Received: by 2002:a25:683:0:0:0:0:0 with SMTP id 125csp403390ybg; Wed, 10 Jun 2020 03:59:40 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwHXDJu+UiP0V+jWG7FgzZT8qyuCsB6trc2UL4s+lkZRbjoSfHrF/zxod5gdnp9OZUQrthh X-Received: by 2002:a05:6402:a49:: with SMTP id bt9mr1998948edb.300.1591786780745; Wed, 10 Jun 2020 03:59:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591786780; cv=none; d=google.com; s=arc-20160816; b=fXoiLuZgM9OM6mreyqjLEbbGn4hbOaL8czP0W81TCDeGkwoGWLnFwutLIkYHmpHj/I qs7fYu5zs1TEIeOQdpvLVCWFkNuUaCW59NKhE8QnUBNww8+R1hLUnTtiPljF6Fer8qtD wkUpmdChWhQf2/gpGarnfHpc37ljj8XHyYIbzfokFcUkPLEDes+DPuv83G6AG8oCoKVl yvBCGpVLXcQPwvMq/hpMiwMhP+ZBeuJu3mAOVJTlavf8HhN+SKesJd78N9iUl+G+Sd4R WWtsCcwoKulzYmMIiLMQNE6jhUToKUWCbRdDU+DEI47hKo5D3oqvOvmnJ9nprSLqfli3 YRTA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=aZpJ/EKmbnhOXheqM0mDGNz1UxIR1/UnaxHW5IEkdQA=; b=t8BK1iXat/2QtY26rfdGfBSbo7GYrReFW/tF2U/C9WNU8PGBKcXP9jW6F/IszY98pB wyZaCJf8QM9ZAjlXTivdDjXVQijZ52TaAyZBpFpH1H5bjSp/TcXPYZU9Tv679UcFeJOL 489bcKV8COCZAQF+BTYPnjFXEeV4Y0XpDBwdCeKNmBuiKt3gDt0XU2cOPp1I5f8l7VHu KCYZrQpAOgXkyb57sv3SJoT4qApxkYulRFxmB/ECcK8Tp7JWZqY2UAFm06saEXohowwt W90VuU6X1EXMVS/t5dm+5uL+oIcbx5cvpXU6wvLdf9pz36zRqMLGt/FG9BaqZNqOBVcH UM6w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h14si12107976edq.256.2020.06.10.03.59.17; Wed, 10 Jun 2020 03:59:40 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728365AbgFJK4s (ORCPT + 99 others); Wed, 10 Jun 2020 06:56:48 -0400 Received: from foss.arm.com ([217.140.110.172]:56960 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728330AbgFJK4r (ORCPT ); Wed, 10 Jun 2020 06:56:47 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 17A5C1FB; Wed, 10 Jun 2020 03:56:47 -0700 (PDT) Received: from gaia (unknown [172.31.20.19]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id B64203F66F; Wed, 10 Jun 2020 03:56:44 -0700 (PDT) Date: Wed, 10 Jun 2020 11:56:42 +0100 From: Catalin Marinas To: kernel test robot Cc: Nicolas Boichat , Linus Torvalds , Dmitry Vyukov , Masahiro Yamada , Kees Cook , Petr Mladek , Thomas Gleixner , Tetsuo Handa , Joe Lawrence , Uladzislau Rezki , Andy Shevchenko , Stephen Rothwell , Andrey Ryabinin , Andrew Morton , LKML , lkp@lists.01.org Subject: Re: [kmemleak] b751c52bb5: BUG:kernel_hang_in_boot_stage Message-ID: <20200610105640.GB26099@gaia> References: <20200610075156.GE12456@shao2-debian> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200610075156.GE12456@shao2-debian> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jun 10, 2020 at 03:51:56PM +0800, kernel test robot wrote: > FYI, we noticed the following commit (built with gcc-7): > > commit: b751c52bb587ae66f773b15204ef7a147467f4c7 ("kmemleak: increase DEBUG_KMEMLEAK_EARLY_LOG_SIZE default to 16K") > https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master > > in testcase: boot > > on test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 8G [...] > BUG: kernel hang in boot stage > > To reproduce: > > # build kernel > cd linux > cp config-5.3.0-11789-gb751c52bb587a .config > make HOSTCC=gcc-7 CC=gcc-7 ARCH=i386 olddefconfig prepare modules_prepare bzImage I've never tried kmemleak on i386. Anyway, I'm not sure what caused the hang (or whether it's a hang at all) but I suspect prior to the above commit, kmemleak probably just disabled itself (early log buffer exceeded). So the bug may have been there already, only that kmemleak started working and tripped over it when the log buffer increased. Is there a chance that the kernel got much slower with kmemleak enabled and the test scripts timed out? Does this problem still exist with the latest mainline? Thanks. -- Catalin