Received: by 2002:ad5:4acb:0:0:0:0:0 with SMTP id n11csp160505imw; Mon, 4 Jul 2022 07:01:07 -0700 (PDT) X-Google-Smtp-Source: AGRyM1uO0kI8Is7eWnkVHIJ2icy+jLhlFCD6c4lnqpdQB5DjTpT6j0f2Aw66k3TXdQPkgNBGfVIn X-Received: by 2002:a05:6402:3807:b0:435:20fb:318d with SMTP id es7-20020a056402380700b0043520fb318dmr38751540edb.272.1656943267360; Mon, 04 Jul 2022 07:01:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1656943267; cv=none; d=google.com; s=arc-20160816; b=ynral+tSeQPV5gttnZ1tvKl4PumI0zM6LkkWhRDOBrZ2ll4ity9T55vLRuhoK4cfdn ev5Dvs/CJoeUmyUgRvRU7txYwqd0eILiVzMjCME0oIraiu3q+SNgJOi6cv/fF9TAzV/U UKjMnXfvP9Ph4UVRdYdizkBVSK/Qksr5drWWZsFOPkuFbUJM3MXVFfpBDdpIElaaj69f Dw+rFLxhKAkiOIedLnkKTkmroF1+DVn63F0jnK+W3sj7L3+SU4F929FHjoBTfnKo2mUx +DFttDcXkM05fNvRGl8tY26TMtKldtIwZ1ErFyKDnNAm5z4CiqFNqHaPfZtURHkDsm3R n+NA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id; bh=raEK3OSHCOCGVm3TktkvzvwZwoy1rKOziIRJ2+xcbV0=; b=mJ3R9DRj7LpfUsPOAUkuMtQtGjnutk+pJNWFy0faK65QjMaodfr8k/CNdnXNR6s0ri t/d8DgLOK2ZpVXXbHxuMCt1U/96djeER3ejFvoD4ch7B1PIqJ/sEyJSVqTFeG3q9djsg 7FAajGp4IBZvmq6q9AYFdvwobziUANi/gduyevBoVH7nmwmZI3bBVCglI+GN6vHfXniF wtrGzt6g2HCRRDGKRwf3QDASSNcnUJ5cd5IGNP7SSIGozWBPtZ9RMHH7l3wPs02neX1K ItwcjiPeavSN3DlyTxVXRik2uNAnPfnnXdxyUodwNLz3aLpypNSzOoyPz8GE7mxrmw/8 kKZQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id ga6-20020a1709070c0600b006fea036b38esi42330517ejc.310.2022.07.04.07.00.41; Mon, 04 Jul 2022 07:01:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232665AbiGDNiA (ORCPT + 99 others); Mon, 4 Jul 2022 09:38:00 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47232 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229542AbiGDNiA (ORCPT ); Mon, 4 Jul 2022 09:38:00 -0400 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 85029109 for ; Mon, 4 Jul 2022 06:37:58 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 8DF3B23A; Mon, 4 Jul 2022 06:37:58 -0700 (PDT) Received: from [10.57.86.91] (unknown [10.57.86.91]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 99BAD3F66F; Mon, 4 Jul 2022 06:37:56 -0700 (PDT) Message-ID: Date: Mon, 4 Jul 2022 14:37:52 +0100 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Thunderbird/91.11.0 Subject: Re: 5.19.0-rc5 : Raspberry Pi 4 : Unable to handle kernel paging request at virtual address Content-Language: en-GB To: Will Deacon , Naresh Kamboju Cc: open list , lkft-triage@lists.linaro.org, regressions@lists.linux.dev, Linux ARM , LTP List , Linus Torvalds , Catalin Marinas , brauner@kernel.org, Vincent Guittot References: <20220704112605.GB31553@willie-the-truck> From: Robin Murphy In-Reply-To: <20220704112605.GB31553@willie-the-truck> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-6.9 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_HI,SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2022-07-04 12:26, Will Deacon wrote: > On Mon, Jul 04, 2022 at 01:28:30PM +0530, Naresh Kamboju wrote: >> While running LTP controllers tests on arm64 Raspberry Pi 4 Model B >> the following kernel crash noticed. >> >> Reported-by: Linux Kernel Functional Testing >> >> metadata: >> git_ref: master >> git_repo: https://gitlab.com/Linaro/lkft/mirrors/torvalds/linux-mainline >> git_sha: 88084a3df1672e131ddc1b4e39eeacfd39864acf >> kernel_version: 5.19.0-rc5 >> kernel-config: https://builds.tuxbuild.com/2BSEyt8Sb19HSj6SnBFiMo6kiQh/config >> build-url: https://gitlab.com/Linaro/lkft/mirrors/torvalds/linux-mainline/-/pipelines/579007773 >> artifact-location: https://builds.tuxbuild.com/2BSEyt8Sb19HSj6SnBFiMo6kiQh >> vmlinux.xz: https://builds.tuxbuild.com/2BSEyt8Sb19HSj6SnBFiMo6kiQh/vmlinux.xz >> System.map: https://builds.tuxbuild.com/2BSEyt8Sb19HSj6SnBFiMo6kiQh/System.map >> toolchain: gcc-11 >> >> Steps to reproduce: >> ------------------- >> ./runltp -p -q -f controllers >> >> Test log: >> ---------- >> cgroup_fj_stress_blkio_4_4_each 1 TPASS: All done! >> cgroup_fj_stress_blkio_4_4_each 2 TINFO: Removing all ltp subgroups... >> cgroup_fj_stress_blkio_2_9_each 1 TINFO: Subsystem blkio is mounted at >> /sys/fs/cgroup/blkio >> cgroup_fj_stress_blkio_2_9_each 1 TINFO: Creating subgroups ... >> [ 2414.973441] Unable to handle kernel paging request at virtual >> address 00620000090336a0 >> [ 2414.981581] Mem abort info: >> [ 2414.984480] ESR = 0x0000000086000004 >> [ 2414.988323] EC = 0x21: IABT (current EL), IL = 32 bits >> [ 2414.993765] SET = 0, FnV = 0 >> [ 2414.996905] EA = 0, S1PTW = 0 >> [ 2415.000124] FSC = 0x04: level 0 translation fault >> [ 2415.005118] [00620000090336a0] address between user and kernel address ranges >> [ 2415.012393] Internal error: Oops: 86000004 [#1] PREEMPT SMP >> [ 2415.018048] Modules linked in: btrfs blake2b_generic libcrc32c >> raid6_pq zstd_compress xhci_pci snd_soc_hdmi_codec xhci_pci_renesas >> raspberrypi_cpufreq hci_uart btqca brcmfmac brcmutil btbcm vc4 >> bluetooth cfg80211 cec drm_display_helper drm_cma_helper rfkill >> clk_raspberrypi reset_raspberrypi drm_kms_helper crct10dif_ce >> raspberrypi_hwmon drm i2c_bcm2835 iproc_rng200 rng_core pwm_bcm2835 >> bcm2711_thermal pcie_brcmstb fuse >> [ 2415.055725] CPU: 0 PID: 11626 Comm: cgroup_fj_stres Not taintedlinu#1 >> [ 2415.062965] Hardware name: Raspberry Pi 4 Model B (DT) >> [ 2415.068175] pstate: 40000005 (nZcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) >> [ 2415.075238] pc : 0x620000090336a0 >> [ 2415.078600] lr : ktime_get+0x50/0xac >> [ 2415.082228] sp : ffff80000dfdbb90 >> [ 2415.085585] x29: ffff80000dfdbb90 x28: 00000000ffffffff x27: ffff00006405e580 >> [ 2415.092832] x26: ffff00006405e748 x25: 0000000001200000 x24: ffff00006405e180 >> [ 2415.100076] x23: ffff80000dfdbd68 x22: 0000000000000000 x21: 000002321545f201 >> [ 2415.107320] x20: 000000000012017e x19: ffff80000ae3b440 x18: ffff000000000000 >> [ 2415.114564] x17: 0000000000000000 x16: 0000000000000000 x15: 00000000000000dc >> [ 2415.121809] x14: 0000000001200011 x13: 0000000060000000 x12: 0000ffffa7b6c1e8 >> [ 2415.129052] x11: 0000000000000040 x10: ffff80000a96c5c0 x9 : ffff8000080990d4 >> [ 2415.136295] x8 : 0000000000000000 x7 : 0000000000a9c84a x6 : 4480001ec1769752 >> [ 2415.143538] x5 : 00ffbffeffffffff x4 : 0000000900000000 x3 : 0000000000000000 >> [ 2415.150781] x2 : ffff80000a94e000 x1 : ffff8000090336a0 x0 : ffff80000ad102f0 >> [ 2415.158025] Call trace: >> [ 2415.160498] 0x620000090336a0 >> [ 2415.163505] copy_process+0xe34/0x1534 > > Do you have the disassembly (and source:line infor) around > copy_process+0xe34/0x1534? The faulting PC is like a messed up copy of x1 > where the upper bits have been corrupted somehow. Even better, according to the vmlinux that LR value points right after a "blr x1". From the shape of it, looks like it's probably the tk_clock_read() call. Robin.