lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <b7363e74-2207-4cab-a573-bc552b901f4e@nvidia.com>
Date: Thu, 6 Feb 2025 11:41:13 +0000
From: Jon Hunter <jonathanh@...dia.com>
To: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Cc: patches@...ts.linux.dev, linux-kernel@...r.kernel.org,
 torvalds@...ux-foundation.org, akpm@...ux-foundation.org,
 linux@...ck-us.net, shuah@...nel.org, patches@...nelci.org,
 lkft-triage@...ts.linaro.org, pavel@...x.de, f.fainelli@...il.com,
 sudipm.mukherjee@...il.com, srw@...dewatkins.net, rwarsow@....de,
 conor@...nel.org, hargar@...rosoft.com, broonie@...nel.org,
 linux-tegra@...r.kernel.org, stable@...r.kernel.org
Subject: Re: [PATCH 6.12 000/590] 6.12.13-rc1 review

Hi Greg,

On 06/02/2025 11:37, Jon Hunter wrote:
> On Wed, 05 Feb 2025 14:35:55 +0100, Greg Kroah-Hartman wrote:
>> This is the start of the stable review cycle for the 6.12.13 release.
>> There are 590 patches in this series, all will be posted as a response
>> to this one.  If anyone has any issues with these being applied, please
>> let me know.
>>
>> Responses should be made by Fri, 07 Feb 2025 13:43:01 +0000.
>> Anything received after that time might be too late.
>>
>> The whole patch series can be found in one patch at:
>> 	https://www.kernel.org/pub/linux/kernel/v6.x/stable-review/patch-6.12.13-rc1.gz
>> or in the git tree and branch at:
>> 	git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git linux-6.12.y
>> and the diffstat can be found below.
>>
>> thanks,
>>
>> greg k-h
> 
> Failures detected for Tegra ...
> 
> Test results for stable-v6.12:
>      10 builds:	10 pass, 0 fail
>      26 boots:	26 pass, 0 fail
>      116 tests:	115 pass, 1 fail
> 
> Linux version:	6.12.13-rc1-g9ca4cdc5e984
> Boards tested:	tegra124-jetson-tk1, tegra186-p2771-0000,
>                  tegra194-p2972-0000, tegra194-p3509-0000+p3668-0000,
>                  tegra20-ventana, tegra210-p2371-2180,
>                  tegra210-p3450-0000, tegra30-cardhu-a04
> 
> Test failures:	tegra194-p2972-0000: pm-system-suspend.sh


I am seeing a suspend regression on both 6.12.y and 6.13.y and bisect is
pointing to the following commit ...

# first bad commit: [ca20473b60926b94fdf58f971ccda43e866c32d1] PM: sleep: core: Synchronize runtime PM status of parents and children

This is the crash log I am seeing ...

[  216.035765] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
[  216.035982] Mem abort info:
[  216.036055]   ESR = 0x0000000096000004
[  216.036147]   EC = 0x25: DABT (current EL), IL = 32 bits
[  216.036276]   SET = 0, FnV = 0
[  216.036349]   EA = 0, S1PTW = 0
[  216.036424]   FSC = 0x04: level 0 translation fault
[  216.036544] Data abort info:
[  216.036612]   ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000
[  216.036736]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[  216.036848]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[  216.036982] user pgtable: 4k pages, 48-bit VAs, pgdp=00000001161af000
[  216.037126] [0000000000000000] pgd=0000000000000000, p4d=0000000000000000
[  216.037340] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[  216.037474] Modules linked in: snd_soc_tegra210_admaif snd_soc_tegra_pcm snd_soc_tegra186_asrc snd_soc_tegra210_mixer snd_soc_tegra210_ope snd_soc_tegra210_dmic snd_soc_tegra210_mvc snd_soc_tegra210_amx snd_soc_tegra210_adx snd_soc_tegra210_sfc snd_soc_tegra210_i2s tegra_drm drm_dp_aux_bus cec drm_display_helper drm_kms_helper tegra210_adma snd_soc_tegra210_ahub ucsi_ccg snd_soc_rt5659 typec_ucsi drm backlight crct10dif_ce snd_soc_rl6231 typec ina3221 snd_soc_tegra_audio_graph_card snd_soc_audio_graph_card snd_soc_simple_card_utils pwm_fan pwm_tegra snd_hda_codec_hdmi tegra_aconnect snd_hda_tegra phy_tegra194_p2u snd_hda_codec snd_hda_core tegra_xudc at24 lm90 pcie_tegra194 host1x tegra_bpmp_thermal ip_tables x_tables ipv6
[  216.078599] CPU: 3 UID: 0 PID: 14542 Comm: rtcwake Tainted: G        W          6.12.13-rc1-g9ca4cdc5e984 #1
[  216.088830] Tainted: [W]=WARN
[  216.091978] Hardware name: NVIDIA Jetson AGX Xavier Developer Kit (DT)
[  216.098287] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  216.105628] pc : simple_pm_bus_runtime_suspend+0x14/0x48
[  216.110883] lr : pm_generic_runtime_suspend+0x2c/0x44
[  216.116132] sp : ffff80009180baf0
[  216.119545] x29: ffff80009180baf0 x28: ffff0000873f9140 x27: 0000000000000000
[  216.127152] x26: ffff800082b339b8 x25: ffff800082d09000 x24: ffff800080931f4c
[  216.134245] x23: 0000000000000000 x22: 0000000000000002 x21: ffff800082d09000
[  216.141596] x20: ffff80008092d498 x19: ffff0000808ec410 x18: ffffffffffff4a00
[  216.149116] x17: 2033303a35353a36 x16: 312031312d39302d x15: 000048df7f6eda30
[  216.156378] x14: ffff0000873f91c0 x13: 0000000000000001 x12: 0000000000000001
[  216.163552] x11: 000000320f13ac60 x10: 0000000000000a90 x9 : ffff80009180b8f0
[  216.170645] x8 : ffff0000873f9c30 x7 : ffff0003fde5ca80 x6 : 0000000000000000
[  216.177991] x5 : 0000000000000000 x4 : ffff800081f78680 x3 : ffff0000808ec410
[  216.184908] x2 : ffff8000805bd4ec x1 : 0000000000000000 x0 : 0000000000000000
[  216.192169] Call trace:
[  216.194619]  simple_pm_bus_runtime_suspend+0x14/0x48
[  216.199613]  pm_generic_runtime_suspend+0x2c/0x44
[  216.204159]  pm_runtime_force_suspend+0x54/0x14c
[  216.208966]  device_suspend_noirq+0x6c/0x278
[  216.213169]  dpm_suspend_noirq+0xc0/0x198
[  216.217452]  suspend_devices_and_enter+0x210/0x4c0
[  216.222265]  pm_suspend+0x164/0x1c8
[  216.225682]  state_store+0x8c/0xfc
[  216.229181]  kobj_attr_store+0x18/0x2c
[  216.233116]  sysfs_kf_write+0x44/0x54
[  216.236616]  kernfs_fop_write_iter+0x118/0x1a8
[  216.240824]  vfs_write+0x2b0/0x35c
[  216.244062]  ksys_write+0x68/0xf4
[  216.247727]  __arm64_sys_write+0x1c/0x28
[  216.251236]  invoke_syscall+0x48/0x110
[  216.255428]  el0_svc_common.constprop.0+0x40/0xe8
[  216.259981]  do_el0_svc+0x20/0x2c
[  216.263215]  el0_svc+0x30/0xd0
[  216.266109]  el0t_64_sync_handler+0x13c/0x158
[  216.270572]  el0t_64_sync+0x190/0x194
[  216.274252] Code: a9be7bfd 910003fd a90153f3 f9403c00 (f9400014)
[  216.280303] ---[ end trace 0000000000000000 ]---

Thanks
Jon

-- 
nvpublic


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ