** Bug watch added: Linux Kernel Bug Tracker #208885 https://bugzilla.kernel.org/show_bug.cgi?id=208885
** Also affects: linux via https://bugzilla.kernel.org/show_bug.cgi?id=208885 Importance: Unknown Status: Unknown ** Description changed: + Running: + + sudo lcov --zerocounters on a gcov enabled kernel causes a read-only + splat: + + [ 139.798968] Unable to handle kernel write to read-only memory at virtual address ffffb4511ee6bb10 [ 139.803325] Mem abort info: [ 139.804882] ESR = 0x9600004e [ 139.806265] EC = 0x25: DABT (current EL), IL = 32 bits [ 139.811261] SET = 0, FnV = 0 [ 139.814163] EA = 0, S1PTW = 0 [ 139.816545] Data abort info: [ 139.817852] ISV = 0, ISS = 0x0000004e [ 139.820023] CM = 0, WnR = 1 [ 139.821350] swapper pgtable: 4k pages, 48-bit VAs, pgdp=000000005086f000 [ 139.825005] [ffffb4511ee6bb10] pgd=00000001b6fff003, p4d=00000001b6fff003, pud=00000001b6ffe003, pmd=004000004e200f91 [ 139.832061] Internal error: Oops: 9600004e [#1] SMP [ 139.835002] Modules linked in: nls_iso8859_1 dm_multipath scsi_dh_rdac scsi_dh_emc scsi_dh_alua efi_pstore qemu_fw_cfg sch_fq_codel drm virtio_rng ip_t ables x_tables autofs4 btrfs blake2b_generic raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor xor_neon raid6_pq libcrc32c rai d1 raid0 multipath linear crct10dif_ce ghash_ce sha2_ce sha256_arm64 sha1_ce virtio_net net_failover xhci_pci virtio_blk virtio_scsi failover xhci_pci_ren esas aes_neon_bs aes_neon_blk aes_ce_blk crypto_simd cryptd aes_ce_cipher [ 139.865929] CPU: 5 PID: 1235 Comm: lcov Tainted: G W 5.8.0-8-generic #9 [ 139.871293] Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 [ 139.876248] pstate: 20400005 (nzCv daif +PAN -UAO BTYPE=--) [ 139.879993] pc : __memset+0x148/0x188 [ 139.882387] lr : gcov_info_reset+0xa0/0x110 [ 139.885404] sp : ffff8000122f3bf0 - [ 139.887730] x29: ffff8000122f3bf0 x28: ffff000167480f40 - [ 139.891129] x27: 0000000000000000 x26: ffffb450e46bc060 - [ 139.894688] x25: 0000000000000001 x24: ffffb450e46bc040 - [ 139.897391] x23: 0000000000000000 x22: ffffb450e46bc0a8 - [ 139.900064] x21: ffffb45122ba5db8 x20: ffffb450e46bc068 - [ 139.902681] x19: ffffb450e46bc068 x18: 0000000000000000 - [ 139.905345] x17: 0000000000000000 x16: 0000000000000000 - [ 139.908016] x15: 0000000000000000 x14: 0000000000000000 - [ 139.910625] x13: 0000000000000000 x12: 0000000000000000 - [ 139.913260] x11: 0000000000000000 x10: 0000000000000000 - [ 139.915922] x9 : 0000000000000000 x8 : ffffb4511ee6bb10 - [ 139.918531] x7 : 0000000000000000 x6 : 000000000000003f - [ 139.921196] x5 : 0000000000000040 x4 : 0000000000000030 - [ 139.923852] x3 : 00000007235d7fd0 x2 : 00000007235d7fd0 - [ 139.926460] x1 : 0000000000000000 x0 : ffffb4511ee6bb10 + [ 139.887730] x29: ffff8000122f3bf0 x28: ffff000167480f40 + [ 139.891129] x27: 0000000000000000 x26: ffffb450e46bc060 + [ 139.894688] x25: 0000000000000001 x24: ffffb450e46bc040 + [ 139.897391] x23: 0000000000000000 x22: ffffb450e46bc0a8 + [ 139.900064] x21: ffffb45122ba5db8 x20: ffffb450e46bc068 + [ 139.902681] x19: ffffb450e46bc068 x18: 0000000000000000 + [ 139.905345] x17: 0000000000000000 x16: 0000000000000000 + [ 139.908016] x15: 0000000000000000 x14: 0000000000000000 + [ 139.910625] x13: 0000000000000000 x12: 0000000000000000 + [ 139.913260] x11: 0000000000000000 x10: 0000000000000000 + [ 139.915922] x9 : 0000000000000000 x8 : ffffb4511ee6bb10 + [ 139.918531] x7 : 0000000000000000 x6 : 000000000000003f + [ 139.921196] x5 : 0000000000000040 x4 : 0000000000000030 + [ 139.923852] x3 : 00000007235d7fd0 x2 : 00000007235d7fd0 + [ 139.926460] x1 : 0000000000000000 x0 : ffffb4511ee6bb10 [ 139.929126] Call trace: [ 139.930349] __memset+0x148/0x188 [ 139.932025] reset_node+0x70/0xc0 [ 139.933662] reset_write+0xc0/0x130 [ 139.935389] full_proxy_write+0x98/0x110 [ 139.937349] vfs_write+0x18c/0x3e0 [ 139.939031] ksys_write+0xc4/0x1f0 [ 139.940766] __arm64_sys_write+0x44/0x60 [ 139.942705] invoke_syscall+0x74/0x150 [ 139.944601] el0_svc_common.constprop.0+0x94/0x264 [ 139.946961] do_el0_svc+0x5c/0x7c [ 139.948651] el0_svc+0x70/0x114 [ 139.950206] el0_sync_handler+0x140/0x39c [ 139.952239] el0_sync+0x17c/0x180 - [ 139.953894] Code: f101007f fa45a068 54fffc0b aa0303e2 (a9001d07) + [ 139.953894] Code: f101007f fa45a068 54fffc0b aa0303e2 (a9001d07) [ 139.956946] ---[ end trace 71e2f9cc3eaddf4e ]--- -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1891288 Title: arm64 gcov in 5.8 breaks when trying to enable it Status in Linux: Unknown Status in linux package in Ubuntu: In Progress Bug description: Running: sudo lcov --zerocounters on a gcov enabled kernel causes a read-only splat: [ 139.798968] Unable to handle kernel write to read-only memory at virtual address ffffb4511ee6bb10 [ 139.803325] Mem abort info: [ 139.804882] ESR = 0x9600004e [ 139.806265] EC = 0x25: DABT (current EL), IL = 32 bits [ 139.811261] SET = 0, FnV = 0 [ 139.814163] EA = 0, S1PTW = 0 [ 139.816545] Data abort info: [ 139.817852] ISV = 0, ISS = 0x0000004e [ 139.820023] CM = 0, WnR = 1 [ 139.821350] swapper pgtable: 4k pages, 48-bit VAs, pgdp=000000005086f000 [ 139.825005] [ffffb4511ee6bb10] pgd=00000001b6fff003, p4d=00000001b6fff003, pud=00000001b6ffe003, pmd=004000004e200f91 [ 139.832061] Internal error: Oops: 9600004e [#1] SMP [ 139.835002] Modules linked in: nls_iso8859_1 dm_multipath scsi_dh_rdac scsi_dh_emc scsi_dh_alua efi_pstore qemu_fw_cfg sch_fq_codel drm virtio_rng ip_t ables x_tables autofs4 btrfs blake2b_generic raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor xor_neon raid6_pq libcrc32c rai d1 raid0 multipath linear crct10dif_ce ghash_ce sha2_ce sha256_arm64 sha1_ce virtio_net net_failover xhci_pci virtio_blk virtio_scsi failover xhci_pci_ren esas aes_neon_bs aes_neon_blk aes_ce_blk crypto_simd cryptd aes_ce_cipher [ 139.865929] CPU: 5 PID: 1235 Comm: lcov Tainted: G W 5.8.0-8-generic #9 [ 139.871293] Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 [ 139.876248] pstate: 20400005 (nzCv daif +PAN -UAO BTYPE=--) [ 139.879993] pc : __memset+0x148/0x188 [ 139.882387] lr : gcov_info_reset+0xa0/0x110 [ 139.885404] sp : ffff8000122f3bf0 [ 139.887730] x29: ffff8000122f3bf0 x28: ffff000167480f40 [ 139.891129] x27: 0000000000000000 x26: ffffb450e46bc060 [ 139.894688] x25: 0000000000000001 x24: ffffb450e46bc040 [ 139.897391] x23: 0000000000000000 x22: ffffb450e46bc0a8 [ 139.900064] x21: ffffb45122ba5db8 x20: ffffb450e46bc068 [ 139.902681] x19: ffffb450e46bc068 x18: 0000000000000000 [ 139.905345] x17: 0000000000000000 x16: 0000000000000000 [ 139.908016] x15: 0000000000000000 x14: 0000000000000000 [ 139.910625] x13: 0000000000000000 x12: 0000000000000000 [ 139.913260] x11: 0000000000000000 x10: 0000000000000000 [ 139.915922] x9 : 0000000000000000 x8 : ffffb4511ee6bb10 [ 139.918531] x7 : 0000000000000000 x6 : 000000000000003f [ 139.921196] x5 : 0000000000000040 x4 : 0000000000000030 [ 139.923852] x3 : 00000007235d7fd0 x2 : 00000007235d7fd0 [ 139.926460] x1 : 0000000000000000 x0 : ffffb4511ee6bb10 [ 139.929126] Call trace: [ 139.930349] __memset+0x148/0x188 [ 139.932025] reset_node+0x70/0xc0 [ 139.933662] reset_write+0xc0/0x130 [ 139.935389] full_proxy_write+0x98/0x110 [ 139.937349] vfs_write+0x18c/0x3e0 [ 139.939031] ksys_write+0xc4/0x1f0 [ 139.940766] __arm64_sys_write+0x44/0x60 [ 139.942705] invoke_syscall+0x74/0x150 [ 139.944601] el0_svc_common.constprop.0+0x94/0x264 [ 139.946961] do_el0_svc+0x5c/0x7c [ 139.948651] el0_svc+0x70/0x114 [ 139.950206] el0_sync_handler+0x140/0x39c [ 139.952239] el0_sync+0x17c/0x180 [ 139.953894] Code: f101007f fa45a068 54fffc0b aa0303e2 (a9001d07) [ 139.956946] ---[ end trace 71e2f9cc3eaddf4e ]--- To manage notifications about this bug go to: https://bugs.launchpad.net/linux/+bug/1891288/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp