lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <b14f55642207e63e907965e209f6323a0df6dcee.camel@physik.fu-berlin.de>
Date: Sat, 09 Aug 2025 08:23:13 +0200
From: John Paul Adrian Glaubitz <glaubitz@...sik.fu-berlin.de>
To: Anthony Yznaga <anthony.yznaga@...cle.com>, sparclinux@...r.kernel.org, 
	davem@...emloft.net, andreas@...sler.com
Cc: linux-kernel@...r.kernel.org, agordeev@...ux.ibm.com, will@...nel.org, 
	ryan.roberts@....com, david@...hat.com, osalvador@...e.de
Subject: Re: [PATCH] sparc64: fix hugetlb for sun4u

Hi Anthony,

On Sat, 2025-08-09 at 00:37 +0200, John Paul Adrian Glaubitz wrote:
> > Maybe try enabling CONFIG_DEBUG_VM_IRQSOFF, CONFIG_DEBUG_VM, and perhaps 
> > CONFIG_DEBUG_VM_PGFLAGS. That might help detect a problem closer to the 
> > source. You can also try adding transparent_hugepage=never to the kernel 
> > boot line to see if compiling in THP support but not using it is okay.
> 
> OK, I will try that. But not today anymore. It's half past midnight now here in Germany
> and I was debugging this issue almost all day long. I'm glad to have finally been able
> to track this down to THP support being enabled.
> 
> Maybe you can try whether you can reproduce this in QEMU as well.

OK, first data point: Setting CONFIG_TRANSPARENT_HUGEPAGE_NEVER=y causes the backtrace during
boot to disappear with CONFIG_TRANSPARENT_HUGEPAGE=y. However, it still disappears later when
running "apt update && apt -y upgrade" again:

[  170.472743] kernel BUG at fs/ext4/inode.c:1174!
[  170.532313]               \|/ ____ \|/
                             "@'/ .. \`@"
                             /_| \__/ |_\
                                \__U_/
[  170.725707] apt(1085): Kernel bad sw trap 5 [#1]
[  170.786396] CPU: 0 UID: 0 PID: 1085 Comm: apt Not tainted 6.16.0+ #35 VOLUNTARY 
[  170.883619] TSTATE: 0000004411001603 TPC: 000000000075ee68 TNPC: 000000000075ee6c Y: 00000000    Not tainted
[  171.012868] TPC: <ext4_block_write_begin+0x408/0x480>
[  171.079299] g0: 0000000000000000 g1: 0000000000000001 g2: 0000000000000000 g3: 0000000000000000
[  171.193692] g4: fff0000007802340 g5: fff000023d194000 g6: fff0000004aa8000 g7: 0000000000000001
[  171.308157] o0: 0000000000000023 o1: 0000000000d74b28 o2: 0000000000000496 o3: 0000000000101cca
[  171.422531] o4: 0000000001568800 o5: 0000000000000000 sp: fff0000004aab161 ret_pc: 000000000075ee60
[  171.541487] RPC: <ext4_block_write_begin+0x400/0x480>
[  171.607814] l0: fff000000274c6a8 l1: 0000000000113cca l2: fff000000274c540 l3: 0000000000001000
[  171.722195] l4: 0000000000000002 l5: 0000000000080000 l6: 0000000000012000 l7: 0000000000000001
[  171.836568] i0: 0000000000000000 i1: 000c000000374400 i2: 0000000000001fc0 i3: 0000000000680000
[  171.950944] i4: 0000000000000000 i5: 0000000000000000 i6: fff0000004aab251 i7: 00000000007625d8
[  172.065317] I7: <ext4_da_write_begin+0x158/0x300>
[  172.127075] Call Trace:
[  172.159101] [<00000000007625d8>] ext4_da_write_begin+0x158/0x300
[  172.238023] [<00000000005b856c>] generic_perform_write+0x8c/0x240
[  172.318085] [<000000000074aef0>] ext4_buffered_write_iter+0x50/0x120
[  172.401586] [<00000000006954e0>] vfs_write+0x2a0/0x400
[  172.469059] [<0000000000695784>] ksys_write+0x44/0xe0
[  172.535395] [<0000000000406274>] linux_sparc_syscall+0x34/0x44
[  172.612029] Disabling lock debugging due to kernel taint
[  172.681796] Caller[00000000007625d8]: ext4_da_write_begin+0x158/0x300
[  172.766430] Caller[00000000005b856c]: generic_perform_write+0x8c/0x240
[  172.852213] Caller[000000000074aef0]: ext4_buffered_write_iter+0x50/0x120
[  172.941429] Caller[00000000006954e0]: vfs_write+0x2a0/0x400
[  173.014627] Caller[0000000000695784]: ksys_write+0x44/0xe0
[  173.086684] Caller[0000000000406274]: linux_sparc_syscall+0x34/0x44
[  173.169033] Caller[0000000000000000]: 0x0
[  173.221645] Instruction DUMP:
[  173.221648]  110035d2 
[  173.260532]  7ff358e0 
[  173.291414]  90122328 
[  173.322289] <91d02005>
[  173.353172]  80a06000 
[  173.384051]  02480010 
[  173.414937]  d45fa7cf 
[  173.445815]  d85fa7cf 
[  173.476697]  9736a000

So, even just compiling in the THP support code already triggers the bug.

Will now test with the debug flags enabled.

Adrian 

-- 
 .''`.  John Paul Adrian Glaubitz
: :' :  Debian Developer
`. `'   Physicist
  `-    GPG: 62FF 8A75 84E0 2956 9546  0006 7426 3B37 F5B5 F913

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ