Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp600611pxj; Thu, 10 Jun 2021 08:17:13 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzA5YIZMT2ey5clq8B42gnNQRCOE39+QMyrbUE9nEsleM3HlyRCgWDGl9zM0dGaoXWJnYyo X-Received: by 2002:a17:906:4483:: with SMTP id y3mr128690ejo.92.1623338233105; Thu, 10 Jun 2021 08:17:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623338233; cv=none; d=google.com; s=arc-20160816; b=u9dFbCDYTCcH7XMTmUpTm3i88a9tTUSfke9rHVCWyJTngyjpgBzNCp01I//LZEvGO2 a9Jjrfwx4FpPBXcRJdOxzstBHax5DKUNx+VV+2nRmdzR18tRK59nXBCd6NccYsmV8/9+ Ne+3nrBbBrgUmLTHmN40DLPuDaInrceIDErMow3uztyLdDFz5UyezVWSjiBcT+kDH07G ddQOxRpd/4r3JKAlHr4SEHZcyvKoEn0/qyU5I8ku/ojq6IYSq/2Fza0qzMnfLQxCXqOA r3JVBkEvV23gT0o7mromXKEzhJRVzNiGCKEYUPZsN00LQ0ydxCAvCoYAXEL7if1IyiZY VgbA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=IR1boR4bTvPzYZX9eQCIo5EDpNKOwQbZFVHgurBzUOc=; b=WoujZnCLhjQVL9qF9Byr/AVDQeIIHQFhWod3S3mQkT7cFwonqfVPm9yNBpxw/Wap93 eifUdo39C6L/kWjbjv2t82I9ZIiYxZB7i+u0CsxF+g6zxq3/d0LZcPiDxQv8Ycy+PSYj wofE6eIu8fxXl35mj6GNYjWpiWfk0ANekU1AUmYs6FKF/CyLi2+va8XT8E8bXzvXaxGF i1b8DGMq3cbnq5OfU1SZQGFmbqj0+K0IYULqGXeOYAB5UU6kS8iSB0jBERuFBSXhkmwr sR9RFVL4QCG8NVM9el9dEv1+51LcGD9slce+5Ht95cIAioN249T4PT83u7E8/wpSLZL/ WaEw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=DpNSyGU8; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h9si2432374edw.186.2021.06.10.08.16.49; Thu, 10 Jun 2021 08:17:13 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=DpNSyGU8; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231572AbhFJPQk (ORCPT + 99 others); Thu, 10 Jun 2021 11:16:40 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.133.124]:27039 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231542AbhFJPQe (ORCPT ); Thu, 10 Jun 2021 11:16:34 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1623338078; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=IR1boR4bTvPzYZX9eQCIo5EDpNKOwQbZFVHgurBzUOc=; b=DpNSyGU84SWo6Zc+5qYEgjTENNW3X/YJRw2M5Hqy67vZryFXiWn3kAV24Kwnzdie9KaaY1 zoSLaJdCwp5j2G8w/7LCpghpbkwW1wnOmmxLxWH7mtqPmS5XL4YcVKbsCFCGri/zmuNOUv L0tkFSE5m+UHk3Fs2Os8rW2wM0NSbec= Received: from mail-ot1-f70.google.com (mail-ot1-f70.google.com [209.85.210.70]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-60-zLG-AsIMPX2JbdX-16yUwA-1; Thu, 10 Jun 2021 11:14:36 -0400 X-MC-Unique: zLG-AsIMPX2JbdX-16yUwA-1 Received: by mail-ot1-f70.google.com with SMTP id 88-20020a9d06e10000b029030513a66c79so42591otx.0 for ; Thu, 10 Jun 2021 08:14:36 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=IR1boR4bTvPzYZX9eQCIo5EDpNKOwQbZFVHgurBzUOc=; b=lHDYf3UU/YOdg5FzJkLICamlXPcUH+6VB9v09YPpJQk0A9Q/XaU3UPqNLBuSZ+e6KS +ABs6rJht4j2S7FkjQ2v6yEBGi79/jG7PbUFRXnSWSXq9npsRZz79nx4Vz0er6AVd/BX FHwjSx1G/KvynvQ//2MyIRDdgK2+9rrKnmFJKy2oPBb40PqRLjZYeEcX9Ymx8eXAXg5X yUPl5k1RNafIX9G6zMLbXLvdKk/VP6Fj8CZ5k/EeONSHtSwqzqUK8/jtdtjVsbeBjIMT a460IlTz6FAFqGMYQNAndjt3EXdik7eouvLaFnj6KSzIL3Bd8oCvcBp+R1dRD9d/Zn++ OA0Q== X-Gm-Message-State: AOAM533U2+G1J0G758jnqAuBqOSpVeiUfiYhit/dbqhfc4wDICiBrq5R +T5jRkbuuR9xtmnm7pAMNEFjdlCvxS4Cs3dcFc8TrEUdqv8/PeqURjroIMGVCVzWcOP6ivJxutK ZAsiXU0e2u0tbja3U0hjlcni4VN0zmzyVXeRS+qvR X-Received: by 2002:a4a:ba87:: with SMTP id d7mr2759070oop.6.1623338075907; Thu, 10 Jun 2021 08:14:35 -0700 (PDT) X-Received: by 2002:a4a:ba87:: with SMTP id d7mr2759052oop.6.1623338075657; Thu, 10 Jun 2021 08:14:35 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: Bruno Goncalves Date: Thu, 10 Jun 2021 17:14:24 +0200 Message-ID: Subject: Re: Panic on ppc64le using kernel 5.13.0-rc3 To: Rasmus Villemoes Cc: linux-kernel@vger.kernel.org, CKI Project Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jun 10, 2021 at 3:02 PM Rasmus Villemoes wrote: > > On 10/06/2021 13.47, Bruno Goncalves wrote: > > Hello, > > > > We've observed in some cases kernel panic when trying to boot on > > ppc64le using a kernel based on 5.13.0-rc3. We are not sure if it > > could be related to patch > > https://lore.kernel.org/lkml/20210313212528.2956377-2-linux@rasmusvillemoes.dk/ > > > > Thanks for the report. It's possible, but I'll need some help from you > to get more info. > > First, can you send me the .config? The .config is on https://s3.us-east-1.amazonaws.com/arr-cki-prod-datawarehouse-public/datawarehouse-public/2021/06/09/317881801/build_ppc64le_redhat:1332368174/kernel-block-ppc64le-d3f02e52f5548006f04358d407bbb7fe51255c41.config > > > > > [ 1.516075] wait_for_initramfs() called before rootfs_initcalls > > This is likely because you have CONFIG_UEVENT_HELPER_PATH set to some > non-empty path (/sbin/hotplug perhaps). This did get reported once before: > CONFIG_UEVENT_HELPER_PATH is not set. In the .config we have "# CONFIG_UEVENT_HELPER is not set" > https://lore.kernel.org/lkml/45556f52-cd2f-5512-ba65-81e4acee21ff@rasmusvillemoes.dk/ > > I think I should go and prepare a patch that moves the > usermodehelper_enable() call to after initramfs unpacking has been > initiated. > > But until then, can you check if you do have UEVENT_HELPER_PATH set, and > if so, does changing it to the empty string make a change wrt this crash? > > > > [ 1.559757] PCI: CLS 128 bytes, default 128 > > [ 1.560150] Trying to unpack rootfs image as initramfs... > > OK, so now we got to populate_rootfs() and have kicked off a worker to > do the unpacking. Meanwhile, PID1 goes on to do other initcalls. > > ... > > > [ 1.764430] Initramfs unpacking failed: no cpio magic > > Whoa, that's not good. Did something scramble over the initramfs memory > while it was being unpacked? It's been .2 seconds since the start of the > unpacking, so it's unlikely the very beginning of the initramfs is corrupt. > > Can you try booting with initramfs_async=0 on the command line and see > if the kernel still crashes? We are not able to reproduce it 100% of the time, but sure I can try with this option and see what happens. We've also seen: Initramfs unpacking failed: junk within compressed archive This can be seen on the other 2 console logs that I provided the link to. Bruno > > > [ 1.766204] Freeing initrd memory: 18176K > ... > > > > [ 1.787649] Run /init as init process > > [ 1.787793] Failed to execute /init (error -2) > > [ 1.787801] Run /sbin/init as init process > > [ 1.787842] Run /etc/init as init process > > [ 1.787880] Run /bin/init as init process > > [ 1.787921] Run /bin/sh as init process > > [ 1.787978] Kernel panic - not syncing: No working init found. Try > > Yeah, well, this is expected when unpacking the initramfs failed. > > So I think the problem is the "no cpio magic", i.e. the initramfs got > corrupted somehow. But I don't have any idea why that would happen - > freeing the initramfs memory only happens after unpacking is done > (naturally...). > > Rasmus >