I've manually re-run the tests on 5.4.0-18-generic on modoc several
times and can't trip this issue. Is it possible to re-run all tests
again to see if it fails when run from the test infrastructure?

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1856900

Title:
  stress-ng sysinfo stressor fails on ppc64el with linux 5.4.0-9.12

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  During autopkgtest testing the sysinfo stressor failed, causing the
  kernel to oops.

  16:20:34 DEBUG| [stdout] sysinfo STARTING
  16:20:39 DEBUG| [stdout] sysinfo RETURNED 0
  16:20:39 DEBUG| [stdout] sysinfo FAILED (kernel oopsed)
  16:20:39 DEBUG| [stdout] [ 6521.203448] kernel tried to execute 
exec-protected page (c0000000c25ffce0) - exploit attempt? (uid: 0)
  16:20:39 DEBUG| [stdout] [ 6521.207260] BUG: Unable to handle kernel 
instruction fetch
  16:20:39 DEBUG| [stdout] [ 6521.207307] Faulting instruction address: 
0xc0000000c25ffce0
  16:20:39 DEBUG| [stdout] [ 6521.207367] Oops: Kernel access of bad area, sig: 
11 [#1]
  16:20:39 DEBUG| [stdout] [ 6521.207416] LE PAGE_SIZE=64K MMU=Hash SMP 
NR_CPUS=2048 NUMA pSeries
  16:20:39 DEBUG| [stdout] [ 6521.207481] Modules linked in: unix_diag sctp 
vhost_vsock vmw_vsock_virtio_transport_common vsock zfs(PO) zunicode(PO) 
zavl(PO) icp(PO) zlua(PO) userio zcommon(PO) znvpair(PO) cuse spl(O) kvm_pr kvm 
snd_seq snd_seq_device snd_timer snd soundcore hci_vhci bluetooth ecdh_generic 
ecc uhid hid vhost_net vhost tap atm algif_rng aegis128 algif_aead anubis 
fcrypt khazad seed sm4_generic tea crc32_generic md4 michael_mic nhpoly1305 
poly1305_generic rmd128 rmd160 rmd256 rmd320 sha3_generic sm3_generic 
streebog_generic tgr192 wp512 xxhash_generic blowfish_generic blowfish_common 
cast5_generic des_generic libdes salsa20_generic chacha_generic 
camellia_generic cast6_generic cast_common serpent_generic twofish_generic 
twofish_common algif_skcipher aufs sch_etf sch_fq dccp_ipv6 dccp_ipv4 dccp 
ip6table_nat ip6_tables iptable_nat xt_nat nf_nat nf_conntrack nf_defrag_ipv6 
nf_defrag_ipv4 algif_hash af_alg ip_vti ip6_vti fou6 sit ipip tunnel4 fou 
geneve act_mirred cls_basic esp6 authenc echainiv
  16:20:39 DEBUG| [stdout] [ 6521.208045]  iptable_filter xt_policy veth 
esp4_offload esp4 xfrm_user xfrm_algo macsec vxlan ip6_udp_tunnel udp_tunnel 
vrf 8021q garp mrp bridge stp llc ip6_gre ip6_tunnel tunnel6 ip_gre ip_tunnel 
gre cls_u32 sch_htb dummy tls binfmt_misc af_packet_diag tcp_diag udp_diag 
raw_diag inet_diag iptable_mangle xt_TCPMSS xt_tcpudp bpfilter dm_multipath 
scsi_dh_rdac scsi_dh_emc scsi_dh_alua vmx_crypto crct10dif_vpmsum sch_fq_codel 
ip_tables x_tables autofs4 btrfs xor zstd_compress raid6_pq libcrc32c 
crc32c_vpmsum virtio_blk virtio_net net_failover failover [last unloaded: 
trace_printk]
  16:20:39 DEBUG| [stdout] [ 6521.209360] CPU: 1 PID: 2647099 Comm: fuse_mnt 
Tainted: P           OE     5.4.0-9-generic #12-Ubuntu
  16:20:39 DEBUG| [stdout] [ 6521.209457] NIP:  c0000000c25ffce0 LR: 
c00000000063f058 CTR: c0000000c25ffce0
  16:20:39 DEBUG| [stdout] [ 6521.209528] REGS: c000000109703810 TRAP: 0400   
Tainted: P           OE      (5.4.0-9-generic)
  16:20:39 DEBUG| [stdout] [ 6521.209608] MSR:  8000000010009033 
<SF,EE,ME,IR,DR,RI,LE>  CR: 88002440  XER: 20000000
  16:20:39 DEBUG| [stdout] [ 6521.209681] CFAR: c00000000063f054 IRQMASK: 0 
  16:20:39 DEBUG| [stdout]                GPR00: c00000000063f034 
c000000109703aa0 c000000001a4bb00 c00000007cef3000 
  16:20:39 DEBUG| [stdout]                GPR04: c0000000c25ffc18 
0000000000000000 0000000000000000 0000000000000000 
  16:20:39 DEBUG| [stdout]                GPR08: 0000000000000000 
0000000000000000 0000000000000000 0000000000000000 
  16:20:39 DEBUG| [stdout]                GPR12: c0000000c25ffce0 
c00000003fffee00 000079b6987b4410 0000000000000000 
  16:20:39 DEBUG| [stdout]                GPR16: 000079b698b30000 
000079b6987b0320 000079b69771f240 000079b6987b4420 
  16:20:39 DEBUG| [stdout]                GPR20: 0000000000000000 
0000000000000000 000079b6880010a0 000079b698a4d3a0 
  16:20:39 DEBUG| [stdout]                GPR24: c000000109d56cc0 
c0000001fde0cd8c c0000000c25ffce0 c000000109d56ca0 
  16:20:39 DEBUG| [stdout]                GPR28: c000000109d56cc0 
0000000000000000 c00000007cef3000 c000000109d56c90 
  16:20:39 DEBUG| [stdout] [ 6521.210276] NIP [c0000000c25ffce0] 
0xc0000000c25ffce0
  16:20:39 DEBUG| [stdout] [ 6521.210355] LR [c00000000063f058] 
fuse_request_end+0x128/0x2f0
  16:20:39 DEBUG| [stdout] [ 6521.210423] Call Trace:
  16:20:39 DEBUG| [stdout] [ 6521.210448] [c000000109703aa0] [c00000000063f034] 
fuse_request_end+0x104/0x2f0 (unreliable)
  16:20:39 DEBUG| [stdout] [ 6521.210520] [c000000109703af0] [c000000000642ebc] 
fuse_dev_do_write+0x2cc/0x5c0
  16:20:39 DEBUG| [stdout] [ 6521.210591] [c000000109703b70] [c000000000643654] 
fuse_dev_write+0x74/0xd0
  16:20:39 DEBUG| [stdout] [ 6521.210660] [c000000109703c00] [c0000000004707c0] 
do_iter_readv_writev+0x240/0x290
  16:20:39 DEBUG| [stdout] [ 6521.210735] [c000000109703c70] [c0000000004730d8] 
do_iter_write+0xc8/0x280
  16:20:39 DEBUG| [stdout] [ 6521.210794] [c000000109703cc0] [c0000000004733a0] 
vfs_writev+0xe0/0x180
  16:20:39 DEBUG| [stdout] [ 6521.210854] [c000000109703dc0] [c0000000004734dc] 
do_writev+0x9c/0x1a0
  16:20:39 DEBUG| [stdout] [ 6521.210915] [c000000109703e20] [c00000000000b278] 
system_call+0x5c/0x68
  16:20:39 DEBUG| [stdout] [ 6521.210973] Instruction dump:
  16:20:39 DEBUG| [stdout] [ 6521.211018] XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX 
XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX 
  16:20:39 DEBUG| [stdout] [ 6521.211089] XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX 
XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX 
  16:20:39 DEBUG| [stdout] [ 6521.211168] ---[ end trace 141e6d1cc5d48ea2 ]---

  Full testing log:

  
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac
  /autopkgtest-focal/focal/ppc64el/l/linux/20191218_163756_0e1f6@/log.gz

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1856900/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to