Received: by 2002:a25:683:0:0:0:0:0 with SMTP id 125csp559826ybg; Wed, 3 Jun 2020 07:51:06 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwhMSkNVDREgvZEgXO4+2Q/mWXSSXn0ES1PhLG+K2nVXc1bUNAW1h1ayYHTTnZ+7sQlZ81U X-Received: by 2002:a17:906:3bd7:: with SMTP id v23mr16690916ejf.299.1591195866411; Wed, 03 Jun 2020 07:51:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591195866; cv=none; d=google.com; s=arc-20160816; b=L5xzIjBnBwReS/uCLiZmIMVN7sy+1WNQaKLklpW6XIwIHCdj2bhW9t4lazIc4PkN3L BlgRsU9dpdMXar4Jck7TL+bOOU/TNeYuLdmNZFlOWpHbf+b3bcXqP7PNRYxAfHYRUrbs RU7pcDGBJ8M25WDgRgF2tqlnY3ePzbxmyW6y4drY8YLVGC9Md1DkexBmmxsbtTffdmgh DM5bc9yZ3wf9LfQEvnyij1xY+DrRxetbEm8eilQ/vGAMCjGgIcCm0PR+qXGI6ACAF32K z17uiWne/FsDzwic45kxSFU7ordQwtO7B+eJFP3WHA5qpYfsDPDPnasrt9uK/s2P73cx NkeA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:reply-to:message-id:subject:cc:to:from:date; bh=b0I4URZ7Mq4FT5B3N3oOwfE4IVi+ama0eDCXYu+UwgA=; b=xsAzr9neZqkh8FrX3Xwxi7qDazeBnzrAWWIOn3GqjsyFImvJiTSRdx2iYMjw1eLv2F XWgLaA7+ysHKefsDq6flWu2kmErly0MNL6JQJI+gWcEQTNabF0LPEvOGCRVGbdfIOwsE 4l0gD8MGAD2DoxJTVDCZ2nvDQUEdOqR4bfJI9u8if2GiBwqC17li/fk4cYKZ1mz5QNci CGGU7KyeWb4Kfclp58SUS7h5abfEBCAZ4RX3TSs+h/FweNae49Uo0ogBCsKDWv8jilBF O6l/vTgBtL/YHF3rfHcsteIDfAoVI+N6CHo2dEJdXCEmAKfgsFwqwZZiC7DALCC4l5Th pCKw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ha25si1252502ejb.180.2020.06.03.07.50.42; Wed, 03 Jun 2020 07:51:06 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726086AbgFCOsX (ORCPT + 99 others); Wed, 3 Jun 2020 10:48:23 -0400 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:16500 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725834AbgFCOsW (ORCPT ); Wed, 3 Jun 2020 10:48:22 -0400 Received: from pps.filterd (m0098419.ppops.net [127.0.0.1]) by mx0b-001b2d01.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id 053EWOBx017053; Wed, 3 Jun 2020 10:47:36 -0400 Received: from ppma01fra.de.ibm.com (46.49.7a9f.ip4.static.sl-reverse.com [159.122.73.70]) by mx0b-001b2d01.pphosted.com with ESMTP id 31ec64m5h5-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 03 Jun 2020 10:47:35 -0400 Received: from pps.filterd (ppma01fra.de.ibm.com [127.0.0.1]) by ppma01fra.de.ibm.com (8.16.0.42/8.16.0.42) with SMTP id 053EhHxG016719; Wed, 3 Jun 2020 14:47:34 GMT Received: from b06avi18878370.portsmouth.uk.ibm.com (b06avi18878370.portsmouth.uk.ibm.com [9.149.26.194]) by ppma01fra.de.ibm.com with ESMTP id 31bf47uc8x-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 03 Jun 2020 14:47:33 +0000 Received: from b06wcsmtp001.portsmouth.uk.ibm.com (b06wcsmtp001.portsmouth.uk.ibm.com [9.149.105.160]) by b06avi18878370.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id 053ElVWG55968044 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 3 Jun 2020 14:47:31 GMT Received: from b06wcsmtp001.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 827CEA405C; Wed, 3 Jun 2020 14:47:31 +0000 (GMT) Received: from b06wcsmtp001.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 2D76CA4054; Wed, 3 Jun 2020 14:47:28 +0000 (GMT) Received: from sathnaga86 (unknown [9.85.87.122]) by b06wcsmtp001.portsmouth.uk.ibm.com (Postfix) with ESMTPS; Wed, 3 Jun 2020 14:47:27 +0000 (GMT) Date: Wed, 3 Jun 2020 20:17:25 +0530 From: Satheesh Rajendran To: Joerg Roedel Cc: Abdul Haleem , sachinp , Stephen Rothwell , linux-kernel , manvanth , linux-next , Steven Rostedt , "aneesh.kumar" , akpm@linux-foundation.org, linuxppc-dev , hch Subject: Re: [mainline][Oops][bisected 2ba3e6 ] 5.7.0 boot fails with kernel panic on powerpc Message-ID: <20200603144725.GA221279@sathnaga86> Reply-To: Satheesh Rajendran References: <1591181457.9020.13.camel@abdul> <20200603133257.GL6857@suse.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200603133257.GL6857@suse.de> X-TM-AS-GCONF: 00 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.216,18.0.687 definitions=2020-06-03_12:2020-06-02,2020-06-03 signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 bulkscore=0 mlxscore=0 priorityscore=1501 impostorscore=0 phishscore=0 clxscore=1011 suspectscore=1 adultscore=0 malwarescore=0 cotscore=-2147483648 spamscore=0 mlxlogscore=999 lowpriorityscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2004280000 definitions=main-2006030112 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jun 03, 2020 at 03:32:57PM +0200, Joerg Roedel wrote: > On Wed, Jun 03, 2020 at 04:20:57PM +0530, Abdul Haleem wrote: > > @Joerg, Could you please have a look? > > Can you please try the attached patch? Hi Joerg, I did hit the similar boot failue on a Power9 baremetal box(mentioned in Note) and your below patch helped solving that for my environment and am able to boot the system fine. ... Fedora 31 (Thirty One) Kernel 5.7.0-gd6f9469a0-dirty on an ppc64le (hvc0) login: Tested-by: Satheesh Rajendran Note: for the record, here is the boot failure call trace. [ 0.023555] mempolicy: Enabling automatic NUMA balancing. Configure with numa_balancing= or the kernel.numa_balancing sysctl [ 0.023582] pid_max: default: 163840 minimum: 1280 [ 0.035014] BUG: Unable to handle kernel data access on read at 0xc000006000000000 [ 0.035058] Faulting instruction address: 0xc000000000382304 [ 0.035074] Oops: Kernel access of bad area, sig: 11 [#1] [ 0.035097] LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA PowerNV [ 0.035113] Modules linked in: [ 0.035136] CPU: 24 PID: 0 Comm: swapper/24 Not tainted 5.7.0-gd6f9469a0 #1 [ 0.035161] NIP: c000000000382304 LR: c00000000038407c CTR: 0000000000000000 [ 0.035197] REGS: c00000000167f930 TRAP: 0300 Not tainted (5.7.0-gd6f9469a0) [ 0.035241] MSR: 9000000002009033 CR: 42022422 XER: 00000000 [ 0.035294] CFAR: c0000000003822fc DAR: c000006000000000 DSISR: 40000000 IRQMASK: 0 [ 0.035294] GPR00: c00000000038407c c00000000167fbc0 c00000000168090[ 150.252645597,5] OPAL: Reboot request... [ 150.252928266,5] RESET: Initiating fast reboot 1... 0 c008000000000000 [ 0.035294] GPR04: ffffffffffffffff 00000000000001ff c0080000001fffff 0000000000000060 [ 0.035294] GPR08: 0000000060000000 0000000000000005 c000006000000000 c008000000200000 [ 0.035294] GPR12: 0000000022022422 c000000001870000 c000000000000000 c008000000000000 [ 0.035294] GPR16: c008000007ffffff c008000000200000 0000000000000000 c000006000000000 [ 0.035294] GPR20: c008000008000000 c008000008000000 c008000007ffffff c008000007ffffff [ 0.035294] GPR24: c00000000163f7c8 c00000000172d0c0 0000000000000001 0000000000000001 [ 0.035294] GPR28: c000000001708000 c00000000172d0c8 0000000000000000 c008000008000000 [ 0.035622] NIP [c000000000382304] map_kernel_range_noflush+0x274/0x510 [ 0.035657] LR [c00000000038407c] __vmalloc_node_range+0x2ec/0x3a0 [ 0.035690] Call Trace: [ 0.035709] [c00000000167fbc0] [c00000000038d848] __alloc_pages_nodemask+0x158/0x3f0 (unreliable) [ 0.035750] [c00000000167fc90] [c00000000038407c] __vmalloc_node_range+0x2ec/0x3a0 [ 0.035787] [c00000000167fd40] [c000000000384268] __vmalloc+0x58/0x70 [ 0.035823] [c00000000167fdb0] [c000000001056db8] alloc_large_system_hash+0x204/0x304 [ 0.035870] [c00000000167fe60] [c00000000105c1f0] vfs_caches_init+0xd8/0x138 [ 0.035916] [c00000000167fee0] [c0000000010242a0] start_kernel+0x644/0x6ec [ 0.035960] [c00000000167ff90] [c00000000000ca9c] start_here_common+0x1c/0x400 [ 0.036004] Instruction dump: [ 0.036016] 3af4ffff 60000000 60000000 38c90010 7f663036 7d667a14 7cc600d0 7d713038 [ 0.036038] 38d1ffff 7c373040 41810008 7e91a378 2c250000 418201b4 7f464830 [ 0.036083] ---[ end trace c7e72029dfacc217 ]--- [ 0.036114] [ 1.036223] Kernel panic - not syncing: Attempted to kill the idle task! [ 1.036858] Rebooting in 10 seconds.. Regards, -Satheesh. > > diff --git a/include/asm-generic/5level-fixup.h b/include/asm-generic/5level-fixup.h > index 58046ddc08d0..afbab31fbd7e 100644 > --- a/include/asm-generic/5level-fixup.h > +++ b/include/asm-generic/5level-fixup.h > @@ -17,6 +17,11 @@ > ((unlikely(pgd_none(*(p4d))) && __pud_alloc(mm, p4d, address)) ? \ > NULL : pud_offset(p4d, address)) > > +#define pud_alloc_track(mm, p4d, address, mask) \ > + ((unlikely(pgd_none(*(p4d))) && \ > + (__pud_alloc(mm, p4d, address) || ({*(mask)|=PGTBL_P4D_MODIFIED;0;})))? \ > + NULL : pud_offset(p4d, address)) > + > #define p4d_alloc(mm, pgd, address) (pgd) > #define p4d_alloc_track(mm, pgd, address, mask) (pgd) > #define p4d_offset(pgd, start) (pgd) > diff --git a/include/linux/mm.h b/include/linux/mm.h > index 7e07f4f490cb..d46bf03b804f 100644 > --- a/include/linux/mm.h > +++ b/include/linux/mm.h > @@ -2088,35 +2088,35 @@ static inline pud_t *pud_alloc(struct mm_struct *mm, p4d_t *p4d, > NULL : pud_offset(p4d, address); > } > > -static inline p4d_t *p4d_alloc_track(struct mm_struct *mm, pgd_t *pgd, > +static inline pud_t *pud_alloc_track(struct mm_struct *mm, p4d_t *p4d, > unsigned long address, > pgtbl_mod_mask *mod_mask) > - > { > - if (unlikely(pgd_none(*pgd))) { > - if (__p4d_alloc(mm, pgd, address)) > + if (unlikely(p4d_none(*p4d))) { > + if (__pud_alloc(mm, p4d, address)) > return NULL; > - *mod_mask |= PGTBL_PGD_MODIFIED; > + *mod_mask |= PGTBL_P4D_MODIFIED; > } > > - return p4d_offset(pgd, address); > + return pud_offset(p4d, address); > } > > -#endif /* !__ARCH_HAS_5LEVEL_HACK */ > - > -static inline pud_t *pud_alloc_track(struct mm_struct *mm, p4d_t *p4d, > +static inline p4d_t *p4d_alloc_track(struct mm_struct *mm, pgd_t *pgd, > unsigned long address, > pgtbl_mod_mask *mod_mask) > + > { > - if (unlikely(p4d_none(*p4d))) { > - if (__pud_alloc(mm, p4d, address)) > + if (unlikely(pgd_none(*pgd))) { > + if (__p4d_alloc(mm, pgd, address)) > return NULL; > - *mod_mask |= PGTBL_P4D_MODIFIED; > + *mod_mask |= PGTBL_PGD_MODIFIED; > } > > - return pud_offset(p4d, address); > + return p4d_offset(pgd, address); > } > > +#endif /* !__ARCH_HAS_5LEVEL_HACK */ > + > static inline pmd_t *pmd_alloc(struct mm_struct *mm, pud_t *pud, unsigned long address) > { > return (unlikely(pud_none(*pud)) && __pmd_alloc(mm, pud, address))?