From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id DF147C433EF for ; Tue, 7 Jun 2022 15:29:57 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344038AbiFGP34 (ORCPT ); Tue, 7 Jun 2022 11:29:56 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49868 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1344031AbiFGP3x (ORCPT ); Tue, 7 Jun 2022 11:29:53 -0400 Received: from mail-yb1-xb36.google.com (mail-yb1-xb36.google.com [IPv6:2607:f8b0:4864:20::b36]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 79AF6F45DE for ; Tue, 7 Jun 2022 08:29:52 -0700 (PDT) Received: by mail-yb1-xb36.google.com with SMTP id x187so4188324ybe.2 for ; Tue, 07 Jun 2022 08:29:52 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=xhg0TrcGyN9sn9DMJKBktBWk6jm5kLlv+Pr2QQJaQCI=; b=ws02tqB78tZz/eX77MqIYJhbF7a9mJNOhjFkWejKDLj7s5GY66d+D0XuBT47c8p97Z ijPb9sPozjoHtmAROXkDAG0WgJf70MqOEfOlnIUNNaF0x0EHdf6HpJ6t40X4mfD4U5xH jSDaYzxImMPKT4mTCpjwlolaF0FSAbpDZIiECCECOhNB4OBWmgFjQs9/TxVweYdP3bvY CqbrMa3vpe9CJnrY/kn0Amn8nItCE3fZlnIu4soe9rV8wO9+kpKjyQd1/4U90m1LGnZJ +XGZQ8XR/YKVcZ/geFCZcJ5/rzQJ39R52PMLpC95pFq3wRAyyF8Ej4fSmcvkKv/1Z2si ScpQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=xhg0TrcGyN9sn9DMJKBktBWk6jm5kLlv+Pr2QQJaQCI=; b=l60dmgSmNoN1lsE3lDzdkUkIMJ9yC93AYj+I3hMX6zYQXIRwpd3n9TB3SRAvFrvTAg JfG/qo3dlTK+59OAbPEpvaA14Yedli7xzEbisfp0oVbCc6o3p4LDiKURy/U4WQAqF/B7 KrzvqTvANAjl6JO+mntGrrFN5EHbfWkFi3HSkS6hibcW+bQsmF9eHtlWA8wLmJJZ/fW7 V2ZZ9xKEhPClWXFfjooJwDTdWbz3gJQQ1R5nZQ2KzYep8m+HRsNYB1teoO5dxWPvnwvj WUTpqzOByZ6GiPbJyDwOdL6FIc6/T+6W8B5yUDZ4iE/Xf/O9wv9L2IxS1nc91dMLfrPu FKcQ== X-Gm-Message-State: AOAM531iTJUXxAMzoC0fNhUoJ5Pr2NRaGRXxCs8GSuShirLgJpS3A7FE T5vRN+nsNgvAW9tySoFlt4oirkBxPvW+dzH0Adf7tw== X-Google-Smtp-Source: ABdhPJxh/2d/cRTxwvpTBGwOoLf3zdXsW0LageAD6nWbcZE/XZPH/H+urgez4bG9QPWtd3cBLpSlCKXwdRl0UX1FReA= X-Received: by 2002:a25:d6d7:0:b0:663:efa3:3fd2 with SMTP id n206-20020a25d6d7000000b00663efa33fd2mr1306059ybg.480.1654615791476; Tue, 07 Jun 2022 08:29:51 -0700 (PDT) MIME-Version: 1.0 References: <20220607162504.7fd5a92a@canb.auug.org.au> In-Reply-To: From: Naresh Kamboju Date: Tue, 7 Jun 2022 20:59:37 +0530 Message-ID: Subject: Re: [next] arm64: boot failed - next-20220606 To: Shakeel Butt Cc: Stephen Rothwell , Linux-Next Mailing List , open list , regressions@lists.linux.dev, lkft-triage@lists.linaro.org, Linux ARM , linux-mm , Andrew Morton , Ard Biesheuvel , Arnd Bergmann , Catalin Marinas , Raghuram Thammiraju , Mark Brown , Will Deacon , Roman Gushchin , Vasily Averin , Qian Cai Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 7 Jun 2022 at 19:47, Shakeel Butt wrote: > > On Tue, Jun 7, 2022 at 3:28 AM Naresh Kamboju wrote: > > > > Hi Shakeel, > > > > > > > Can you test v5.19-rc1, please? If that does not fail, then you could > > > > > bisect between that and next-20220606 ... > > > > > > > > > > > > > This is already reported at > > > > https://lore.kernel.org/all/Yp4F6n2Ie32re7Ed@qian/ and I think we know > > > > the underlying issue (which is calling virt_to_page() on a vmalloc > > > > address). > > > > > > Sorry, I might be wrong. Just checked the stacktrace again and it > > > seems like the failure is happening in early boot in this report. > > > Though the error "Unable to handle kernel paging request at virtual > > > address" is happening in the function mem_cgroup_from_obj(). > > > > > > Naresh, can you repro the issue if you revert the patch "net: set > > > proper memcg for net_init hooks allocations"? > > > > yes. You are right ! > > 19ee3818b7c6 ("net: set proper memcg for net_init hooks allocations") > > After reverting this single commit I am able to boot arm64 successfully. > > > > Reported-by: Linux Kernel Functional Testing > > > > Can you please run script/faddr2line on "mem_cgroup_from_obj+0x2c/0x120"? ./scripts/faddr2line vmlinux mem_cgroup_from_obj+0x2c/0x120 mem_cgroup_from_obj+0x2c/0x120: mem_cgroup_from_obj at ??:? Please find the following artifacts which are causing kernel crashes. vmlinux: https://builds.tuxbuild.com/2ABl8X9kHAAU5MlL3E3xExHFrNy/vmlinux.xz System.map: https://builds.tuxbuild.com/2ABl8X9kHAAU5MlL3E3xExHFrNy/System.map - Naresh