxZs=; b=N6uQFYPswEzXIKycA70ggDJaUKfuGK3gpizWGNP1RTGdSFdKmFNu3gn0ohJzfIT5hZIIFD fjxhgKx55qfoG6PN96pv8pLAsz7N1JFmluzdc8+0NEYPWrgLqactwA8H9WayNgQnbZtjoN D0hOvUPgTDyyfuYocB5Plic4j75/TcQ= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-188-VvRhE14-OxqVkDRRag5dSg-1; Wed, 05 Feb 2020 05:19:14 -0500 X-MC-Unique: VvRhE14-OxqVkDRRag5dSg-1 Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 92A2C2EDA; Wed, 5 Feb 2020 10:19:12 +0000 (UTC) Received: from localhost.localdomain (ovpn-12-108.pek2.redhat.com [10.72.12.108]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 77823857AF; Wed, 5 Feb 2020 10:19:05 +0000 (UTC) Subject: Re: [PATCH 0/2] printk: replace ringbuffer To: John Ogness , Sergey Senozhatsky Cc: Petr Mladek , Peter Zijlstra , Sergey Senozhatsky , Steven Rostedt , Linus Torvalds , Greg Kroah-Hartman , Andrea Parri , Thomas Gleixner , kexec@lists.infradead.org, linux-kernel@vger.kernel.org References: <20200128161948.8524-1-john.ogness@linutronix.de> <20200205044848.GH41358@google.com> <20200205050204.GI41358@google.com> <88827ae2-7af5-347b-29fb-cffb94350f8f@redhat.com> <20200205063640.GJ41358@google.com> <877e11h0ir.fsf@linutronix.de> From: lijiang Message-ID: Date: Wed, 5 Feb 2020 18:19:02 +0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: <877e11h0ir.fsf@linutronix.de> Content-Type: text/plain; charset=windows-1252 Content-Language: en-US Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > On 2020-02-05, Sergey Senozhatsky wrote: >>>>> So there is a General protection fault. That's the type of a >>>>> problem that kills the boot for me as well (different backtrace, >>>>> tho). >>>> >>>> Do you have CONFIG_RELOCATABLE and CONFIG_RANDOMIZE_BASE (KASLR) >>>> enabled? >>> >>> Yes. These two options are enabled. >>> >>> CONFIG_RELOCATABLE=y >>> CONFIG_RANDOMIZE_BASE=y >> >> So KASLR kills the boot for me. So does KASAN. > > Sergey, thanks for looking into this already! > >> John, do you see any of these problems on your test machine? > > For x86 I have only been using qemu. (For hardware tests I use arm64-smp > in order to verify memory barriers.) With qemu-x86_64 I am unable to > reproduce the problem. > > Lianbo, thanks for the report. Can you share your boot args? Anything > special in there (like log_buf_len=, earlyprintk, etc)? > Thanks for your response. Here is my kernel command line: Command line: BOOT_IMAGE=(hd0,msdos1)/vmlinuz-5.5.0-rc7+ root=/dev/mapper/intel--wildcatpass--07-root ro crashkernel=512M resume=/dev/mapper/intel--wildcatpass--07-swap rd.lvm.lv=intel-wildcatpass-07/root rd.lvm.lv=intel-wildcatpass-07/swap console=ttyS0,115200n81 BTW: Actually, I put the complete kernel log in my last email reply, you could check the attachment if needed. > Also, could you share your CONFIG_LOG_* and CONFIG_PRINTK_* options? > Sure. Please refer to it. [root@intel-wildcatpass-07 linux]# grep -nr "CONFIG_LOG_" .config 134:CONFIG_LOG_BUF_SHIFT=20 135:CONFIG_LOG_CPU_MAX_BUF_SHIFT=12 [root@intel-wildcatpass-07 linux]# grep -nr "CONFIG_PRINTK_" .config 136:CONFIG_PRINTK_SAFE_LOG_BUF_SHIFT=13 207:CONFIG_PRINTK_NMI=y 7758:CONFIG_PRINTK_TIME=y 7759:# CONFIG_PRINTK_CALLER is not set Do you have any suggestions about the size of CONFIG_LOG_* and CONFIG_PRINTK_* options by default? Thanks. Lianbo > I will move to bare metal x86_64 and hopefully see it as well. > > John >