* Re: [PATCH 6.9 000/281] 6.9.6-rc1 review [not found] <20240619125609.836313103@linuxfoundation.org> @ 2024-06-20 11:51 ` Naresh Kamboju 2024-06-20 12:29 ` Greg Kroah-Hartman 0 siblings, 1 reply; 8+ messages in thread From: Naresh Kamboju @ 2024-06-20 11:51 UTC (permalink / raw) To: Greg Kroah-Hartman Cc: stable, patches, linux-kernel, torvalds, akpm, linux, shuah, patches, lkft-triage, pavel, jonathanh, f.fainelli, sudipm.mukherjee, srw, rwarsow, conor, allen.lkml, broonie, Miaohe Lin, Arnd Bergmann, Dan Carpenter, David Hildenbrand, Cgroups, linux-mm, Baolin Wang, jbeulich, LTP List On Wed, 19 Jun 2024 at 18:41, Greg Kroah-Hartman <gregkh@linuxfoundation.org> wrote: > > This is the start of the stable review cycle for the 6.9.6 release. > There are 281 patches in this series, all will be posted as a response > to this one. If anyone has any issues with these being applied, please > let me know. > > Responses should be made by Fri, 21 Jun 2024 12:55:11 +0000. > Anything received after that time might be too late. > > The whole patch series can be found in one patch at: > https://www.kernel.org/pub/linux/kernel/v6.x/stable-review/patch-6.9.6-rc1.gz > or in the git tree and branch at: > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-6.9.y > and the diffstat can be found below. > > thanks, > > greg k-h There are two major issues on arm64 Juno-r2 on Linux stable-rc 6.9.6-rc1 Reported-by: Linux Kernel Functional Testing <lkft@linaro.org> 1) The LTP controllers cgroup_fj_stress test cases causing kernel crash on arm64 Juno-r2 with compat mode testing with stable-rc 6.9 kernel. In the recent past I have reported this issues on Linux mainline. LTP: fork13: kernel panic on rk3399-rock-pi-4 running mainline 6.10.rc3 - https://lore.kernel.org/all/CA+G9fYvKmr84WzTArmfaypKM9+=Aw0uXCtuUKHQKFCNMGJyOgQ@mail.gmail.com/ it goes like this, Unable to handle kernel NULL pointer dereference at virtual address ... Insufficient stack space to handle exception! end Kernel panic - not syncing: kernel stack overflow 2) The LTP controllers cgroup_fj_stress test suite causing kernel oops on arm64 Juno-r2 (with the clang-night build toolchain). Unable to handle kernel NULL pointer dereference at virtual address 0000000000000009 Internal error: Oops: 0000000096000044 [#1] PREEMPT SMP pc : xprt_alloc_slot+0x54/0x1c8 lr : xprt_alloc_slot+0x30/0x1c8 Details of crash log: 1) Crash log: ----------- cgroup_fj_stress 1 TINFO: Running: cgroup_fj_stress.sh cpuacct 200 1 none cgroup_fj_stress 1 TINFO: timeout per run is 0h 50m 0s tst_cgroup.c:764: TINFO: Mounted V1 cpuacct CGroup on /scratch/ltp-iiltEE0UOm/cgroup_cpuacct cgroup_fj_stress 1 TINFO: test starts with cgroup version 1 cgroup_fj_stress 1 TINFO: Creating subgroups ... [ 1785.477847] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000070 [ 1785.486682] Mem abort info: [ 1785.489477] ESR = 0x0000000096000004 [ 1785.493232] EC = 0x25: DABT (current EL), IL = 32 bits [ 1785.498555] SET = 0, FnV = 0 [ 1785.501613] EA = 0, S1PTW = 0 [ 1785.504757] FSC = 0x04: level 0 translation fault [ 1785.509643] Data abort info: [ 1785.512526] ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 [ 1785.518021] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [ 1785.523082] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 .. [ 1786.235715] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000070 .. [ 1786.286238] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000070 .. [ 1786.336761] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000070 [ 1786.345564] Mem abort info: [ 1786.348359] ESR = 0x0000000096000004 [ 1786.352112] EC = 0x25: DABT (current EL), IL = 32 bits [ 1786.357434] SET = 0, FnV = 0 [ 1786.360492] EA = 0, S1PTW = 0 [ 1786.363637] FSC = 0x04: level 0 translation fault [ 1786.368523] Data abort info: [ 1786.371405] ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 [ 1786.376900] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [ 1786.381960] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [ 1786.387284] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000070 [ 1786.387293] Insufficient stack space to handle exception! [ 1786.387296] ESR: 0x0000000096000047 -- DABT (current EL) [ 1786.387302] FAR: 0xffff80008399ffe0 [ 1786.387306] Task stack: [0xffff8000839a0000..0xffff8000839a4000] [ 1786.387312] IRQ stack: [0xffff8000837f8000..0xffff8000837fc000] [ 1786.387319] Overflow stack: [0xffff00097ec95320..0xffff00097ec96320] [ 1786.387327] CPU: 4 PID: 0 Comm: swapper/4 Not tainted 6.9.6-rc1 #1 [ 1786.387338] Hardware name: ARM Juno development board (r2) (DT) [ 1786.387344] pstate: a00003c5 (NzCv DAIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 1786.387355] pc : _prb_read_valid (kernel/printk/printk_ringbuffer.c:2109) [ 1786.387374] lr : prb_read_valid (kernel/printk/printk_ringbuffer.c:2183) [ 1786.387385] sp : ffff80008399ffe0 [ 1786.387390] x29: ffff8000839a0030 x28: ffff000800365f00 x27: ffff800082530008 [ 1786.387407] x26: ffff8000834e33b8 x25: ffff8000839a00b0 x24: 0000000000000001 [ 1786.387423] x23: ffff8000839a00a8 x22: ffff8000830e3e40 x21: 0000000000001e9e [ 1786.387438] x20: 0000000000000000 x19: ffff8000839a01c8 x18: 0000000000000010 [ 1786.387453] x17: 72646461206c6175 x16: 7472697620746120 x15: 65636e6572656665 [ 1786.387468] x14: 726564207265746e x13: 3037303030303030 x12: 3030303030303030 [ 1786.387483] x11: 2073736572646461 x10: ffff800083151ea0 x9 : ffff80008014273c [ 1786.387498] x8 : ffff8000839a0120 x7 : 0000000000000000 x6 : 0000000000000e9f [ 1786.387512] x5 : ffff8000839a00c8 x4 : ffff8000837157c0 x3 : 0000000000000000 [ 1786.387526] x2 : ffff8000839a00b0 x1 : 0000000000000000 x0 : ffff8000830e3f58 [ 1786.387542] Kernel panic - not syncing: kernel stack overflow [ 1786.387549] SMP: stopping secondary CPUs [ 1787.510055] SMP: failed to stop secondary CPUs 0,4 [ 1787.510065] Kernel Offset: disabled [ 1787.510068] CPU features: 0x4,00001061,e0100000,0200421b [ 1787.510076] Memory Limit: none [ 1787.680436] ---[ end Kernel panic - not syncing: kernel stack overflow ]--- 2) Kernel oops log: ----------- [ 1094.253182] __secondary_switched+0xb8/0xc0 [ 1094.258306] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000009 [ 1094.267132] Mem abort info: [ 1094.269938] ESR = 0x0000000096000044 [ 1094.273701] EC = 0x25: DABT (current EL), IL = 32 bits [ 1094.279031] SET = 0, FnV = 0 [ 1094.282097] EA = 0, S1PTW = 0 [ 1094.285242] FSC = ranslation fault [ 1094.290136] Data abort info: [ 1094.293019] ISV = 0, ISS = 0x00000044, ISS2 = 0x00000000 [ 1094.298523] CM = 0, WnR = 1, TnD = 0, TagAccess = 0 [ 1094.303592] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [ 1094.308921] user pgtable: 4k bit VAs, pgdp=00000008a2a34000 [ 1094.315383] [0000000000000009] pgd=0000000000000000, p4d=0000000000000000 [ 1094.322211] Internal error: Oops: 0000000096000044 [#1] PREEMPT SMP [ 1094.328489] Modules linked in: btrfs xor xor_neon raid6_pq zstd_compress libcrc38x hdlcd cec drm_dma_helper onboard_usb_hub crct10dif_ce drm_kms_helper fuse drm backlight dm_mod ip_tables x_tables [ 1094.346744] CPU: 1 PID: 161 Comm: systemd-journal Tainted: G W 6.9.6-rc1 #1 [ 1094.355112] Hardware name: ARM Juno development board (r2) (DT) [ 1094.361038] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 1094.368013] pc : xprt_alloc_slot+0x54/0x1c8 [ 1094.372208] lr : xprt_alloc_slot+0x30/0x1c8 [ 1094.376398] sp : ffff800082dc37e0 [ 1094.379713] x29: ffff800082dc37e0 x28: ffff8000814d31c8 x27: 0000000000008080 [ 1094.386868] x26: ffff8000825da000 x25: 0000000000000001 x24: 0000000000440100 [ 1094.394022] x23: ffff000821759300 x22: 0000000000002102 x21: ffff00082d39d000 [ 1094.401176] x20: ffff00082201f800 x19: ffff0008225bf400 x18: 0000000000000000 [ 1094.408329] x17: 0000000000000000 x16: 0000000000000800 x15: 8080008000000000 [ 1094.415483] x14: 0000ff0064656873 x13: ffff800082dc0000 x12: 0000000000000022 [ 1094.422636] x11: dead000000000100 x10: 0000000000000001 x9 : 0000000000000000 [ 1094.429790] x8 : ffff00082d39d0c8 x7 : 0000000000000000 x6 : 0000000000000000 [ 1094.436942] x5 : 0000000000000000 x4 : ffff00097ec4c530 x3 : ffff800082dc3790 [ 1094.444096] x2 : ffff000821759300 x1 : 0000000000000000 x0 : ffff800081583770 [ 1094.451249] Call trace: [ 1094.453694] xprt_alloc_slot+0x54/0x1c8 [ 1094.457536] xprt_reserve+0x6c/0xe8 [ 1094.461029] call_reserve+0x2c/0x40 [ 1094.464522] __rpc_execute+0x124/0x640 [ 1094.468280] rpc_execute+0x100/0x280 [ 1094.471862] rpc_run_task+0x124/0x1e8 [ 1094.475528] rpc_call_sync+0x58/0xc0 [ 1094.479106] nfs3_proc_getattr+0x94/0xf8 [ 1094.483037] __nfs_revalidate_inode+0x13c/0x310 [ 1094.487575] nfs_access_get_cached+0x23c/0x3b8 [ 1094.492024] nfs_do_access+0x74/0x2b8 [ 1094.495689] nfs_permission+0xb8/0x1e0 [ 1094.499441] inode_permission+0xc4/0x170 [ 1094.503371] link_path_walk+0x100/0x3e0 [ 1094.507215] path_lookupat+0x74/0x130 [ 1094.510882] filename_lookup+0xdc/0x1d8 [ 1094.514724] user_path_at_empty+0x58/0x108 [ 1094.518828] do_faccessat+0x178/0x330 [ 1094.522495] __arm64_sys_faccessat+0x30/0x48 [ 1094.526771] invoke_syscall+0x4c/0x118 [ 1094.530528] el0_svc_common+0x8c/0xf0 [ 1094.534197] do_el0_svc+0x28/0x40 [ 1094.537518] el0_svc+0x40/0x88 [ 1094.540576] el0t_64_sync_handler+0x90/0x100 [ 1094.544853] el0t_64_sync+0x190/0x198 [ 1094.548522] Code: d280200b f2fbd5ab 5280044c d1032115 (f9000549) [ 1094.554623] ---[ end trace 0000000000000000 ]--- [ 1094.559268] note: systemd-journal[161] exited with preempt_count 1 [ 1115.569495] rcu: INFO: rcu_preempt self-detected stall on CPU Links: ------ 1) - https://qa-reports.linaro.org/lkft/linux-stable-rc-linux-6.9.y/build/v6.9.5-282-g93f303762da5/testrun/24410131/suite/log-parser-test/test/check-kernel-panic/log - https://qa-reports.linaro.org/lkft/linux-stable-rc-linux-6.9.y/build/v6.9.5-282-g93f303762da5/testrun/24410131/suite/log-parser-test/test/check-kernel-panic-a44367e5836148d6e94412d6de8ab7a0ca37c18d2bfb6a639947ecd2704ad6b1/details/ - https://tuxapi.tuxsuite.com/v1/groups/linaro/projects/lkft/tests/2i6h1Ah6I8CP7ABUzTl9shfaW60 - https://lkft.validation.linaro.org/scheduler/job/7687060#L23314 2) - https://qa-reports.linaro.org/lkft/linux-stable-rc-linux-6.9.y/build/v6.9.5-282-g93f303762da5/testrun/24410890/suite/log-parser-test/test/check-kernel-oops/log - https://qa-reports.linaro.org/lkft/linux-stable-rc-linux-6.9.y/build/v6.9.5-282-g93f303762da5/testrun/24410890/suite/log-parser-test/test/check-kernel-exception-55b962f42ea3dfdcb5c7b6c7ceee184b48ae8d479f430f7b31241f220adcb542/details/ - https://qa-reports.linaro.org/lkft/linux-stable-rc-linux-6.9.y/build/v6.9.5-282-g93f303762da5/testrun/24410890/suite/log-parser-test/tests/ - https://lkft.validation.linaro.org/scheduler/job/7688690#L16336 Build details: ------- * kernel: 6.9.6-rc1 * git: https://gitlab.com/Linaro/lkft/mirrors/stable/linux-stable-rc * git branch: linux-6.9.y * git commit: 93f303762da5a9d9c2c72cac615d4d092ce42b1f * git describe: v6.9.5-282-g93f303762da5 -- Linaro LKFT https://lkft.linaro.org ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH 6.9 000/281] 6.9.6-rc1 review 2024-06-20 11:51 ` [PATCH 6.9 000/281] 6.9.6-rc1 review Naresh Kamboju @ 2024-06-20 12:29 ` Greg Kroah-Hartman 2024-06-20 13:14 ` Naresh Kamboju 0 siblings, 1 reply; 8+ messages in thread From: Greg Kroah-Hartman @ 2024-06-20 12:29 UTC (permalink / raw) To: Naresh Kamboju Cc: stable, patches, linux-kernel, torvalds, akpm, linux, shuah, patches, lkft-triage, pavel, jonathanh, f.fainelli, sudipm.mukherjee, srw, rwarsow, conor, allen.lkml, broonie, Miaohe Lin, Arnd Bergmann, Dan Carpenter, David Hildenbrand, Cgroups, linux-mm, Baolin Wang, jbeulich, LTP List On Thu, Jun 20, 2024 at 05:21:09PM +0530, Naresh Kamboju wrote: > On Wed, 19 Jun 2024 at 18:41, Greg Kroah-Hartman > <gregkh@linuxfoundation.org> wrote: > > > > This is the start of the stable review cycle for the 6.9.6 release. > > There are 281 patches in this series, all will be posted as a response > > to this one. If anyone has any issues with these being applied, please > > let me know. > > > > Responses should be made by Fri, 21 Jun 2024 12:55:11 +0000. > > Anything received after that time might be too late. > > > > The whole patch series can be found in one patch at: > > https://www.kernel.org/pub/linux/kernel/v6.x/stable-review/patch-6.9.6-rc1.gz > > or in the git tree and branch at: > > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-6.9.y > > and the diffstat can be found below. > > > > thanks, > > > > greg k-h > > There are two major issues on arm64 Juno-r2 on Linux stable-rc 6.9.6-rc1 > > Reported-by: Linux Kernel Functional Testing <lkft@linaro.org> > > 1) > The LTP controllers cgroup_fj_stress test cases causing kernel crash > on arm64 Juno-r2 with > compat mode testing with stable-rc 6.9 kernel. > > In the recent past I have reported this issues on Linux mainline. > > LTP: fork13: kernel panic on rk3399-rock-pi-4 running mainline 6.10.rc3 > - https://lore.kernel.org/all/CA+G9fYvKmr84WzTArmfaypKM9+=Aw0uXCtuUKHQKFCNMGJyOgQ@mail.gmail.com/ > > it goes like this, > Unable to handle kernel NULL pointer dereference at virtual address > ... > Insufficient stack space to handle exception! > end Kernel panic - not syncing: kernel stack overflow > > 2) > The LTP controllers cgroup_fj_stress test suite causing kernel oops on > arm64 Juno-r2 (with the clang-night build toolchain). > Unable to handle kernel NULL pointer dereference at virtual address > 0000000000000009 > Internal error: Oops: 0000000096000044 [#1] PREEMPT SMP > pc : xprt_alloc_slot+0x54/0x1c8 > lr : xprt_alloc_slot+0x30/0x1c8 And these are regressions? Any chance to run 'git bisect'? thanks, greg k-h ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH 6.9 000/281] 6.9.6-rc1 review 2024-06-20 12:29 ` Greg Kroah-Hartman @ 2024-06-20 13:14 ` Naresh Kamboju 2024-06-20 13:53 ` David Hildenbrand 0 siblings, 1 reply; 8+ messages in thread From: Naresh Kamboju @ 2024-06-20 13:14 UTC (permalink / raw) To: Greg Kroah-Hartman Cc: stable, patches, linux-kernel, torvalds, akpm, linux, shuah, patches, lkft-triage, pavel, jonathanh, f.fainelli, sudipm.mukherjee, srw, rwarsow, conor, allen.lkml, broonie, Miaohe Lin, Arnd Bergmann, Dan Carpenter, David Hildenbrand, Cgroups, linux-mm, Baolin Wang, jbeulich, LTP List On Thu, 20 Jun 2024 at 17:59, Greg Kroah-Hartman <gregkh@linuxfoundation.org> wrote: > > On Thu, Jun 20, 2024 at 05:21:09PM +0530, Naresh Kamboju wrote: > > On Wed, 19 Jun 2024 at 18:41, Greg Kroah-Hartman > > <gregkh@linuxfoundation.org> wrote: > > > > > > This is the start of the stable review cycle for the 6.9.6 release. > > > There are 281 patches in this series, all will be posted as a response > > > to this one. If anyone has any issues with these being applied, please > > > let me know. > > > > > > Responses should be made by Fri, 21 Jun 2024 12:55:11 +0000. > > > Anything received after that time might be too late. > > > > > > The whole patch series can be found in one patch at: > > > https://www.kernel.org/pub/linux/kernel/v6.x/stable-review/patch-6.9.6-rc1.gz > > > or in the git tree and branch at: > > > git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-6.9.y > > > and the diffstat can be found below. > > > > > > thanks, > > > > > > greg k-h > > > > There are two major issues on arm64 Juno-r2 on Linux stable-rc 6.9.6-rc1 > > > > Reported-by: Linux Kernel Functional Testing <lkft@linaro.org> > > > > 1) > > The LTP controllers cgroup_fj_stress test cases causing kernel crash > > on arm64 Juno-r2 with > > compat mode testing with stable-rc 6.9 kernel. > > > > In the recent past I have reported this issues on Linux mainline. > > > > LTP: fork13: kernel panic on rk3399-rock-pi-4 running mainline 6.10.rc3 > > - https://lore.kernel.org/all/CA+G9fYvKmr84WzTArmfaypKM9+=Aw0uXCtuUKHQKFCNMGJyOgQ@mail.gmail.com/ > > > > it goes like this, > > Unable to handle kernel NULL pointer dereference at virtual address > > ... > > Insufficient stack space to handle exception! > > end Kernel panic - not syncing: kernel stack overflow > > > > 2) > > The LTP controllers cgroup_fj_stress test suite causing kernel oops on > > arm64 Juno-r2 (with the clang-night build toolchain). > > Unable to handle kernel NULL pointer dereference at virtual address > > 0000000000000009 > > Internal error: Oops: 0000000096000044 [#1] PREEMPT SMP > > pc : xprt_alloc_slot+0x54/0x1c8 > > lr : xprt_alloc_slot+0x30/0x1c8 > > And these are regressions? Any chance to run 'git bisect'? it's difficult to reproduce the first one so we haven't been able to bisect it. It seemd like David and Baolin might have an idea what's causing it. - Naresh ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH 6.9 000/281] 6.9.6-rc1 review 2024-06-20 13:14 ` Naresh Kamboju @ 2024-06-20 13:53 ` David Hildenbrand 2024-06-20 14:02 ` Naresh Kamboju 0 siblings, 1 reply; 8+ messages in thread From: David Hildenbrand @ 2024-06-20 13:53 UTC (permalink / raw) To: Naresh Kamboju, Greg Kroah-Hartman Cc: stable, patches, linux-kernel, torvalds, akpm, linux, shuah, patches, lkft-triage, pavel, jonathanh, f.fainelli, sudipm.mukherjee, srw, rwarsow, conor, allen.lkml, broonie, Miaohe Lin, Arnd Bergmann, Dan Carpenter, Cgroups, linux-mm, Baolin Wang, jbeulich, LTP List On 20.06.24 15:14, Naresh Kamboju wrote: > On Thu, 20 Jun 2024 at 17:59, Greg Kroah-Hartman > <gregkh@linuxfoundation.org> wrote: >> >> On Thu, Jun 20, 2024 at 05:21:09PM +0530, Naresh Kamboju wrote: >>> On Wed, 19 Jun 2024 at 18:41, Greg Kroah-Hartman >>> <gregkh@linuxfoundation.org> wrote: >>>> >>>> This is the start of the stable review cycle for the 6.9.6 release. >>>> There are 281 patches in this series, all will be posted as a response >>>> to this one. If anyone has any issues with these being applied, please >>>> let me know. >>>> >>>> Responses should be made by Fri, 21 Jun 2024 12:55:11 +0000. >>>> Anything received after that time might be too late. >>>> >>>> The whole patch series can be found in one patch at: >>>> https://www.kernel.org/pub/linux/kernel/v6.x/stable-review/patch-6.9.6-rc1.gz >>>> or in the git tree and branch at: >>>> git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-6.9.y >>>> and the diffstat can be found below. >>>> >>>> thanks, >>>> >>>> greg k-h >>> >>> There are two major issues on arm64 Juno-r2 on Linux stable-rc 6.9.6-rc1 >>> >>> Reported-by: Linux Kernel Functional Testing <lkft@linaro.org> >>> >>> 1) >>> The LTP controllers cgroup_fj_stress test cases causing kernel crash >>> on arm64 Juno-r2 with >>> compat mode testing with stable-rc 6.9 kernel. >>> >>> In the recent past I have reported this issues on Linux mainline. >>> >>> LTP: fork13: kernel panic on rk3399-rock-pi-4 running mainline 6.10.rc3 >>> - https://lore.kernel.org/all/CA+G9fYvKmr84WzTArmfaypKM9+=Aw0uXCtuUKHQKFCNMGJyOgQ@mail.gmail.com/ >>> >>> it goes like this, >>> Unable to handle kernel NULL pointer dereference at virtual address >>> ... >>> Insufficient stack space to handle exception! >>> end Kernel panic - not syncing: kernel stack overflow >>> How is that related to 6.9.6-rc1? That report is from mainline (6.10.rc3). Can you share a similar kernel dmesg output from the issue on 6.9.6-rc1? -- Cheers, David / dhildenb ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH 6.9 000/281] 6.9.6-rc1 review 2024-06-20 13:53 ` David Hildenbrand @ 2024-06-20 14:02 ` Naresh Kamboju 2024-06-20 14:20 ` David Hildenbrand 0 siblings, 1 reply; 8+ messages in thread From: Naresh Kamboju @ 2024-06-20 14:02 UTC (permalink / raw) To: David Hildenbrand Cc: Greg Kroah-Hartman, stable, patches, linux-kernel, torvalds, akpm, linux, shuah, patches, lkft-triage, pavel, jonathanh, f.fainelli, sudipm.mukherjee, srw, rwarsow, conor, allen.lkml, broonie, Miaohe Lin, Arnd Bergmann, Dan Carpenter, Cgroups, linux-mm, Baolin Wang, jbeulich, LTP List On Thu, 20 Jun 2024 at 19:23, David Hildenbrand <david@redhat.com> wrote: > > On 20.06.24 15:14, Naresh Kamboju wrote: > > On Thu, 20 Jun 2024 at 17:59, Greg Kroah-Hartman > > <gregkh@linuxfoundation.org> wrote: > >> > >> On Thu, Jun 20, 2024 at 05:21:09PM +0530, Naresh Kamboju wrote: > >>> On Wed, 19 Jun 2024 at 18:41, Greg Kroah-Hartman > >>> <gregkh@linuxfoundation.org> wrote: > >>>> > >>>> This is the start of the stable review cycle for the 6.9.6 release. > >>>> There are 281 patches in this series, all will be posted as a response > >>>> to this one. If anyone has any issues with these being applied, please > >>>> let me know. > >>>> > >>>> Responses should be made by Fri, 21 Jun 2024 12:55:11 +0000. > >>>> Anything received after that time might be too late. > >>>> > >>>> The whole patch series can be found in one patch at: > >>>> https://www.kernel.org/pub/linux/kernel/v6.x/stable-review/patch-6.9.6-rc1.gz > >>>> or in the git tree and branch at: > >>>> git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-6.9.y > >>>> and the diffstat can be found below. > >>>> > >>>> thanks, > >>>> > >>>> greg k-h > >>> > >>> There are two major issues on arm64 Juno-r2 on Linux stable-rc 6.9.6-rc1 > >>> > >>> Reported-by: Linux Kernel Functional Testing <lkft@linaro.org> > >>> > >>> 1) > >>> The LTP controllers cgroup_fj_stress test cases causing kernel crash > >>> on arm64 Juno-r2 with > >>> compat mode testing with stable-rc 6.9 kernel. > >>> > >>> In the recent past I have reported this issues on Linux mainline. > >>> > >>> LTP: fork13: kernel panic on rk3399-rock-pi-4 running mainline 6.10.rc3 > >>> - https://lore.kernel.org/all/CA+G9fYvKmr84WzTArmfaypKM9+=Aw0uXCtuUKHQKFCNMGJyOgQ@mail.gmail.com/ > >>> > >>> it goes like this, > >>> Unable to handle kernel NULL pointer dereference at virtual address > >>> ... > >>> Insufficient stack space to handle exception! > >>> end Kernel panic - not syncing: kernel stack overflow > >>> > > How is that related to 6.9.6-rc1? That report is from mainline (6.10.rc3). > > Can you share a similar kernel dmesg output from the issue on 6.9.6-rc1? I request you to use this link for detailed boot log, test log and crash log. - https://lkft.validation.linaro.org/scheduler/job/7687060#L23314 Few more logs related to build artifacts links provided in the original email thread and bottom of this email. crash log: --- [ 0.000000] Booting Linux on physical CPU 0x0000000100 [0x410fd033] [ 0.000000] Linux version 6.9.6-rc1 (tuxmake@tuxmake) (aarch64-linux-gnu-gcc (Debian 13.2.0-12) 13.2.0, GNU ld (GNU Binutils for Debian) 2.42) #1 SMP PREEMPT @1718817000 ... [ 1786.336761] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000070 [ 1786.345564] Mem abort info: [ 1786.348359] ESR = 0x0000000096000004 [ 1786.352112] EC = 0x25: DABT (current EL), IL = 32 bits [ 1786.357434] SET = 0, FnV = 0 [ 1786.360492] EA = 0, S1PTW = 0 [ 1786.363637] FSC = 0x04: level 0 translation fault [ 1786.368523] Data abort info: [ 1786.371405] ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 [ 1786.376900] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [ 1786.381960] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [ 1786.387284] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000070 [ 1786.387293] Insufficient stack space to handle exception! [ 1786.387296] ESR: 0x0000000096000047 -- DABT (current EL) [ 1786.387302] FAR: 0xffff80008399ffe0 [ 1786.387306] Task stack: [0xffff8000839a0000..0xffff8000839a4000] [ 1786.387312] IRQ stack: [0xffff8000837f8000..0xffff8000837fc000] [ 1786.387319] Overflow stack: [0xffff00097ec95320..0xffff00097ec96320] [ 1786.387327] CPU: 4 PID: 0 Comm: swapper/4 Not tainted 6.9.6-rc1 #1 [ 1786.387338] Hardware name: ARM Juno development board (r2) (DT) [ 1786.387344] pstate: a00003c5 (NzCv DAIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 1786.387355] pc : _prb_read_valid (kernel/printk/printk_ringbuffer.c:2109) [ 1786.387374] lr : prb_read_valid (kernel/printk/printk_ringbuffer.c:2183) [ 1786.387385] sp : ffff80008399ffe0 [ 1786.387390] x29: ffff8000839a0030 x28: ffff000800365f00 x27: ffff800082530008 [ 1786.387407] x26: ffff8000834e33b8 x25: ffff8000839a00b0 x24: 0000000000000001 [ 1786.387423] x23: ffff8000839a00a8 x22: ffff8000830e3e40 x21: 0000000000001e9e [ 1786.387438] x20: 0000000000000000 x19: ffff8000839a01c8 x18: 0000000000000010 [ 1786.387453] x17: 72646461206c6175 x16: 7472697620746120 x15: 65636e6572656665 [ 1786.387468] x14: 726564207265746e x13: 3037303030303030 x12: 3030303030303030 [ 1786.387483] x11: 2073736572646461 x10: ffff800083151ea0 x9 : ffff80008014273c [ 1786.387498] x8 : ffff8000839a0120 x7 : 0000000000000000 x6 : 0000000000000e9f [ 1786.387512] x5 : ffff8000839a00c8 x4 : ffff8000837157c0 x3 : 0000000000000000 [ 1786.387526] x2 : ffff8000839a00b0 x1 : 0000000000000000 x0 : ffff8000830e3f58 [ 1786.387542] Kernel panic - not syncing: kernel stack overflow [ 1786.387549] SMP: stopping secondary CPUs [ 1787.510055] SMP: failed to stop secondary CPUs 0,4 [ 1787.510065] Kernel Offset: disabled [ 1787.510068] CPU features: 0x4,00001061,e0100000,0200421b [ 1787.510076] Memory Limit: none [ 1787.680436] ---[ end Kernel panic - not syncing: kernel stack overflow ]--- 1) - https://qa-reports.linaro.org/lkft/linux-stable-rc-linux-6.9.y/build/v6.9.5-282-g93f303762da5/testrun/24410131/suite/log-parser-test/test/check-kernel-panic/log - https://qa-reports.linaro.org/lkft/linux-stable-rc-linux-6.9.y/build/v6.9.5-282-g93f303762da5/testrun/24410131/suite/log-parser-test/test/check-kernel-panic-a44367e5836148d6e94412d6de8ab7a0ca37c18d2bfb6a639947ecd2704ad6b1/details/ - https://tuxapi.tuxsuite.com/v1/groups/linaro/projects/lkft/tests/2i6h1Ah6I8CP7ABUzTl9shfaW60 - https://lkft.validation.linaro.org/scheduler/job/7687060#L23314 - Naresh > > -- > Cheers, > > David / dhildenb > ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH 6.9 000/281] 6.9.6-rc1 review 2024-06-20 14:02 ` Naresh Kamboju @ 2024-06-20 14:20 ` David Hildenbrand 2024-06-20 15:39 ` Naresh Kamboju 0 siblings, 1 reply; 8+ messages in thread From: David Hildenbrand @ 2024-06-20 14:20 UTC (permalink / raw) To: Naresh Kamboju Cc: Greg Kroah-Hartman, stable, patches, linux-kernel, torvalds, akpm, linux, shuah, patches, lkft-triage, pavel, jonathanh, f.fainelli, sudipm.mukherjee, srw, rwarsow, conor, allen.lkml, broonie, Miaohe Lin, Arnd Bergmann, Dan Carpenter, Cgroups, linux-mm, Baolin Wang, jbeulich, LTP List On 20.06.24 16:02, Naresh Kamboju wrote: > On Thu, 20 Jun 2024 at 19:23, David Hildenbrand <david@redhat.com> wrote: >> >> On 20.06.24 15:14, Naresh Kamboju wrote: >>> On Thu, 20 Jun 2024 at 17:59, Greg Kroah-Hartman >>> <gregkh@linuxfoundation.org> wrote: >>>> >>>> On Thu, Jun 20, 2024 at 05:21:09PM +0530, Naresh Kamboju wrote: >>>>> On Wed, 19 Jun 2024 at 18:41, Greg Kroah-Hartman >>>>> <gregkh@linuxfoundation.org> wrote: >>>>>> >>>>>> This is the start of the stable review cycle for the 6.9.6 release. >>>>>> There are 281 patches in this series, all will be posted as a response >>>>>> to this one. If anyone has any issues with these being applied, please >>>>>> let me know. >>>>>> >>>>>> Responses should be made by Fri, 21 Jun 2024 12:55:11 +0000. >>>>>> Anything received after that time might be too late. >>>>>> >>>>>> The whole patch series can be found in one patch at: >>>>>> https://www.kernel.org/pub/linux/kernel/v6.x/stable-review/patch-6.9.6-rc1.gz >>>>>> or in the git tree and branch at: >>>>>> git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-6.9.y >>>>>> and the diffstat can be found below. >>>>>> >>>>>> thanks, >>>>>> >>>>>> greg k-h >>>>> >>>>> There are two major issues on arm64 Juno-r2 on Linux stable-rc 6.9.6-rc1 >>>>> >>>>> Reported-by: Linux Kernel Functional Testing <lkft@linaro.org> >>>>> >>>>> 1) >>>>> The LTP controllers cgroup_fj_stress test cases causing kernel crash >>>>> on arm64 Juno-r2 with >>>>> compat mode testing with stable-rc 6.9 kernel. >>>>> >>>>> In the recent past I have reported this issues on Linux mainline. >>>>> >>>>> LTP: fork13: kernel panic on rk3399-rock-pi-4 running mainline 6.10.rc3 >>>>> - https://lore.kernel.org/all/CA+G9fYvKmr84WzTArmfaypKM9+=Aw0uXCtuUKHQKFCNMGJyOgQ@mail.gmail.com/ >>>>> >>>>> it goes like this, >>>>> Unable to handle kernel NULL pointer dereference at virtual address >>>>> ... >>>>> Insufficient stack space to handle exception! >>>>> end Kernel panic - not syncing: kernel stack overflow >>>>> >> >> How is that related to 6.9.6-rc1? That report is from mainline (6.10.rc3). >> >> Can you share a similar kernel dmesg output from the issue on 6.9.6-rc1? > > I request you to use this link for detailed boot log, test log and crash log. > - https://lkft.validation.linaro.org/scheduler/job/7687060#L23314 > > Few more logs related to build artifacts links provided in the original > email thread and bottom of this email. > > crash log: > --- > Thanks, so this is something different than the "BUG: Bad page map in process fork13 BUG: Bad rss-counter state mm:" stuff on mainline you referenced. Looks like some recursive exception until we exhausted the stack. Trying to connect the dots here, can you enlighten me how this is related to the fork13 mainline report? > [ 0.000000] Booting Linux on physical CPU 0x0000000100 [0x410fd033] > [ 0.000000] Linux version 6.9.6-rc1 (tuxmake@tuxmake) > (aarch64-linux-gnu-gcc (Debian 13.2.0-12) 13.2.0, GNU ld (GNU Binutils > for Debian) 2.42) #1 SMP PREEMPT @1718817000 > ... > [ 1786.336761] Unable to handle kernel NULL pointer dereference at > virtual address 0000000000000070 > [ 1786.345564] Mem abort info: > [ 1786.348359] ESR = 0x0000000096000004 > [ 1786.352112] EC = 0x25: DABT (current EL), IL = 32 bits > [ 1786.357434] SET = 0, FnV = 0 > [ 1786.360492] EA = 0, S1PTW = 0 > [ 1786.363637] FSC = 0x04: level 0 translation fault > [ 1786.368523] Data abort info: > [ 1786.371405] ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 > [ 1786.376900] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 > [ 1786.381960] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 > [ 1786.387284] Unable to handle kernel NULL pointer dereference at > virtual address 0000000000000070 > [ 1786.387293] Insufficient stack space to handle exception! > [ 1786.387296] ESR: 0x0000000096000047 -- DABT (current EL) > [ 1786.387302] FAR: 0xffff80008399ffe0 > [ 1786.387306] Task stack: [0xffff8000839a0000..0xffff8000839a4000] > [ 1786.387312] IRQ stack: [0xffff8000837f8000..0xffff8000837fc000] > [ 1786.387319] Overflow stack: [0xffff00097ec95320..0xffff00097ec96320] > [ 1786.387327] CPU: 4 PID: 0 Comm: swapper/4 Not tainted 6.9.6-rc1 #1 > [ 1786.387338] Hardware name: ARM Juno development board (r2) (DT) > [ 1786.387344] pstate: a00003c5 (NzCv DAIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--) > [ 1786.387355] pc : _prb_read_valid (kernel/printk/printk_ringbuffer.c:2109) > [ 1786.387374] lr : prb_read_valid (kernel/printk/printk_ringbuffer.c:2183) > [ 1786.387385] sp : ffff80008399ffe0 > [ 1786.387390] x29: ffff8000839a0030 x28: ffff000800365f00 x27: ffff800082530008 > [ 1786.387407] x26: ffff8000834e33b8 x25: ffff8000839a00b0 x24: 0000000000000001 > [ 1786.387423] x23: ffff8000839a00a8 x22: ffff8000830e3e40 x21: 0000000000001e9e > [ 1786.387438] x20: 0000000000000000 x19: ffff8000839a01c8 x18: 0000000000000010 > [ 1786.387453] x17: 72646461206c6175 x16: 7472697620746120 x15: 65636e6572656665 > [ 1786.387468] x14: 726564207265746e x13: 3037303030303030 x12: 3030303030303030 > [ 1786.387483] x11: 2073736572646461 x10: ffff800083151ea0 x9 : ffff80008014273c > [ 1786.387498] x8 : ffff8000839a0120 x7 : 0000000000000000 x6 : 0000000000000e9f > [ 1786.387512] x5 : ffff8000839a00c8 x4 : ffff8000837157c0 x3 : 0000000000000000 > [ 1786.387526] x2 : ffff8000839a00b0 x1 : 0000000000000000 x0 : ffff8000830e3f58 > [ 1786.387542] Kernel panic - not syncing: kernel stack overflow > [ 1786.387549] SMP: stopping secondary CPUs > [ 1787.510055] SMP: failed to stop secondary CPUs 0,4 > [ 1787.510065] Kernel Offset: disabled > [ 1787.510068] CPU features: 0x4,00001061,e0100000,0200421b > [ 1787.510076] Memory Limit: none > [ 1787.680436] ---[ end Kernel panic - not syncing: kernel stack overflow ]--- -- Cheers, David / dhildenb ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH 6.9 000/281] 6.9.6-rc1 review 2024-06-20 14:20 ` David Hildenbrand @ 2024-06-20 15:39 ` Naresh Kamboju 2024-06-20 19:31 ` David Hildenbrand 0 siblings, 1 reply; 8+ messages in thread From: Naresh Kamboju @ 2024-06-20 15:39 UTC (permalink / raw) To: David Hildenbrand Cc: Greg Kroah-Hartman, stable, patches, linux-kernel, torvalds, akpm, linux, shuah, patches, lkft-triage, pavel, jonathanh, f.fainelli, sudipm.mukherjee, srw, rwarsow, conor, allen.lkml, broonie, Miaohe Lin, Arnd Bergmann, Dan Carpenter, Cgroups, linux-mm, Baolin Wang, jbeulich, LTP List On Thu, 20 Jun 2024 at 19:50, David Hildenbrand <david@redhat.com> wrote: > > On 20.06.24 16:02, Naresh Kamboju wrote: > > On Thu, 20 Jun 2024 at 19:23, David Hildenbrand <david@redhat.com> wrote: > >> > >> On 20.06.24 15:14, Naresh Kamboju wrote: > >>> On Thu, 20 Jun 2024 at 17:59, Greg Kroah-Hartman > >>> <gregkh@linuxfoundation.org> wrote: > >>>> > >>>> On Thu, Jun 20, 2024 at 05:21:09PM +0530, Naresh Kamboju wrote: > >>>>> On Wed, 19 Jun 2024 at 18:41, Greg Kroah-Hartman > >>>>> <gregkh@linuxfoundation.org> wrote: > >>>>>> > >>>>>> This is the start of the stable review cycle for the 6.9.6 release. > >>>>>> There are 281 patches in this series, all will be posted as a response > >>>>>> to this one. If anyone has any issues with these being applied, please > >>>>>> let me know. > >>>>>> > >>>>>> Responses should be made by Fri, 21 Jun 2024 12:55:11 +0000. > >>>>>> Anything received after that time might be too late. > >>>>>> > >>>>>> The whole patch series can be found in one patch at: > >>>>>> https://www.kernel.org/pub/linux/kernel/v6.x/stable-review/patch-6.9.6-rc1.gz > >>>>>> or in the git tree and branch at: > >>>>>> git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-6.9.y > >>>>>> and the diffstat can be found below. > >>>>>> > >>>>>> thanks, > >>>>>> > >>>>>> greg k-h > >>>>> > >>>>> There are two major issues on arm64 Juno-r2 on Linux stable-rc 6.9.6-rc1 > >>>>> > >>>>> Reported-by: Linux Kernel Functional Testing <lkft@linaro.org> > >>>>> > >>>>> 1) > >>>>> The LTP controllers cgroup_fj_stress test cases causing kernel crash > >>>>> on arm64 Juno-r2 with > >>>>> compat mode testing with stable-rc 6.9 kernel. > >>>>> > >>>>> In the recent past I have reported this issues on Linux mainline. > >>>>> > >>>>> LTP: fork13: kernel panic on rk3399-rock-pi-4 running mainline 6.10.rc3 > >>>>> - https://lore.kernel.org/all/CA+G9fYvKmr84WzTArmfaypKM9+=Aw0uXCtuUKHQKFCNMGJyOgQ@mail.gmail.com/ > >>>>> > >>>>> it goes like this, > >>>>> Unable to handle kernel NULL pointer dereference at virtual address > >>>>> ... > >>>>> Insufficient stack space to handle exception! > >>>>> end Kernel panic - not syncing: kernel stack overflow > >>>>> > >> > >> How is that related to 6.9.6-rc1? That report is from mainline (6.10.rc3). > >> > >> Can you share a similar kernel dmesg output from the issue on 6.9.6-rc1? > > > > I request you to use this link for detailed boot log, test log and crash log. > > - https://lkft.validation.linaro.org/scheduler/job/7687060#L23314 > > > > Few more logs related to build artifacts links provided in the original > > email thread and bottom of this email. > > > > crash log: > > --- > > Thanks for investigating this crash report. > Thanks, so this is something different than the > > "BUG: Bad page map in process fork13 > BUG: Bad rss-counter state mm:" > > stuff on mainline you referenced. > > Looks like some recursive exception until we exhausted the stack. You are right ! I see only one common case is, exhaust the stack. > > > Trying to connect the dots here, can you enlighten me how this is > related to the fork13 mainline report? I am not sure about the relation between these two reports. But as a common practice I have shared that report information. > > [ 0.000000] Booting Linux on physical CPU 0x0000000100 [0x410fd033] > > [ 0.000000] Linux version 6.9.6-rc1 (tuxmake@tuxmake) > > (aarch64-linux-gnu-gcc (Debian 13.2.0-12) 13.2.0, GNU ld (GNU Binutils > > for Debian) 2.42) #1 SMP PREEMPT @1718817000 > > ... > > [ 1786.336761] Unable to handle kernel NULL pointer dereference at > > virtual address 0000000000000070 > > [ 1786.345564] Mem abort info: > > [ 1786.348359] ESR = 0x0000000096000004 > > [ 1786.352112] EC = 0x25: DABT (current EL), IL = 32 bits > > [ 1786.357434] SET = 0, FnV = 0 > > [ 1786.360492] EA = 0, S1PTW = 0 > > [ 1786.363637] FSC = 0x04: level 0 translation fault > > [ 1786.368523] Data abort info: > > [ 1786.371405] ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 > > [ 1786.376900] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 > > [ 1786.381960] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 > > [ 1786.387284] Unable to handle kernel NULL pointer dereference at > > virtual address 0000000000000070 > > [ 1786.387293] Insufficient stack space to handle exception! > > [ 1786.387296] ESR: 0x0000000096000047 -- DABT (current EL) > > [ 1786.387302] FAR: 0xffff80008399ffe0 > > [ 1786.387306] Task stack: [0xffff8000839a0000..0xffff8000839a4000] > > [ 1786.387312] IRQ stack: [0xffff8000837f8000..0xffff8000837fc000] > > [ 1786.387319] Overflow stack: [0xffff00097ec95320..0xffff00097ec96320] > > [ 1786.387327] CPU: 4 PID: 0 Comm: swapper/4 Not tainted 6.9.6-rc1 #1 > > [ 1786.387338] Hardware name: ARM Juno development board (r2) (DT) > > [ 1786.387344] pstate: a00003c5 (NzCv DAIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--) > > [ 1786.387355] pc : _prb_read_valid (kernel/printk/printk_ringbuffer.c:2109) > > [ 1786.387374] lr : prb_read_valid (kernel/printk/printk_ringbuffer.c:2183) > > [ 1786.387385] sp : ffff80008399ffe0 > > [ 1786.387390] x29: ffff8000839a0030 x28: ffff000800365f00 x27: ffff800082530008 > > [ 1786.387407] x26: ffff8000834e33b8 x25: ffff8000839a00b0 x24: 0000000000000001 > > [ 1786.387423] x23: ffff8000839a00a8 x22: ffff8000830e3e40 x21: 0000000000001e9e > > [ 1786.387438] x20: 0000000000000000 x19: ffff8000839a01c8 x18: 0000000000000010 > > [ 1786.387453] x17: 72646461206c6175 x16: 7472697620746120 x15: 65636e6572656665 > > [ 1786.387468] x14: 726564207265746e x13: 3037303030303030 x12: 3030303030303030 > > [ 1786.387483] x11: 2073736572646461 x10: ffff800083151ea0 x9 : ffff80008014273c > > [ 1786.387498] x8 : ffff8000839a0120 x7 : 0000000000000000 x6 : 0000000000000e9f > > [ 1786.387512] x5 : ffff8000839a00c8 x4 : ffff8000837157c0 x3 : 0000000000000000 > > [ 1786.387526] x2 : ffff8000839a00b0 x1 : 0000000000000000 x0 : ffff8000830e3f58 > > [ 1786.387542] Kernel panic - not syncing: kernel stack overflow > > [ 1786.387549] SMP: stopping secondary CPUs > > [ 1787.510055] SMP: failed to stop secondary CPUs 0,4 > > [ 1787.510065] Kernel Offset: disabled > > [ 1787.510068] CPU features: 0x4,00001061,e0100000,0200421b > > [ 1787.510076] Memory Limit: none > > [ 1787.680436] ---[ end Kernel panic - not syncing: kernel stack overflow ]--- > > > -- > Cheers, > > David / dhildenb - Naresh ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH 6.9 000/281] 6.9.6-rc1 review 2024-06-20 15:39 ` Naresh Kamboju @ 2024-06-20 19:31 ` David Hildenbrand 0 siblings, 0 replies; 8+ messages in thread From: David Hildenbrand @ 2024-06-20 19:31 UTC (permalink / raw) To: Naresh Kamboju Cc: Greg Kroah-Hartman, stable, patches, linux-kernel, torvalds, akpm, linux, shuah, patches, lkft-triage, pavel, jonathanh, f.fainelli, sudipm.mukherjee, srw, rwarsow, conor, allen.lkml, broonie, Miaohe Lin, Arnd Bergmann, Dan Carpenter, Cgroups, linux-mm, Baolin Wang, jbeulich, LTP List >>>> >> Trying to connect the dots here, can you enlighten me how this is >> related to the fork13 mainline report? > > I am not sure about the relation between these two reports. > But as a common practice I have shared that report information. Yes, I was just briefly concerned that we are seeing the same issue as we saw once on 6.10-rc3 also on a 6.9 kernel -- also because the patch list don't contain that much MM stuff. -- Cheers, David / dhildenb ^ permalink raw reply [flat|nested] 8+ messages in thread
end of thread, other threads:[~2024-06-20 19:31 UTC | newest]
Thread overview: 8+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
[not found] <20240619125609.836313103@linuxfoundation.org>
2024-06-20 11:51 ` [PATCH 6.9 000/281] 6.9.6-rc1 review Naresh Kamboju
2024-06-20 12:29 ` Greg Kroah-Hartman
2024-06-20 13:14 ` Naresh Kamboju
2024-06-20 13:53 ` David Hildenbrand
2024-06-20 14:02 ` Naresh Kamboju
2024-06-20 14:20 ` David Hildenbrand
2024-06-20 15:39 ` Naresh Kamboju
2024-06-20 19:31 ` David Hildenbrand
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox