[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#993091: linux: kernel oops on Olimex A20-OLinuXino-LIME2, Allwinner sun7i (A20)



Source: linux
Version: 5.10.46-4
Severity: normal
X-Debbugs-Cc: andi@debian.org

Dear Maintainer, hi all,

after upgrading a A20-OLinuXino-LIME2 board to bullseye, I had problems with the 
network interface which could be solved by preparing a tweaked u-boot (c.f. [1]).
However, a few hours later, a kernel oops happended and the board could not be 
reached from the LAN again:

Aug 27 01:35:13 blackbox kernel: 8<--- cut here -!-
Aug 27 01:35:13 blackbox kernel: Unable to handle kernel paging request at virtual address 800071e0
Aug 27 01:35:13 blackbox kernel: pgd = e54385ff
Aug 27 01:35:13 blackbox kernel: [800071e0] *pgd=437cf003, *pmd=00000000
Aug 27 01:35:13 blackbox kernel: Internal error: Oops: 80000206 [#1] SMP ARM
Aug 27 01:35:13 blackbox kernel: Modules linked in: nft_counter(E) ipt_REJECT(E) xt_set(E) xt_multiport(E) nft_compat(E) ip_set_hash_ip(E) nft_fib_inet(E) nft_fib_ipv4(E) nft_fib_ipv6(E) nft_fib(E) nft_reject_inet(E) nf_reject_ipv4(E) nf_reject_ipv6(E) nft_reject(E) nft_ct(E) nft_chain_nat(E) nf_nat(E) nf_conntrack(E>
Aug 27 01:35:13 blackbox kernel:  libaes(E) xts(E) dm_crypt(E) dm_mod(E) ledtrig_heartbeat(E) sd_mod(E) t10_pi(E) crc_t10dif(E) crct10dif_generic(E) crct10dif_common(E) pinctrl_axp209(E) axp20x_regulator(E) realtek(E) dwmac_sunxi(E) stmmac_platform(E) stmmac(E) pcs_xpcs(E) phylink(E) ptp(E) ahci_sunxi(E) libahci_plat>
Aug 27 01:35:13 blackbox kernel: CPU: 1 PID: 6862 Comm: fw_packets Tainted: G         C  E     5.10.0-8-armmp-lpae #1 Debian 5.10.46-4
Aug 27 01:35:13 blackbox kernel: Hardware name: Allwinner sun7i (A20) Family
Aug 27 01:35:13 blackbox kernel: PC is at 0x800071e0
Aug 27 01:35:13 blackbox kernel: LR is at symbol_string+0xc0/0x104
Aug 27 01:35:13 blackbox kernel: pc : [<800071e0>]    lr : [<c08e3810>]    psr: 600f0093
Aug 27 01:35:13 blackbox kernel: sp : d331dcb0  ip : ffffffff  fp : d331dcf4
Aug 27 01:35:13 blackbox kernel: r10: d331dd14  r9 : c17a7dc0  r8 : c11c9675
Aug 27 01:35:13 blackbox kernel: r7 : d331dd90  r6 : ffffffff  r5 : c17a7dc0  r4 : c17a79ef
Aug 27 01:35:13 blackbox kernel: r3 : 00000000  r2 : 00000000  r1 : 0000000c  r0 : c17a79fb
Aug 27 01:35:13 blackbox kernel: Flags: nZCv  IRQs off  FIQs on  Mode SVC_32  ISA ARM  Segment user
Aug 27 01:35:13 blackbox kernel: Control: 30c5387d  Table: 46bcb5c0  DAC: feff7ef6
Aug 27 01:35:13 blackbox kernel: Process fw_packets (pid: 6862, stack limit = 0xb93a5a89)
Aug 27 01:35:13 blackbox kernel: Stack: (0xd331dcb0 to 0xd331e000)
Aug 27 01:35:13 blackbox kernel: dca0:                                     ffff0a00 c11c9675 00000000 d331dd04
Aug 27 01:35:13 blackbox kernel: dcc0: d331dcf4 d331dcd0 c0483820 c04835c0 c1c14d80 c17a79ef c11c9673 00000002
Aug 27 01:35:13 blackbox kernel: dce0: d331dd90 c11c9675 d331dd4c d331dcf8 c08e79f4 c08e72b8 ffffff05 ffff0a00
Aug 27 01:35:13 blackbox kernel: dd00: c17a9500 c105ac9c 00000400 c17a79c0 d331dd2c ffffff05 ffff0a00 09458db8
Aug 27 01:35:13 blackbox kernel: dd20: c2ad496c 00000400 00000000 c11c9644 d35ce548 d35ce540 d331c000 000000c5
Aug 27 01:35:13 blackbox kernel: dd40: d331dd64 d331dd50 c08e7be0 c08e77cc c17a7990 00000000 d331dd84 d331dd68
Aug 27 01:35:13 blackbox kernel: dd60: c0e156e4 c08e7bd8 d331dd8c 09458db8 00000000 d35ce548 d331dda4 d331dd98
Aug 27 01:35:13 blackbox kernel: dd80: c0e23b84 c0e1562c c11c9644 c07cfa48 09458db8 00000000 d331de94 d331dda8
Aug 27 01:35:13 blackbox kernel: dda0: c07cfa48 c0e23b74 d331ddec d331ddb8 c0501b0c c0c03e38 0b7b90f2 00ffffff
Aug 27 01:35:13 blackbox kernel: ddc0: c0484678 00000000 00000000 c17e576c 00000000 00000000 00000000 00000000
Aug 27 01:35:13 blackbox kernel: dde0: 00000000 00000000 00000000 00000400 00000000 00000000 c18f5550 c70c5880
Aug 27 01:35:13 blackbox kernel: de00: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Aug 27 01:35:13 blackbox kernel: de20: 00000000 c0000000 00000000 00000000 00000000 00000000 00000000 00000000
Aug 27 01:35:13 blackbox kernel: de40: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Aug 27 01:35:13 blackbox kernel: de60: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 d331dee8
Aug 27 01:35:13 blackbox kernel: de80: d35ce548 d35ce540 d331dea4 d331de98 c07d3f78 c07cf878 d331debc d331dea8
Aug 27 01:35:13 blackbox kernel: dea0: c0799650 c07d3f60 beb08418 d35ce540 d331dee4 d331dec0 c06b5128 c0799610
Aug 27 01:35:13 blackbox kernel: dec0: beb08418 b6f042e4 00000000 000000c5 c04002c4 d331c000 d331df94 d331dee8
Aug 27 01:35:13 blackbox kernel: dee0: c06b5208 c06b5100 00400100 c3bc26c0 d331c000 d331dfb0 00000000 00000000
Aug 27 01:35:13 blackbox kernel: df00: d331c000 fffffe30 d331df2c d331df18 c0e266f4 c0e25c94 ffffe000 d331df30
Aug 27 01:35:13 blackbox kernel: df20: d331dfac d331df30 c040d5e0 c0e26694 c0e23ed4 c0e23dcc 5ac3c35a c1605e50
Aug 27 01:35:13 blackbox kernel: df40: c0455894 c0e23ed0 c153b2c0 00000000 d331df84 d331df60 c04c70f4 c045580c
Aug 27 01:35:13 blackbox kernel: df60: c16078e0 d331dfb0 f0802000 c153b2cc f080200c 00000000 d331dfac 09458db8
Aug 27 01:35:13 blackbox kernel: df80: c0401664 beb08610 d331dfa4 d331df98 c06b5370 c06b51e8 00000000 d331dfa8
Aug 27 01:35:13 blackbox kernel: dfa0: c04000c0 c06b5364 beb08610 b6f042e4 00000002 beb08418 beb08418 beb08610
Aug 27 01:35:13 blackbox kernel: dfc0: beb08610 b6f042e4 00000000 000000c5 00000000 00000001 beb08b84 00000001
Aug 27 01:35:13 blackbox kernel: dfe0: 000000c5 beb0840c b6e9bdc7 b6e22c66 200f0030 00000002 00000000 00000000
Aug 27 01:35:13 blackbox kernel: Backtrace: 
Aug 27 01:35:13 blackbox kernel: [<c08e72ac>] (pointer) from [<c08e79f4>] (vsnprintf+0x234/0x40c)
Aug 27 01:35:13 blackbox kernel:  r8:c11c9675 r7:d331dd90 r6:00000002 r5:c11c9673 r4:c17a79ef
Aug 27 01:35:13 blackbox kernel: [<c08e77c0>] (vsnprintf) from [<c08e7be0>] (vscnprintf+0x14/0x2c)
Aug 27 01:35:13 blackbox kernel:  r10:000000c5 r9:d331c000 r8:d35ce540 r7:d35ce548 r6:c11c9644 r5:00000000
Aug 27 01:35:13 blackbox kernel:  r4:00000400
Aug 27 01:35:13 blackbox kernel: [<c08e7bcc>] (vscnprintf) from [<c0e156e4>] (panic+0xc8/0x340)
Aug 27 01:35:13 blackbox kernel:  r5:00000000 r4:c17a7990
Aug 27 01:35:13 blackbox kernel: [<c0e1561c>] (panic) from [<c0e23b84>] (printk_nmi_enter+0x0/0x34)
Aug 27 01:35:13 blackbox kernel:  r3:00000000 r2:09458db8 r1:c07cfa48 r0:c11c9644
Aug 27 01:35:13 blackbox kernel:  r7:d35ce548
Aug 27 01:35:13 blackbox kernel: [<c0e23b68>] (__stack_chk_fail) from [<c07cfa48>] (tomoyo_path_perm+0x1dc/0x1e0)
Aug 27 01:35:13 blackbox kernel: [<c07cf86c>] (tomoyo_path_perm) from [<c07d3f78>] (tomoyo_inode_getattr+0x24/0x28)
Aug 27 01:35:13 blackbox kernel:  r8:d35ce540 r7:d35ce548 r6:d331dee8 r5:00000000 r4:00000000
Aug 27 01:35:13 blackbox kernel: [<c07d3f54>] (tomoyo_inode_getattr) from [<c0799650>] (security_inode_getattr+0x4c/0x68)
Aug 27 01:35:13 blackbox kernel: [<c0799604>] (security_inode_getattr) from [<c06b5128>] (vfs_fstat+0x34/0x7c)
Aug 27 01:35:13 blackbox kernel:  r5:d35ce540 r4:beb08418
Aug 27 01:35:13 blackbox kernel: [<c06b50f4>] (vfs_fstat) from [<c06b5208>] (__do_sys_fstat64+0x2c/0x6c)
Aug 27 01:35:13 blackbox kernel:  r9:d331c000 r8:c04002c4 r7:000000c5 r6:00000000 r5:b6f042e4 r4:beb08418
Aug 27 01:35:13 blackbox kernel: [<c06b51dc>] (__do_sys_fstat64) from [<c06b5370>] (sys_fstat64+0x18/0x1c)
Aug 27 01:35:13 blackbox kernel:  r4:beb08610
Aug 27 01:35:13 blackbox kernel: [<c06b5358>] (sys_fstat64) from [<c04000c0>] (ret_fast_syscall+0x0/0x4c)
Aug 27 01:35:13 blackbox kernel: Exception stack(0xd331dfa8 to 0xd331dff0)
Aug 27 01:35:13 blackbox kernel: dfa0:                   beb08610 b6f042e4 00000002 beb08418 beb08418 beb08610
Aug 27 01:35:13 blackbox kernel: dfc0: beb08610 b6f042e4 00000000 000000c5 00000000 00000001 beb08b84 00000001
Aug 27 01:35:13 blackbox kernel: dfe0: 000000c5 beb0840c b6e9bdc7 b6e22c66
Aug 27 01:35:13 blackbox kernel: Code: bad PC value
Aug 27 01:35:13 blackbox kernel: ---[ end trace 6e13e1a363db19b0 ]---
 
I downgraded to the buster kernel for now which was working reliably for months 
without issues on the same board. 

Many thanks and best regards,

  Andi


[1] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=927397#62


-- System Information:
Debian Release: 11.0
  APT prefers stable-security
  APT policy: (500, 'stable-security'), (500, 'stable')
Architecture: armhf (armv7l)

Kernel: Linux 4.19.0-17-armmp-lpae (SMP w/2 CPU threads)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled


Reply to: