Focal passes autotest stress-ng tests:

14:06:30 INFO | Summary:
14:06:30 INFO |   Stressors run: 191
14:06:30 INFO |   Skipped: 1,  binderfs
14:06:30 INFO |   Failed:  0, 
14:06:30 INFO |   Oopsed:  0, 
14:06:30 INFO |   Oomed:   0, 
14:06:30 INFO |   Passed:  190,  access af-alg affinity aio aiol bad-altstack 
bigheap branch brk cache cap chattr chdir chmod chown chroot clock close 
context cpu crypt cyclic daemon dccp dentry dev dev-shm dir dirdeep dnotify dup 
dynlib enosys env epoll eventfd fallocate fanotify fault fcntl fiemap fifo 
file-ioctl filename flock fork fp-error fstat full funcret futex get getdent 
getrandom handle hdd hrtimers icache icmp-flood inode-flags inotify io iomix 
ioprio ipsec-mb itimer judy key kill klog lease link locka lockbus lockf 
lockofd loop madvise malloc mcontend membarrier memfd memhotplug memrate 
memthrash mergesort mincore mknod mlock mmap mmapaddr mmapfixed mmapfork 
mmapmany mq mremap msg msync netdev netlink-proc netlink-task nice null open 
personality physpage pidfd pipe pipeherd pkey poll prctl procfs pthread ptrace 
pty radixsort ramfs rawdev rawsock readahead reboot rename revio rlimit rmap 
rtc schedpolicy sctp seal seccomp seek sem sem-sysv sendfile set shellsort shm 
shm-sysv sigfd sigfpe sigio sigpending sigpipe sigq sigrt sigsegv sigsuspend 
skiplist sleep sock sockabuse sockdiag sockmany softlockup splice stackmmap 
stream swap switch symlink sync-file sysbadaddr sysfs tee timer timerfd 
tlb-shootdown tmpfs tree tsearch tun udp udp-flood unshare urandom userfaultfd 
utime vdso vfork vm vm-addr vm-rw vm-segv vm-splice wait x86syscall yield zero 
zombie
14:06:30 INFO |   Badret:  0, 
14:06:30 INFO |  
14:06:30 INFO | Tests took 972 seconds to run

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1866772

Title:
  Sys oopsed with sysfs test in ubuntu_stress_smoke_test on X-hwe ARM64

Status in Stress-ng:
  New
Status in ubuntu-kernel-tests:
  In Progress
Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Bionic:
  Fix Committed
Status in linux source package in Eoan:
  Fix Committed
Status in linux source package in Focal:
  Fix Released

Bug description:
  == SRU Request [ BIONIC, EOAN, FOCAL ] ==

  Reading /sys/firmware/acpi/tables/data/BERT as root at at odd byte
  offset will cause an oops.  This is because the source address is I/O
  mapped and this needs to be read with an I/O memcpy rather than an
  memcpy.

  == Fix ==

  The fix is upstream (linux-next) commit that will land in 5.7, the
  backport to bionic, eoan and focal is just a minor context wiggle.

  commit 08c07cefb3042a55bc9f8243814b504d5eff93f3
  Author: Colin Ian King <[email protected]>
  Date:   Thu Mar 12 11:13:45 2020 +0000

      ACPI: sysfs: copy ACPI data using io memory copying

  == Test ==

  Running on hotdog with the reproducer below (run as root):

  #include <sys/types.h>
  #include <sys/stat.h>
  #include <fcntl.h>
  #include <unistd.h>
  #include <errno.h>
  #include <stdio.h>
  #include <string.h>

  int main(void)
  {
          int fd;
          char buffer[3];
          ssize_t n;

          fd = open("/sys/firmware/acpi/tables/data/BERT", O_RDONLY);
          if (fd < 0) {
                  fprintf(stderr, "open failed: %d (%s)\n", errno, 
strerror(errno));
                  return -1;
          }
          do {
                  n = read(fd, buffer, sizeof(buffer));
          } while (n > 0);

          return 0;
  }

  Without the fix it will oops. With the fix it works OK.

  == Regession Potential ==

  This only affects the reading of the ACPI BERT table from /sys as root
  so it is limited in scope to just a very narrow use case. Normally the
  BERT table is just handled by the kernel, so access to this table is
  just for debugging purposes.

  -----------------------

  Issue found on new ARM64 node "hotdog" 4.15.0-91.92~16.04.1
  Failed 2 of 2 attempts.

  Test suite HEAD SHA1: 3f43e81

   sysfs STARTING
   sysfs RETURNED 0
   sysfs FAILED (kernel oopsed)
   [ 1075.760640] Unable to handle kernel paging request at virtual address 
ffff00004a70072a
   [ 1075.763319] Unable to handle kernel paging request at virtual address 
ffff00004a70e4ba
   [ 1075.768563] Mem abort info:
   [ 1075.768566]   ESR = 0x96000021
   [ 1075.768568]   Exception class = DABT (current EL), IL = 32 bits
   [ 1075.768569]   SET = 0, FnV = 0
   [ 1075.768570]   EA = 0, S1PTW = 0
   [ 1075.768571] Data abort info:
   [ 1075.768577]   ISV = 0, ISS = 0x00000021
   [ 1075.776489] Mem abort info:
   [ 1075.776491]   ESR = 0x96000021
   [ 1075.776493]   Exception class = DABT (current EL), IL = 32 bits
   [ 1075.776494]   SET = 0, FnV = 0
   [ 1075.776495]   EA = 0, S1PTW = 0
   [ 1075.776496] Data abort info:
   [ 1075.776500]   ISV = 0, ISS = 0x00000021
   [ 1075.779284]   CM = 0, WnR = 0
   [ 1075.779288] swapper pgtable: 4k pages, 48-bit VAs, pgd = 00000000facfed4f
   [ 1075.779290] [ffff00004a70072a] *pgd=000000bffcffe003, 
*pud=0000009f6122c003, *pmd=000000bf5adf4003, *pte=0068000080280703
   [ 1075.782342]   CM = 0, WnR = 0
   [ 1075.782346] swapper pgtable: 4k pages, 48-bit VAs, pgd = 00000000facfed4f
   [ 1075.782352] [ffff00004a70e4ba] *pgd=000000bffcffe003, 
*pud=0000009f6122c003, *pmd=000000bf5adf4003, *pte=006800008028e703
   [ 1075.788262] Internal error: Oops: 96000021 [#2] SMP
   [ 1075.788269] Modules linked in: unix_diag binfmt_misc snd_seq 
snd_seq_device snd_timer snd soundcore userio vfio_iommu_type1 vfio hci_vhci 
bluetooth ecdh_generic uhid cuse vhost_vsock vmw_vsock_virtio_transport_common 
vhost_net vhost vsock tap dccp_ipv4 dccp ipx p8023 atm psnap p8022 llc 
algif_rng algif_aead anubis fcrypt khazad seed tea md4 michael_mic 
poly1305_generic rmd128 rmd160 rmd256 rmd320 sha3_generic sm3_generic tgr192 
wp512 algif_hash chacha20_neon chacha20_generic blowfish_generic 
blowfish_common cast5_generic des_generic salsa20_generic camellia_generic 
cast6_generic cast_common serpent_generic twofish_generic twofish_common 
algif_skcipher af_alg nls_iso8859_1 ipmi_ssif ipmi_devintf joydev input_leds 
ipmi_msghandler shpchp i2c_xlp9xx(+) thunderx2_pmu ib_iser rdma_cm iw_cm ib_cm 
ib_core
   [ 1075.942470]  iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi autofs4 
btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq 
async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear 
hid_generic usbhid hid uas usb_storage aes_ce_blk aes_ce_cipher crc32_ce qede 
ast i2c_algo_bit crct10dif_ce ptp ghash_ce ttm drm_kms_helper sha2_ce pps_core 
syscopyarea sysfillrect sysimgblt fb_sys_fops sha256_arm64 sha1_ce mpt3sas qed 
drm raid_class scsi_transport_sas ahci libahci gpio_xlp aes_neon_bs 
aes_neon_blk crypto_simd cryptd aes_arm64
   [ 1075.991997] Process stress-ng-sysfs (pid: 108395, stack limit = 
0x000000009cb607b8)
   [ 1075.999643] CPU: 100 PID: 108395 Comm: stress-ng-sysfs Tainted: G      D  
        4.15.0-91-generic #92~16.04.1-Ubuntu
   [ 1076.010324] Hardware name: To be filled by O.E.M. Saber/Saber, BIOS 
0ACKL027 07/01/2019
   [ 1076.018314] pstate: 80400009 (Nzcv daif +PAN -UAO)
   [ 1076.023096] pc : __memcpy+0x84/0x180
   [ 1076.026663] lr : memory_read_from_buffer+0x64/0x88
   [ 1076.031441] sp : ffff00003ea2bd10
   [ 1076.034743] x29: ffff00003ea2bd10 x28: ffff80be4d85cb00
   [ 1076.040042] x27: ffff000008b42000 x26: 000000000000003f
   [ 1076.045342] x25: 0000000000000124 x24: ffff00004a700000
   [ 1076.050643] x23: ffff809e3a7e8500 x22: 000000000000000a
   [ 1076.055942] x21: ffff00003ea2bd88 x20: 000000000000000a
   [ 1076.061240] x19: 0000000000000734 x18: 0000000000000014
   [ 1076.066540] x17: 0000ffffaf4e1a58 x16: ffff0000082e8e28
   [ 1076.071839] x15: 00002d88734750e0 x14: 00181a0596c27059
   [ 1076.077138] x13: 00000003e8000000 x12: 0000000000000018
   [ 1076.082436] x11: 000000000006372e x10: 000000005e66c174
   [ 1076.087735] x9 : 003b9aca00000000 x8 : 000000000000003f
   [ 1076.093034] x7 : ffff000008645490 x6 : ffff809e3a7e8500
   [ 1076.098333] x5 : 000000000000000a x4 : 0000000000010000
   [ 1076.103633] x3 : ffff00004a700000 x2 : 000000000000000a
   [ 1076.108932] x1 : ffff00004a70072a x0 : ffff809e3a7e8500
   [ 1076.114231] Call trace:
   [ 1076.116668]  __memcpy+0x84/0x180
   [ 1076.119887]  acpi_data_show+0x54/0x80
   [ 1076.123541]  sysfs_kf_bin_read+0x6c/0xa8
   [ 1076.127451]  kernfs_fop_read+0xa4/0x1e0
   [ 1076.131274]  __vfs_read+0x48/0x90
   [ 1076.134577]  vfs_read+0x94/0x150
   [ 1076.137792]  SyS_read+0x74/0xf0
   [ 1076.140923]  el0_svc_naked+0x30/0x34
   [ 1076.144487] Code: a88120c7 a8c12027 a88120c7 36180062 (f8408423)
   [ 1076.150570] ---[ end trace 496ae41e9716bef2 ]---
   [ 1076.155180] Internal error: Oops: 96000021 [#3] SMP
   [ 1076.160054] Modules linked in: unix_diag binfmt_misc snd_seq 
snd_seq_device snd_timer snd soundcore userio vfio_iommu_type1 vfio hci_vhci 
bluetooth ecdh_generic uhid cuse vhost_vsock vmw_vsock_virtio_transport_common 
vhost_net vhost vsock tap dccp_ipv4 dccp ipx p8023 atm psnap p8022 llc 
algif_rng algif_aead anubis fcrypt khazad seed tea md4 michael_mic 
poly1305_generic rmd128 rmd160 rmd256 rmd320 sha3_generic sm3_generic tgr192 
wp512 algif_hash chacha20_neon chacha20_generic blowfish_generic 
blowfish_common cast5_generic des_generic salsa20_generic camellia_generic 
cast6_generic cast_common serpent_generic twofish_generic twofish_common 
algif_skcipher af_alg nls_iso8859_1 ipmi_ssif ipmi_devintf joydev input_leds 
ipmi_msghandler shpchp i2c_xlp9xx(+) thunderx2_pmu ib_iser rdma_cm iw_cm ib_cm 
ib_core
   [ 1076.230688]  iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi autofs4 
btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq 
async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear 
hid_generic usbhid hid uas usb_storage aes_ce_blk aes_ce_cipher crc32_ce qede 
ast i2c_algo_bit crct10dif_ce ptp ghash_ce ttm drm_kms_helper sha2_ce pps_core 
syscopyarea sysfillrect sysimgblt fb_sys_fops sha256_arm64 sha1_ce mpt3sas qed 
drm raid_class scsi_transport_sas ahci libahci gpio_xlp aes_neon_bs 
aes_neon_blk crypto_simd cryptd aes_arm64
   [ 1076.280211] Process stress-ng-sysfs (pid: 108405, stack limit = 
0x00000000081889d7)
   [ 1076.287856] CPU: 155 PID: 108405 Comm: stress-ng-sysfs Tainted: G      D  
        4.15.0-91-generic #92~16.04.1-Ubuntu
   [ 1076.298538] Hardware name: To be filled by O.E.M. Saber/Saber, BIOS 
0ACKL027 07/01/2019
   [ 1076.306530] pstate: 80400009 (Nzcv daif +PAN -UAO)
   [ 1076.311319] pc : __memcpy+0x84/0x180
   [ 1076.314890] lr : memory_read_from_buffer+0x64/0x88
   [ 1076.319667] sp : ffff00003eea3d10
   [ 1076.322969] x29: ffff00003eea3d10 x28: ffff80be4d858000
   [ 1076.328269] x27: ffff000008b42000 x26: 000000000000003f
   [ 1076.333568] x25: 0000000000000124 x24: ffff00004a700000
   [ 1076.338868] x23: ffff80bec6fa7400 x22: 000000000000000d
   [ 1076.344167] x21: ffff00003eea3d88 x20: 000000000000000d
   [ 1076.349467] x19: 000000000000e4c7 x18: 0000000000000014
   [ 1076.354767] x17: 0000ffffaf4e1a58 x16: ffff0000082e8e28
   [ 1076.360068] x15: 0000566c10765956 x14: 00181a0596c27059
   [ 1076.365368] x13: 00000003e8000000 x12: 0000000000000018
   [ 1076.370667] x11: 00000000000641a6 x10: 000000005e66c174
   [ 1076.375966] x9 : 003b9aca00000000 x8 : 000000000000003f
   [ 1076.381265] x7 : ffff000008645490 x6 : ffff80bec6fa7400
   [ 1076.386564] x5 : 000000000000000d x4 : 0000000000010000
   [ 1076.391864] x3 : ffff00004a700000 x2 : 000000000000000d
   [ 1076.397163] x1 : ffff00004a70e4ba x0 : ffff80bec6fa7400
   [ 1076.402463] Call trace:
   [ 1076.404901]  __memcpy+0x84/0x180
   [ 1076.408125]  acpi_data_show+0x54/0x80
   [ 1076.411785]  sysfs_kf_bin_read+0x6c/0xa8
   [ 1076.415696]  kernfs_fop_read+0xa4/0x1e0
   [ 1076.419520]  __vfs_read+0x48/0x90
   [ 1076.422823]  vfs_read+0x94/0x150
   [ 1076.426038]  SyS_read+0x74/0xf0
   [ 1076.429171]  el0_svc_naked+0x30/0x34
   [ 1076.432736] Code: a88120c7 a8c12027 a88120c7 36180062 (f8408423)
   [ 1076.438818] ---[ end trace 496ae41e9716bef3 ]---

To manage notifications about this bug go to:
https://bugs.launchpad.net/stress-ng/+bug/1866772/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to