** Changed in: linux (Ubuntu)
     Assignee: (unassigned) => dann frazier (dannf)

** Changed in: linux (Ubuntu Jammy)
     Assignee: (unassigned) => dann frazier (dannf)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1973153

Title:
  kernel oops triggered by read_all_sys in ubuntu_ltp/fs on J-5.15 /
  J-5.17 ARM64 "helo-kernel", "howzit-kernel"

Status in ubuntu-kernel-tests:
  New
Status in linux package in Ubuntu:
  Incomplete
Status in linux source package in Jammy:
  Incomplete

Bug description:
  Issue found on Jammy 5.17.0-8-generic #8~22.04.2-Ubuntu and Jammy
  5.15.0-27-generic with ARM64 node helo-kernel only.

  It looks like this is hardware-specific.

  The read_all_sys test in fs from ubuntu_ltp will cause kernel oops and
  test will timeout.

  Steps to reproduce this:
  git clone -b sru git://git.launchpad.net/~canonical-kernel-team/+git/ltp
  cd ltp
  make autotools
  ./configure
  make
  sudo make install
  echo "read_all_sys read_all -d /sys -q -r 3" > /tmp/fs
  sudo /opt/ltp/runltp -f /tmp/fs

  Test log:
  <<<test_start>>>
  tag=read_all_sys stime=1652343855
  cmdline="read_all -d /sys -q -r 3"
  contacts=""
  analysis=exit
  <<<test_output>>>
  incrementing stop
  tst_test.c:1456: TINFO: Timeout per run is 0h 30m 00s
  Test timeouted, sending SIGKILL!
  tst_test.c:1500: TINFO: Killed the leftover descendant processes
  tst_test.c:1506: TINFO: If you are running on slow machine, try exporting 
LTP_TIMEOUT_MUL > 1
  tst_test.c:1508: TBROK: Test killed! (timeout?)

  Summary:
  passed   0
  failed   0
  broken   1
  skipped  0
  warnings 0
  <<<execution_status>>>
  initiation_status="ok"
  duration=1800 termination_type=exited termination_id=2 corefile=no
  cutime=39 cstime=140
  <<<test_end>>>

  dmesg output:
  [ 1614.203083] LTP: starting read_all_sys (read_all -d /sys -q -r 3)
  [ 1617.509566] mpt3sas 0000:8d:00.0: invalid VPD tag 0x00 (size 0) at offset 
0; assume missing optional EEPROM
  [ 1617.543837] mpt3sas_cm0: host_trace_buffer_size_show: host_trace_buffer is 
not registered
  [ 1617.550373] mpt3sas_cm0: host_trace_buffer_size_show: host_trace_buffer is 
not registered
  [ 1617.550381] mpt3sas_cm0: host_trace_buffer_size_show: host_trace_buffer is 
not registered
  [ 1617.550474] mpt3sas_cm0: host_trace_buffer_show: host_trace_buffer is not 
registered
  [ 1617.550504] mpt3sas_cm0: host_trace_buffer_show: host_trace_buffer is not 
registered
  [ 1617.550593] mpt3sas_cm0: BRM_status_show: BRM attribute is only for 
warpdrive
  [ 1617.550622] mpt3sas_cm0: BRM_status_show: BRM attribute is only for 
warpdrive
  [ 1617.598371] mpt3sas_cm0: host_trace_buffer_show: host_trace_buffer is not 
registered
  [ 1617.606183] mpt3sas_cm0: BRM_status_show: BRM attribute is only for 
warpdrive
  [ 1617.641990] mpt3sas 0000:8d:00.0: VPD access failed.  This is likely a 
firmware bug on this device.  Contact the card vendor for a firmware update
  [ 1617.973894] WARNING! power/level is deprecated; use power/control instead
  [ 1619.368112] bdi 7:6: the stable_pages_required attribute has been removed. 
Use the stable_writes queue attribute instead.
  [ 1627.430319] Unable to handle kernel paging request at virtual address 
ffff800033b503bf
  [ 1627.438256] Mem abort info:
  [ 1627.441086]   ESR = 0x96000021
  [ 1627.444133]   EC = 0x25: DABT (current EL), IL = 32 bits
  [ 1627.449469]   SET = 0, FnV = 0
  [ 1627.452515]   EA = 0, S1PTW = 0
  [ 1627.455676]   FSC = 0x21: alignment fault
  [ 1627.459701] Data abort info:
  [ 1627.462597]   ISV = 0, ISS = 0x00000021
  [ 1627.466449]   CM = 0, WnR = 0
  [ 1627.469434] swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000000f4aba000
  [ 1627.476160] [ffff800033b503bf] pgd=100000bffcfff003, p4d=100000bffcfff003, 
pud=100000bffcffe003, pmd=10000008948f5003, pte=0068000080213f0f
  [ 1627.488712] Internal error: Oops: 96000021 [#1] SMP
  [ 1627.493585] Modules linked in: efi_pstore nls_iso8859_1 joydev input_leds 
acpi_ipmi ipmi_ssif thunderx2_pmu cppc_cpufreq sch_fq_codel dm_multipath 
scsi_dh_rdac scsi_dh_emc scsi_dh_alua ipmi_devintf ipmi_msghandler ip_tables 
x_tables autofs4 btrfs blake2b_generic zstd_compress raid10 raid456 
async_raid6_recov async_memcpy async_pq async_xor async_tx xor xor_neon 
raid6_pq libcrc32c raid1 raid0 multipath linear hid_generic usbhid uas hid 
usb_storage ast drm_vram_helper drm_ttm_helper i2c_smbus ttm i2c_algo_bit 
drm_kms_helper syscopyarea crct10dif_ce sysfillrect ghash_ce sysimgblt sha2_ce 
fb_sys_fops cec sha256_arm64 rc_core sha1_ce qede mpt3sas qed raid_class drm 
scsi_transport_sas xhci_pci ahci xhci_pci_renesas gpio_xlp i2c_xlp9xx 
aes_neon_bs aes_neon_blk aes_ce_blk aes_ce_cipher
  [ 1627.500861] Unable to handle kernel paging request at virtual address 
ffff800033b503bf
  [ 1627.562614] CPU: 71 PID: 4190 Comm: read_all Not tainted 5.17.0-8-generic 
#8~22.04.2-Ubuntu
  [ 1627.562623] Hardware name: To be filled by O.E.M. Saber/Saber, BIOS 
0ACKL030 06/04/2020
  [ 1627.562626] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
  [ 1627.570544] Mem abort info:
  [ 1627.571497] Unable to handle kernel paging request at virtual address 
ffff800033b503bf
  [ 1627.571505] Mem abort info:
  [ 1627.571508]   ESR = 0x96000021
  [ 1627.571511]   EC = 0x25: DABT (current EL), IL = 32 bits
  [ 1627.571516]   SET = 0, FnV = 0
  [ 1627.571519]   EA = 0, S1PTW = 0
  [ 1627.571521]   FSC = 0x21: alignment fault
  [ 1627.571524] Data abort info:
  [ 1627.571526]   ISV = 0, ISS = 0x00000021
  [ 1627.571529]   CM = 0, WnR = 0
  [ 1627.571531] swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000000f4aba000
  [ 1627.571536] [ffff800033b503bf] pgd=100000bffcfff003, p4d=100000bffcfff003, 
pud=100000bffcffe003, pmd=10000008948f5003, pte=0068000080213f0f
  [ 1627.578871] pc : __memcpy+0x168/0x240
  [ 1627.578882] lr : memory_read_from_buffer+0x58/0x80
  [ 1627.578892] sp : ffff800032ddba40
  [ 1627.578894] x29: ffff800032ddba40 x28: ffff00083e53b0c0 x27: 
0000000000000000
  [ 1627.586903]   ESR = 0x96000021
  [ 1627.593843] x26: 0000000000000000 x25: 0000000000000000 x24: 
ffff00080d3dc020
  [ 1627.593853] x23: ffff800032ddbb40 x22: 00000000000003ff x21: 
ffff800032ddbaa8
  [ 1627.593862] x20: 00000000000003ff
  [ 1627.596652]   EC = 0x25: DABT (current EL), IL = 32 bits
  [ 1627.604547]  x19: 00000000000003ff x18: 0000000000000000
  [ 1627.604555] x17: 0000000000000000 x16: 0000000000000000 x15: 
0000000000000000
  [ 1627.604562] x14: 0000000000000000 x13: 0000000000000000 x12: 
0000000000000000
  [ 1627.604570] x11: 0000000000000000 x10: 0000000000000000
  [ 1627.607354]   SET = 0, FnV = 0
  [ 1627.610396]  x9 : 0000000000000000
  [ 1627.610401] x8 : 0000000000000000 x7 : 0000000000000000 x6 : 
0000000000000000
  [ 1627.610409] x5 : ffff000829c803ff x4 : ffff800033b503ff x3 : 
ffff000829c80380
  [ 1627.610417] x2 : ffffffffffffffef x1 : ffff800033b503c0 x0 : 
ffff000829c80000
  [ 1627.615729]   EA = 0, S1PTW = 0

  [ 1627.618767] Call trace:
  [ 1627.618770]  __memcpy+0x168/0x240
  [ 1627.618778]  acpi_data_show+0x5c/0x90
  [ 1627.621922]   FSC = 0x21: alignment fault
  [ 1627.625911]  sysfs_kf_bin_read+0x78/0xa0
  [ 1627.625921]  kernfs_file_read_iter+0x9c/0x1a4
  [ 1627.625927]  kernfs_fop_read_iter+0x34/0x50
  [ 1627.625934]  new_sync_read+0xf0/0x184
  [ 1627.628809] Data abort info:
  [ 1627.632625]  vfs_read+0x158/0x1f0
  [ 1627.632635]  ksys_read+0x74/0x100
  [ 1627.632642]  __arm64_sys_read+0x28/0x34
  [ 1627.635601]   ISV = 0, ISS = 0x00000021
  [ 1627.642289]  invoke_syscall+0x78/0x100
  [ 1627.642300]  el0_svc_common.constprop.0+0x54/0x184
  [ 1627.642308]  do_el0_svc+0x34/0x9c
  [ 1627.642313]  el0_svc+0x48/0x1b0
  [ 1627.654823]   CM = 0, WnR = 0
  [ 1627.658465]  el0t_64_sync_handler+0xa4/0x130
  [ 1627.658473]  el0t_64_sync+0x1a4/0x1a8
  [ 1627.658483] Code: a984346c a9c4342c f1010042 54fffee8 (a97c3c8e)
  [ 1627.658488] ---[ end trace 0000000000000000 ]---
  [ 1627.663275] swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000000f4aba000
  [ 1627.846745] [ffff800033b503bf] pgd=100000bffcfff003, p4d=100000bffcfff003, 
pud=100000bffcffe003, pmd=10000008948f5003, pte=0068000080213f0f
  [ 1627.847725] Internal error: Oops: 96000021 [#2] SMP
  [ 1627.864132] Modules linked in: efi_pstore nls_iso8859_1 joydev input_leds 
acpi_ipmi ipmi_ssif thunderx2_pmu cppc_cpufreq sch_fq_codel dm_multipath 
scsi_dh_rdac scsi_dh_emc scsi_dh_alua ipmi_devintf ipmi_msghandler ip_tables 
x_tables autofs4 btrfs blake2b_generic zstd_compress raid10 raid456 
async_raid6_recov async_memcpy async_pq async_xor async_tx xor xor_neon 
raid6_pq libcrc32c raid1 raid0 multipath linear hid_generic usbhid uas hid 
usb_storage ast drm_vram_helper drm_ttm_helper i2c_smbus ttm i2c_algo_bit 
drm_kms_helper syscopyarea crct10dif_ce sysfillrect ghash_ce sysimgblt sha2_ce 
fb_sys_fops cec sha256_arm64 rc_core sha1_ce qede mpt3sas qed raid_class drm 
scsi_transport_sas xhci_pci ahci xhci_pci_renesas gpio_xlp i2c_xlp9xx 
aes_neon_bs aes_neon_blk aes_ce_blk aes_ce_cipher
  [ 1627.933049] CPU: 70 PID: 4189 Comm: read_all Tainted: G      D           
5.17.0-8-generic #8~22.04.2-Ubuntu
  [ 1627.942777] Hardware name: To be filled by O.E.M. Saber/Saber, BIOS 
0ACKL030 06/04/2020
  [ 1627.950766] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
  [ 1627.957715] pc : __memcpy+0x168/0x240
  [ 1627.961367] lr : memory_read_from_buffer+0x58/0x80
  [ 1627.966147] sp : ffff800032a5bab0
  [ 1627.969448] x29: ffff800032a5bab0 x28: ffff00082ea74100 x27: 
0000000000000000
  [ 1627.976573] x26: 0000000000000000 x25: 0000000000000000 x24: 
ffff00080d3a0f20
  [ 1627.983696] x23: ffff800032a5bbb0 x22: 00000000000003ff x21: 
ffff800032a5bb18
  [ 1627.990820] x20: 00000000000003ff x19: 00000000000003ff x18: 
0000000000000000
  [ 1627.997944] x17: 0000000000000000 x16: 0000000000000000 x15: 
0000000000000000
  [ 1628.005067] x14: 0000000000000000 x13: 0000000000000000 x12: 
0000000000000000
  [ 1628.012190] x11: 0000000000000000 x10: 0000000000000000 x9 : 
0000000000000000
  [ 1628.019313] x8 : 0000000000000000 x7 : 0000000000000000 x6 : 
0000000000000000
  [ 1628.026436] x5 : ffff000829c497ff x4 : ffff800033b503ff x3 : 
ffff000829c49780
  [ 1628.033559] x2 : ffffffffffffffef x1 : ffff800033b503c0 x0 : 
ffff000829c49400
  [ 1628.040683] Call trace:
  [ 1628.043115]  __memcpy+0x168/0x240
  [ 1628.046418]  acpi_data_show+0x5c/0x90
  [ 1628.050070]  sysfs_kf_bin_read+0x78/0xa0
  [ 1628.053982]  kernfs_file_read_iter+0x9c/0x1a4
  [ 1628.058326]  kernfs_fop_read_iter+0x34/0x50
  [ 1628.062497]  new_sync_read+0xf0/0x184
  [ 1628.066148]  vfs_read+0x158/0x1f0
  [ 1628.069451]  ksys_read+0x74/0x100
  [ 1628.072754]  __arm64_sys_read+0x28/0x34
  [ 1628.076578]  invoke_syscall+0x78/0x100
  [ 1628.080316]  el0_svc_common.constprop.0+0x54/0x184
  [ 1628.085096]  do_el0_svc+0x34/0x9c
  [ 1628.088397]  el0_svc+0x48/0x1b0
  [ 1628.091526]  el0t_64_sync_handler+0xa4/0x130
  [ 1628.095783]  el0t_64_sync+0x1a4/0x1a8
  [ 1628.099435] Code: a984346c a9c4342c f1010042 54fffee8 (a97c3c8e)
  [ 1628.105514] ---[ end trace 0000000000000000 ]---
  [ 1628.114726] pstore: crypto_comp_compress failed, ret = -22!
  [ 1628.147258] Internal error: Oops: 96000021 [#3] SMP
  [ 1628.152129] Modules linked in: efi_pstore nls_iso8859_1 joydev input_leds 
acpi_ipmi ipmi_ssif thunderx2_pmu cppc_cpufreq sch_fq_codel dm_multipath 
scsi_dh_rdac scsi_dh_emc scsi_dh_alua ipmi_devintf ipmi_msghandler ip_tables 
x_tables autofs4 btrfs blake2b_generic zstd_compress raid10 raid456 
async_raid6_recov async_memcpy async_pq async_xor async_tx xor xor_neon 
raid6_pq libcrc32c raid1 raid0 multipath linear hid_generic usbhid uas hid 
usb_storage ast drm_vram_helper drm_ttm_helper i2c_smbus ttm i2c_algo_bit 
drm_kms_helper syscopyarea crct10dif_ce sysfillrect ghash_ce sysimgblt sha2_ce 
fb_sys_fops cec sha256_arm64 rc_core sha1_ce qede mpt3sas qed raid_class drm 
scsi_transport_sas xhci_pci ahci xhci_pci_renesas gpio_xlp i2c_xlp9xx 
aes_neon_bs aes_neon_blk aes_ce_blk aes_ce_cipher
  [ 1628.221137] CPU: 36 PID: 4191 Comm: read_all Tainted: G      D           
5.17.0-8-generic #8~22.04.2-Ubuntu
  [ 1628.230871] Hardware name: To be filled by O.E.M. Saber/Saber, BIOS 
0ACKL030 06/04/2020
  [ 1628.238863] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
  [ 1628.245818] pc : __memcpy+0x168/0x240
  [ 1628.249474] lr : memory_read_from_buffer+0x58/0x80
  [ 1628.254260] sp : ffff800033efba70
  [ 1628.257563] x29: ffff800033efba70 x28: ffff00083e53a080 x27: 
0000000000000000
  [ 1628.264696] x26: 0000000000000000 x25: 0000000000000000 x24: 
ffff00080cbaab20
  [ 1628.271826] x23: ffff800033efbb70 x22: 00000000000003ff x21: 
ffff800033efbad8
  [ 1628.278956] x20: 00000000000003ff x19: 00000000000003ff x18: 
0000000000000000
  [ 1628.286085] x17: 0000000000000000 x16: 0000000000000000 x15: 
0000000000000000
  [ 1628.293214] x14: 0000000000000000 x13: 0000000000000000 x12: 
0000000000000000
  [ 1628.300343] x11: 0000000000000000 x10: 0000000000000000 x9 : 
0000000000000000
  [ 1628.307472] x8 : 0000000000000000 x7 : 0000000000000000 x6 : 
0000000000000000
  [ 1628.314602] x5 : ffff0008295163ff x4 : ffff800033b503ff x3 : 
ffff000829516380
  [ 1628.321731] x2 : ffffffffffffffef x1 : ffff800033b503c0 x0 : 
ffff000829516000
  [ 1628.328860] Call trace:
  [ 1628.331296]  __memcpy+0x168/0x240
  [ 1628.334603]  acpi_data_show+0x5c/0x90
  [ 1628.338260]  sysfs_kf_bin_read+0x78/0xa0
  [ 1628.342176]  kernfs_file_read_iter+0x9c/0x1a4
  [ 1628.346525]  kernfs_fop_read_iter+0x34/0x50
  [ 1628.350700]  new_sync_read+0xf0/0x184
  [ 1628.354356]  vfs_read+0x158/0x1f0
  [ 1628.357664]  ksys_read+0x74/0x100
  [ 1628.360971]  __arm64_sys_read+0x28/0x34
  [ 1628.364800]  invoke_syscall+0x78/0x100
  [ 1628.368543]  el0_svc_common.constprop.0+0x54/0x184
  [ 1628.373328]  do_el0_svc+0x34/0x9c
  [ 1628.376632]  el0_svc+0x48/0x1b0
  [ 1628.379765]  el0t_64_sync_handler+0xa4/0x130
  [ 1628.384026]  el0t_64_sync+0x1a4/0x1a8
  [ 1628.387682] Code: a984346c a9c4342c f1010042 54fffee8 (a97c3c8e)
  [ 1628.393766] ---[ end trace 0000000000000000 ]---

  This issue will cause the following 22 tests failed, because of "TBROK: 
Kernel is already tainted"
  * ubuntu_ltp.sched:cfs_bandwidth01
  * ubuntu_ltp.pty:pty05
  * ubuntu_ltp.pty:pty06
  * ubuntu_ltp.pty:pty07
  * ubuntu_ltp.cve:cve-2016-8655
  * ubuntu_ltp.cve:cve-2017-2636
  * ubuntu_ltp.cve:cve-2017-10661
  * ubuntu_ltp.cve:cve-2017-17712
  * ubuntu_ltp.cve:cve-2017-1000112
  * ubuntu_ltp.cve:cve-2017-1000380
  * ubuntu_ltp.cve:cve-2018-7566
  * ubuntu_ltp.cve:cve-2018-9568
  * ubuntu_ltp.cve:cve-2018-18445
  * ubuntu_ltp.cve:cve-2018-18559
  * ubuntu_ltp.cve:cve-2019-8912
  * ubuntu_ltp.cve:cve-2020-14386
  * ubuntu_ltp.cve:cve-2021-3444
  * ubuntu_ltp.cve:cve-2021-3609
  * ubuntu_ltp.cve:cve-2021-22555
  * ubuntu_ltp.cve:cve-2021-26708
  * ubuntu_ltp.cve:cve-2021-22600
  * ubuntu_ltp.crypto:af_alg07

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1973153/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to