https://bugzilla.kernel.org/show_bug.cgi?id=219826 Bug ID: 219826 Summary: Oops introduced after 6.1.51 between network / usb Product: Drivers Version: 2.5 Hardware: All OS: Linux Status: NEW Severity: normal Priority: P3 Component: USB Assignee: drivers_usb@xxxxxxxxxxxxxxxxxxxxxx Reporter: nick.hawkins@xxxxxxx Regression: No We use linux/drivers/usb/dwc3 (There is one change we did in this driver to enable the sysfs entry for the role switch control from userspace) for the Synopsys designware host controller which operates in dual role mode. When we connect a USB device (mass storage) to the port, host controller operates as USB host and we mount the mass storage and transfer files, unmounts. Then we are connecting the laptop to the port, then the host controller is working in the device mode and we are configuring the gadgetfs for NCM using the UDC provided by the DWC3 driver,when we remote the laptop connection , we are just writing "" to the UDC file in the gadgetfs (ie: Not removing the files /directories from gadgetfs) Again when we connect mass storage to the port, we switching the host controller role to host mode (The gadgetfs directories and files are still present but the UDC is not connected) Once we repeat the above steps multiple times we are getting the oops. Note : The issue not observed on kernel 6.1.51. Issue not observed on 6.1.119 if we remove the gadgetfs directory completely before the host controller role switch to host mode. [ 172.170751] Unable to handle kernel paging request at virtual address 00003130302f3130 [ 172.179550] Mem abort info: [ 172.182618] ESR = 0x0000000096000004 [ 172.186741] EC = 0x25: DABT (current EL), IL = 32 bits [ 172.192590] SET = 0, FnV = 0 [ 172.195954] EA = 0, S1PTW = 0 [ 172.199406] FSC = 0x04: level 0 translation fault [ 172.204772] Data abort info: [ 172.207938] ISV = 0, ISS = 0x00000004 [ 172.212152] CM = 0, WnR = 0 [ 172.215404] [00003130302f3130] address between user and kernel address ranges [ 172.223248] Internal error: Oops: 0000000096000004 [#1] SMP [ 172.229369] CPU: 0 PID: 506 Comm: usb_srv_task Not tainted 6.1.119-yocto-standard #1 [ 172.237875] Hardware name: GXP (DT) [ 172.241698] pstate: 80000005 (Nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 172.249344] pc : __pi_strlen+0x14/0x150 [ 172.253559] lr : rtnl_fill_ifinfo+0xee8/0x114c [ 172.258440] sp : ffffffc0094eb670 [ 172.262072] x29: ffffffc0094eb700 x28: ffffff8006ce0000 x27: 0000000000002c68 [ 172.269917] x26: ffffff8006ce0000 x25: 0000000000002f8c x24: ffffff8006ce0000 [ 172.277759] x23: ffffff8006ce2f8c x22: ffffff8006ce2a0c x21: 44003130302f3130 [ 172.285601] x20: ffffff800642f000 x19: ffffff8009895d00 x18: 00000000000000d0 [ 172.293443] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 [ 172.301284] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000 [ 172.309126] x11: 0000000000000000 x10: 0000000000000001 x9 : 0000000000000000 [ 172.316967] x8 : 0101010101010101 x7 : 0000000000000000 x6 : 0000000000003ec0 [ 172.324809] x5 : ffffff8006ce2f90 x4 : 0000000000000130 x3 : ffffff8006ce0000 [ 172.332652] x2 : 0000000000001ec0 x1 : 0000000000002f8c x0 : 44003130302f3130 [ 172.340493] Call trace: [ 172.343170] __pi_strlen+0x14/0x150 [ 172.346998] rtnl_dump_ifinfo+0x2c4/0x6b0 [ 172.351402] netlink_dump+0x114/0x374 [ 172.355423] netlink_recvmsg+0x1dc/0x360 [ 172.359730] ____sys_recvmsg+0x94/0x1a0 [ 172.363939] ___sys_recvmsg+0x94/0xe0 [ 172.367958] __sys_recvmsg+0x74/0xcc [ 172.371881] __arm64_sys_recvmsg+0x24/0x30 [ 172.376379] invoke_syscall.constprop.0+0x50/0xf0 [ 172.381544] do_el0_svc+0x50/0x150 [ 172.385276] el0_svc+0x28/0x9c [ 172.388626] el0t_64_sync_handler+0x114/0x120 [ 172.393409] el0t_64_sync+0x18c/0x190 [ 172.397431] Code: 92402c04 b200c3e8 f13fc09f 5400088c (a9400c02) [ 172.404121] ---[ end trace 0000000000000000 ]--- -- You may reply to this email to add a comment. You are receiving this mail because: You are watching the assignee of the bug.