Received: by 2002:a05:7412:f589:b0:e2:908c:2ebd with SMTP id eh9csp367784rdb; Tue, 31 Oct 2023 09:35:48 -0700 (PDT) X-Google-Smtp-Source: AGHT+IH56DjbMHhOdvc/O8kUkWek7HoI5yenQnRVueqYQ1HVa9vRP+Jif4ZVUCae6Kr2w8K8TPOX X-Received: by 2002:a17:902:e54d:b0:1cc:44ba:ffc4 with SMTP id n13-20020a170902e54d00b001cc44baffc4mr8647038plf.45.1698770148662; Tue, 31 Oct 2023 09:35:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1698770148; cv=none; d=google.com; s=arc-20160816; b=dxYycf38JMCmkFH5W/YcImMjwtIbO30Bo8qA09Vn7dpeY9m7BjdKunS239huBlRUB5 oHtkySuD77ZNrSJu/XKu/T0U0B5DXhmrKb2YDFnm9/caRonmfxOhrqdZ5YhCiTqXfF1c aNqKlfDlXMEFUwslJFy3nKQ6tkYGFT2awSgqaK+Kc3l3xHZRvG/RetkxqSK3NDvr/ppP Hg5uD1i2zCkh2SgIH/bozvnEcq6/DzPhwtkgIxiNPm6E+zycv01oHvrAhb4ccmD3YjYx O1DI/DdcDollPT5gwEXjWTmbeh2e0ubQbo3cQKcuJto5TAl5KCPBahZkQPl9zBo7JJ/T kyWg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=1eKIvmHJir1PtteKo0iu7iHOI1GrkBSqp5IQB6XaocY=; fh=HqPA2cmnW2s8DdURuQaeP6ywpmCI6/gxQZrVZ8oPS7U=; b=euxlPCevc8vs4WyxmbYNGxSlgz4pUA0SC7DKTo6MGqUXVX7E8PCOjdN3xBTfsTNcKg ebLk0D2hiTJSwGmoKvmn9FdC1QYfcoab6nGL+N1bIVItwYcqDMr6n9uxynSMWTHXKfeV En7rQEbLdCeamiA9ctak3Qz5OU52MsRAFvfKzCNeitIflaY69a53DTr9Rz1/rfVkNFuw r2MMzp4j+d1wkK8FPB7ZKYGRrijmyscrDQ+La7XG8WkrD0PeAB70Td+PHXvYSXmbSDyW K+zMMzKdBlQVDOYX8RL28CFDQbyuQHDIibQp/YVZ6mm75URMw/qrR6kCaaO2i/H1Ol8r 3uJw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from snail.vger.email (snail.vger.email. [23.128.96.37]) by mx.google.com with ESMTPS id iw18-20020a170903045200b001c624237977si1207015plb.252.2023.10.31.09.35.48 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 31 Oct 2023 09:35:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) client-ip=23.128.96.37; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id 5233E80E65B5; Tue, 31 Oct 2023 09:35:47 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1346728AbjJaQff (ORCPT + 99 others); Tue, 31 Oct 2023 12:35:35 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55244 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1346630AbjJaQev (ORCPT ); Tue, 31 Oct 2023 12:34:51 -0400 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 74AA5213B; Tue, 31 Oct 2023 09:32:47 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 31F762F4; Tue, 31 Oct 2023 09:33:28 -0700 (PDT) Received: from FVFF77S0Q05N (unknown [10.57.36.213]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id F02DA3F67D; Tue, 31 Oct 2023 09:32:43 -0700 (PDT) Date: Tue, 31 Oct 2023 16:32:41 +0000 From: Mark Rutland To: Ard Biesheuvel Cc: Naresh Kamboju , Catalin Marinas , Will Deacon , Oliver Upton , Linux-Next Mailing List , open list , Linux ARM , lkft-triage@lists.linaro.org, Arnd Bergmann , Thomas Gleixner , Ingo Molnar , Anders Roxell , Dan Carpenter , LTP List , Petr Vorel Subject: Re: qemu-arm64: handle_futex_death - kernel/futex/core.c:661 - Unable to handle kernel unknown 43 at virtual address Message-ID: References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Tue, 31 Oct 2023 09:35:47 -0700 (PDT) On Thu, Oct 26, 2023 at 05:39:11PM +0200, Ard Biesheuvel wrote: > On Thu, 26 Oct 2023 at 17:30, Mark Rutland wrote: > > > > On Thu, Oct 26, 2023 at 08:11:26PM +0530, Naresh Kamboju wrote: > > > Following kernel crash noticed on qemu-arm64 while running LTP syscalls > > > set_robust_list test case running Linux next 6.6.0-rc7-next-20231026 and > > > 6.6.0-rc7-next-20231025. > > > > > > BAD: next-20231025 > > > Good: next-20231024 > > > > > > Reported-by: Linux Kernel Functional Testing > > > Reported-by: Naresh Kamboju > > > > > > Log: > > > ---- > > > <1>[ 203.119139] Unable to handle kernel unknown 43 at virtual > > > address 0001ffff9e2e7d78 > > > <1>[ 203.119838] Mem abort info: > > > <1>[ 203.120064] ESR = 0x000000009793002b > > > <1>[ 203.121040] EC = 0x25: DABT (current EL), IL = 32 bits > > > set_robust_list01 1 TPASS : set_robust_list: retval = -1 > > > (expected -1), errno = 22 (expected 22) > > > set_robust_list01 2 TPASS : set_robust_list: retval = 0 > > > (expected 0), errno = 0 (expected 0) > > > <1>[ 203.124496] SET = 0, FnV = 0 > > > <1>[ 203.124778] EA = 0, S1PTW = 0 > > > <1>[ 203.125029] FSC = 0x2b: unknown 43 > > > > It looks like this is fallout from the LPA2 enablement. > > > > According to the latest ARM ARM (ARM DDI 0487J.a), page D19-6475, that "unknown > > 43" (0x2b / 0b101011) is the DFSC for a level -1 translation fault: > > > > 0b101011 When FEAT_LPA2 is implemented: > > Translation fault, level -1. > > > > It's triggered here by an LDTR in a get_user() on a bogus userspace address. > > The exception is expected, and it's supposed to be handled via the exception > > fixups, but the LPA2 patches didn't update the fault_info table entries for all > > the level -1 faults, and so those all get handled by do_bad() and don't call > > fixup_exception(), causing them to be fatal. > > > > It should be relatively simple to update the fault_info table for the level -1 > > faults, but given the other issues we're seeing I think it's probably worth > > dropping the LPA2 patches for the moment. > > > > Thanks for the analysis Mark. > > I agree that this should not be difficult to fix, but given the other > CI problems and identified loose ends, I am not going to object to > dropping this partially or entirely at this point. I'm sure everybody > will be thrilled to go over those 60 patches again after I rebase them > onto v6.7-rc1 :-) FWIW, I'm more than happy to try; the issue has lagely been finding the time. Hopefully that'll be a bit easier after LPC! Mark.