Received: by 2002:a05:7412:37c9:b0:e2:908c:2ebd with SMTP id jz9csp2450207rdb; Thu, 21 Sep 2023 21:14:34 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEc/Vva8gT9DzR2tJTZtTULBBnJacx3h/m+xAvUNiORyNoMW4h1vARg5rZnYgvJpBnKkLrS X-Received: by 2002:a05:6a20:728c:b0:153:8983:d8bf with SMTP id o12-20020a056a20728c00b001538983d8bfmr8039695pzk.16.1695356074239; Thu, 21 Sep 2023 21:14:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1695356074; cv=none; d=google.com; s=arc-20160816; b=VXLQhKe4F7YgIx4Wot7+TLqrevMsQV44sLBk04lmk1ZsZdTefqEkGLjzV2UXeskv98 ix4ZmWBdvWLB67sc7QUmq00pOwSgyZ7XWirf6wl75SOmIMyo8qMzUXCrl2XgJ3xrbGkq CPJXiCiiBsx857sZVK6QGJ4pygVRmRUYJD210pAear5Uu3PtbfytCc7NKzbqYBiRI7hj ZDrmdUk9e9Jiw2nbExTRNtYRpwpCS+mHxR19Xd3bHxUmCGdqkYPiPVyy/nHCdEbVUSnu Kndng7hV/wvoePt70sv1s9XdhaIBVISpluH9MO48sKAtN+0IK3e+H1XrDIvggBXeeQVJ CzOQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=iSxC7sF+RqNEHA9olKy8ZxyWEExKXHAbh2l7mGLx11E=; fh=yXhyu53EzQyqjT/NsoEstqyW7j9GFu0zNtNBN7HfzQc=; b=WrTyrpxKFEq0oo4DrKQoSQG8Dm7oSyRF6aGDzgoroA936+cgB5hMl5tRfwXYHaHINB TVU1Wh2n8m1j+EXUx9I/X8LT6RyQFXatM8AvJJkfNGAUHudGelMIc0n2X9N6g4OZFBo4 pQXvnqq6Lld2KMasrUhDTLw8IU36zKlVU/6rooG9dpA1JrJ6fTm/iF0x07spKKZAhhpg u+g5cYMEn2QP9qzOzy/MWX1qmekXGvu9k833wclZuiqHdgD0tNyxEjB1m4ZT/AXKhZQF LATpwsLj3kSCiw1bMbVxIoCde5wd6mObjhVNHjbxXQSM3CocxKIxO22DjyBJ592f4JuD zehQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=Xu2o1vsj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.38 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from fry.vger.email (fry.vger.email. [23.128.96.38]) by mx.google.com with ESMTPS id hg14-20020a17090b300e00b0026829a94587si2952048pjb.176.2023.09.21.21.14.33 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 21 Sep 2023 21:14:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.38 as permitted sender) client-ip=23.128.96.38; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=Xu2o1vsj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.38 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by fry.vger.email (Postfix) with ESMTP id 0174D808BD06; Thu, 21 Sep 2023 13:22:06 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at fry.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231185AbjIUUWC (ORCPT + 99 others); Thu, 21 Sep 2023 16:22:02 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49252 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231689AbjIUUVg (ORCPT ); Thu, 21 Sep 2023 16:21:36 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CE5D02691 for ; Thu, 21 Sep 2023 10:31:16 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1695317352; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=iSxC7sF+RqNEHA9olKy8ZxyWEExKXHAbh2l7mGLx11E=; b=Xu2o1vsjzBj1wRepbnC6a9OFPUu4PciRBZ4/8Naw/V+vVWQ6wnrX+vIPijy+01iI0gb7AD NPCGfJYjEitDWhkRfQePbi0BqGG86nQTlPAqTzaCfY0G4OZeK1mORBrXdAXkJVYohgna1R 2VOXqviZ415yL3hBmi0QpvopoR7VY5U= Received: from mail-vs1-f71.google.com (mail-vs1-f71.google.com [209.85.217.71]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-288-GqLyCiqyMiuqlgIuW_B8PA-1; Thu, 21 Sep 2023 05:01:23 -0400 X-MC-Unique: GqLyCiqyMiuqlgIuW_B8PA-1 Received: by mail-vs1-f71.google.com with SMTP id ada2fe7eead31-45289b05c67so324594137.2 for ; Thu, 21 Sep 2023 02:01:23 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1695286883; x=1695891683; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=iSxC7sF+RqNEHA9olKy8ZxyWEExKXHAbh2l7mGLx11E=; b=I++fxGClXu57AzNuD8nvBFSGzRdnNbi+tUsv1Qk+DRNomdJTPGWW7IKRkL5TBMqP2o WillV5B+g/AQGmB+GWIDuDy9qocPs3JT/n+bH7Lv5hmRyUu0cykSkNlSqw0JWZMcxciv VVeFRTKHiyKvMIqLemOAU13OL2aqQuf5zm+MeR21am6FIiLfJ4ClqE2tdgBlxm1BmRIH m4PEp5mVeDppRofCUrmgGFK49cRoGx0v6kLcrsHHUPxjhDDVtsKtMCNRtMEMzQmq3Rzn TpS0aZPQ+xpu1jwSR9URKT2vF2hF2Dtzbkjo28rF0s1oi+UMTZsGThuH6i1U68TN8wud pCHQ== X-Gm-Message-State: AOJu0Yzyqv6IudXHYDY/0UUgapV/YiEYoIxGmFIPEFtQ+BRYErIFae8D tHrv/94ekCpojXINR27Zf5U5fI+7bjJLNTAl1vMfJwJ1ZTVS4bLlL4alRNEBAzcFZmNXNVNRZ9P IPqMqUL18vQEK9Lnz8kriCCJfQHYCcEUnTs6jBJ0B7ys6kxm7wrI= X-Received: by 2002:a67:ebc1:0:b0:450:8e58:2de4 with SMTP id y1-20020a67ebc1000000b004508e582de4mr4833718vso.7.1695286883214; Thu, 21 Sep 2023 02:01:23 -0700 (PDT) X-Received: by 2002:a67:ebc1:0:b0:450:8e58:2de4 with SMTP id y1-20020a67ebc1000000b004508e582de4mr4833703vso.7.1695286882847; Thu, 21 Sep 2023 02:01:22 -0700 (PDT) MIME-Version: 1.0 References: <7c85cbf5-efb2-9cc6-4a5c-9854f7db1b0e@arm.com> <8474df43-0718-4ae5-b36e-2c3c1f19d5e9@paulmck-laptop> In-Reply-To: <8474df43-0718-4ae5-b36e-2c3c1f19d5e9@paulmck-laptop> From: Jan Stancek Date: Thu, 21 Sep 2023 11:01:06 +0200 Message-ID: Subject: Re: [LTP] arm64: Unable to handle kernel execute from non-executable memory at virtual address ffff8000834c13a0 To: paulmck@kernel.org Cc: Robin Murphy , Mark Rutland , Dan Carpenter , Arnd Bergmann , Peter Zijlstra , Greg Kroah-Hartman , open list , lkft-triage@lists.linaro.org, Ard Biesheuvel , rcu , Jason Baron , Steven Rostedt , Linux ARM , Catalin Marinas , Will Deacon , Josh Poimboeuf , LTP List Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=0.6 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RCVD_IN_SORBS_WEB,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on fry.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (fry.vger.email [0.0.0.0]); Thu, 21 Sep 2023 13:22:06 -0700 (PDT) On Wed, Sep 20, 2023 at 7:02=E2=80=AFPM Paul E. McKenney wrote: > > On Wed, Sep 20, 2023 at 05:26:33PM +0100, Robin Murphy wrote: > > On 20/09/2023 3:32 pm, Mark Rutland wrote: > > > Hi Naresh, > > > > > > On Wed, Sep 20, 2023 at 11:29:12AM +0200, Naresh Kamboju wrote: > > > > [ my two cents ] > > > > While running LTP pty07 test cases on arm64 juno-r2 with Linux next= -20230919 > > > > the following kernel crash was noticed. > > > > > > > > I have been noticing this issue intermittently on Juno-r2 for more = than a month. > > > > Anyone have noticed this crash ? > > > > > > How intermittent is this? 1/2, 1/10, 1/100, rarer still? > > > > > > Are you running *just* the pty07 test, or are you running a whole LTP= suite and > > > the issue first occurs around pty07? > > > > > > Given you've been hitting this for a month, have you tried testing ma= inline? Do > > > you have a known-good kernel that we can start a bisect from? > > > > > > Do you *only* see this on Juno-r2 and are you testing on other hardwa= re? > > > > > > > Reported-by: Linux Kernel Functional Testing > > > > > > > > [ 0.000000] Linux version 6.6.0-rc2-next-20230919 (tuxmake@tuxma= ke) > > > > (aarch64-linux-gnu-gcc (Debian 13.2.0-2) 13.2.0, GNU ld (GNU Binuti= ls > > > > for Debian) 2.41) #1 SMP PREEMPT @1695107157 > > > > [ 0.000000] KASLR disabled due to lack of seed > > > > [ 0.000000] Machine model: ARM Juno development board (r2) > > > > ... > > > > LTP running pty > > > > ... > > > > > > > > pty07.c:92: TINFO: Saving active console 1 > > > > ../../../include/tst_fuzzy_sync.h:640: TINFO: Stopped sampling at 5= 52 > > > > (out of 1024) samples, sampling time reached 50% of the total time > > > > limit > > > > ../../../include/tst_fuzzy_sync.h:307: TINFO: loop =3D 552, delay_b= ias =3D 0 > > > > ../../../include/tst_fuzzy_sync.h:295: TINFO: start_a - start_b: { = avg > > > > =3D 127ns, avg_dev =3D 84ns, dev_ratio =3D 0.66 } > > > > ../../../include/tst_fuzzy_sync.h:295: TINFO: end_a - start_a : { = avg > > > > =3D 17296156ns, avg_dev =3D 5155058ns, dev_ratio =3D 0.30 } > > > > ../../../include/tst_fuzzy_sync.h:295: TINFO: end_b - start_b : { = avg > > > > =3D 101202336ns, avg_dev =3D 6689286ns, dev_ratio =3D 0.07 } > > > > ../../../include/tst_fuzzy_sync.h:295: TINFO: end_a - end_b : { = avg > > > > =3D -83906064ns, avg_dev =3D 10230694ns, dev_ratio =3D 0.12 } > > > > ../../../include/tst_fuzzy_sync.h:295: TINFO: spins : { = avg > > > > =3D 2765565 , avg_dev =3D 339285 , dev_ratio =3D 0.12 } > > > > [ 384.133538] Unable to handle kernel execute from non-executable > > > > memory at virtual address ffff8000834c13a0 > > > > [ 384.133559] Mem abort info: > > > > [ 384.133568] ESR =3D 0x000000008600000f > > > > [ 384.133578] EC =3D 0x21: IABT (current EL), IL =3D 32 bits > > > > [ 384.133590] SET =3D 0, FnV =3D 0 > > > > [ 384.133600] EA =3D 0, S1PTW =3D 0 > > > > [ 384.133610] FSC =3D 0x0f: level 3 permission fault > > > > [ 384.133621] swapper pgtable: 4k pages, 48-bit VAs, pgdp=3D000000= 0082375000 > > > > [ 384.133634] [ffff8000834c13a0] pgd=3D10000009fffff003, > > > > p4d=3D10000009fffff003, pud=3D10000009ffffe003, pmd=3D10000009ffff8= 003, > > > > pte=3D00780000836c1703 > > > > [ 384.133697] Internal error: Oops: 000000008600000f [#1] PREEMPT = SMP > > > > [ 384.133707] Modules linked in: tda998x onboard_usb_hub cec hdlcd > > > > crct10dif_ce drm_dma_helper drm_kms_helper fuse drm backlight dm_mo= d > > > > ip_tables x_tables > > > > [ 384.133767] CPU: 3 PID: 589 Comm: (udev-worker) Not tainted > > > > 6.6.0-rc2-next-20230919 #1 > > > > [ 384.133779] Hardware name: ARM Juno development board (r2) (DT) > > > > [ 384.133784] pstate: 40000005 (nZcv daif -PAN -UAO -TCO -DIT -SSB= S BTYPE=3D--) > > > > [ 384.133796] pc : in_lookup_hashtable+0x178/0x2000 > > > > > > This indicates that the faulting address ffff8000834c13a0 is > > > in_lookup_hashtable+0x178/0x2000, which would been we've somehow mark= ed the > > > kernel text as non-executable, which we never do intentionally. > > > > > > I suspect that implies memory corruption. Have you tried running this= with > > > KASAN enabled? > > > > > > > [ 384.133818] lr : rcu_core (arch/arm64/include/asm/preempt.h:13 > > > > (discriminator 1) kernel/rcu/tree.c:2146 (discriminator 1) > > > > kernel/rcu/tree.c:2403 (discriminator 1)) > > > > For the record, this LR appears to be the expected return address of th= e > > "f(rhp);" call within rcu_do_batch() (if CONFIG_DEBUG_LOCK_ALLOC=3Dn), = so it > > looks like a case of a bogus or corrupted RCU callback. The PC is in th= e > > middle of a data symbol (in_lookup_hashtable is an array), so NX is exp= ected > > and I wouldn't imagine the pagetables have gone wrong, just regular dat= a > > corruption or use-after-free somewhere. > > Is it possible to use either KASAN or CONFIG_DEBUG_OBJECTS_RCU_HEAD=3Dy > here? CKI has been also running into issues during pty07 runs lately. This is from aarch64 debug kernel: [ 5537.660548] LTP: starting pty07 [-- MARK -- Mon Sep 18 14:30:00 2023] [ 5807.450507] =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D [ 5807.450515] BUG: KASAN: slab-use-after-free in d_alloc_parallel+0xbfc/0x= df8 [ 5807.450524] Read of size 4 at addr ffff000169d87630 by task (udev-worker)/280492 [ 5807.450527] [ 5807.450530] CPU: 4 PID: 280492 Comm: (udev-worker) Not tainted 6.6.0-0.rc2.20.test.eln.aarch64+debug #1 [ 5807.450534] Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/20= 15 [ 5807.450536] Call trace: [ 5807.450537] dump_backtrace+0xa0/0x128 [ 5807.450542] show_stack+0x20/0x38 [ 5807.450544] dump_stack_lvl+0xe8/0x178 [ 5807.450550] print_address_description.constprop.0+0x84/0x3a0 [ 5807.450555] print_report+0xb0/0x278 [ 5807.450557] kasan_report+0x90/0xd0 [ 5807.450559] __asan_report_load4_noabort+0x20/0x30 [ 5807.450562] d_alloc_parallel+0xbfc/0xdf8 [ 5807.450564] lookup_open.isra.0+0x6e0/0xe88 [ 5807.450567] open_last_lookups+0x740/0xe88 [ 5807.450571] path_openat+0x16c/0x538 [ 5807.450573] do_filp_open+0x174/0x340 [ 5807.450576] do_sys_openat2+0x134/0x180 [ 5807.450579] __arm64_sys_openat+0x138/0x1d0 [ 5807.450581] invoke_syscall.constprop.0+0xdc/0x1e0 [ 5807.450584] do_el0_svc+0x154/0x1d0 [ 5807.450586] el0_svc+0x58/0x118 [ 5807.450590] el0t_64_sync_handler+0x120/0x130 [ 5807.450593] el0t_64_sync+0x1a4/0x1a8 [ 5807.450595] [ 5807.450596] Allocated by task 280071: [ 5807.450598] kasan_save_stack+0x3c/0x68 [ 5807.450604] kasan_set_track+0x2c/0x40 [ 5807.450607] kasan_save_alloc_info+0x24/0x38 [ 5807.450609] __kasan_slab_alloc+0x8c/0x90 [ 5807.450613] kmem_cache_alloc+0x144/0x300 [ 5807.450618] alloc_empty_file+0x6c/0x180 [ 5807.450621] path_openat+0xd0/0x538 [ 5807.450623] do_filp_open+0x174/0x340 [ 5807.450626] do_sys_openat2+0x134/0x180 [ 5807.450628] __arm64_sys_openat+0x138/0x1d0 [ 5807.450630] invoke_syscall.constprop.0+0xdc/0x1e0 [ 5807.450632] do_el0_svc+0x154/0x1d0 [ 5807.450634] el0_svc+0x58/0x118 [ 5807.450637] el0t_64_sync_handler+0x120/0x130 [ 5807.450639] el0t_64_sync+0x1a4/0x1a8 [ 5807.450642] [ 5807.450643] Freed by task 79: [ 5807.450645] kasan_save_stack+0x3c/0x68 [ 5807.450649] kasan_set_track+0x2c/0x40 [ 5807.450652] kasan_save_free_info+0x38/0x60 [ 5807.450654] __kasan_slab_free+0xe4/0x150 [ 5807.450658] slab_free_freelist_hook+0xf4/0x1d0 [ 5807.450662] kmem_cache_free+0x1d0/0x3e8 [ 5807.450665] file_free_rcu+0xa4/0x120 [ 5807.450668] rcu_do_batch+0x4e0/0x1860 [ 5807.450671] rcu_core+0x408/0x5b0 [ 5807.450673] rcu_core_si+0x18/0x30 [ 5807.450676] __do_softirq+0x2e0/0xed0 [ 5807.450678] [ 5807.450678] Last potentially related work creation: [ 5807.450680] kasan_save_stack+0x3c/0x68 [ 5807.450683] __kasan_record_aux_stack+0x9c/0xc8 [ 5807.450686] kasan_record_aux_stack_noalloc+0x14/0x20 [ 5807.450689] __call_rcu_common.constprop.0+0x100/0x940 [ 5807.450691] call_rcu+0x18/0x30 [ 5807.450693] __fput+0x404/0x848 [ 5807.450696] __fput_sync+0x7c/0x98 [ 5807.450698] __arm64_sys_close+0x74/0xd0 [ 5807.450700] invoke_syscall.constprop.0+0xdc/0x1e0 [ 5807.450702] do_el0_svc+0x154/0x1d0 [ 5807.450704] el0_svc+0x58/0x118 [ 5807.450707] el0t_64_sync_handler+0x120/0x130 [ 5807.450710] el0t_64_sync+0x1a4/0x1a8 [ 5807.450712] [ 5807.450712] Second to last potentially related work creation: [ 5807.450714] kasan_save_stack+0x3c/0x68 [ 5807.450717] __kasan_record_aux_stack+0x9c/0xc8 [ 5807.450719] kasan_record_aux_stack_noalloc+0x14/0x20 [ 5807.450722] __call_rcu_common.constprop.0+0x100/0x940 [ 5807.450724] call_rcu+0x18/0x30 [ 5807.450726] __fput+0x404/0x848 [ 5807.450728] __fput_sync+0x7c/0x98 [ 5807.450731] __arm64_sys_close+0x74/0xd0 [ 5807.450733] invoke_syscall.constprop.0+0xdc/0x1e0 [ 5807.450735] do_el0_svc+0x154/0x1d0 [ 5807.450737] el0_svc+0x58/0x118 [ 5807.450740] el0t_64_sync_handler+0x120/0x130 [ 5807.450742] el0t_64_sync+0x1a4/0x1a8 [ 5807.450744] [ 5807.450745] The buggy address belongs to the object at ffff000169d87480 [ 5807.450745] which belongs to the cache filp of size 464 [ 5807.450748] The buggy address is located 432 bytes inside of [ 5807.450748] freed 464-byte region [ffff000169d87480, ffff000169d87650) [ 5807.450751] [ 5807.450752] The buggy address belongs to the physical page: [ 5807.450754] page:00000000310d19d2 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1a9d84 [ 5807.450758] head:00000000310d19d2 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 5807.450760] memcg:ffff0001350cb601 [ 5807.450762] flags: 0x2fffff00000840(slab|head|node=3D0|zone=3D2|lastcpupid=3D0xfffff) [ 5807.450766] page_type: 0xffffffff() [ 5807.450770] raw: 002fffff00000840 ffff0000d225eb40 fffffc0004b0cc00 dead000000000002 [ 5807.450772] raw: 0000000000000000 0000000000190019 00000001ffffffff ffff0001350cb601 [ 5807.450774] page dumped because: kasan: bad access detected [ 5807.450775] [ 5807.450776] Memory state around the buggy address: [ 5807.450778] ffff000169d87500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 5807.450779] ffff000169d87580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 5807.450781] >ffff000169d87600: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 5807.450783] ^ [ 5807.450784] ffff000169d87680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 5807.450786] ffff000169d87700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 5807.450787] =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D [ 5807.450790] Disabling lock debugging due to kernel taint [ 5807.458789] Unable to handle kernel execute from non-executable memory at virtual address ffffb66294dcf728 [ 5807.486215] KASAN: maybe wild-memory-access in range [0x0001b314a6e7b940-0x0001b314a6e7b947] [ 5807.486221] Mem abort info: [ 5807.486223] ESR =3D 0x000000008600000e [ 5807.486226] EC =3D 0x21: IABT (current EL), IL =3D 32 bits [ 5807.486228] SET =3D 0, FnV =3D 0 [ 5807.486230] EA =3D 0, S1PTW =3D 0 [ 5807.486232] FSC =3D 0x0e: level 2 permission fault [ 5807.486235] swapper pgtable: 4k pages, 48-bit VAs, pgdp=3D00000012b36030= 00 [ 5807.486238] [ffffb66294dcf728] pgd=3D100000233ffff003, p4d=3D100000233ffff003, pud=3D100000233fffe003, pmd=3D00680012b7600f01 [ 5807.486250] Internal error: Oops: 000000008600000e [#1] SMP [ 5807.486254] Modules linked in: n_hdlc slcan can_dev slip slhc nfsv3 nfs_acl nfs lockd grace fscache netfs tun brd overlay exfat ext4 mbcache jbd2 rfkill sunrpc vfat fat loop fuse dm_mod xfs crct10dif_ce ghash_ce sha2_ce sha256_arm64 sha1_ce virtio_blk virtio_console virtio_net net_failover failover virtio_mmio [last unloaded: hwpoison_inject] [ 5807.486304] CPU: 9 PID: 0 Comm: swapper/9 Tainted: G B ------- --- 6.6.0-0.rc2.20.test.eln.aarch64+debug #1 [ 5807.486308] Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/20= 15 [ 5807.486310] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE= =3D--) [ 5807.486313] pc : in_lookup_hashtable+0x13c8/0x2020 [ 5807.486320] lr : rcu_do_batch+0x4e0/0x1860 [ 5807.486324] sp : ffff800080097cb0 [ 5807.486325] x29: ffff800080097cb0 x28: 0000000000000009 x27: ffff0000d29= 3c008 [ 5807.486330] x26: ffffb6628fb04ca0 x25: ffffb66292266000 x24: ffffb66291d= e8fc8 [ 5807.486334] x23: ffffb66291de9a20 x22: 0000000000000066 x21: dfff8000000= 00000 [ 5807.486338] x20: ffffb66290e73008 x19: ffff0002f4ba4418 x18: 00000000000= 00000 [ 5807.486342] x17: ffff49bb6df11000 x16: ffff800080090000 x15: ffff001dfed= 8b168 [ 5807.486345] x14: ffff001dfed8b0e8 x13: ffff001dfed8b068 x12: ffff76cc529= d0793 [ 5807.486349] x11: 1ffff6cc529d0792 x10: ffff76cc529d0792 x9 : ffffb66291d= e9000 [ 5807.486353] x8 : 0000000000000007 x7 : 0000000000000000 x6 : ffffb6628d8= d0488 [ 5807.486357] x5 : 0000000000000000 x4 : 0000000000000000 x3 : 1fffe003bfd= b2e10 [ 5807.486360] x2 : 1fffe0001a527801 x1 : ffffb66294dcf728 x0 : ffff0002f4b= a4418 [ 5807.486364] Call trace: [ 5807.486365] in_lookup_hashtable+0x13c8/0x2020 [ 5807.486368] rcu_core+0x408/0x5b0 [ 5807.486371] rcu_core_si+0x18/0x30 [ 5807.486373] __do_softirq+0x2e0/0xed0 [ 5807.486376] ____do_softirq+0x18/0x30 [ 5807.486379] call_on_irq_stack+0x24/0x30 [ 5807.486384] do_softirq_own_stack+0x24/0x38 [ 5807.486386] __irq_exit_rcu+0x1f8/0x580 [ 5807.486391] irq_exit_rcu+0x1c/0x90 [ 5807.486393] el1_interrupt+0x4c/0xb0 [ 5807.486398] el1h_64_irq_handler+0x18/0x28 [ 5807.486400] el1h_64_irq+0x78/0x80 [ 5807.486402] arch_local_irq_enable+0x8/0x20 [ 5807.486406] cpuidle_idle_call+0x26c/0x370 [ 5807.486409] do_idle+0x1ac/0x208 [ 5807.486411] cpu_startup_entry+0x2c/0x40 [ 5807.486413] secondary_start_kernel+0x240/0x360 [ 5807.486417] __secondary_switched+0xb8/0xc0 [ 5807.486423] Code: 00000000 00000000 00000000 00000000 (f4ba4418) [ 5807.486426] ---[ end trace 0000000000000000 ]--- [ 5807.486428] Kernel panic - not syncing: Oops: Fatal exception in interru= pt [ 5807.486430] SMP: stopping secondary CPUs [ 5807.486467] Kernel Offset: 0x36620d560000 from 0xffff800080000000 [ 5807.486469] PHYS_OFFSET: 0x40000000 [ 5807.486470] CPU features: 0x00000001,70020143,1001720b [ 5807.486472] Memory Limit: none