Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp10852137rwd; Thu, 22 Jun 2023 05:52:06 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ6EzDrc8S5jhiQ4J7A5T35epKQ/InQuCc3UKMV+kiprs0Dm3FGAUEnEcxXd9LzPMGFVV+gW X-Received: by 2002:a17:902:c944:b0:1b0:6038:2982 with SMTP id i4-20020a170902c94400b001b060382982mr21078618pla.41.1687438326003; Thu, 22 Jun 2023 05:52:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1687438325; cv=none; d=google.com; s=arc-20160816; b=n33lVAjhKS70pxl5wCu70bq9DUZFpxap+r2YgNoxE8VjxkGF0NK5cP72brtE224Hya f0WSvUKDR5dYMq05hunRGGHDponamO7KabgvH9dphYg3eiiYCG1xeBXDEP95vZE11lxC TZ5nobpaNmpX62eo6H4HAqro67LgIBmCgW+78EhgzPOXtOTcLjJH3tv8iamTwPN4BKIH AEfnM+z9KGINbBA3GpRCLWxchgwn0xMX3IVvXnEsoPu/uL9EiACbFU0yymAiR7A/5NRr 9e/ypv7NLCtCSiqn3HsKOldX2Oy8feOkn+3WtsE4LoYmlpozYizpi/RQI0teyZHB/H9S CYAg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=BwL1XXFpB7Juc23gGcrmpmP3rd5YyIO3kgOAyPIlzcM=; b=s1aXFfpLvre6YK45x+Jh2CNDa4QfOrfiTtRRKxWyt7QWiCQqglxXamGOxfWuUwtrvR u/Dhn4q4XV0ftjjWTD7wMomKAKApo95bUg1fxKeBTcKGlHezMP3jxWH8gLp8INpHUQoW 04uokHErsKRxwc3bbPNfYoZx5zcBjG4KbMEcH53IANYDuoaJ+gWXr6qtFsjT1zXHqFVb 4e4SMNiBoqcSzpMnNrFi7e59qTSpmwO0HF5nLaAjxZdgONBKyF0a9w+8ABj/5hDrKRTC BqodRLdeWS/ggv6k1HHj5b9hDjqaJC9QwEJvBalAHOH/xcHA3ANOam3GgIEEAhrOLmPA RGdw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=CqGj2E1L; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id lf5-20020a170902fb4500b001ae4c3bbb0dsi5897068plb.145.2023.06.22.05.51.52; Thu, 22 Jun 2023 05:52:05 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=CqGj2E1L; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229645AbjFVMf5 (ORCPT + 99 others); Thu, 22 Jun 2023 08:35:57 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43546 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231366AbjFVMfz (ORCPT ); Thu, 22 Jun 2023 08:35:55 -0400 Received: from mail-vk1-xa36.google.com (mail-vk1-xa36.google.com [IPv6:2607:f8b0:4864:20::a36]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 537D51BC6 for ; Thu, 22 Jun 2023 05:35:53 -0700 (PDT) Received: by mail-vk1-xa36.google.com with SMTP id 71dfb90a1353d-471b3ad20e1so1399250e0c.1 for ; Thu, 22 Jun 2023 05:35:53 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; t=1687437352; x=1690029352; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=BwL1XXFpB7Juc23gGcrmpmP3rd5YyIO3kgOAyPIlzcM=; b=CqGj2E1L8WAGd6HSmOq2ffig5DVss6jWELqzntl3GKlXUEYm5evoPvavsg0cZPdyUG uVYi/gfibC8xVIb/UDtPwlUBdDgsGbxguuycXjG2YxnCEy6H8kcNelG4AmVpMpuckiFA eyEowBgxCKXjLiR8L0kyDyIwgAAsE6ldsvwGIJ3f6rUlNWz3fc1ZPRn8DOTpQsHvf9U3 rCVWH3iloZlCntq1nkRIF3PZgXJe73H9ULOZzTrIaIObG/zpStYEiw4JdcsdNwNBIaPh qAF5aEyVo3tt/zl56/6m0CiD/OPH7Vi4QYEnxzx/YEwhml9wARWBRGCZwE5R0GDgcGQY E3NA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1687437352; x=1690029352; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=BwL1XXFpB7Juc23gGcrmpmP3rd5YyIO3kgOAyPIlzcM=; b=S1Jg5Rric7lC+ppjR6KmZm6PlkuRtPJHxCUU7Vm18BlPOexbv9zTrLYOhYN0yAT2Mm RQauC8sWHEk5yFte6zI4xG3xjCpnBceTNBK6ZV+SKLGwVCFLZZQU9fTiKiY09NKVYQoi LwjR7lV+tq7GvVnTZRjOtokjr57gs0hdyFbuCJaMYc9hQqZ/lCOyuBLNKwK2oRdTa26G C45DvgCxVRgluUxSQjq6YZcvvrD/a8JAJXaci3nHRYpPSGmOmArxdiWPJQRpfu8tWm/+ kGclF6EdxWWYF2s4dMp2kwGwGXv/0JBrtbqjh3CLM5RfAhDBrWazUENZCusV6WbFDGST BPNA== X-Gm-Message-State: AC+VfDz87I66BETb75tmGYSE16HiPE2Rr25hoVRVrcBVbu+6pzFtZ5qh 0nRkwQJitGVZ7lmOfkYdAuJwpnpQazEwg8HdWybsyw== X-Received: by 2002:a1f:e201:0:b0:471:4ceb:675f with SMTP id z1-20020a1fe201000000b004714ceb675fmr5066318vkg.9.1687437352169; Thu, 22 Jun 2023 05:35:52 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: Naresh Kamboju Date: Thu, 22 Jun 2023 18:05:40 +0530 Message-ID: Subject: Re: next: Rpi4: Unexpected kernel BRK exception at EL1 To: Mark Rutland Cc: Linux ARM , open list , linux-rpi-kernel@lists.infradead.org, Netdev , lkft-triage@lists.linaro.org, Arnd Bergmann , Dan Carpenter , Linus Walleij , Catalin Marinas , Will Deacon , Anshuman Khandual , Puranjay Mohan , Song Liu , Alexei Starovoitov Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Mark, On Thu, 22 Jun 2023 at 15:12, Mark Rutland wrote: > > On Wed, Jun 21, 2023 at 01:57:21PM +0100, Mark Rutland wrote: > > On Wed, Jun 21, 2023 at 06:06:51PM +0530, Naresh Kamboju wrote: > > > Following boot warnings and crashes noticed on arm64 Rpi4 device running > > > Linux next-20230621 kernel. > > > > > > Reported-by: Linux Kernel Functional Testing > > > > > > boot log: > > > > > > [ 22.331748] Kernel text patching generated an invalid instruction > > > at 0xffff8000835d6580! > > > [ 22.340579] Unexpected kernel BRK exception at EL1 > > > [ 22.346141] Internal error: BRK handler: 00000000f2000100 [#1] PREEMPT SMP > > > > This indicates execution of AARCH64_BREAK_FAULT. > > > > That could be from dodgy arguments to aarch64_insn_gen_*(), or elsewhere, and > > given this is in the networking code I suspect this'll be related to BPF. > > > > Looking at next-20230621 I see commit: > > > > 49703aa2adfaff28 ("bpf, arm64: use bpf_jit_binary_pack_alloc") > > > > ... which changed the way BPF allocates memory, and has code that pads memory > > with a bunch of AARCH64_BREAK_FAULT, so it looks like that *might* be related. > > For the benefit of those just looknig at this thread, there has been some > discussion in the original thread for this commit. Summary and links below. > > We identified a potential issue with missing cache maintenance: > > https://lore.kernel.org/linux-arm-kernel/ZJMXqTffB22LSOkd@FVFF77S0Q05N/ > > Puranjay verified that was causing the problem seen here: > > https://lore.kernel.org/linux-arm-kernel/CANk7y0h5ucxmMz4K8sGx7qogFyx6PRxYxmFtwTRO7=0Y=B4ugw@mail.gmail.com/ > > Alexei has dropped this commit for now: > > https://lore.kernel.org/linux-arm-kernel/CAADnVQJqDOMABEx8JuU6r_Dehyf=SkDfRNChx1oNfqPoo7pSrw@mail.gmail.com/ Thanks for the detailed information. I am happy to test any proposed fix patches. > > Thanks, > Mark. - Naresh