1
Unable to handle kernel paging request at virtual address ffffffc07cbd45b1
Mem abort info:
ESR = 0x0000000096000007
EC = 0x25: DABT (current EL), IL = 32 bits
SET = 0, FnV = 0
EA = 0, S1PTW = 0
FSC = 0x07: level 3 translation fault
Data abort info:
ISV = 0, ISS = 0x00000007, ISS2 = 0x00000000
CM = 0, WnR = 0, TnD = 0, TagAccess = 0
GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
swapper pgtable: 4k pages, 39-bit VAs, pgdp=00000000432a0000
[ffffffc07cbd45b1] pgd=1000000106104003, p4d=1000000106104003, pud=1000000106104003, pmd=10000001078c1003, pte=0000000000000000
Internal error: Oops: 0000000096000007 [#1] PREEMPT SMP
Modules linked in: pptp(E) l2tp_ppp(E) r8153_ecm(E) cdc_ncm(E) hci_uart(E) btusb(E) pppox(E) bsd_comp(E) ppp_mppe(E) ppp_deflate(E) cdc_eem(E) ax88179_178a(E) aqc111(E) asix(E) cdc_ether(E) btqca(E) hidp(E) btsdio(E) btbcm(E) btintel(E) rfcomm(E) btrtl(E) clk_test(E) ptp(E) tipc_diag(E) ieee802154_socket(E) ieee802154_6lowpan(E) mac802154(E) nhc_hop(E) nhc_udp(E) nhc_routing(E) nhc_fragment(E) nhc_ipv6(E) nhc_dest(E) nhc_mobility(E) ppp_generic(E) regmap_kunit(E) usbnet(E) r8152(E) bluetooth(E) ftdi_sio(E) vcan(E) slcan(E) zram(E) can_bcm(E) can_raw(E) can_gw(E) soc_utils_test platform_test(E) clk_gate_test(E) dev_addr_lists_test(E) kunit_example_test(E) input_test(E) kunit_test(E) time_test(E) hid_uclogic_test(E) lib_test(E) iio_test_format(E) soc_topology_test of_kunit_helpers(E) ext4_inode_test fat_test clk_kunit_helpers(E) cdc_acm(E) vcpu_stall_detector(E) wwan(E) kheaders(E) gnss(E) rtl8150(E) 8021q(E) pps_core(E) libarc4(E) virtio_balloon(E) usbmon(E) pwrseq_core(E) tipc(E) cctrng(E) macsec(E)
ieee802154(E) vmw_vsock_virtio_transport(E) 6lowpan(E) tls(E) l2tp_core(E) slhc(E) gzvm(E) regmap_ram(E) mii(E) rfkill(E) usbserial(E) regmap_raw_ram(E) can_dev(E) zsmalloc(E) can(E) open_dice(E) kunit(E) [last unloaded: nfc(E)]
CPU: 3 UID: 0 PID: 53 Comm: kworker/3:1 Tainted: G E 6.12.18-android16-1-maybe-dirty-4k #1 d3e6fbf0856859f03ae6ca68e3996e4092ab8d53
Tainted: [E]=UNSIGNED_MODULE
Hardware name: linux,dummy-virt (DT)
Workqueue: events 0xffffffc07cbb9c90
pstate: 80000005 (Nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : __pi_strlen+0x14/0x150 proc/self/cwd/common/arch/arm64/lib/strlen.S:87
lr : _Z16__fortify_strlenPKcU25pass_dynamic_object_size1 proc/self/cwd/common/include/linux/fortify-string.h:268 [inline]
lr : trace_event_get_offsets_lock_acquire proc/self/cwd/common/include/trace/events/lock.h:24 [inline]
lr : perf_trace_lock_acquire+0x88/0x224 proc/self/cwd/common/include/trace/events/lock.h:24
sp : ffffffc084a0bb90
x29: ffffffc084a0bbb0 x28: ffffff80c0b3e244 x27: ffffffc08024e680
x26: ffffffc08024e288 x25: ffffffc084a0bd50 x24: ffffffc07cbd45b1
x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000001
x20: ffffffc084a0bd50 x19: ffffffc08327faa0 x18: ffffffc0845c5030
x17: 00000000feb0a33a x16: 00000000feb0a33a x15: 00000000ffffffff
x14: 00000000000000c4 x13: 0000000000000000 x12: ffffffffffffffff
x11: 0000000100000001 x10: 000000000000022f x9 : ffffffc08292f6f8
x8 : 0101010101010101 x7 : ffffffc0801d7544 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 00000000000005b1 x3 : 0000000000000000
x2 : 0000000000000000 x1 : ffffffc084a0bd50 x0 : ffffffc07cbd45b1
Call trace:
__pi_strlen+0x14/0x150 proc/self/cwd/common/arch/arm64/lib/strlen.S:86
__traceiter_lock_acquire+0xac/0xf0 proc/self/cwd/common/include/trace/events/lock.h:24
trace_lock_acquire proc/self/cwd/common/include/trace/events/lock.h:24 [inline]
lock_acquire+0x260/0x280 proc/self/cwd/common/kernel/locking/lockdep.c:5796
process_one_work+0x474/0xd04 proc/self/cwd/common/kernel/workqueue.c:3213
process_scheduled_works proc/self/cwd/common/kernel/workqueue.c:3318 [inline]
worker_thread+0x78c/0xa78 proc/self/cwd/common/kernel/workqueue.c:3399
kthread+0x228/0x25c proc/self/cwd/common/kernel/kthread.c:389
ret_from_fork+0x10/0x20 proc/self/cwd/common/arch/arm64/kernel/entry.S:860
Code: 92402c04 b200c3e8 f13fc09f 5400088c (a9400c02)
---[ end trace 0000000000000000 ]---
----------------
Code disassembly (best guess):
0: 92402c04 and x4, x0, #0xfff
4: b200c3e8 mov x8, #0x101010101010101 // #72340172838076673
8: f13fc09f cmp x4, #0xff0
c: 5400088c b.gt 0x11c
* 10: a9400c02 ldp x2, x3, [x0] <-- trapping instruction
For immediate assistance, please email our customer support: [email protected]