From: John Paul Adrian Glaubitz <glaubitz@physik.fu-berlin.de>
To: Anthony Yznaga <anthony.yznaga@oracle.com>,
sparclinux@vger.kernel.org, davem@davemloft.net,
andreas@gaisler.com
Cc: linux-kernel@vger.kernel.org, agordeev@linux.ibm.com,
will@kernel.org, ryan.roberts@arm.com, david@redhat.com,
osalvador@suse.de
Subject: Re: [PATCH] sparc64: fix hugetlb for sun4u
Date: Sat, 09 Aug 2025 08:23:13 +0200 [thread overview]
Message-ID: <b14f55642207e63e907965e209f6323a0df6dcee.camel@physik.fu-berlin.de> (raw)
In-Reply-To: <38f4469f48e6d36fa92b445c8ecef7a440be43e6.camel@physik.fu-berlin.de>
Hi Anthony,
On Sat, 2025-08-09 at 00:37 +0200, John Paul Adrian Glaubitz wrote:
> > Maybe try enabling CONFIG_DEBUG_VM_IRQSOFF, CONFIG_DEBUG_VM, and perhaps
> > CONFIG_DEBUG_VM_PGFLAGS. That might help detect a problem closer to the
> > source. You can also try adding transparent_hugepage=never to the kernel
> > boot line to see if compiling in THP support but not using it is okay.
>
> OK, I will try that. But not today anymore. It's half past midnight now here in Germany
> and I was debugging this issue almost all day long. I'm glad to have finally been able
> to track this down to THP support being enabled.
>
> Maybe you can try whether you can reproduce this in QEMU as well.
OK, first data point: Setting CONFIG_TRANSPARENT_HUGEPAGE_NEVER=y causes the backtrace during
boot to disappear with CONFIG_TRANSPARENT_HUGEPAGE=y. However, it still disappears later when
running "apt update && apt -y upgrade" again:
[ 170.472743] kernel BUG at fs/ext4/inode.c:1174!
[ 170.532313] \|/ ____ \|/
"@'/ .. \`@"
/_| \__/ |_\
\__U_/
[ 170.725707] apt(1085): Kernel bad sw trap 5 [#1]
[ 170.786396] CPU: 0 UID: 0 PID: 1085 Comm: apt Not tainted 6.16.0+ #35 VOLUNTARY
[ 170.883619] TSTATE: 0000004411001603 TPC: 000000000075ee68 TNPC: 000000000075ee6c Y: 00000000 Not tainted
[ 171.012868] TPC: <ext4_block_write_begin+0x408/0x480>
[ 171.079299] g0: 0000000000000000 g1: 0000000000000001 g2: 0000000000000000 g3: 0000000000000000
[ 171.193692] g4: fff0000007802340 g5: fff000023d194000 g6: fff0000004aa8000 g7: 0000000000000001
[ 171.308157] o0: 0000000000000023 o1: 0000000000d74b28 o2: 0000000000000496 o3: 0000000000101cca
[ 171.422531] o4: 0000000001568800 o5: 0000000000000000 sp: fff0000004aab161 ret_pc: 000000000075ee60
[ 171.541487] RPC: <ext4_block_write_begin+0x400/0x480>
[ 171.607814] l0: fff000000274c6a8 l1: 0000000000113cca l2: fff000000274c540 l3: 0000000000001000
[ 171.722195] l4: 0000000000000002 l5: 0000000000080000 l6: 0000000000012000 l7: 0000000000000001
[ 171.836568] i0: 0000000000000000 i1: 000c000000374400 i2: 0000000000001fc0 i3: 0000000000680000
[ 171.950944] i4: 0000000000000000 i5: 0000000000000000 i6: fff0000004aab251 i7: 00000000007625d8
[ 172.065317] I7: <ext4_da_write_begin+0x158/0x300>
[ 172.127075] Call Trace:
[ 172.159101] [<00000000007625d8>] ext4_da_write_begin+0x158/0x300
[ 172.238023] [<00000000005b856c>] generic_perform_write+0x8c/0x240
[ 172.318085] [<000000000074aef0>] ext4_buffered_write_iter+0x50/0x120
[ 172.401586] [<00000000006954e0>] vfs_write+0x2a0/0x400
[ 172.469059] [<0000000000695784>] ksys_write+0x44/0xe0
[ 172.535395] [<0000000000406274>] linux_sparc_syscall+0x34/0x44
[ 172.612029] Disabling lock debugging due to kernel taint
[ 172.681796] Caller[00000000007625d8]: ext4_da_write_begin+0x158/0x300
[ 172.766430] Caller[00000000005b856c]: generic_perform_write+0x8c/0x240
[ 172.852213] Caller[000000000074aef0]: ext4_buffered_write_iter+0x50/0x120
[ 172.941429] Caller[00000000006954e0]: vfs_write+0x2a0/0x400
[ 173.014627] Caller[0000000000695784]: ksys_write+0x44/0xe0
[ 173.086684] Caller[0000000000406274]: linux_sparc_syscall+0x34/0x44
[ 173.169033] Caller[0000000000000000]: 0x0
[ 173.221645] Instruction DUMP:
[ 173.221648] 110035d2
[ 173.260532] 7ff358e0
[ 173.291414] 90122328
[ 173.322289] <91d02005>
[ 173.353172] 80a06000
[ 173.384051] 02480010
[ 173.414937] d45fa7cf
[ 173.445815] d85fa7cf
[ 173.476697] 9736a000
So, even just compiling in the THP support code already triggers the bug.
Will now test with the debug flags enabled.
Adrian
--
.''`. John Paul Adrian Glaubitz
: :' : Debian Developer
`. `' Physicist
`- GPG: 62FF 8A75 84E0 2956 9546 0006 7426 3B37 F5B5 F913
next prev parent reply other threads:[~2025-08-09 6:23 UTC|newest]
Thread overview: 26+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-07-16 1:24 [PATCH] sparc64: fix hugetlb for sun4u Anthony Yznaga
2025-07-16 6:18 ` John Paul Adrian Glaubitz
2025-07-16 8:41 ` John Paul Adrian Glaubitz
2025-07-16 16:47 ` Anthony Yznaga
2025-07-24 10:52 ` John Paul Adrian Glaubitz
2025-07-25 5:59 ` John Paul Adrian Glaubitz
2025-07-25 20:46 ` John Paul Adrian Glaubitz
2025-07-25 21:09 ` John Paul Adrian Glaubitz
2025-08-08 21:31 ` John Paul Adrian Glaubitz
2025-08-08 22:15 ` Anthony Yznaga
2025-08-08 22:37 ` John Paul Adrian Glaubitz
2025-08-09 6:23 ` John Paul Adrian Glaubitz [this message]
2025-08-09 6:26 ` John Paul Adrian Glaubitz
2025-08-09 6:42 ` John Paul Adrian Glaubitz
2025-08-10 9:52 ` John Paul Adrian Glaubitz
2025-08-10 22:20 ` John Paul Adrian Glaubitz
2025-08-11 8:25 ` David Hildenbrand
2025-08-11 10:44 ` John Paul Adrian Glaubitz
2025-08-11 11:06 ` John Paul Adrian Glaubitz
2025-08-12 12:32 ` Found it - was: " John Paul Adrian Glaubitz
2025-08-12 12:34 ` John Paul Adrian Glaubitz
2025-08-21 12:52 ` David Hildenbrand
2025-08-21 15:03 ` Edgecombe, Rick P
2025-08-21 16:42 ` John Paul Adrian Glaubitz
2025-08-11 8:20 ` David Hildenbrand
2025-08-11 8:28 ` John Paul Adrian Glaubitz
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=b14f55642207e63e907965e209f6323a0df6dcee.camel@physik.fu-berlin.de \
--to=glaubitz@physik.fu-berlin.de \
--cc=agordeev@linux.ibm.com \
--cc=andreas@gaisler.com \
--cc=anthony.yznaga@oracle.com \
--cc=davem@davemloft.net \
--cc=david@redhat.com \
--cc=linux-kernel@vger.kernel.org \
--cc=osalvador@suse.de \
--cc=ryan.roberts@arm.com \
--cc=sparclinux@vger.kernel.org \
--cc=will@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).