Received: by 2002:a25:f815:0:0:0:0:0 with SMTP id u21csp3572944ybd; Tue, 25 Jun 2019 05:04:27 -0700 (PDT) X-Google-Smtp-Source: APXvYqwQtON65TucUMOuVDSCk/b1E+tTUa5rw2m3Z0kPQpeTGcNSLlsacBN/mXbEC5NRJ8XdR2NQ X-Received: by 2002:a63:56:: with SMTP id 83mr39335807pga.145.1561464267545; Tue, 25 Jun 2019 05:04:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1561464267; cv=none; d=google.com; s=arc-20160816; b=DLDyr7BOR9LTmatFoHinlQdvtYmg6DPfsEMgWvrUqOK99UdCKFrot3r2v+HvBN90Bh vK1xAjCEfBnwCZyo+2yIFTAtZAr6YCb2Q9ArL/gmZeqfOorRDvTtbiIk5HaDDSpYo66d GbwGDgIL3o0Sq9mjhi4Mgnik9/E89QqJlEmHL2CD7Z2AxVLYinGJqM1pOu6wSRPF4pxT m++1Esm67FfhKcX/bL2U6SaOrmuWSR6wj9MGDEx2fRBAeXEe2eDmSJGLOH2cExlqoYjm mraQbgYGljuH2dBoK0WHPoncRpJjm8T6b81TxnoQptGE1g00PG3zD3gZwjp2fEv8ymDE 6oyw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=w0Ax6NhJZP3RWsHevDTB1jT/mrudRCcsUbe2m+NroHE=; b=CJAGsgdoFENIBzEuuYIDtw/iHYyFINN7cft/pazP14zSzXIZRilu+fZy4y1WmC4GTo V7akqcHvBTkjnPqeZouQh/M4GiR/8DSBZQXwWrO4DURaT1Re6KsfrO/QdjlUwkplG9ku JHauPCqatCgEqR3Nkni+mrM4jbd4m2nyjcc02MMaxqRTKnFZtEVpBKpKddp0fp8WodKu Yd+YkXwS0lE7BwMnxBDA6ZtekT5sweEMcSoxUlzNjbo2irlrfy5syzem4Ed3G8nIGFhX GO6eYmb98nLwnH9icwx5/99Xwlw8m9F9Tl4RWsrVMyD3lWr5euQ9xJiiqkb6EebW+g0x AXhA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d135si12926858pga.557.2019.06.25.05.04.08; Tue, 25 Jun 2019 05:04:27 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728616AbfFYJqG (ORCPT + 99 others); Tue, 25 Jun 2019 05:46:06 -0400 Received: from foss.arm.com ([217.140.110.172]:37146 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727729AbfFYJqG (ORCPT ); Tue, 25 Jun 2019 05:46:06 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 9BAF8C0A; Tue, 25 Jun 2019 02:46:05 -0700 (PDT) Received: from fuggles.cambridge.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.121.207.14]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 94A833F71E; Tue, 25 Jun 2019 02:46:04 -0700 (PDT) Date: Tue, 25 Jun 2019 10:46:02 +0100 From: Will Deacon To: Will Deacon Cc: Vicente Bergas , Al Viro , linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, Catalin Marinas , marc.zyngier@arm.com Subject: Re: d_lookup: Unable to handle kernel paging request Message-ID: <20190625094602.GC13263@fuggles.cambridge.arm.com> References: <20190522162945.GN17978@ZenIV.linux.org.uk> <10192e43-c21d-44e4-915d-bf77a50c22c4@gmail.com> <20190618183548.GB17978@ZenIV.linux.org.uk> <20190619162802.GF17978@ZenIV.linux.org.uk> <20190619170940.GG17978@ZenIV.linux.org.uk> <20190624114741.i542cb3wbhfbk4q4@willie-the-truck> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190624114741.i542cb3wbhfbk4q4@willie-the-truck> User-Agent: Mutt/1.11.1+86 (6f28e57d73f2) () Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [+Marc] Hi again, Vicente, On Mon, Jun 24, 2019 at 12:47:41PM +0100, Will Deacon wrote: > On Sat, Jun 22, 2019 at 08:02:19PM +0200, Vicente Bergas wrote: > > Hi Al, > > i think have a hint of what is going on. > > With the last kernel built with your sentinels at hlist_bl_*lock > > it is very easy to reproduce the issue. > > In fact it is so unstable that i had to connect a serial port > > in order to save the kernel trace. > > Unfortunately all the traces are at different addresses and > > your sentinel did not trigger. > > > > Now i am writing this email from that same buggy kernel, which is > > v5.2-rc5-224-gbed3c0d84e7e. > > > > The difference is that I changed the bootloader. > > Before was booting 5.1.12 and kexec into this one. > > Now booting from u-boot into this one. > > I will continue booting with u-boot for some time to be sure it is > > stable and confirm this is the cause. > > > > In case it is, who is the most probable offender? > > the kernel before kexec or the kernel after? > > Has kexec ever worked reliably on this board? If you used to kexec > successfully, then we can try to hunt down the regression using memtest. > If you kexec into a problematic kernel with CONFIG_MEMTEST=y and pass > "memtest=17" on the command-line, it will hopefully reveal any active > memory corruption. > > My first thought is that there is ongoing DMA which corrupts the dentry > hash. The rk3399 SoC also has an IOMMU, which could contribute to the fun > if it's not shutdown correctly (i.e. if it enters bypass mode). > > > The original report was sent to you because you appeared as the maintainer > > of fs/dcache.c, which appeared on the trace. Should this be redirected > > somewhere else now? > > linux-arm-kernel@lists.infradead.org > > Probably worth adding Heiko Stuebner to cc. Before you rush over to LAKML, please could you provide your full dmesg output from the kernel that was crashing (i.e. the dmesg you see in the kexec'd kernel)? We've got a theory that the issue may be related to the interrupt controller, and the dmesg output should help to establish whether that is plausible or not. Thanks, Will