Received: by 2002:a25:f815:0:0:0:0:0 with SMTP id u21csp2468205ybd; Mon, 24 Jun 2019 07:00:14 -0700 (PDT) X-Google-Smtp-Source: APXvYqy3/yvlbYNVyZkXggdB7aMSkVR2UumLA5q18LPehkYm1B270x/j6L8h3jL6q5RtQ17lO9YL X-Received: by 2002:a17:902:968c:: with SMTP id n12mr55553445plp.59.1561384814406; Mon, 24 Jun 2019 07:00:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1561384814; cv=none; d=google.com; s=arc-20160816; b=TInbKgU/wP8DpVOTu53RScteF2CU+UV3g3VgkWjJy3c5Xkabe0TvtAwcUB9bquc2Vw 4Mqr3Qoe5v3uyd53p8nF0BB7FuauthquxmoGKh7CE5nz5WaRIMukQkxeEzNtcP6LBSJ/ NYeLI1zk+eBD19URhF3Pfma/+xV2Idb2Vh2xIPqswFEHMEQSN3/77o1Cq5THlWTUvskf s5WZ85XwhAIj0RyMMSoJGOn+vigySjfKoMY1wawBluJW/yyWqUOkl4IjzmaoI2JL8SAG 9dHhr1jOTSEVb1xUdBsXTmtxAEID+HWzxiuje0Ll3xSxlypomKbXCXeT6O4GJOf+A2FN QqZg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=L7+mv+MSDTumLwPDvYe/itTBhoIm4n1zDW8F6v4e3TA=; b=TBt4MiVGpJ6Gnq72EFzu4ruAW9l7EeAmDNDbgF+/0sVHr2lWE6hn/6Npha9c46+6Ta jVyajnSlo7Lq0IuZz9WUmiXUDLa30RXd2eto8yD0x1IHlQ9ayHsq8CFuuSk0Iq4Nj0I/ F/PFEjV/HiDWn9TdKS5XACoGduge/B3dGo1fRXZ/iMSjkFLIUEN2MivEX8KCqwctOVj7 pSo3HhxfMnH7M5dmoTcu4LsMIVpTN9LGPZivIyQ1OBl7Js8UqEWj3ydv49g/gdCu+QJd c281FZ2JhVtZSih+z3P+qhRAxFRBTKUsmwIim9ebugNVsKDip39BO/CPzNe95zW1rsy5 /V9w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=JpzEg3oN; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o6si11385100pje.1.2019.06.24.06.59.58; Mon, 24 Jun 2019 07:00:14 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=JpzEg3oN; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729820AbfFXLrr (ORCPT + 99 others); Mon, 24 Jun 2019 07:47:47 -0400 Received: from mail.kernel.org ([198.145.29.99]:59654 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726334AbfFXLrr (ORCPT ); Mon, 24 Jun 2019 07:47:47 -0400 Received: from willie-the-truck (236.31.169.217.in-addr.arpa [217.169.31.236]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 17BFF20674; Mon, 24 Jun 2019 11:47:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1561376866; bh=EHCIrE5dWZz7UIHv3Mt0UGdPFK98b1UEAL4km+gAnRM=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=JpzEg3oNYpbs1copvvpNgzJoG/DGjPL1JheCElUYYb3Kyfn6ZY3vMNpnIO7zdr5bM YstNnwaddGcQvaxeMAMks8QR4gCvCw/200+rSeXlQ6FfEQpvgEqbY/D8jDmA2ARNd2 NOMmlmCjjxArVHgQKI7rGxrmQ7BczUbloPCy59gQ= Date: Mon, 24 Jun 2019 12:47:41 +0100 From: Will Deacon To: Vicente Bergas Cc: Al Viro , linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, Catalin Marinas , Will Deacon Subject: Re: d_lookup: Unable to handle kernel paging request Message-ID: <20190624114741.i542cb3wbhfbk4q4@willie-the-truck> References: <20190522135331.GM17978@ZenIV.linux.org.uk> <20190522162945.GN17978@ZenIV.linux.org.uk> <10192e43-c21d-44e4-915d-bf77a50c22c4@gmail.com> <20190618183548.GB17978@ZenIV.linux.org.uk> <20190619162802.GF17978@ZenIV.linux.org.uk> <20190619170940.GG17978@ZenIV.linux.org.uk> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: NeoMutt/20170113 (1.7.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, Jun 22, 2019 at 08:02:19PM +0200, Vicente Bergas wrote: > Hi Al, > i think have a hint of what is going on. > With the last kernel built with your sentinels at hlist_bl_*lock > it is very easy to reproduce the issue. > In fact it is so unstable that i had to connect a serial port > in order to save the kernel trace. > Unfortunately all the traces are at different addresses and > your sentinel did not trigger. > > Now i am writing this email from that same buggy kernel, which is > v5.2-rc5-224-gbed3c0d84e7e. > > The difference is that I changed the bootloader. > Before was booting 5.1.12 and kexec into this one. > Now booting from u-boot into this one. > I will continue booting with u-boot for some time to be sure it is > stable and confirm this is the cause. > > In case it is, who is the most probable offender? > the kernel before kexec or the kernel after? Has kexec ever worked reliably on this board? If you used to kexec successfully, then we can try to hunt down the regression using memtest. If you kexec into a problematic kernel with CONFIG_MEMTEST=y and pass "memtest=17" on the command-line, it will hopefully reveal any active memory corruption. My first thought is that there is ongoing DMA which corrupts the dentry hash. The rk3399 SoC also has an IOMMU, which could contribute to the fun if it's not shutdown correctly (i.e. if it enters bypass mode). > The original report was sent to you because you appeared as the maintainer > of fs/dcache.c, which appeared on the trace. Should this be redirected > somewhere else now? linux-arm-kernel@lists.infradead.org Probably worth adding Heiko Stuebner to cc. Will