This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:

apport-collect 1973153

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a comment stating that fact and change
the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the
Ubuntu Kernel Team.

** Changed in: linux (Ubuntu)
       Status: New => Incomplete

** Changed in: linux (Ubuntu Jammy)
       Status: New => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1973153

Title:
  kernel oops tiggered by read_all_sys in ubuntu_ltp/fs on J-5.15 /
  J-5.17 ARM64 "helo-kernel"

Status in ubuntu-kernel-tests:
  New
Status in linux package in Ubuntu:
  Incomplete
Status in linux source package in Jammy:
  Incomplete

Bug description:
  Issue found on Jammy 5.17.0-8-generic #8~22.04.2-Ubuntu and Jammy
  5.15.0-27-generic with ARM64 node helo-kernel only.

  It looks like this is hardware-specific.

  The read_all_sys test in fs from ubuntu_ltp will cause kernel oops and
  test will timeout.

  Test log:
  <<<test_start>>>
  tag=read_all_sys stime=1652343855
  cmdline="read_all -d /sys -q -r 3"
  contacts=""
  analysis=exit
  <<<test_output>>>
  incrementing stop
  tst_test.c:1456: TINFO: Timeout per run is 0h 30m 00s
  Test timeouted, sending SIGKILL!
  tst_test.c:1500: TINFO: Killed the leftover descendant processes
  tst_test.c:1506: TINFO: If you are running on slow machine, try exporting 
LTP_TIMEOUT_MUL > 1
  tst_test.c:1508: TBROK: Test killed! (timeout?)

  Summary:
  passed   0
  failed   0
  broken   1
  skipped  0
  warnings 0
  <<<execution_status>>>
  initiation_status="ok"
  duration=1800 termination_type=exited termination_id=2 corefile=no
  cutime=39 cstime=140
  <<<test_end>>>

  dmesg output:
  [ 1614.203083] LTP: starting read_all_sys (read_all -d /sys -q -r 3)
  [ 1617.509566] mpt3sas 0000:8d:00.0: invalid VPD tag 0x00 (size 0) at offset 
0; assume missing optional EEPROM
  [ 1617.543837] mpt3sas_cm0: host_trace_buffer_size_show: host_trace_buffer is 
not registered
  [ 1617.550373] mpt3sas_cm0: host_trace_buffer_size_show: host_trace_buffer is 
not registered
  [ 1617.550381] mpt3sas_cm0: host_trace_buffer_size_show: host_trace_buffer is 
not registered
  [ 1617.550474] mpt3sas_cm0: host_trace_buffer_show: host_trace_buffer is not 
registered
  [ 1617.550504] mpt3sas_cm0: host_trace_buffer_show: host_trace_buffer is not 
registered
  [ 1617.550593] mpt3sas_cm0: BRM_status_show: BRM attribute is only for 
warpdrive
  [ 1617.550622] mpt3sas_cm0: BRM_status_show: BRM attribute is only for 
warpdrive
  [ 1617.598371] mpt3sas_cm0: host_trace_buffer_show: host_trace_buffer is not 
registered
  [ 1617.606183] mpt3sas_cm0: BRM_status_show: BRM attribute is only for 
warpdrive
  [ 1617.641990] mpt3sas 0000:8d:00.0: VPD access failed.  This is likely a 
firmware bug on this device.  Contact the card vendor for a firmware update
  [ 1617.973894] WARNING! power/level is deprecated; use power/control instead
  [ 1619.368112] bdi 7:6: the stable_pages_required attribute has been removed. 
Use the stable_writes queue attribute instead.
  [ 1627.430319] Unable to handle kernel paging request at virtual address 
ffff800033b503bf
  [ 1627.438256] Mem abort info:
  [ 1627.441086]   ESR = 0x96000021
  [ 1627.444133]   EC = 0x25: DABT (current EL), IL = 32 bits
  [ 1627.449469]   SET = 0, FnV = 0
  [ 1627.452515]   EA = 0, S1PTW = 0
  [ 1627.455676]   FSC = 0x21: alignment fault
  [ 1627.459701] Data abort info:
  [ 1627.462597]   ISV = 0, ISS = 0x00000021
  [ 1627.466449]   CM = 0, WnR = 0
  [ 1627.469434] swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000000f4aba000
  [ 1627.476160] [ffff800033b503bf] pgd=100000bffcfff003, p4d=100000bffcfff003, 
pud=100000bffcffe003, pmd=10000008948f5003, pte=0068000080213f0f
  [ 1627.488712] Internal error: Oops: 96000021 [#1] SMP
  [ 1627.493585] Modules linked in: efi_pstore nls_iso8859_1 joydev input_leds 
acpi_ipmi ipmi_ssif thunderx2_pmu cppc_cpufreq sch_fq_codel dm_multipath 
scsi_dh_rdac scsi_dh_emc scsi_dh_alua ipmi_devintf ipmi_msghandler ip_tables 
x_tables autofs4 btrfs blake2b_generic zstd_compress raid10 raid456 
async_raid6_recov async_memcpy async_pq async_xor async_tx xor xor_neon 
raid6_pq libcrc32c raid1 raid0 multipath linear hid_generic usbhid uas hid 
usb_storage ast drm_vram_helper drm_ttm_helper i2c_smbus ttm i2c_algo_bit 
drm_kms_helper syscopyarea crct10dif_ce sysfillrect ghash_ce sysimgblt sha2_ce 
fb_sys_fops cec sha256_arm64 rc_core sha1_ce qede mpt3sas qed raid_class drm 
scsi_transport_sas xhci_pci ahci xhci_pci_renesas gpio_xlp i2c_xlp9xx 
aes_neon_bs aes_neon_blk aes_ce_blk aes_ce_cipher
  [ 1627.500861] Unable to handle kernel paging request at virtual address 
ffff800033b503bf
  [ 1627.562614] CPU: 71 PID: 4190 Comm: read_all Not tainted 5.17.0-8-generic 
#8~22.04.2-Ubuntu
  [ 1627.562623] Hardware name: To be filled by O.E.M. Saber/Saber, BIOS 
0ACKL030 06/04/2020
  [ 1627.562626] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
  [ 1627.570544] Mem abort info:
  [ 1627.571497] Unable to handle kernel paging request at virtual address 
ffff800033b503bf
  [ 1627.571505] Mem abort info:
  [ 1627.571508]   ESR = 0x96000021
  [ 1627.571511]   EC = 0x25: DABT (current EL), IL = 32 bits
  [ 1627.571516]   SET = 0, FnV = 0
  [ 1627.571519]   EA = 0, S1PTW = 0
  [ 1627.571521]   FSC = 0x21: alignment fault
  [ 1627.571524] Data abort info:
  [ 1627.571526]   ISV = 0, ISS = 0x00000021
  [ 1627.571529]   CM = 0, WnR = 0
  [ 1627.571531] swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000000f4aba000
  [ 1627.571536] [ffff800033b503bf] pgd=100000bffcfff003, p4d=100000bffcfff003, 
pud=100000bffcffe003, pmd=10000008948f5003, pte=0068000080213f0f
  [ 1627.578871] pc : __memcpy+0x168/0x240
  [ 1627.578882] lr : memory_read_from_buffer+0x58/0x80
  [ 1627.578892] sp : ffff800032ddba40
  [ 1627.578894] x29: ffff800032ddba40 x28: ffff00083e53b0c0 x27: 
0000000000000000
  [ 1627.586903]   ESR = 0x96000021
  [ 1627.593843] x26: 0000000000000000 x25: 0000000000000000 x24: 
ffff00080d3dc020
  [ 1627.593853] x23: ffff800032ddbb40 x22: 00000000000003ff x21: 
ffff800032ddbaa8
  [ 1627.593862] x20: 00000000000003ff
  [ 1627.596652]   EC = 0x25: DABT (current EL), IL = 32 bits
  [ 1627.604547]  x19: 00000000000003ff x18: 0000000000000000
  [ 1627.604555] x17: 0000000000000000 x16: 0000000000000000 x15: 
0000000000000000
  [ 1627.604562] x14: 0000000000000000 x13: 0000000000000000 x12: 
0000000000000000
  [ 1627.604570] x11: 0000000000000000 x10: 0000000000000000
  [ 1627.607354]   SET = 0, FnV = 0
  [ 1627.610396]  x9 : 0000000000000000
  [ 1627.610401] x8 : 0000000000000000 x7 : 0000000000000000 x6 : 
0000000000000000
  [ 1627.610409] x5 : ffff000829c803ff x4 : ffff800033b503ff x3 : 
ffff000829c80380
  [ 1627.610417] x2 : ffffffffffffffef x1 : ffff800033b503c0 x0 : 
ffff000829c80000
  [ 1627.615729]   EA = 0, S1PTW = 0

  [ 1627.618767] Call trace:
  [ 1627.618770]  __memcpy+0x168/0x240
  [ 1627.618778]  acpi_data_show+0x5c/0x90
  [ 1627.621922]   FSC = 0x21: alignment fault
  [ 1627.625911]  sysfs_kf_bin_read+0x78/0xa0
  [ 1627.625921]  kernfs_file_read_iter+0x9c/0x1a4
  [ 1627.625927]  kernfs_fop_read_iter+0x34/0x50
  [ 1627.625934]  new_sync_read+0xf0/0x184
  [ 1627.628809] Data abort info:
  [ 1627.632625]  vfs_read+0x158/0x1f0
  [ 1627.632635]  ksys_read+0x74/0x100
  [ 1627.632642]  __arm64_sys_read+0x28/0x34
  [ 1627.635601]   ISV = 0, ISS = 0x00000021
  [ 1627.642289]  invoke_syscall+0x78/0x100
  [ 1627.642300]  el0_svc_common.constprop.0+0x54/0x184
  [ 1627.642308]  do_el0_svc+0x34/0x9c
  [ 1627.642313]  el0_svc+0x48/0x1b0
  [ 1627.654823]   CM = 0, WnR = 0
  [ 1627.658465]  el0t_64_sync_handler+0xa4/0x130
  [ 1627.658473]  el0t_64_sync+0x1a4/0x1a8
  [ 1627.658483] Code: a984346c a9c4342c f1010042 54fffee8 (a97c3c8e)
  [ 1627.658488] ---[ end trace 0000000000000000 ]---
  [ 1627.663275] swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000000f4aba000
  [ 1627.846745] [ffff800033b503bf] pgd=100000bffcfff003, p4d=100000bffcfff003, 
pud=100000bffcffe003, pmd=10000008948f5003, pte=0068000080213f0f
  [ 1627.847725] Internal error: Oops: 96000021 [#2] SMP
  [ 1627.864132] Modules linked in: efi_pstore nls_iso8859_1 joydev input_leds 
acpi_ipmi ipmi_ssif thunderx2_pmu cppc_cpufreq sch_fq_codel dm_multipath 
scsi_dh_rdac scsi_dh_emc scsi_dh_alua ipmi_devintf ipmi_msghandler ip_tables 
x_tables autofs4 btrfs blake2b_generic zstd_compress raid10 raid456 
async_raid6_recov async_memcpy async_pq async_xor async_tx xor xor_neon 
raid6_pq libcrc32c raid1 raid0 multipath linear hid_generic usbhid uas hid 
usb_storage ast drm_vram_helper drm_ttm_helper i2c_smbus ttm i2c_algo_bit 
drm_kms_helper syscopyarea crct10dif_ce sysfillrect ghash_ce sysimgblt sha2_ce 
fb_sys_fops cec sha256_arm64 rc_core sha1_ce qede mpt3sas qed raid_class drm 
scsi_transport_sas xhci_pci ahci xhci_pci_renesas gpio_xlp i2c_xlp9xx 
aes_neon_bs aes_neon_blk aes_ce_blk aes_ce_cipher
  [ 1627.933049] CPU: 70 PID: 4189 Comm: read_all Tainted: G      D           
5.17.0-8-generic #8~22.04.2-Ubuntu
  [ 1627.942777] Hardware name: To be filled by O.E.M. Saber/Saber, BIOS 
0ACKL030 06/04/2020
  [ 1627.950766] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
  [ 1627.957715] pc : __memcpy+0x168/0x240
  [ 1627.961367] lr : memory_read_from_buffer+0x58/0x80
  [ 1627.966147] sp : ffff800032a5bab0
  [ 1627.969448] x29: ffff800032a5bab0 x28: ffff00082ea74100 x27: 
0000000000000000
  [ 1627.976573] x26: 0000000000000000 x25: 0000000000000000 x24: 
ffff00080d3a0f20
  [ 1627.983696] x23: ffff800032a5bbb0 x22: 00000000000003ff x21: 
ffff800032a5bb18
  [ 1627.990820] x20: 00000000000003ff x19: 00000000000003ff x18: 
0000000000000000
  [ 1627.997944] x17: 0000000000000000 x16: 0000000000000000 x15: 
0000000000000000
  [ 1628.005067] x14: 0000000000000000 x13: 0000000000000000 x12: 
0000000000000000
  [ 1628.012190] x11: 0000000000000000 x10: 0000000000000000 x9 : 
0000000000000000
  [ 1628.019313] x8 : 0000000000000000 x7 : 0000000000000000 x6 : 
0000000000000000
  [ 1628.026436] x5 : ffff000829c497ff x4 : ffff800033b503ff x3 : 
ffff000829c49780
  [ 1628.033559] x2 : ffffffffffffffef x1 : ffff800033b503c0 x0 : 
ffff000829c49400
  [ 1628.040683] Call trace:
  [ 1628.043115]  __memcpy+0x168/0x240
  [ 1628.046418]  acpi_data_show+0x5c/0x90
  [ 1628.050070]  sysfs_kf_bin_read+0x78/0xa0
  [ 1628.053982]  kernfs_file_read_iter+0x9c/0x1a4
  [ 1628.058326]  kernfs_fop_read_iter+0x34/0x50
  [ 1628.062497]  new_sync_read+0xf0/0x184
  [ 1628.066148]  vfs_read+0x158/0x1f0
  [ 1628.069451]  ksys_read+0x74/0x100
  [ 1628.072754]  __arm64_sys_read+0x28/0x34
  [ 1628.076578]  invoke_syscall+0x78/0x100
  [ 1628.080316]  el0_svc_common.constprop.0+0x54/0x184
  [ 1628.085096]  do_el0_svc+0x34/0x9c
  [ 1628.088397]  el0_svc+0x48/0x1b0
  [ 1628.091526]  el0t_64_sync_handler+0xa4/0x130
  [ 1628.095783]  el0t_64_sync+0x1a4/0x1a8
  [ 1628.099435] Code: a984346c a9c4342c f1010042 54fffee8 (a97c3c8e)
  [ 1628.105514] ---[ end trace 0000000000000000 ]---
  [ 1628.114726] pstore: crypto_comp_compress failed, ret = -22!
  [ 1628.147258] Internal error: Oops: 96000021 [#3] SMP
  [ 1628.152129] Modules linked in: efi_pstore nls_iso8859_1 joydev input_leds 
acpi_ipmi ipmi_ssif thunderx2_pmu cppc_cpufreq sch_fq_codel dm_multipath 
scsi_dh_rdac scsi_dh_emc scsi_dh_alua ipmi_devintf ipmi_msghandler ip_tables 
x_tables autofs4 btrfs blake2b_generic zstd_compress raid10 raid456 
async_raid6_recov async_memcpy async_pq async_xor async_tx xor xor_neon 
raid6_pq libcrc32c raid1 raid0 multipath linear hid_generic usbhid uas hid 
usb_storage ast drm_vram_helper drm_ttm_helper i2c_smbus ttm i2c_algo_bit 
drm_kms_helper syscopyarea crct10dif_ce sysfillrect ghash_ce sysimgblt sha2_ce 
fb_sys_fops cec sha256_arm64 rc_core sha1_ce qede mpt3sas qed raid_class drm 
scsi_transport_sas xhci_pci ahci xhci_pci_renesas gpio_xlp i2c_xlp9xx 
aes_neon_bs aes_neon_blk aes_ce_blk aes_ce_cipher
  [ 1628.221137] CPU: 36 PID: 4191 Comm: read_all Tainted: G      D           
5.17.0-8-generic #8~22.04.2-Ubuntu
  [ 1628.230871] Hardware name: To be filled by O.E.M. Saber/Saber, BIOS 
0ACKL030 06/04/2020
  [ 1628.238863] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
  [ 1628.245818] pc : __memcpy+0x168/0x240
  [ 1628.249474] lr : memory_read_from_buffer+0x58/0x80
  [ 1628.254260] sp : ffff800033efba70
  [ 1628.257563] x29: ffff800033efba70 x28: ffff00083e53a080 x27: 
0000000000000000
  [ 1628.264696] x26: 0000000000000000 x25: 0000000000000000 x24: 
ffff00080cbaab20
  [ 1628.271826] x23: ffff800033efbb70 x22: 00000000000003ff x21: 
ffff800033efbad8
  [ 1628.278956] x20: 00000000000003ff x19: 00000000000003ff x18: 
0000000000000000
  [ 1628.286085] x17: 0000000000000000 x16: 0000000000000000 x15: 
0000000000000000
  [ 1628.293214] x14: 0000000000000000 x13: 0000000000000000 x12: 
0000000000000000
  [ 1628.300343] x11: 0000000000000000 x10: 0000000000000000 x9 : 
0000000000000000
  [ 1628.307472] x8 : 0000000000000000 x7 : 0000000000000000 x6 : 
0000000000000000
  [ 1628.314602] x5 : ffff0008295163ff x4 : ffff800033b503ff x3 : 
ffff000829516380
  [ 1628.321731] x2 : ffffffffffffffef x1 : ffff800033b503c0 x0 : 
ffff000829516000
  [ 1628.328860] Call trace:
  [ 1628.331296]  __memcpy+0x168/0x240
  [ 1628.334603]  acpi_data_show+0x5c/0x90
  [ 1628.338260]  sysfs_kf_bin_read+0x78/0xa0
  [ 1628.342176]  kernfs_file_read_iter+0x9c/0x1a4
  [ 1628.346525]  kernfs_fop_read_iter+0x34/0x50
  [ 1628.350700]  new_sync_read+0xf0/0x184
  [ 1628.354356]  vfs_read+0x158/0x1f0
  [ 1628.357664]  ksys_read+0x74/0x100
  [ 1628.360971]  __arm64_sys_read+0x28/0x34
  [ 1628.364800]  invoke_syscall+0x78/0x100
  [ 1628.368543]  el0_svc_common.constprop.0+0x54/0x184
  [ 1628.373328]  do_el0_svc+0x34/0x9c
  [ 1628.376632]  el0_svc+0x48/0x1b0
  [ 1628.379765]  el0t_64_sync_handler+0xa4/0x130
  [ 1628.384026]  el0t_64_sync+0x1a4/0x1a8
  [ 1628.387682] Code: a984346c a9c4342c f1010042 54fffee8 (a97c3c8e)
  [ 1628.393766] ---[ end trace 0000000000000000 ]---

  This issue will cause the following 22 tests failed, because of "TBROK: 
Kernel is already tainted"
  * ubuntu_ltp.sched:cfs_bandwidth01
  * ubuntu_ltp.pty:pty05
  * ubuntu_ltp.pty:pty06
  * ubuntu_ltp.pty:pty07
  * ubuntu_ltp.cve:cve-2016-8655
  * ubuntu_ltp.cve:cve-2017-2636
  * ubuntu_ltp.cve:cve-2017-10661
  * ubuntu_ltp.cve:cve-2017-17712
  * ubuntu_ltp.cve:cve-2017-1000112
  * ubuntu_ltp.cve:cve-2017-1000380
  * ubuntu_ltp.cve:cve-2018-7566
  * ubuntu_ltp.cve:cve-2018-9568
  * ubuntu_ltp.cve:cve-2018-18445
  * ubuntu_ltp.cve:cve-2018-18559
  * ubuntu_ltp.cve:cve-2019-8912
  * ubuntu_ltp.cve:cve-2020-14386
  * ubuntu_ltp.cve:cve-2021-3444
  * ubuntu_ltp.cve:cve-2021-3609
  * ubuntu_ltp.cve:cve-2021-22555
  * ubuntu_ltp.cve:cve-2021-26708
  * ubuntu_ltp.cve:cve-2021-22600
  * ubuntu_ltp.crypto:af_alg07

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1973153/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to