Comment 0 for bug 1879470

Revision history for this message
Colin Ian King (colin-king) wrote :

Running stress-ng coverage testss on an ARM64 VM gcov 5.4.0-26-generic focal kernel trips the following oops:

[ 894.205097] swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000000bf608000
[ 894.209645] [ffffabd0c7eba050] pgd=00000001b6fff003, pud=00000001b6ffe003, pmd=000000019b19d003, pte=006000011f517f93
[ 894.217586] Internal error: Oops: 9600004f [#1] SMP
[ 894.220753] Modules linked in: userio(+) aes_arm64 algif_rng aegis128 algif_aead anubis fcrypt khazad seed sm4_generic tea crc32_generic md4 michael_mic nhpoly1305_neon nhpoly1305 poly1305_generic rmd128 rmd160 rmd256 rmd320 sha3_generic sm3_generic streebog_generic tgr192 wp512 xxhash_generic algif_hash blowfish_generic blowfish_common cast5_generic des_generic libdes salsa20_generic chacha_neon chacha_generic unix_diag camellia_generic cast6_generic cast_common sctp serpent_generic twofish_generic twofish_common algif_skcipher atm af_alg dccp_ipv4 dccp xfs binfmt_misc zfs(PO) zunicode(PO) zavl(PO) icp(PO) zlua(PO) nls_iso8859_1 zcommon(PO) znvpair(PO) dm_multipath scsi_dh_rdac scsi_dh_emc spl(O) scsi_dh_alua qemu_fw_cfg nfsd auth_rpcgss sch_fq_codel nfs_acl lockd grace drm sunrpc virtio_rng ip_tables x_tables autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor xor_neon raid6_pq libcrc32c raid1 raid0 multipath linear crct10dif_ce
[ 894.227087] ghash_ce sha2_ce sha256_arm64 sha1_ce virtio_net virtio_blk net_failover virtio_scsi failover aes_neon_bs aes_neon_blk aes_ce_blk crypto_simd cryptd aes_ce_cipher
[ 894.287863] CPU: 5 PID: 24647 Comm: modprobe Tainted: P O 5.4.0-26-generic #30
[ 894.292103] Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015
[ 894.295900] pstate: 60400005 (nZCv daif +PAN -UAO)
[ 894.298999] pc : jump_label_swap+0x2c/0x80
[ 894.301451] lr : jump_label_swap+0x1c/0x80
[ 894.304012] sp : ffff8000168cba30
[ 894.305734] x29: ffff8000168cba30 x28: ffffabd0c7eba0b0
[ 894.308535] x27: ffffabd0c7eba050 x26: 0000000000000010
[ 894.311432] x25: 0000000000000010 x24: ffffabd0da14c3c0
[ 894.315165] x23: 0000000000000050 x22: 0000000000000000
[ 894.319411] x21: ffffabd0c7eba000 x20: ffffabd0c7eba050
[ 894.323865] x19: ffffabd0c7eba0b0 x18: 0000000000000000
[ 894.327192] x17: da02346b4a843289 x16: 785f32823a7a414c
[ 894.330232] x15: 000055552ed60f0f x14: 0000000000000004
[ 894.333187] x13: ffffabd0d8a918f0 x12: 0000000000000030
[ 894.336289] x11: ffff0000cc4c3420 x10: ffff00015cc23828
[ 894.339448] x9 : 0000000000000000 x8 : ffffabd0dd503000
[ 894.343242] x7 : 0000000000000000 x6 : 0000000000000000
[ 894.348272] x5 : 0000000000000001 x4 : 00000000ffffd82c
[ 894.351581] x3 : 00000000ffffd9bc x2 : 00000000ffffe410
[ 894.355001] x1 : ffffabd0d9d3e76c x0 : ffffffffffffffa0
[ 894.358183] Call trace:
[ 894.359991] jump_label_swap+0x2c/0x80
[ 894.362067] do_swap+0x40/0x170
[ 894.363886] sort_r+0x200/0x2f0
[ 894.365400] sort+0x30/0x48
[ 894.367488] jump_label_add_module+0x7c/0x458
[ 894.371041] jump_label_module_notify+0xc8/0x190
[ 894.375615] notifier_call_chain+0xa4/0x108
[ 894.378428] __blocking_notifier_call_chain+0xa4/0xe0
[ 894.381374] blocking_notifier_call_chain+0x54/0x70
[ 894.384374] load_module+0x1674/0x1d50
[ 894.386229] __do_sys_finit_module+0x184/0x1d8
[ 894.388569] __arm64_sys_finit_module+0x40/0x58
[ 894.390935] el0_svc_common.constprop.0+0x150/0x5e8
[ 894.394000] el0_svc_handler+0xbc/0x260
[ 894.396581] el0_svc+0x10/0x14
[ 894.398445] Code: b9400262 cb130280 29400e84 4b000042 (b9000282)
[ 894.402792] ---[ end trace 05455454484e1508 ]---
[ 897.757436] loop_set_block_size: loop3 () has still dirty pages (nrpages=1)