This bug is missing log files that will aid in diagnosing the problem. While running an Ubuntu kernel (not a mainline or third-party kernel) please enter the following command in a terminal window:
apport-collect 1973153 and then change the status of the bug to 'Confirmed'. If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'. This change has been made by an automated script, maintained by the Ubuntu Kernel Team. ** Changed in: linux (Ubuntu) Status: New => Incomplete ** Changed in: linux (Ubuntu Jammy) Status: New => Incomplete -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1973153 Title: kernel oops tiggered by read_all_sys in ubuntu_ltp/fs on J-5.15 / J-5.17 ARM64 "helo-kernel" Status in ubuntu-kernel-tests: New Status in linux package in Ubuntu: Incomplete Status in linux source package in Jammy: Incomplete Bug description: Issue found on Jammy 5.17.0-8-generic #8~22.04.2-Ubuntu and Jammy 5.15.0-27-generic with ARM64 node helo-kernel only. It looks like this is hardware-specific. The read_all_sys test in fs from ubuntu_ltp will cause kernel oops and test will timeout. Test log: <<<test_start>>> tag=read_all_sys stime=1652343855 cmdline="read_all -d /sys -q -r 3" contacts="" analysis=exit <<<test_output>>> incrementing stop tst_test.c:1456: TINFO: Timeout per run is 0h 30m 00s Test timeouted, sending SIGKILL! tst_test.c:1500: TINFO: Killed the leftover descendant processes tst_test.c:1506: TINFO: If you are running on slow machine, try exporting LTP_TIMEOUT_MUL > 1 tst_test.c:1508: TBROK: Test killed! (timeout?) Summary: passed 0 failed 0 broken 1 skipped 0 warnings 0 <<<execution_status>>> initiation_status="ok" duration=1800 termination_type=exited termination_id=2 corefile=no cutime=39 cstime=140 <<<test_end>>> dmesg output: [ 1614.203083] LTP: starting read_all_sys (read_all -d /sys -q -r 3) [ 1617.509566] mpt3sas 0000:8d:00.0: invalid VPD tag 0x00 (size 0) at offset 0; assume missing optional EEPROM [ 1617.543837] mpt3sas_cm0: host_trace_buffer_size_show: host_trace_buffer is not registered [ 1617.550373] mpt3sas_cm0: host_trace_buffer_size_show: host_trace_buffer is not registered [ 1617.550381] mpt3sas_cm0: host_trace_buffer_size_show: host_trace_buffer is not registered [ 1617.550474] mpt3sas_cm0: host_trace_buffer_show: host_trace_buffer is not registered [ 1617.550504] mpt3sas_cm0: host_trace_buffer_show: host_trace_buffer is not registered [ 1617.550593] mpt3sas_cm0: BRM_status_show: BRM attribute is only for warpdrive [ 1617.550622] mpt3sas_cm0: BRM_status_show: BRM attribute is only for warpdrive [ 1617.598371] mpt3sas_cm0: host_trace_buffer_show: host_trace_buffer is not registered [ 1617.606183] mpt3sas_cm0: BRM_status_show: BRM attribute is only for warpdrive [ 1617.641990] mpt3sas 0000:8d:00.0: VPD access failed. This is likely a firmware bug on this device. Contact the card vendor for a firmware update [ 1617.973894] WARNING! power/level is deprecated; use power/control instead [ 1619.368112] bdi 7:6: the stable_pages_required attribute has been removed. Use the stable_writes queue attribute instead. [ 1627.430319] Unable to handle kernel paging request at virtual address ffff800033b503bf [ 1627.438256] Mem abort info: [ 1627.441086] ESR = 0x96000021 [ 1627.444133] EC = 0x25: DABT (current EL), IL = 32 bits [ 1627.449469] SET = 0, FnV = 0 [ 1627.452515] EA = 0, S1PTW = 0 [ 1627.455676] FSC = 0x21: alignment fault [ 1627.459701] Data abort info: [ 1627.462597] ISV = 0, ISS = 0x00000021 [ 1627.466449] CM = 0, WnR = 0 [ 1627.469434] swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000000f4aba000 [ 1627.476160] [ffff800033b503bf] pgd=100000bffcfff003, p4d=100000bffcfff003, pud=100000bffcffe003, pmd=10000008948f5003, pte=0068000080213f0f [ 1627.488712] Internal error: Oops: 96000021 [#1] SMP [ 1627.493585] Modules linked in: efi_pstore nls_iso8859_1 joydev input_leds acpi_ipmi ipmi_ssif thunderx2_pmu cppc_cpufreq sch_fq_codel dm_multipath scsi_dh_rdac scsi_dh_emc scsi_dh_alua ipmi_devintf ipmi_msghandler ip_tables x_tables autofs4 btrfs blake2b_generic zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor xor_neon raid6_pq libcrc32c raid1 raid0 multipath linear hid_generic usbhid uas hid usb_storage ast drm_vram_helper drm_ttm_helper i2c_smbus ttm i2c_algo_bit drm_kms_helper syscopyarea crct10dif_ce sysfillrect ghash_ce sysimgblt sha2_ce fb_sys_fops cec sha256_arm64 rc_core sha1_ce qede mpt3sas qed raid_class drm scsi_transport_sas xhci_pci ahci xhci_pci_renesas gpio_xlp i2c_xlp9xx aes_neon_bs aes_neon_blk aes_ce_blk aes_ce_cipher [ 1627.500861] Unable to handle kernel paging request at virtual address ffff800033b503bf [ 1627.562614] CPU: 71 PID: 4190 Comm: read_all Not tainted 5.17.0-8-generic #8~22.04.2-Ubuntu [ 1627.562623] Hardware name: To be filled by O.E.M. Saber/Saber, BIOS 0ACKL030 06/04/2020 [ 1627.562626] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 1627.570544] Mem abort info: [ 1627.571497] Unable to handle kernel paging request at virtual address ffff800033b503bf [ 1627.571505] Mem abort info: [ 1627.571508] ESR = 0x96000021 [ 1627.571511] EC = 0x25: DABT (current EL), IL = 32 bits [ 1627.571516] SET = 0, FnV = 0 [ 1627.571519] EA = 0, S1PTW = 0 [ 1627.571521] FSC = 0x21: alignment fault [ 1627.571524] Data abort info: [ 1627.571526] ISV = 0, ISS = 0x00000021 [ 1627.571529] CM = 0, WnR = 0 [ 1627.571531] swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000000f4aba000 [ 1627.571536] [ffff800033b503bf] pgd=100000bffcfff003, p4d=100000bffcfff003, pud=100000bffcffe003, pmd=10000008948f5003, pte=0068000080213f0f [ 1627.578871] pc : __memcpy+0x168/0x240 [ 1627.578882] lr : memory_read_from_buffer+0x58/0x80 [ 1627.578892] sp : ffff800032ddba40 [ 1627.578894] x29: ffff800032ddba40 x28: ffff00083e53b0c0 x27: 0000000000000000 [ 1627.586903] ESR = 0x96000021 [ 1627.593843] x26: 0000000000000000 x25: 0000000000000000 x24: ffff00080d3dc020 [ 1627.593853] x23: ffff800032ddbb40 x22: 00000000000003ff x21: ffff800032ddbaa8 [ 1627.593862] x20: 00000000000003ff [ 1627.596652] EC = 0x25: DABT (current EL), IL = 32 bits [ 1627.604547] x19: 00000000000003ff x18: 0000000000000000 [ 1627.604555] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 [ 1627.604562] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000 [ 1627.604570] x11: 0000000000000000 x10: 0000000000000000 [ 1627.607354] SET = 0, FnV = 0 [ 1627.610396] x9 : 0000000000000000 [ 1627.610401] x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000 [ 1627.610409] x5 : ffff000829c803ff x4 : ffff800033b503ff x3 : ffff000829c80380 [ 1627.610417] x2 : ffffffffffffffef x1 : ffff800033b503c0 x0 : ffff000829c80000 [ 1627.615729] EA = 0, S1PTW = 0 [ 1627.618767] Call trace: [ 1627.618770] __memcpy+0x168/0x240 [ 1627.618778] acpi_data_show+0x5c/0x90 [ 1627.621922] FSC = 0x21: alignment fault [ 1627.625911] sysfs_kf_bin_read+0x78/0xa0 [ 1627.625921] kernfs_file_read_iter+0x9c/0x1a4 [ 1627.625927] kernfs_fop_read_iter+0x34/0x50 [ 1627.625934] new_sync_read+0xf0/0x184 [ 1627.628809] Data abort info: [ 1627.632625] vfs_read+0x158/0x1f0 [ 1627.632635] ksys_read+0x74/0x100 [ 1627.632642] __arm64_sys_read+0x28/0x34 [ 1627.635601] ISV = 0, ISS = 0x00000021 [ 1627.642289] invoke_syscall+0x78/0x100 [ 1627.642300] el0_svc_common.constprop.0+0x54/0x184 [ 1627.642308] do_el0_svc+0x34/0x9c [ 1627.642313] el0_svc+0x48/0x1b0 [ 1627.654823] CM = 0, WnR = 0 [ 1627.658465] el0t_64_sync_handler+0xa4/0x130 [ 1627.658473] el0t_64_sync+0x1a4/0x1a8 [ 1627.658483] Code: a984346c a9c4342c f1010042 54fffee8 (a97c3c8e) [ 1627.658488] ---[ end trace 0000000000000000 ]--- [ 1627.663275] swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000000f4aba000 [ 1627.846745] [ffff800033b503bf] pgd=100000bffcfff003, p4d=100000bffcfff003, pud=100000bffcffe003, pmd=10000008948f5003, pte=0068000080213f0f [ 1627.847725] Internal error: Oops: 96000021 [#2] SMP [ 1627.864132] Modules linked in: efi_pstore nls_iso8859_1 joydev input_leds acpi_ipmi ipmi_ssif thunderx2_pmu cppc_cpufreq sch_fq_codel dm_multipath scsi_dh_rdac scsi_dh_emc scsi_dh_alua ipmi_devintf ipmi_msghandler ip_tables x_tables autofs4 btrfs blake2b_generic zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor xor_neon raid6_pq libcrc32c raid1 raid0 multipath linear hid_generic usbhid uas hid usb_storage ast drm_vram_helper drm_ttm_helper i2c_smbus ttm i2c_algo_bit drm_kms_helper syscopyarea crct10dif_ce sysfillrect ghash_ce sysimgblt sha2_ce fb_sys_fops cec sha256_arm64 rc_core sha1_ce qede mpt3sas qed raid_class drm scsi_transport_sas xhci_pci ahci xhci_pci_renesas gpio_xlp i2c_xlp9xx aes_neon_bs aes_neon_blk aes_ce_blk aes_ce_cipher [ 1627.933049] CPU: 70 PID: 4189 Comm: read_all Tainted: G D 5.17.0-8-generic #8~22.04.2-Ubuntu [ 1627.942777] Hardware name: To be filled by O.E.M. Saber/Saber, BIOS 0ACKL030 06/04/2020 [ 1627.950766] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 1627.957715] pc : __memcpy+0x168/0x240 [ 1627.961367] lr : memory_read_from_buffer+0x58/0x80 [ 1627.966147] sp : ffff800032a5bab0 [ 1627.969448] x29: ffff800032a5bab0 x28: ffff00082ea74100 x27: 0000000000000000 [ 1627.976573] x26: 0000000000000000 x25: 0000000000000000 x24: ffff00080d3a0f20 [ 1627.983696] x23: ffff800032a5bbb0 x22: 00000000000003ff x21: ffff800032a5bb18 [ 1627.990820] x20: 00000000000003ff x19: 00000000000003ff x18: 0000000000000000 [ 1627.997944] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 [ 1628.005067] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000 [ 1628.012190] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000 [ 1628.019313] x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000 [ 1628.026436] x5 : ffff000829c497ff x4 : ffff800033b503ff x3 : ffff000829c49780 [ 1628.033559] x2 : ffffffffffffffef x1 : ffff800033b503c0 x0 : ffff000829c49400 [ 1628.040683] Call trace: [ 1628.043115] __memcpy+0x168/0x240 [ 1628.046418] acpi_data_show+0x5c/0x90 [ 1628.050070] sysfs_kf_bin_read+0x78/0xa0 [ 1628.053982] kernfs_file_read_iter+0x9c/0x1a4 [ 1628.058326] kernfs_fop_read_iter+0x34/0x50 [ 1628.062497] new_sync_read+0xf0/0x184 [ 1628.066148] vfs_read+0x158/0x1f0 [ 1628.069451] ksys_read+0x74/0x100 [ 1628.072754] __arm64_sys_read+0x28/0x34 [ 1628.076578] invoke_syscall+0x78/0x100 [ 1628.080316] el0_svc_common.constprop.0+0x54/0x184 [ 1628.085096] do_el0_svc+0x34/0x9c [ 1628.088397] el0_svc+0x48/0x1b0 [ 1628.091526] el0t_64_sync_handler+0xa4/0x130 [ 1628.095783] el0t_64_sync+0x1a4/0x1a8 [ 1628.099435] Code: a984346c a9c4342c f1010042 54fffee8 (a97c3c8e) [ 1628.105514] ---[ end trace 0000000000000000 ]--- [ 1628.114726] pstore: crypto_comp_compress failed, ret = -22! [ 1628.147258] Internal error: Oops: 96000021 [#3] SMP [ 1628.152129] Modules linked in: efi_pstore nls_iso8859_1 joydev input_leds acpi_ipmi ipmi_ssif thunderx2_pmu cppc_cpufreq sch_fq_codel dm_multipath scsi_dh_rdac scsi_dh_emc scsi_dh_alua ipmi_devintf ipmi_msghandler ip_tables x_tables autofs4 btrfs blake2b_generic zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor xor_neon raid6_pq libcrc32c raid1 raid0 multipath linear hid_generic usbhid uas hid usb_storage ast drm_vram_helper drm_ttm_helper i2c_smbus ttm i2c_algo_bit drm_kms_helper syscopyarea crct10dif_ce sysfillrect ghash_ce sysimgblt sha2_ce fb_sys_fops cec sha256_arm64 rc_core sha1_ce qede mpt3sas qed raid_class drm scsi_transport_sas xhci_pci ahci xhci_pci_renesas gpio_xlp i2c_xlp9xx aes_neon_bs aes_neon_blk aes_ce_blk aes_ce_cipher [ 1628.221137] CPU: 36 PID: 4191 Comm: read_all Tainted: G D 5.17.0-8-generic #8~22.04.2-Ubuntu [ 1628.230871] Hardware name: To be filled by O.E.M. Saber/Saber, BIOS 0ACKL030 06/04/2020 [ 1628.238863] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 1628.245818] pc : __memcpy+0x168/0x240 [ 1628.249474] lr : memory_read_from_buffer+0x58/0x80 [ 1628.254260] sp : ffff800033efba70 [ 1628.257563] x29: ffff800033efba70 x28: ffff00083e53a080 x27: 0000000000000000 [ 1628.264696] x26: 0000000000000000 x25: 0000000000000000 x24: ffff00080cbaab20 [ 1628.271826] x23: ffff800033efbb70 x22: 00000000000003ff x21: ffff800033efbad8 [ 1628.278956] x20: 00000000000003ff x19: 00000000000003ff x18: 0000000000000000 [ 1628.286085] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 [ 1628.293214] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000 [ 1628.300343] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000 [ 1628.307472] x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000 [ 1628.314602] x5 : ffff0008295163ff x4 : ffff800033b503ff x3 : ffff000829516380 [ 1628.321731] x2 : ffffffffffffffef x1 : ffff800033b503c0 x0 : ffff000829516000 [ 1628.328860] Call trace: [ 1628.331296] __memcpy+0x168/0x240 [ 1628.334603] acpi_data_show+0x5c/0x90 [ 1628.338260] sysfs_kf_bin_read+0x78/0xa0 [ 1628.342176] kernfs_file_read_iter+0x9c/0x1a4 [ 1628.346525] kernfs_fop_read_iter+0x34/0x50 [ 1628.350700] new_sync_read+0xf0/0x184 [ 1628.354356] vfs_read+0x158/0x1f0 [ 1628.357664] ksys_read+0x74/0x100 [ 1628.360971] __arm64_sys_read+0x28/0x34 [ 1628.364800] invoke_syscall+0x78/0x100 [ 1628.368543] el0_svc_common.constprop.0+0x54/0x184 [ 1628.373328] do_el0_svc+0x34/0x9c [ 1628.376632] el0_svc+0x48/0x1b0 [ 1628.379765] el0t_64_sync_handler+0xa4/0x130 [ 1628.384026] el0t_64_sync+0x1a4/0x1a8 [ 1628.387682] Code: a984346c a9c4342c f1010042 54fffee8 (a97c3c8e) [ 1628.393766] ---[ end trace 0000000000000000 ]--- This issue will cause the following 22 tests failed, because of "TBROK: Kernel is already tainted" * ubuntu_ltp.sched:cfs_bandwidth01 * ubuntu_ltp.pty:pty05 * ubuntu_ltp.pty:pty06 * ubuntu_ltp.pty:pty07 * ubuntu_ltp.cve:cve-2016-8655 * ubuntu_ltp.cve:cve-2017-2636 * ubuntu_ltp.cve:cve-2017-10661 * ubuntu_ltp.cve:cve-2017-17712 * ubuntu_ltp.cve:cve-2017-1000112 * ubuntu_ltp.cve:cve-2017-1000380 * ubuntu_ltp.cve:cve-2018-7566 * ubuntu_ltp.cve:cve-2018-9568 * ubuntu_ltp.cve:cve-2018-18445 * ubuntu_ltp.cve:cve-2018-18559 * ubuntu_ltp.cve:cve-2019-8912 * ubuntu_ltp.cve:cve-2020-14386 * ubuntu_ltp.cve:cve-2021-3444 * ubuntu_ltp.cve:cve-2021-3609 * ubuntu_ltp.cve:cve-2021-22555 * ubuntu_ltp.cve:cve-2021-26708 * ubuntu_ltp.cve:cve-2021-22600 * ubuntu_ltp.crypto:af_alg07 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1973153/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp