From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-io0-f198.google.com (mail-io0-f198.google.com [209.85.223.198]) by kanga.kvack.org (Postfix) with ESMTP id 99A386B0008 for ; Tue, 17 Jul 2018 22:01:01 -0400 (EDT) Received: by mail-io0-f198.google.com with SMTP id t23-v6so2328457ioa.9 for ; Tue, 17 Jul 2018 19:01:01 -0700 (PDT) Received: from userp2120.oracle.com (userp2120.oracle.com. [156.151.31.85]) by mx.google.com with ESMTPS id x139-v6si681758itc.4.2018.07.17.19.01.00 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 17 Jul 2018 19:01:00 -0700 (PDT) Received: from pps.filterd (userp2120.oracle.com [127.0.0.1]) by userp2120.oracle.com (8.16.0.22/8.16.0.22) with SMTP id w6I205TK153624 for ; Wed, 18 Jul 2018 02:00:59 GMT Received: from aserv0021.oracle.com (aserv0021.oracle.com [141.146.126.233]) by userp2120.oracle.com with ESMTP id 2k7a3ju27w-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for ; Wed, 18 Jul 2018 02:00:59 +0000 Received: from aserv0122.oracle.com (aserv0122.oracle.com [141.146.126.236]) by aserv0021.oracle.com (8.14.4/8.14.4) with ESMTP id w6I20vtN014171 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for ; Wed, 18 Jul 2018 02:00:58 GMT Received: from abhmp0011.oracle.com (abhmp0011.oracle.com [141.146.116.17]) by aserv0122.oracle.com (8.14.4/8.14.4) with ESMTP id w6I20vvU006631 for ; Wed, 18 Jul 2018 02:00:57 GMT Received: by mail-oi0-f52.google.com with SMTP id s198-v6so5779643oih.11 for ; Tue, 17 Jul 2018 19:00:57 -0700 (PDT) MIME-Version: 1.0 References: <1531416305.6480.24.camel@abdul.in.ibm.com> <1531473191.6480.26.camel@abdul.in.ibm.com> <20180714105500.3694b93f@canb.auug.org.au> <1531824532.15016.30.camel@abdul.in.ibm.com> In-Reply-To: <1531824532.15016.30.camel@abdul.in.ibm.com> From: Pavel Tatashin Date: Tue, 17 Jul 2018 22:00:20 -0400 Message-ID: Subject: Re: [next-20180711][Oops] linux-next kernel boot is broken on powerpc Content-Type: text/plain; charset="UTF-8" Sender: owner-linux-mm@kvack.org List-ID: To: abdhalee@linux.vnet.ibm.com Cc: Stephen Rothwell , sachinp@linux.vnet.ibm.com, Michal Hocko , sim@linux.vnet.ibm.com, venkatb3@in.ibm.com, LKML , manvanth@linux.vnet.ibm.com, Linux Memory Management List , linux-next@vger.kernel.org, aneesh.kumar@linux.vnet.ibm.com, linuxppc-dev@lists.ozlabs.org On Tue, Jul 17, 2018 at 6:49 AM Abdul Haleem wrote: > > On Sat, 2018-07-14 at 10:55 +1000, Stephen Rothwell wrote: > > Hi Abdul, > > > > On Fri, 13 Jul 2018 14:43:11 +0530 Abdul Haleem wrote: > > > > > > On Thu, 2018-07-12 at 13:44 -0400, Pavel Tatashin wrote: > > > > > Related commit could be one of below ? I see lots of patches related to mm and could not bisect > > > > > > > > > > 5479976fda7d3ab23ba0a4eb4d60b296eb88b866 mm: page_alloc: restore memblock_next_valid_pfn() on arm/arm64 > > > > > 41619b27b5696e7e5ef76d9c692dd7342c1ad7eb mm-drop-vm_bug_on-from-__get_free_pages-fix > > > > > 531bbe6bd2721f4b66cdb0f5cf5ac14612fa1419 mm: drop VM_BUG_ON from __get_free_pages > > > > > 479350dd1a35f8bfb2534697e5ca68ee8a6e8dea mm, page_alloc: actually ignore mempolicies for high priority allocations > > > > > 088018f6fe571444caaeb16e84c9f24f22dfc8b0 mm: skip invalid pages block at a time in zero_resv_unresv() > > > > > > > > Looks like: > > > > 0ba29a108979 mm/sparse: Remove CONFIG_SPARSEMEM_ALLOC_MEM_MAP_TOGETHER > > > > > > > > This patch is going to be reverted from linux-next. Abdul, please > > > > verify that issue is gone once you revert this patch. > > > > > > kernel booted fine when the above patch is reverted. > > > > And it has been removed from linux-next as of next-20180713. (Friday > > the 13th is not all bad :-)) > > Hi Stephen, > > After reverting 0ba29a108979, our bare-metal machines boot fails with > kernel panic, is this related ? > > I have attached the boot logs. The panic happens much later in boot and looks unrelated to the sparse_init changes. Thank you, Pavel