Kernel crash with preinstalled Kinetic image

Bug #2002090 reported by Heinrich Schuchardt
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
linux-allwinner (Ubuntu)
New
Undecided
Unassigned

Bug Description

When trying to boot the Kinetic preinstalled image ubuntu-22.10-preinstalled-server-riscv64+licheerv.img.xz (https://cdimage.ubuntu.com/releases/22.10/release/ubuntu-22.10-preinstalled-server-riscv64+licheerv.img.xz) with a 0fe6:9700 "ICS Advent DM9601 Fast Ethernet Adapter" plugged in the following crash occurs:

[ 163.933818] Unable to handle kernel paging request at virtual address fffffffdf54d0289
[ 163.941784] Oops [#1]
[ 163.944072] Modules linked in: binfmt_misc cfg80211 snd_soc_hdmi_codec dw_hdmi_i2s_audio dw_hdmi_cec sr9700 dm9601 usbnet pwrseq_simple sunxi_cir rc_core sun8i_drm_hdmi dw_hdmi sun8i_mixer sunxi phy_generic sunxi_cedrus(C) snd_soc_simple_card v4l2_mem2mem sun20i_codec snd_soc_dmic videobuf2_dma_contig snd_soc_simple_card_utils videobuf2_memops videobuf2_v4l2 sun4i_drm videobuf2_common sun4i_frontend sun4i_tcon sun8i_tcon_top display_connector drm_cma_helper snd_soc_core videodev snd_compress ac97_bus snd_pcm_dmaengine drm_kms_helper snd_pcm leds_sun50i_r329 led_class_multicolor mc snd_timer fb_sys_fops snd syscopyarea sysfillrect sysimgblt leds_gpio backlight soundcore nls_iso8859_1 uio_pdrv_genirq uio dm_multipath scsi_dh_rdac scsi_dh_emc scsi_dh_alua ramoops reed_solomon pstore_blk pstore_zone efi_pstore ip_tables x_tables autofs4 efivarfs raid10 raid456 libcrc32c async_raid6_recov async_memcpy async_pq async_xor xor async_tx raid6_pq raid1 raid0 multipath linear
[ 164.030015] CPU: 0 PID: 668 Comm: (d-logind) Tainted: G C 5.17.0-1003-allwinner #3-Ubuntu
[ 164.039517] Hardware name: Sipeed Lichee RV Dock (DT)
[ 164.044578] epc : __update_blocked_fair.isra.0+0xb6/0x3ca
[ 164.050012] ra : __update_blocked_fair.isra.0+0xa6/0x3ca
[ 164.055437] epc : ffffffff80060b1e ra : ffffffff80060b0e sp : ffffffd8056d7650
[ 164.062678] gp : ffffffff81e93b80 tp : ffffffd804023e80 t0 : 000000000000000e
[ 164.069918] t1 : 0000000000000000 t2 : 0000000000000407 s0 : ffffffd8056d76d0
[ 164.077156] s1 : ffffffd806012800 a0 : ffffffffffffffff a1 : d4be6efdf54d01a9
[ 164.084395] a2 : 0000000000000007 a3 : ffffffff81ea6540 a4 : ffffffd80461e780
[ 164.091634] a5 : ffffffd80493db98 a6 : 0000000000000000 a7 : 0000000000000000
[ 164.098873] s2 : ffffffd806012940 s3 : 0000000000001000 s4 : ffffffd81ecc2780
[ 164.106114] s5 : 0000000000000000 s6 : 000000000000b67e s7 : ffffffd8056d76d7
[ 164.113354] s8 : ffffffff80e7d600 s9 : 000000262b36e925 s10: 0000000000000100
[ 164.120595] s11: ffffffd804432400 t3 : 000000000000001c t4 : 0000016cddfa32cc
[ 164.127835] t5 : 0000000000000407 t6 : 00000407ab360ba9
[ 164.133162] status: 0000000200000100 badaddr: fffffffdf54d0289 cause: 000000000000000d
[ 164.141097] [<ffffffff80060f56>] update_blocked_averages+0x124/0x1d2
[ 164.147475] [<ffffffff80066c48>] newidle_balance+0x120/0x3b6
[ 164.153160] [<ffffffff80066f62>] pick_next_task_fair+0x4e/0x318
[ 164.159102] [<ffffffff80b1c46c>] __schedule+0x144/0x630
[ 164.164354] [<ffffffff80b1c9a8>] schedule+0x50/0xc2
[ 164.169253] [<ffffffff80b1ccec>] io_schedule+0x4c/0x66
[ 164.174413] [<ffffffff801b12b4>] folio_wait_bit_common+0x218/0x396
[ 164.180630] [<ffffffff801b18e0>] filemap_update_page+0x2cc/0x2da
[ 164.186660] [<ffffffff801b1ae0>] filemap_get_pages+0x1f2/0x314
[ 164.192516] [<ffffffff801b1cac>] filemap_read+0xaa/0x276
[ 164.197851] [<ffffffff801b3146>] generic_file_read_iter+0xf2/0x14e
[ 164.204054] [<ffffffff8033174e>] ext4_file_read_iter+0x60/0x160
[ 164.210007] [<ffffffff80266ff0>] __kernel_read+0xfc/0x23c
[ 164.215433] [<ffffffff80267188>] kernel_read+0x58/0x8e
[ 164.220594] [<ffffffff8026dc92>] search_binary_handler+0x64/0x240
[ 164.226710] [<ffffffff8026df52>] exec_binprm+0x54/0x14a
[ 164.231956] [<ffffffff8026f20e>] bprm_execve.part.0+0x178/0x1d2
[ 164.237899] [<ffffffff8026f2be>] bprm_execve+0x56/0x80
[ 164.243059] [<ffffffff8026f8de>] do_execveat_common+0x16e/0x1ee
[ 164.248999] [<ffffffff8026f99a>] sys_execve+0x3c/0x48
[ 164.254072] [<ffffffff80003b86>] ret_from_syscall+0x0/0x2

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.