2020-03-10 07:49:06 |
Po-Hsu Lin |
bug |
|
|
added bug |
2020-03-10 07:49:25 |
Po-Hsu Lin |
tags |
|
4.15 arm64 kqa-blocker sru-20200217 xenial |
|
2020-03-10 07:50:55 |
Po-Hsu Lin |
bug task added |
|
stress-ng |
|
2020-03-10 07:51:03 |
Po-Hsu Lin |
tags |
4.15 arm64 kqa-blocker sru-20200217 xenial |
4.15 arm64 kqa-blocker sru-20200217 ubuntu-stress-smoke-test xenial |
|
2020-03-10 07:57:01 |
Po-Hsu Lin |
description |
Issue found on new ARM64 node "hotdog" 4.15.0-91.92~16.04.1
Failed 2 of 2 attempts.
sysfs STARTING
sysfs RETURNED 0
sysfs FAILED (kernel oopsed)
[ 1075.760640] Unable to handle kernel paging request at virtual address ffff00004a70072a
[ 1075.763319] Unable to handle kernel paging request at virtual address ffff00004a70e4ba
[ 1075.768563] Mem abort info:
[ 1075.768566] ESR = 0x96000021
[ 1075.768568] Exception class = DABT (current EL), IL = 32 bits
[ 1075.768569] SET = 0, FnV = 0
[ 1075.768570] EA = 0, S1PTW = 0
[ 1075.768571] Data abort info:
[ 1075.768577] ISV = 0, ISS = 0x00000021
[ 1075.776489] Mem abort info:
[ 1075.776491] ESR = 0x96000021
[ 1075.776493] Exception class = DABT (current EL), IL = 32 bits
[ 1075.776494] SET = 0, FnV = 0
[ 1075.776495] EA = 0, S1PTW = 0
[ 1075.776496] Data abort info:
[ 1075.776500] ISV = 0, ISS = 0x00000021
[ 1075.779284] CM = 0, WnR = 0
[ 1075.779288] swapper pgtable: 4k pages, 48-bit VAs, pgd = 00000000facfed4f
[ 1075.779290] [ffff00004a70072a] *pgd=000000bffcffe003, *pud=0000009f6122c003, *pmd=000000bf5adf4003, *pte=0068000080280703
[ 1075.782342] CM = 0, WnR = 0
[ 1075.782346] swapper pgtable: 4k pages, 48-bit VAs, pgd = 00000000facfed4f
[ 1075.782352] [ffff00004a70e4ba] *pgd=000000bffcffe003, *pud=0000009f6122c003, *pmd=000000bf5adf4003, *pte=006800008028e703
[ 1075.788262] Internal error: Oops: 96000021 [#2] SMP
[ 1075.788269] Modules linked in: unix_diag binfmt_misc snd_seq snd_seq_device snd_timer snd soundcore userio vfio_iommu_type1 vfio hci_vhci bluetooth ecdh_generic uhid cuse vhost_vsock vmw_vsock_virtio_transport_common vhost_net vhost vsock tap dccp_ipv4 dccp ipx p8023 atm psnap p8022 llc algif_rng algif_aead anubis fcrypt khazad seed tea md4 michael_mic poly1305_generic rmd128 rmd160 rmd256 rmd320 sha3_generic sm3_generic tgr192 wp512 algif_hash chacha20_neon chacha20_generic blowfish_generic blowfish_common cast5_generic des_generic salsa20_generic camellia_generic cast6_generic cast_common serpent_generic twofish_generic twofish_common algif_skcipher af_alg nls_iso8859_1 ipmi_ssif ipmi_devintf joydev input_leds ipmi_msghandler shpchp i2c_xlp9xx(+) thunderx2_pmu ib_iser rdma_cm iw_cm ib_cm ib_core
[ 1075.942470] iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear hid_generic usbhid hid uas usb_storage aes_ce_blk aes_ce_cipher crc32_ce qede ast i2c_algo_bit crct10dif_ce ptp ghash_ce ttm drm_kms_helper sha2_ce pps_core syscopyarea sysfillrect sysimgblt fb_sys_fops sha256_arm64 sha1_ce mpt3sas qed drm raid_class scsi_transport_sas ahci libahci gpio_xlp aes_neon_bs aes_neon_blk crypto_simd cryptd aes_arm64
[ 1075.991997] Process stress-ng-sysfs (pid: 108395, stack limit = 0x000000009cb607b8)
[ 1075.999643] CPU: 100 PID: 108395 Comm: stress-ng-sysfs Tainted: G D 4.15.0-91-generic #92~16.04.1-Ubuntu
[ 1076.010324] Hardware name: To be filled by O.E.M. Saber/Saber, BIOS 0ACKL027 07/01/2019
[ 1076.018314] pstate: 80400009 (Nzcv daif +PAN -UAO)
[ 1076.023096] pc : __memcpy+0x84/0x180
[ 1076.026663] lr : memory_read_from_buffer+0x64/0x88
[ 1076.031441] sp : ffff00003ea2bd10
[ 1076.034743] x29: ffff00003ea2bd10 x28: ffff80be4d85cb00
[ 1076.040042] x27: ffff000008b42000 x26: 000000000000003f
[ 1076.045342] x25: 0000000000000124 x24: ffff00004a700000
[ 1076.050643] x23: ffff809e3a7e8500 x22: 000000000000000a
[ 1076.055942] x21: ffff00003ea2bd88 x20: 000000000000000a
[ 1076.061240] x19: 0000000000000734 x18: 0000000000000014
[ 1076.066540] x17: 0000ffffaf4e1a58 x16: ffff0000082e8e28
[ 1076.071839] x15: 00002d88734750e0 x14: 00181a0596c27059
[ 1076.077138] x13: 00000003e8000000 x12: 0000000000000018
[ 1076.082436] x11: 000000000006372e x10: 000000005e66c174
[ 1076.087735] x9 : 003b9aca00000000 x8 : 000000000000003f
[ 1076.093034] x7 : ffff000008645490 x6 : ffff809e3a7e8500
[ 1076.098333] x5 : 000000000000000a x4 : 0000000000010000
[ 1076.103633] x3 : ffff00004a700000 x2 : 000000000000000a
[ 1076.108932] x1 : ffff00004a70072a x0 : ffff809e3a7e8500
[ 1076.114231] Call trace:
[ 1076.116668] __memcpy+0x84/0x180
[ 1076.119887] acpi_data_show+0x54/0x80
[ 1076.123541] sysfs_kf_bin_read+0x6c/0xa8
[ 1076.127451] kernfs_fop_read+0xa4/0x1e0
[ 1076.131274] __vfs_read+0x48/0x90
[ 1076.134577] vfs_read+0x94/0x150
[ 1076.137792] SyS_read+0x74/0xf0
[ 1076.140923] el0_svc_naked+0x30/0x34
[ 1076.144487] Code: a88120c7 a8c12027 a88120c7 36180062 (f8408423)
[ 1076.150570] ---[ end trace 496ae41e9716bef2 ]---
[ 1076.155180] Internal error: Oops: 96000021 [#3] SMP
[ 1076.160054] Modules linked in: unix_diag binfmt_misc snd_seq snd_seq_device snd_timer snd soundcore userio vfio_iommu_type1 vfio hci_vhci bluetooth ecdh_generic uhid cuse vhost_vsock vmw_vsock_virtio_transport_common vhost_net vhost vsock tap dccp_ipv4 dccp ipx p8023 atm psnap p8022 llc algif_rng algif_aead anubis fcrypt khazad seed tea md4 michael_mic poly1305_generic rmd128 rmd160 rmd256 rmd320 sha3_generic sm3_generic tgr192 wp512 algif_hash chacha20_neon chacha20_generic blowfish_generic blowfish_common cast5_generic des_generic salsa20_generic camellia_generic cast6_generic cast_common serpent_generic twofish_generic twofish_common algif_skcipher af_alg nls_iso8859_1 ipmi_ssif ipmi_devintf joydev input_leds ipmi_msghandler shpchp i2c_xlp9xx(+) thunderx2_pmu ib_iser rdma_cm iw_cm ib_cm ib_core
[ 1076.230688] iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear hid_generic usbhid hid uas usb_storage aes_ce_blk aes_ce_cipher crc32_ce qede ast i2c_algo_bit crct10dif_ce ptp ghash_ce ttm drm_kms_helper sha2_ce pps_core syscopyarea sysfillrect sysimgblt fb_sys_fops sha256_arm64 sha1_ce mpt3sas qed drm raid_class scsi_transport_sas ahci libahci gpio_xlp aes_neon_bs aes_neon_blk crypto_simd cryptd aes_arm64
[ 1076.280211] Process stress-ng-sysfs (pid: 108405, stack limit = 0x00000000081889d7)
[ 1076.287856] CPU: 155 PID: 108405 Comm: stress-ng-sysfs Tainted: G D 4.15.0-91-generic #92~16.04.1-Ubuntu
[ 1076.298538] Hardware name: To be filled by O.E.M. Saber/Saber, BIOS 0ACKL027 07/01/2019
[ 1076.306530] pstate: 80400009 (Nzcv daif +PAN -UAO)
[ 1076.311319] pc : __memcpy+0x84/0x180
[ 1076.314890] lr : memory_read_from_buffer+0x64/0x88
[ 1076.319667] sp : ffff00003eea3d10
[ 1076.322969] x29: ffff00003eea3d10 x28: ffff80be4d858000
[ 1076.328269] x27: ffff000008b42000 x26: 000000000000003f
[ 1076.333568] x25: 0000000000000124 x24: ffff00004a700000
[ 1076.338868] x23: ffff80bec6fa7400 x22: 000000000000000d
[ 1076.344167] x21: ffff00003eea3d88 x20: 000000000000000d
[ 1076.349467] x19: 000000000000e4c7 x18: 0000000000000014
[ 1076.354767] x17: 0000ffffaf4e1a58 x16: ffff0000082e8e28
[ 1076.360068] x15: 0000566c10765956 x14: 00181a0596c27059
[ 1076.365368] x13: 00000003e8000000 x12: 0000000000000018
[ 1076.370667] x11: 00000000000641a6 x10: 000000005e66c174
[ 1076.375966] x9 : 003b9aca00000000 x8 : 000000000000003f
[ 1076.381265] x7 : ffff000008645490 x6 : ffff80bec6fa7400
[ 1076.386564] x5 : 000000000000000d x4 : 0000000000010000
[ 1076.391864] x3 : ffff00004a700000 x2 : 000000000000000d
[ 1076.397163] x1 : ffff00004a70e4ba x0 : ffff80bec6fa7400
[ 1076.402463] Call trace:
[ 1076.404901] __memcpy+0x84/0x180
[ 1076.408125] acpi_data_show+0x54/0x80
[ 1076.411785] sysfs_kf_bin_read+0x6c/0xa8
[ 1076.415696] kernfs_fop_read+0xa4/0x1e0
[ 1076.419520] __vfs_read+0x48/0x90
[ 1076.422823] vfs_read+0x94/0x150
[ 1076.426038] SyS_read+0x74/0xf0
[ 1076.429171] el0_svc_naked+0x30/0x34
[ 1076.432736] Code: a88120c7 a8c12027 a88120c7 36180062 (f8408423)
[ 1076.438818] ---[ end trace 496ae41e9716bef3 ]--- |
Issue found on new ARM64 node "hotdog" 4.15.0-91.92~16.04.1
Failed 2 of 2 attempts.
Test suite HEAD SHA1: 3f43e81
sysfs STARTING
sysfs RETURNED 0
sysfs FAILED (kernel oopsed)
[ 1075.760640] Unable to handle kernel paging request at virtual address ffff00004a70072a
[ 1075.763319] Unable to handle kernel paging request at virtual address ffff00004a70e4ba
[ 1075.768563] Mem abort info:
[ 1075.768566] ESR = 0x96000021
[ 1075.768568] Exception class = DABT (current EL), IL = 32 bits
[ 1075.768569] SET = 0, FnV = 0
[ 1075.768570] EA = 0, S1PTW = 0
[ 1075.768571] Data abort info:
[ 1075.768577] ISV = 0, ISS = 0x00000021
[ 1075.776489] Mem abort info:
[ 1075.776491] ESR = 0x96000021
[ 1075.776493] Exception class = DABT (current EL), IL = 32 bits
[ 1075.776494] SET = 0, FnV = 0
[ 1075.776495] EA = 0, S1PTW = 0
[ 1075.776496] Data abort info:
[ 1075.776500] ISV = 0, ISS = 0x00000021
[ 1075.779284] CM = 0, WnR = 0
[ 1075.779288] swapper pgtable: 4k pages, 48-bit VAs, pgd = 00000000facfed4f
[ 1075.779290] [ffff00004a70072a] *pgd=000000bffcffe003, *pud=0000009f6122c003, *pmd=000000bf5adf4003, *pte=0068000080280703
[ 1075.782342] CM = 0, WnR = 0
[ 1075.782346] swapper pgtable: 4k pages, 48-bit VAs, pgd = 00000000facfed4f
[ 1075.782352] [ffff00004a70e4ba] *pgd=000000bffcffe003, *pud=0000009f6122c003, *pmd=000000bf5adf4003, *pte=006800008028e703
[ 1075.788262] Internal error: Oops: 96000021 [#2] SMP
[ 1075.788269] Modules linked in: unix_diag binfmt_misc snd_seq snd_seq_device snd_timer snd soundcore userio vfio_iommu_type1 vfio hci_vhci bluetooth ecdh_generic uhid cuse vhost_vsock vmw_vsock_virtio_transport_common vhost_net vhost vsock tap dccp_ipv4 dccp ipx p8023 atm psnap p8022 llc algif_rng algif_aead anubis fcrypt khazad seed tea md4 michael_mic poly1305_generic rmd128 rmd160 rmd256 rmd320 sha3_generic sm3_generic tgr192 wp512 algif_hash chacha20_neon chacha20_generic blowfish_generic blowfish_common cast5_generic des_generic salsa20_generic camellia_generic cast6_generic cast_common serpent_generic twofish_generic twofish_common algif_skcipher af_alg nls_iso8859_1 ipmi_ssif ipmi_devintf joydev input_leds ipmi_msghandler shpchp i2c_xlp9xx(+) thunderx2_pmu ib_iser rdma_cm iw_cm ib_cm ib_core
[ 1075.942470] iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear hid_generic usbhid hid uas usb_storage aes_ce_blk aes_ce_cipher crc32_ce qede ast i2c_algo_bit crct10dif_ce ptp ghash_ce ttm drm_kms_helper sha2_ce pps_core syscopyarea sysfillrect sysimgblt fb_sys_fops sha256_arm64 sha1_ce mpt3sas qed drm raid_class scsi_transport_sas ahci libahci gpio_xlp aes_neon_bs aes_neon_blk crypto_simd cryptd aes_arm64
[ 1075.991997] Process stress-ng-sysfs (pid: 108395, stack limit = 0x000000009cb607b8)
[ 1075.999643] CPU: 100 PID: 108395 Comm: stress-ng-sysfs Tainted: G D 4.15.0-91-generic #92~16.04.1-Ubuntu
[ 1076.010324] Hardware name: To be filled by O.E.M. Saber/Saber, BIOS 0ACKL027 07/01/2019
[ 1076.018314] pstate: 80400009 (Nzcv daif +PAN -UAO)
[ 1076.023096] pc : __memcpy+0x84/0x180
[ 1076.026663] lr : memory_read_from_buffer+0x64/0x88
[ 1076.031441] sp : ffff00003ea2bd10
[ 1076.034743] x29: ffff00003ea2bd10 x28: ffff80be4d85cb00
[ 1076.040042] x27: ffff000008b42000 x26: 000000000000003f
[ 1076.045342] x25: 0000000000000124 x24: ffff00004a700000
[ 1076.050643] x23: ffff809e3a7e8500 x22: 000000000000000a
[ 1076.055942] x21: ffff00003ea2bd88 x20: 000000000000000a
[ 1076.061240] x19: 0000000000000734 x18: 0000000000000014
[ 1076.066540] x17: 0000ffffaf4e1a58 x16: ffff0000082e8e28
[ 1076.071839] x15: 00002d88734750e0 x14: 00181a0596c27059
[ 1076.077138] x13: 00000003e8000000 x12: 0000000000000018
[ 1076.082436] x11: 000000000006372e x10: 000000005e66c174
[ 1076.087735] x9 : 003b9aca00000000 x8 : 000000000000003f
[ 1076.093034] x7 : ffff000008645490 x6 : ffff809e3a7e8500
[ 1076.098333] x5 : 000000000000000a x4 : 0000000000010000
[ 1076.103633] x3 : ffff00004a700000 x2 : 000000000000000a
[ 1076.108932] x1 : ffff00004a70072a x0 : ffff809e3a7e8500
[ 1076.114231] Call trace:
[ 1076.116668] __memcpy+0x84/0x180
[ 1076.119887] acpi_data_show+0x54/0x80
[ 1076.123541] sysfs_kf_bin_read+0x6c/0xa8
[ 1076.127451] kernfs_fop_read+0xa4/0x1e0
[ 1076.131274] __vfs_read+0x48/0x90
[ 1076.134577] vfs_read+0x94/0x150
[ 1076.137792] SyS_read+0x74/0xf0
[ 1076.140923] el0_svc_naked+0x30/0x34
[ 1076.144487] Code: a88120c7 a8c12027 a88120c7 36180062 (f8408423)
[ 1076.150570] ---[ end trace 496ae41e9716bef2 ]---
[ 1076.155180] Internal error: Oops: 96000021 [#3] SMP
[ 1076.160054] Modules linked in: unix_diag binfmt_misc snd_seq snd_seq_device snd_timer snd soundcore userio vfio_iommu_type1 vfio hci_vhci bluetooth ecdh_generic uhid cuse vhost_vsock vmw_vsock_virtio_transport_common vhost_net vhost vsock tap dccp_ipv4 dccp ipx p8023 atm psnap p8022 llc algif_rng algif_aead anubis fcrypt khazad seed tea md4 michael_mic poly1305_generic rmd128 rmd160 rmd256 rmd320 sha3_generic sm3_generic tgr192 wp512 algif_hash chacha20_neon chacha20_generic blowfish_generic blowfish_common cast5_generic des_generic salsa20_generic camellia_generic cast6_generic cast_common serpent_generic twofish_generic twofish_common algif_skcipher af_alg nls_iso8859_1 ipmi_ssif ipmi_devintf joydev input_leds ipmi_msghandler shpchp i2c_xlp9xx(+) thunderx2_pmu ib_iser rdma_cm iw_cm ib_cm ib_core
[ 1076.230688] iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear hid_generic usbhid hid uas usb_storage aes_ce_blk aes_ce_cipher crc32_ce qede ast i2c_algo_bit crct10dif_ce ptp ghash_ce ttm drm_kms_helper sha2_ce pps_core syscopyarea sysfillrect sysimgblt fb_sys_fops sha256_arm64 sha1_ce mpt3sas qed drm raid_class scsi_transport_sas ahci libahci gpio_xlp aes_neon_bs aes_neon_blk crypto_simd cryptd aes_arm64
[ 1076.280211] Process stress-ng-sysfs (pid: 108405, stack limit = 0x00000000081889d7)
[ 1076.287856] CPU: 155 PID: 108405 Comm: stress-ng-sysfs Tainted: G D 4.15.0-91-generic #92~16.04.1-Ubuntu
[ 1076.298538] Hardware name: To be filled by O.E.M. Saber/Saber, BIOS 0ACKL027 07/01/2019
[ 1076.306530] pstate: 80400009 (Nzcv daif +PAN -UAO)
[ 1076.311319] pc : __memcpy+0x84/0x180
[ 1076.314890] lr : memory_read_from_buffer+0x64/0x88
[ 1076.319667] sp : ffff00003eea3d10
[ 1076.322969] x29: ffff00003eea3d10 x28: ffff80be4d858000
[ 1076.328269] x27: ffff000008b42000 x26: 000000000000003f
[ 1076.333568] x25: 0000000000000124 x24: ffff00004a700000
[ 1076.338868] x23: ffff80bec6fa7400 x22: 000000000000000d
[ 1076.344167] x21: ffff00003eea3d88 x20: 000000000000000d
[ 1076.349467] x19: 000000000000e4c7 x18: 0000000000000014
[ 1076.354767] x17: 0000ffffaf4e1a58 x16: ffff0000082e8e28
[ 1076.360068] x15: 0000566c10765956 x14: 00181a0596c27059
[ 1076.365368] x13: 00000003e8000000 x12: 0000000000000018
[ 1076.370667] x11: 00000000000641a6 x10: 000000005e66c174
[ 1076.375966] x9 : 003b9aca00000000 x8 : 000000000000003f
[ 1076.381265] x7 : ffff000008645490 x6 : ffff80bec6fa7400
[ 1076.386564] x5 : 000000000000000d x4 : 0000000000010000
[ 1076.391864] x3 : ffff00004a700000 x2 : 000000000000000d
[ 1076.397163] x1 : ffff00004a70e4ba x0 : ffff80bec6fa7400
[ 1076.402463] Call trace:
[ 1076.404901] __memcpy+0x84/0x180
[ 1076.408125] acpi_data_show+0x54/0x80
[ 1076.411785] sysfs_kf_bin_read+0x6c/0xa8
[ 1076.415696] kernfs_fop_read+0xa4/0x1e0
[ 1076.419520] __vfs_read+0x48/0x90
[ 1076.422823] vfs_read+0x94/0x150
[ 1076.426038] SyS_read+0x74/0xf0
[ 1076.429171] el0_svc_naked+0x30/0x34
[ 1076.432736] Code: a88120c7 a8c12027 a88120c7 36180062 (f8408423)
[ 1076.438818] ---[ end trace 496ae41e9716bef3 ]--- |
|
2020-03-10 09:15:23 |
Colin Ian King |
bug |
|
|
added subscriber Colin Ian King |
2020-03-10 09:32:23 |
Colin Ian King |
ubuntu-kernel-tests: importance |
Undecided |
Medium |
|
2020-03-10 09:32:24 |
Colin Ian King |
ubuntu-kernel-tests: assignee |
|
Colin Ian King (colin-king) |
|
2020-03-10 09:32:28 |
Colin Ian King |
ubuntu-kernel-tests: status |
New |
Incomplete |
|
2020-03-10 14:14:26 |
Sean Feole |
tags |
4.15 arm64 kqa-blocker sru-20200217 ubuntu-stress-smoke-test xenial |
4.15 arm64 sru-20200217 ubuntu-stress-smoke-test xenial |
|
2020-03-11 11:26:50 |
Colin Ian King |
ubuntu-kernel-tests: status |
Incomplete |
In Progress |
|
2020-03-17 15:15:39 |
Colin Ian King |
description |
Issue found on new ARM64 node "hotdog" 4.15.0-91.92~16.04.1
Failed 2 of 2 attempts.
Test suite HEAD SHA1: 3f43e81
sysfs STARTING
sysfs RETURNED 0
sysfs FAILED (kernel oopsed)
[ 1075.760640] Unable to handle kernel paging request at virtual address ffff00004a70072a
[ 1075.763319] Unable to handle kernel paging request at virtual address ffff00004a70e4ba
[ 1075.768563] Mem abort info:
[ 1075.768566] ESR = 0x96000021
[ 1075.768568] Exception class = DABT (current EL), IL = 32 bits
[ 1075.768569] SET = 0, FnV = 0
[ 1075.768570] EA = 0, S1PTW = 0
[ 1075.768571] Data abort info:
[ 1075.768577] ISV = 0, ISS = 0x00000021
[ 1075.776489] Mem abort info:
[ 1075.776491] ESR = 0x96000021
[ 1075.776493] Exception class = DABT (current EL), IL = 32 bits
[ 1075.776494] SET = 0, FnV = 0
[ 1075.776495] EA = 0, S1PTW = 0
[ 1075.776496] Data abort info:
[ 1075.776500] ISV = 0, ISS = 0x00000021
[ 1075.779284] CM = 0, WnR = 0
[ 1075.779288] swapper pgtable: 4k pages, 48-bit VAs, pgd = 00000000facfed4f
[ 1075.779290] [ffff00004a70072a] *pgd=000000bffcffe003, *pud=0000009f6122c003, *pmd=000000bf5adf4003, *pte=0068000080280703
[ 1075.782342] CM = 0, WnR = 0
[ 1075.782346] swapper pgtable: 4k pages, 48-bit VAs, pgd = 00000000facfed4f
[ 1075.782352] [ffff00004a70e4ba] *pgd=000000bffcffe003, *pud=0000009f6122c003, *pmd=000000bf5adf4003, *pte=006800008028e703
[ 1075.788262] Internal error: Oops: 96000021 [#2] SMP
[ 1075.788269] Modules linked in: unix_diag binfmt_misc snd_seq snd_seq_device snd_timer snd soundcore userio vfio_iommu_type1 vfio hci_vhci bluetooth ecdh_generic uhid cuse vhost_vsock vmw_vsock_virtio_transport_common vhost_net vhost vsock tap dccp_ipv4 dccp ipx p8023 atm psnap p8022 llc algif_rng algif_aead anubis fcrypt khazad seed tea md4 michael_mic poly1305_generic rmd128 rmd160 rmd256 rmd320 sha3_generic sm3_generic tgr192 wp512 algif_hash chacha20_neon chacha20_generic blowfish_generic blowfish_common cast5_generic des_generic salsa20_generic camellia_generic cast6_generic cast_common serpent_generic twofish_generic twofish_common algif_skcipher af_alg nls_iso8859_1 ipmi_ssif ipmi_devintf joydev input_leds ipmi_msghandler shpchp i2c_xlp9xx(+) thunderx2_pmu ib_iser rdma_cm iw_cm ib_cm ib_core
[ 1075.942470] iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear hid_generic usbhid hid uas usb_storage aes_ce_blk aes_ce_cipher crc32_ce qede ast i2c_algo_bit crct10dif_ce ptp ghash_ce ttm drm_kms_helper sha2_ce pps_core syscopyarea sysfillrect sysimgblt fb_sys_fops sha256_arm64 sha1_ce mpt3sas qed drm raid_class scsi_transport_sas ahci libahci gpio_xlp aes_neon_bs aes_neon_blk crypto_simd cryptd aes_arm64
[ 1075.991997] Process stress-ng-sysfs (pid: 108395, stack limit = 0x000000009cb607b8)
[ 1075.999643] CPU: 100 PID: 108395 Comm: stress-ng-sysfs Tainted: G D 4.15.0-91-generic #92~16.04.1-Ubuntu
[ 1076.010324] Hardware name: To be filled by O.E.M. Saber/Saber, BIOS 0ACKL027 07/01/2019
[ 1076.018314] pstate: 80400009 (Nzcv daif +PAN -UAO)
[ 1076.023096] pc : __memcpy+0x84/0x180
[ 1076.026663] lr : memory_read_from_buffer+0x64/0x88
[ 1076.031441] sp : ffff00003ea2bd10
[ 1076.034743] x29: ffff00003ea2bd10 x28: ffff80be4d85cb00
[ 1076.040042] x27: ffff000008b42000 x26: 000000000000003f
[ 1076.045342] x25: 0000000000000124 x24: ffff00004a700000
[ 1076.050643] x23: ffff809e3a7e8500 x22: 000000000000000a
[ 1076.055942] x21: ffff00003ea2bd88 x20: 000000000000000a
[ 1076.061240] x19: 0000000000000734 x18: 0000000000000014
[ 1076.066540] x17: 0000ffffaf4e1a58 x16: ffff0000082e8e28
[ 1076.071839] x15: 00002d88734750e0 x14: 00181a0596c27059
[ 1076.077138] x13: 00000003e8000000 x12: 0000000000000018
[ 1076.082436] x11: 000000000006372e x10: 000000005e66c174
[ 1076.087735] x9 : 003b9aca00000000 x8 : 000000000000003f
[ 1076.093034] x7 : ffff000008645490 x6 : ffff809e3a7e8500
[ 1076.098333] x5 : 000000000000000a x4 : 0000000000010000
[ 1076.103633] x3 : ffff00004a700000 x2 : 000000000000000a
[ 1076.108932] x1 : ffff00004a70072a x0 : ffff809e3a7e8500
[ 1076.114231] Call trace:
[ 1076.116668] __memcpy+0x84/0x180
[ 1076.119887] acpi_data_show+0x54/0x80
[ 1076.123541] sysfs_kf_bin_read+0x6c/0xa8
[ 1076.127451] kernfs_fop_read+0xa4/0x1e0
[ 1076.131274] __vfs_read+0x48/0x90
[ 1076.134577] vfs_read+0x94/0x150
[ 1076.137792] SyS_read+0x74/0xf0
[ 1076.140923] el0_svc_naked+0x30/0x34
[ 1076.144487] Code: a88120c7 a8c12027 a88120c7 36180062 (f8408423)
[ 1076.150570] ---[ end trace 496ae41e9716bef2 ]---
[ 1076.155180] Internal error: Oops: 96000021 [#3] SMP
[ 1076.160054] Modules linked in: unix_diag binfmt_misc snd_seq snd_seq_device snd_timer snd soundcore userio vfio_iommu_type1 vfio hci_vhci bluetooth ecdh_generic uhid cuse vhost_vsock vmw_vsock_virtio_transport_common vhost_net vhost vsock tap dccp_ipv4 dccp ipx p8023 atm psnap p8022 llc algif_rng algif_aead anubis fcrypt khazad seed tea md4 michael_mic poly1305_generic rmd128 rmd160 rmd256 rmd320 sha3_generic sm3_generic tgr192 wp512 algif_hash chacha20_neon chacha20_generic blowfish_generic blowfish_common cast5_generic des_generic salsa20_generic camellia_generic cast6_generic cast_common serpent_generic twofish_generic twofish_common algif_skcipher af_alg nls_iso8859_1 ipmi_ssif ipmi_devintf joydev input_leds ipmi_msghandler shpchp i2c_xlp9xx(+) thunderx2_pmu ib_iser rdma_cm iw_cm ib_cm ib_core
[ 1076.230688] iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear hid_generic usbhid hid uas usb_storage aes_ce_blk aes_ce_cipher crc32_ce qede ast i2c_algo_bit crct10dif_ce ptp ghash_ce ttm drm_kms_helper sha2_ce pps_core syscopyarea sysfillrect sysimgblt fb_sys_fops sha256_arm64 sha1_ce mpt3sas qed drm raid_class scsi_transport_sas ahci libahci gpio_xlp aes_neon_bs aes_neon_blk crypto_simd cryptd aes_arm64
[ 1076.280211] Process stress-ng-sysfs (pid: 108405, stack limit = 0x00000000081889d7)
[ 1076.287856] CPU: 155 PID: 108405 Comm: stress-ng-sysfs Tainted: G D 4.15.0-91-generic #92~16.04.1-Ubuntu
[ 1076.298538] Hardware name: To be filled by O.E.M. Saber/Saber, BIOS 0ACKL027 07/01/2019
[ 1076.306530] pstate: 80400009 (Nzcv daif +PAN -UAO)
[ 1076.311319] pc : __memcpy+0x84/0x180
[ 1076.314890] lr : memory_read_from_buffer+0x64/0x88
[ 1076.319667] sp : ffff00003eea3d10
[ 1076.322969] x29: ffff00003eea3d10 x28: ffff80be4d858000
[ 1076.328269] x27: ffff000008b42000 x26: 000000000000003f
[ 1076.333568] x25: 0000000000000124 x24: ffff00004a700000
[ 1076.338868] x23: ffff80bec6fa7400 x22: 000000000000000d
[ 1076.344167] x21: ffff00003eea3d88 x20: 000000000000000d
[ 1076.349467] x19: 000000000000e4c7 x18: 0000000000000014
[ 1076.354767] x17: 0000ffffaf4e1a58 x16: ffff0000082e8e28
[ 1076.360068] x15: 0000566c10765956 x14: 00181a0596c27059
[ 1076.365368] x13: 00000003e8000000 x12: 0000000000000018
[ 1076.370667] x11: 00000000000641a6 x10: 000000005e66c174
[ 1076.375966] x9 : 003b9aca00000000 x8 : 000000000000003f
[ 1076.381265] x7 : ffff000008645490 x6 : ffff80bec6fa7400
[ 1076.386564] x5 : 000000000000000d x4 : 0000000000010000
[ 1076.391864] x3 : ffff00004a700000 x2 : 000000000000000d
[ 1076.397163] x1 : ffff00004a70e4ba x0 : ffff80bec6fa7400
[ 1076.402463] Call trace:
[ 1076.404901] __memcpy+0x84/0x180
[ 1076.408125] acpi_data_show+0x54/0x80
[ 1076.411785] sysfs_kf_bin_read+0x6c/0xa8
[ 1076.415696] kernfs_fop_read+0xa4/0x1e0
[ 1076.419520] __vfs_read+0x48/0x90
[ 1076.422823] vfs_read+0x94/0x150
[ 1076.426038] SyS_read+0x74/0xf0
[ 1076.429171] el0_svc_naked+0x30/0x34
[ 1076.432736] Code: a88120c7 a8c12027 a88120c7 36180062 (f8408423)
[ 1076.438818] ---[ end trace 496ae41e9716bef3 ]--- |
== SRU Request [ BIONIC, EOAN, FOCAL ] ==
Reading /sys/firmware/acpi/tables/data/BERT as root at at odd byte offset will cause an oops. This is because the source address is I/O mapped and this needs to be read with an I/O memcpy rather than an memcpy.
== Fix ==
The fix is upstream (linux-next) commit:
commit 08c07cefb3042a55bc9f8243814b504d5eff93f3
Author: Colin Ian King <colin.king@canonical.com>
Date: Thu Mar 12 11:13:45 2020 +0000
ACPI: sysfs: copy ACPI data using io memory copying
== Test ==
Running on hotdog with the reproducer below (run as root):
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <unistd.h>
#include <errno.h>
#include <stdio.h>
#include <string.h>
int main(void)
{
int fd;
char buffer[3];
ssize_t n;
fd = open("/sys/firmware/acpi/tables/data/BERT", O_RDONLY);
if (fd < 0) {
fprintf(stderr, "open failed: %d (%s)\n", errno, strerror(errno));
return -1;
}
do {
n = read(fd, buffer, sizeof(buffer));
} while (n > 0);
return 0;
}
Without the fix it will oops. With the fix it works OK.
== Regession Potential ==
This only affects the reading of the ACPI BERT table from /sys as root so it is limited in scope to just a very narrow use case. Normally the BERT table is just handled by the kernel, so access to this table is just for debugging purposes.
-----------------------
Issue found on new ARM64 node "hotdog" 4.15.0-91.92~16.04.1
Failed 2 of 2 attempts.
Test suite HEAD SHA1: 3f43e81
sysfs STARTING
sysfs RETURNED 0
sysfs FAILED (kernel oopsed)
[ 1075.760640] Unable to handle kernel paging request at virtual address ffff00004a70072a
[ 1075.763319] Unable to handle kernel paging request at virtual address ffff00004a70e4ba
[ 1075.768563] Mem abort info:
[ 1075.768566] ESR = 0x96000021
[ 1075.768568] Exception class = DABT (current EL), IL = 32 bits
[ 1075.768569] SET = 0, FnV = 0
[ 1075.768570] EA = 0, S1PTW = 0
[ 1075.768571] Data abort info:
[ 1075.768577] ISV = 0, ISS = 0x00000021
[ 1075.776489] Mem abort info:
[ 1075.776491] ESR = 0x96000021
[ 1075.776493] Exception class = DABT (current EL), IL = 32 bits
[ 1075.776494] SET = 0, FnV = 0
[ 1075.776495] EA = 0, S1PTW = 0
[ 1075.776496] Data abort info:
[ 1075.776500] ISV = 0, ISS = 0x00000021
[ 1075.779284] CM = 0, WnR = 0
[ 1075.779288] swapper pgtable: 4k pages, 48-bit VAs, pgd = 00000000facfed4f
[ 1075.779290] [ffff00004a70072a] *pgd=000000bffcffe003, *pud=0000009f6122c003, *pmd=000000bf5adf4003, *pte=0068000080280703
[ 1075.782342] CM = 0, WnR = 0
[ 1075.782346] swapper pgtable: 4k pages, 48-bit VAs, pgd = 00000000facfed4f
[ 1075.782352] [ffff00004a70e4ba] *pgd=000000bffcffe003, *pud=0000009f6122c003, *pmd=000000bf5adf4003, *pte=006800008028e703
[ 1075.788262] Internal error: Oops: 96000021 [#2] SMP
[ 1075.788269] Modules linked in: unix_diag binfmt_misc snd_seq snd_seq_device snd_timer snd soundcore userio vfio_iommu_type1 vfio hci_vhci bluetooth ecdh_generic uhid cuse vhost_vsock vmw_vsock_virtio_transport_common vhost_net vhost vsock tap dccp_ipv4 dccp ipx p8023 atm psnap p8022 llc algif_rng algif_aead anubis fcrypt khazad seed tea md4 michael_mic poly1305_generic rmd128 rmd160 rmd256 rmd320 sha3_generic sm3_generic tgr192 wp512 algif_hash chacha20_neon chacha20_generic blowfish_generic blowfish_common cast5_generic des_generic salsa20_generic camellia_generic cast6_generic cast_common serpent_generic twofish_generic twofish_common algif_skcipher af_alg nls_iso8859_1 ipmi_ssif ipmi_devintf joydev input_leds ipmi_msghandler shpchp i2c_xlp9xx(+) thunderx2_pmu ib_iser rdma_cm iw_cm ib_cm ib_core
[ 1075.942470] iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear hid_generic usbhid hid uas usb_storage aes_ce_blk aes_ce_cipher crc32_ce qede ast i2c_algo_bit crct10dif_ce ptp ghash_ce ttm drm_kms_helper sha2_ce pps_core syscopyarea sysfillrect sysimgblt fb_sys_fops sha256_arm64 sha1_ce mpt3sas qed drm raid_class scsi_transport_sas ahci libahci gpio_xlp aes_neon_bs aes_neon_blk crypto_simd cryptd aes_arm64
[ 1075.991997] Process stress-ng-sysfs (pid: 108395, stack limit = 0x000000009cb607b8)
[ 1075.999643] CPU: 100 PID: 108395 Comm: stress-ng-sysfs Tainted: G D 4.15.0-91-generic #92~16.04.1-Ubuntu
[ 1076.010324] Hardware name: To be filled by O.E.M. Saber/Saber, BIOS 0ACKL027 07/01/2019
[ 1076.018314] pstate: 80400009 (Nzcv daif +PAN -UAO)
[ 1076.023096] pc : __memcpy+0x84/0x180
[ 1076.026663] lr : memory_read_from_buffer+0x64/0x88
[ 1076.031441] sp : ffff00003ea2bd10
[ 1076.034743] x29: ffff00003ea2bd10 x28: ffff80be4d85cb00
[ 1076.040042] x27: ffff000008b42000 x26: 000000000000003f
[ 1076.045342] x25: 0000000000000124 x24: ffff00004a700000
[ 1076.050643] x23: ffff809e3a7e8500 x22: 000000000000000a
[ 1076.055942] x21: ffff00003ea2bd88 x20: 000000000000000a
[ 1076.061240] x19: 0000000000000734 x18: 0000000000000014
[ 1076.066540] x17: 0000ffffaf4e1a58 x16: ffff0000082e8e28
[ 1076.071839] x15: 00002d88734750e0 x14: 00181a0596c27059
[ 1076.077138] x13: 00000003e8000000 x12: 0000000000000018
[ 1076.082436] x11: 000000000006372e x10: 000000005e66c174
[ 1076.087735] x9 : 003b9aca00000000 x8 : 000000000000003f
[ 1076.093034] x7 : ffff000008645490 x6 : ffff809e3a7e8500
[ 1076.098333] x5 : 000000000000000a x4 : 0000000000010000
[ 1076.103633] x3 : ffff00004a700000 x2 : 000000000000000a
[ 1076.108932] x1 : ffff00004a70072a x0 : ffff809e3a7e8500
[ 1076.114231] Call trace:
[ 1076.116668] __memcpy+0x84/0x180
[ 1076.119887] acpi_data_show+0x54/0x80
[ 1076.123541] sysfs_kf_bin_read+0x6c/0xa8
[ 1076.127451] kernfs_fop_read+0xa4/0x1e0
[ 1076.131274] __vfs_read+0x48/0x90
[ 1076.134577] vfs_read+0x94/0x150
[ 1076.137792] SyS_read+0x74/0xf0
[ 1076.140923] el0_svc_naked+0x30/0x34
[ 1076.144487] Code: a88120c7 a8c12027 a88120c7 36180062 (f8408423)
[ 1076.150570] ---[ end trace 496ae41e9716bef2 ]---
[ 1076.155180] Internal error: Oops: 96000021 [#3] SMP
[ 1076.160054] Modules linked in: unix_diag binfmt_misc snd_seq snd_seq_device snd_timer snd soundcore userio vfio_iommu_type1 vfio hci_vhci bluetooth ecdh_generic uhid cuse vhost_vsock vmw_vsock_virtio_transport_common vhost_net vhost vsock tap dccp_ipv4 dccp ipx p8023 atm psnap p8022 llc algif_rng algif_aead anubis fcrypt khazad seed tea md4 michael_mic poly1305_generic rmd128 rmd160 rmd256 rmd320 sha3_generic sm3_generic tgr192 wp512 algif_hash chacha20_neon chacha20_generic blowfish_generic blowfish_common cast5_generic des_generic salsa20_generic camellia_generic cast6_generic cast_common serpent_generic twofish_generic twofish_common algif_skcipher af_alg nls_iso8859_1 ipmi_ssif ipmi_devintf joydev input_leds ipmi_msghandler shpchp i2c_xlp9xx(+) thunderx2_pmu ib_iser rdma_cm iw_cm ib_cm ib_core
[ 1076.230688] iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear hid_generic usbhid hid uas usb_storage aes_ce_blk aes_ce_cipher crc32_ce qede ast i2c_algo_bit crct10dif_ce ptp ghash_ce ttm drm_kms_helper sha2_ce pps_core syscopyarea sysfillrect sysimgblt fb_sys_fops sha256_arm64 sha1_ce mpt3sas qed drm raid_class scsi_transport_sas ahci libahci gpio_xlp aes_neon_bs aes_neon_blk crypto_simd cryptd aes_arm64
[ 1076.280211] Process stress-ng-sysfs (pid: 108405, stack limit = 0x00000000081889d7)
[ 1076.287856] CPU: 155 PID: 108405 Comm: stress-ng-sysfs Tainted: G D 4.15.0-91-generic #92~16.04.1-Ubuntu
[ 1076.298538] Hardware name: To be filled by O.E.M. Saber/Saber, BIOS 0ACKL027 07/01/2019
[ 1076.306530] pstate: 80400009 (Nzcv daif +PAN -UAO)
[ 1076.311319] pc : __memcpy+0x84/0x180
[ 1076.314890] lr : memory_read_from_buffer+0x64/0x88
[ 1076.319667] sp : ffff00003eea3d10
[ 1076.322969] x29: ffff00003eea3d10 x28: ffff80be4d858000
[ 1076.328269] x27: ffff000008b42000 x26: 000000000000003f
[ 1076.333568] x25: 0000000000000124 x24: ffff00004a700000
[ 1076.338868] x23: ffff80bec6fa7400 x22: 000000000000000d
[ 1076.344167] x21: ffff00003eea3d88 x20: 000000000000000d
[ 1076.349467] x19: 000000000000e4c7 x18: 0000000000000014
[ 1076.354767] x17: 0000ffffaf4e1a58 x16: ffff0000082e8e28
[ 1076.360068] x15: 0000566c10765956 x14: 00181a0596c27059
[ 1076.365368] x13: 00000003e8000000 x12: 0000000000000018
[ 1076.370667] x11: 00000000000641a6 x10: 000000005e66c174
[ 1076.375966] x9 : 003b9aca00000000 x8 : 000000000000003f
[ 1076.381265] x7 : ffff000008645490 x6 : ffff80bec6fa7400
[ 1076.386564] x5 : 000000000000000d x4 : 0000000000010000
[ 1076.391864] x3 : ffff00004a700000 x2 : 000000000000000d
[ 1076.397163] x1 : ffff00004a70e4ba x0 : ffff80bec6fa7400
[ 1076.402463] Call trace:
[ 1076.404901] __memcpy+0x84/0x180
[ 1076.408125] acpi_data_show+0x54/0x80
[ 1076.411785] sysfs_kf_bin_read+0x6c/0xa8
[ 1076.415696] kernfs_fop_read+0xa4/0x1e0
[ 1076.419520] __vfs_read+0x48/0x90
[ 1076.422823] vfs_read+0x94/0x150
[ 1076.426038] SyS_read+0x74/0xf0
[ 1076.429171] el0_svc_naked+0x30/0x34
[ 1076.432736] Code: a88120c7 a8c12027 a88120c7 36180062 (f8408423)
[ 1076.438818] ---[ end trace 496ae41e9716bef3 ]--- |
|
2020-03-17 15:16:37 |
Colin Ian King |
description |
== SRU Request [ BIONIC, EOAN, FOCAL ] ==
Reading /sys/firmware/acpi/tables/data/BERT as root at at odd byte offset will cause an oops. This is because the source address is I/O mapped and this needs to be read with an I/O memcpy rather than an memcpy.
== Fix ==
The fix is upstream (linux-next) commit:
commit 08c07cefb3042a55bc9f8243814b504d5eff93f3
Author: Colin Ian King <colin.king@canonical.com>
Date: Thu Mar 12 11:13:45 2020 +0000
ACPI: sysfs: copy ACPI data using io memory copying
== Test ==
Running on hotdog with the reproducer below (run as root):
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <unistd.h>
#include <errno.h>
#include <stdio.h>
#include <string.h>
int main(void)
{
int fd;
char buffer[3];
ssize_t n;
fd = open("/sys/firmware/acpi/tables/data/BERT", O_RDONLY);
if (fd < 0) {
fprintf(stderr, "open failed: %d (%s)\n", errno, strerror(errno));
return -1;
}
do {
n = read(fd, buffer, sizeof(buffer));
} while (n > 0);
return 0;
}
Without the fix it will oops. With the fix it works OK.
== Regession Potential ==
This only affects the reading of the ACPI BERT table from /sys as root so it is limited in scope to just a very narrow use case. Normally the BERT table is just handled by the kernel, so access to this table is just for debugging purposes.
-----------------------
Issue found on new ARM64 node "hotdog" 4.15.0-91.92~16.04.1
Failed 2 of 2 attempts.
Test suite HEAD SHA1: 3f43e81
sysfs STARTING
sysfs RETURNED 0
sysfs FAILED (kernel oopsed)
[ 1075.760640] Unable to handle kernel paging request at virtual address ffff00004a70072a
[ 1075.763319] Unable to handle kernel paging request at virtual address ffff00004a70e4ba
[ 1075.768563] Mem abort info:
[ 1075.768566] ESR = 0x96000021
[ 1075.768568] Exception class = DABT (current EL), IL = 32 bits
[ 1075.768569] SET = 0, FnV = 0
[ 1075.768570] EA = 0, S1PTW = 0
[ 1075.768571] Data abort info:
[ 1075.768577] ISV = 0, ISS = 0x00000021
[ 1075.776489] Mem abort info:
[ 1075.776491] ESR = 0x96000021
[ 1075.776493] Exception class = DABT (current EL), IL = 32 bits
[ 1075.776494] SET = 0, FnV = 0
[ 1075.776495] EA = 0, S1PTW = 0
[ 1075.776496] Data abort info:
[ 1075.776500] ISV = 0, ISS = 0x00000021
[ 1075.779284] CM = 0, WnR = 0
[ 1075.779288] swapper pgtable: 4k pages, 48-bit VAs, pgd = 00000000facfed4f
[ 1075.779290] [ffff00004a70072a] *pgd=000000bffcffe003, *pud=0000009f6122c003, *pmd=000000bf5adf4003, *pte=0068000080280703
[ 1075.782342] CM = 0, WnR = 0
[ 1075.782346] swapper pgtable: 4k pages, 48-bit VAs, pgd = 00000000facfed4f
[ 1075.782352] [ffff00004a70e4ba] *pgd=000000bffcffe003, *pud=0000009f6122c003, *pmd=000000bf5adf4003, *pte=006800008028e703
[ 1075.788262] Internal error: Oops: 96000021 [#2] SMP
[ 1075.788269] Modules linked in: unix_diag binfmt_misc snd_seq snd_seq_device snd_timer snd soundcore userio vfio_iommu_type1 vfio hci_vhci bluetooth ecdh_generic uhid cuse vhost_vsock vmw_vsock_virtio_transport_common vhost_net vhost vsock tap dccp_ipv4 dccp ipx p8023 atm psnap p8022 llc algif_rng algif_aead anubis fcrypt khazad seed tea md4 michael_mic poly1305_generic rmd128 rmd160 rmd256 rmd320 sha3_generic sm3_generic tgr192 wp512 algif_hash chacha20_neon chacha20_generic blowfish_generic blowfish_common cast5_generic des_generic salsa20_generic camellia_generic cast6_generic cast_common serpent_generic twofish_generic twofish_common algif_skcipher af_alg nls_iso8859_1 ipmi_ssif ipmi_devintf joydev input_leds ipmi_msghandler shpchp i2c_xlp9xx(+) thunderx2_pmu ib_iser rdma_cm iw_cm ib_cm ib_core
[ 1075.942470] iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear hid_generic usbhid hid uas usb_storage aes_ce_blk aes_ce_cipher crc32_ce qede ast i2c_algo_bit crct10dif_ce ptp ghash_ce ttm drm_kms_helper sha2_ce pps_core syscopyarea sysfillrect sysimgblt fb_sys_fops sha256_arm64 sha1_ce mpt3sas qed drm raid_class scsi_transport_sas ahci libahci gpio_xlp aes_neon_bs aes_neon_blk crypto_simd cryptd aes_arm64
[ 1075.991997] Process stress-ng-sysfs (pid: 108395, stack limit = 0x000000009cb607b8)
[ 1075.999643] CPU: 100 PID: 108395 Comm: stress-ng-sysfs Tainted: G D 4.15.0-91-generic #92~16.04.1-Ubuntu
[ 1076.010324] Hardware name: To be filled by O.E.M. Saber/Saber, BIOS 0ACKL027 07/01/2019
[ 1076.018314] pstate: 80400009 (Nzcv daif +PAN -UAO)
[ 1076.023096] pc : __memcpy+0x84/0x180
[ 1076.026663] lr : memory_read_from_buffer+0x64/0x88
[ 1076.031441] sp : ffff00003ea2bd10
[ 1076.034743] x29: ffff00003ea2bd10 x28: ffff80be4d85cb00
[ 1076.040042] x27: ffff000008b42000 x26: 000000000000003f
[ 1076.045342] x25: 0000000000000124 x24: ffff00004a700000
[ 1076.050643] x23: ffff809e3a7e8500 x22: 000000000000000a
[ 1076.055942] x21: ffff00003ea2bd88 x20: 000000000000000a
[ 1076.061240] x19: 0000000000000734 x18: 0000000000000014
[ 1076.066540] x17: 0000ffffaf4e1a58 x16: ffff0000082e8e28
[ 1076.071839] x15: 00002d88734750e0 x14: 00181a0596c27059
[ 1076.077138] x13: 00000003e8000000 x12: 0000000000000018
[ 1076.082436] x11: 000000000006372e x10: 000000005e66c174
[ 1076.087735] x9 : 003b9aca00000000 x8 : 000000000000003f
[ 1076.093034] x7 : ffff000008645490 x6 : ffff809e3a7e8500
[ 1076.098333] x5 : 000000000000000a x4 : 0000000000010000
[ 1076.103633] x3 : ffff00004a700000 x2 : 000000000000000a
[ 1076.108932] x1 : ffff00004a70072a x0 : ffff809e3a7e8500
[ 1076.114231] Call trace:
[ 1076.116668] __memcpy+0x84/0x180
[ 1076.119887] acpi_data_show+0x54/0x80
[ 1076.123541] sysfs_kf_bin_read+0x6c/0xa8
[ 1076.127451] kernfs_fop_read+0xa4/0x1e0
[ 1076.131274] __vfs_read+0x48/0x90
[ 1076.134577] vfs_read+0x94/0x150
[ 1076.137792] SyS_read+0x74/0xf0
[ 1076.140923] el0_svc_naked+0x30/0x34
[ 1076.144487] Code: a88120c7 a8c12027 a88120c7 36180062 (f8408423)
[ 1076.150570] ---[ end trace 496ae41e9716bef2 ]---
[ 1076.155180] Internal error: Oops: 96000021 [#3] SMP
[ 1076.160054] Modules linked in: unix_diag binfmt_misc snd_seq snd_seq_device snd_timer snd soundcore userio vfio_iommu_type1 vfio hci_vhci bluetooth ecdh_generic uhid cuse vhost_vsock vmw_vsock_virtio_transport_common vhost_net vhost vsock tap dccp_ipv4 dccp ipx p8023 atm psnap p8022 llc algif_rng algif_aead anubis fcrypt khazad seed tea md4 michael_mic poly1305_generic rmd128 rmd160 rmd256 rmd320 sha3_generic sm3_generic tgr192 wp512 algif_hash chacha20_neon chacha20_generic blowfish_generic blowfish_common cast5_generic des_generic salsa20_generic camellia_generic cast6_generic cast_common serpent_generic twofish_generic twofish_common algif_skcipher af_alg nls_iso8859_1 ipmi_ssif ipmi_devintf joydev input_leds ipmi_msghandler shpchp i2c_xlp9xx(+) thunderx2_pmu ib_iser rdma_cm iw_cm ib_cm ib_core
[ 1076.230688] iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear hid_generic usbhid hid uas usb_storage aes_ce_blk aes_ce_cipher crc32_ce qede ast i2c_algo_bit crct10dif_ce ptp ghash_ce ttm drm_kms_helper sha2_ce pps_core syscopyarea sysfillrect sysimgblt fb_sys_fops sha256_arm64 sha1_ce mpt3sas qed drm raid_class scsi_transport_sas ahci libahci gpio_xlp aes_neon_bs aes_neon_blk crypto_simd cryptd aes_arm64
[ 1076.280211] Process stress-ng-sysfs (pid: 108405, stack limit = 0x00000000081889d7)
[ 1076.287856] CPU: 155 PID: 108405 Comm: stress-ng-sysfs Tainted: G D 4.15.0-91-generic #92~16.04.1-Ubuntu
[ 1076.298538] Hardware name: To be filled by O.E.M. Saber/Saber, BIOS 0ACKL027 07/01/2019
[ 1076.306530] pstate: 80400009 (Nzcv daif +PAN -UAO)
[ 1076.311319] pc : __memcpy+0x84/0x180
[ 1076.314890] lr : memory_read_from_buffer+0x64/0x88
[ 1076.319667] sp : ffff00003eea3d10
[ 1076.322969] x29: ffff00003eea3d10 x28: ffff80be4d858000
[ 1076.328269] x27: ffff000008b42000 x26: 000000000000003f
[ 1076.333568] x25: 0000000000000124 x24: ffff00004a700000
[ 1076.338868] x23: ffff80bec6fa7400 x22: 000000000000000d
[ 1076.344167] x21: ffff00003eea3d88 x20: 000000000000000d
[ 1076.349467] x19: 000000000000e4c7 x18: 0000000000000014
[ 1076.354767] x17: 0000ffffaf4e1a58 x16: ffff0000082e8e28
[ 1076.360068] x15: 0000566c10765956 x14: 00181a0596c27059
[ 1076.365368] x13: 00000003e8000000 x12: 0000000000000018
[ 1076.370667] x11: 00000000000641a6 x10: 000000005e66c174
[ 1076.375966] x9 : 003b9aca00000000 x8 : 000000000000003f
[ 1076.381265] x7 : ffff000008645490 x6 : ffff80bec6fa7400
[ 1076.386564] x5 : 000000000000000d x4 : 0000000000010000
[ 1076.391864] x3 : ffff00004a700000 x2 : 000000000000000d
[ 1076.397163] x1 : ffff00004a70e4ba x0 : ffff80bec6fa7400
[ 1076.402463] Call trace:
[ 1076.404901] __memcpy+0x84/0x180
[ 1076.408125] acpi_data_show+0x54/0x80
[ 1076.411785] sysfs_kf_bin_read+0x6c/0xa8
[ 1076.415696] kernfs_fop_read+0xa4/0x1e0
[ 1076.419520] __vfs_read+0x48/0x90
[ 1076.422823] vfs_read+0x94/0x150
[ 1076.426038] SyS_read+0x74/0xf0
[ 1076.429171] el0_svc_naked+0x30/0x34
[ 1076.432736] Code: a88120c7 a8c12027 a88120c7 36180062 (f8408423)
[ 1076.438818] ---[ end trace 496ae41e9716bef3 ]--- |
== SRU Request [ BIONIC, EOAN, FOCAL ] ==
Reading /sys/firmware/acpi/tables/data/BERT as root at at odd byte offset will cause an oops. This is because the source address is I/O mapped and this needs to be read with an I/O memcpy rather than an memcpy.
== Fix ==
The fix is upstream (linux-next) commit that will land in 5.7, the backport to bionic, eoan and focal is just a minor context wiggle.
commit 08c07cefb3042a55bc9f8243814b504d5eff93f3
Author: Colin Ian King <colin.king@canonical.com>
Date: Thu Mar 12 11:13:45 2020 +0000
ACPI: sysfs: copy ACPI data using io memory copying
== Test ==
Running on hotdog with the reproducer below (run as root):
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <unistd.h>
#include <errno.h>
#include <stdio.h>
#include <string.h>
int main(void)
{
int fd;
char buffer[3];
ssize_t n;
fd = open("/sys/firmware/acpi/tables/data/BERT", O_RDONLY);
if (fd < 0) {
fprintf(stderr, "open failed: %d (%s)\n", errno, strerror(errno));
return -1;
}
do {
n = read(fd, buffer, sizeof(buffer));
} while (n > 0);
return 0;
}
Without the fix it will oops. With the fix it works OK.
== Regession Potential ==
This only affects the reading of the ACPI BERT table from /sys as root so it is limited in scope to just a very narrow use case. Normally the BERT table is just handled by the kernel, so access to this table is just for debugging purposes.
-----------------------
Issue found on new ARM64 node "hotdog" 4.15.0-91.92~16.04.1
Failed 2 of 2 attempts.
Test suite HEAD SHA1: 3f43e81
sysfs STARTING
sysfs RETURNED 0
sysfs FAILED (kernel oopsed)
[ 1075.760640] Unable to handle kernel paging request at virtual address ffff00004a70072a
[ 1075.763319] Unable to handle kernel paging request at virtual address ffff00004a70e4ba
[ 1075.768563] Mem abort info:
[ 1075.768566] ESR = 0x96000021
[ 1075.768568] Exception class = DABT (current EL), IL = 32 bits
[ 1075.768569] SET = 0, FnV = 0
[ 1075.768570] EA = 0, S1PTW = 0
[ 1075.768571] Data abort info:
[ 1075.768577] ISV = 0, ISS = 0x00000021
[ 1075.776489] Mem abort info:
[ 1075.776491] ESR = 0x96000021
[ 1075.776493] Exception class = DABT (current EL), IL = 32 bits
[ 1075.776494] SET = 0, FnV = 0
[ 1075.776495] EA = 0, S1PTW = 0
[ 1075.776496] Data abort info:
[ 1075.776500] ISV = 0, ISS = 0x00000021
[ 1075.779284] CM = 0, WnR = 0
[ 1075.779288] swapper pgtable: 4k pages, 48-bit VAs, pgd = 00000000facfed4f
[ 1075.779290] [ffff00004a70072a] *pgd=000000bffcffe003, *pud=0000009f6122c003, *pmd=000000bf5adf4003, *pte=0068000080280703
[ 1075.782342] CM = 0, WnR = 0
[ 1075.782346] swapper pgtable: 4k pages, 48-bit VAs, pgd = 00000000facfed4f
[ 1075.782352] [ffff00004a70e4ba] *pgd=000000bffcffe003, *pud=0000009f6122c003, *pmd=000000bf5adf4003, *pte=006800008028e703
[ 1075.788262] Internal error: Oops: 96000021 [#2] SMP
[ 1075.788269] Modules linked in: unix_diag binfmt_misc snd_seq snd_seq_device snd_timer snd soundcore userio vfio_iommu_type1 vfio hci_vhci bluetooth ecdh_generic uhid cuse vhost_vsock vmw_vsock_virtio_transport_common vhost_net vhost vsock tap dccp_ipv4 dccp ipx p8023 atm psnap p8022 llc algif_rng algif_aead anubis fcrypt khazad seed tea md4 michael_mic poly1305_generic rmd128 rmd160 rmd256 rmd320 sha3_generic sm3_generic tgr192 wp512 algif_hash chacha20_neon chacha20_generic blowfish_generic blowfish_common cast5_generic des_generic salsa20_generic camellia_generic cast6_generic cast_common serpent_generic twofish_generic twofish_common algif_skcipher af_alg nls_iso8859_1 ipmi_ssif ipmi_devintf joydev input_leds ipmi_msghandler shpchp i2c_xlp9xx(+) thunderx2_pmu ib_iser rdma_cm iw_cm ib_cm ib_core
[ 1075.942470] iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear hid_generic usbhid hid uas usb_storage aes_ce_blk aes_ce_cipher crc32_ce qede ast i2c_algo_bit crct10dif_ce ptp ghash_ce ttm drm_kms_helper sha2_ce pps_core syscopyarea sysfillrect sysimgblt fb_sys_fops sha256_arm64 sha1_ce mpt3sas qed drm raid_class scsi_transport_sas ahci libahci gpio_xlp aes_neon_bs aes_neon_blk crypto_simd cryptd aes_arm64
[ 1075.991997] Process stress-ng-sysfs (pid: 108395, stack limit = 0x000000009cb607b8)
[ 1075.999643] CPU: 100 PID: 108395 Comm: stress-ng-sysfs Tainted: G D 4.15.0-91-generic #92~16.04.1-Ubuntu
[ 1076.010324] Hardware name: To be filled by O.E.M. Saber/Saber, BIOS 0ACKL027 07/01/2019
[ 1076.018314] pstate: 80400009 (Nzcv daif +PAN -UAO)
[ 1076.023096] pc : __memcpy+0x84/0x180
[ 1076.026663] lr : memory_read_from_buffer+0x64/0x88
[ 1076.031441] sp : ffff00003ea2bd10
[ 1076.034743] x29: ffff00003ea2bd10 x28: ffff80be4d85cb00
[ 1076.040042] x27: ffff000008b42000 x26: 000000000000003f
[ 1076.045342] x25: 0000000000000124 x24: ffff00004a700000
[ 1076.050643] x23: ffff809e3a7e8500 x22: 000000000000000a
[ 1076.055942] x21: ffff00003ea2bd88 x20: 000000000000000a
[ 1076.061240] x19: 0000000000000734 x18: 0000000000000014
[ 1076.066540] x17: 0000ffffaf4e1a58 x16: ffff0000082e8e28
[ 1076.071839] x15: 00002d88734750e0 x14: 00181a0596c27059
[ 1076.077138] x13: 00000003e8000000 x12: 0000000000000018
[ 1076.082436] x11: 000000000006372e x10: 000000005e66c174
[ 1076.087735] x9 : 003b9aca00000000 x8 : 000000000000003f
[ 1076.093034] x7 : ffff000008645490 x6 : ffff809e3a7e8500
[ 1076.098333] x5 : 000000000000000a x4 : 0000000000010000
[ 1076.103633] x3 : ffff00004a700000 x2 : 000000000000000a
[ 1076.108932] x1 : ffff00004a70072a x0 : ffff809e3a7e8500
[ 1076.114231] Call trace:
[ 1076.116668] __memcpy+0x84/0x180
[ 1076.119887] acpi_data_show+0x54/0x80
[ 1076.123541] sysfs_kf_bin_read+0x6c/0xa8
[ 1076.127451] kernfs_fop_read+0xa4/0x1e0
[ 1076.131274] __vfs_read+0x48/0x90
[ 1076.134577] vfs_read+0x94/0x150
[ 1076.137792] SyS_read+0x74/0xf0
[ 1076.140923] el0_svc_naked+0x30/0x34
[ 1076.144487] Code: a88120c7 a8c12027 a88120c7 36180062 (f8408423)
[ 1076.150570] ---[ end trace 496ae41e9716bef2 ]---
[ 1076.155180] Internal error: Oops: 96000021 [#3] SMP
[ 1076.160054] Modules linked in: unix_diag binfmt_misc snd_seq snd_seq_device snd_timer snd soundcore userio vfio_iommu_type1 vfio hci_vhci bluetooth ecdh_generic uhid cuse vhost_vsock vmw_vsock_virtio_transport_common vhost_net vhost vsock tap dccp_ipv4 dccp ipx p8023 atm psnap p8022 llc algif_rng algif_aead anubis fcrypt khazad seed tea md4 michael_mic poly1305_generic rmd128 rmd160 rmd256 rmd320 sha3_generic sm3_generic tgr192 wp512 algif_hash chacha20_neon chacha20_generic blowfish_generic blowfish_common cast5_generic des_generic salsa20_generic camellia_generic cast6_generic cast_common serpent_generic twofish_generic twofish_common algif_skcipher af_alg nls_iso8859_1 ipmi_ssif ipmi_devintf joydev input_leds ipmi_msghandler shpchp i2c_xlp9xx(+) thunderx2_pmu ib_iser rdma_cm iw_cm ib_cm ib_core
[ 1076.230688] iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear hid_generic usbhid hid uas usb_storage aes_ce_blk aes_ce_cipher crc32_ce qede ast i2c_algo_bit crct10dif_ce ptp ghash_ce ttm drm_kms_helper sha2_ce pps_core syscopyarea sysfillrect sysimgblt fb_sys_fops sha256_arm64 sha1_ce mpt3sas qed drm raid_class scsi_transport_sas ahci libahci gpio_xlp aes_neon_bs aes_neon_blk crypto_simd cryptd aes_arm64
[ 1076.280211] Process stress-ng-sysfs (pid: 108405, stack limit = 0x00000000081889d7)
[ 1076.287856] CPU: 155 PID: 108405 Comm: stress-ng-sysfs Tainted: G D 4.15.0-91-generic #92~16.04.1-Ubuntu
[ 1076.298538] Hardware name: To be filled by O.E.M. Saber/Saber, BIOS 0ACKL027 07/01/2019
[ 1076.306530] pstate: 80400009 (Nzcv daif +PAN -UAO)
[ 1076.311319] pc : __memcpy+0x84/0x180
[ 1076.314890] lr : memory_read_from_buffer+0x64/0x88
[ 1076.319667] sp : ffff00003eea3d10
[ 1076.322969] x29: ffff00003eea3d10 x28: ffff80be4d858000
[ 1076.328269] x27: ffff000008b42000 x26: 000000000000003f
[ 1076.333568] x25: 0000000000000124 x24: ffff00004a700000
[ 1076.338868] x23: ffff80bec6fa7400 x22: 000000000000000d
[ 1076.344167] x21: ffff00003eea3d88 x20: 000000000000000d
[ 1076.349467] x19: 000000000000e4c7 x18: 0000000000000014
[ 1076.354767] x17: 0000ffffaf4e1a58 x16: ffff0000082e8e28
[ 1076.360068] x15: 0000566c10765956 x14: 00181a0596c27059
[ 1076.365368] x13: 00000003e8000000 x12: 0000000000000018
[ 1076.370667] x11: 00000000000641a6 x10: 000000005e66c174
[ 1076.375966] x9 : 003b9aca00000000 x8 : 000000000000003f
[ 1076.381265] x7 : ffff000008645490 x6 : ffff80bec6fa7400
[ 1076.386564] x5 : 000000000000000d x4 : 0000000000010000
[ 1076.391864] x3 : ffff00004a700000 x2 : 000000000000000d
[ 1076.397163] x1 : ffff00004a70e4ba x0 : ffff80bec6fa7400
[ 1076.402463] Call trace:
[ 1076.404901] __memcpy+0x84/0x180
[ 1076.408125] acpi_data_show+0x54/0x80
[ 1076.411785] sysfs_kf_bin_read+0x6c/0xa8
[ 1076.415696] kernfs_fop_read+0xa4/0x1e0
[ 1076.419520] __vfs_read+0x48/0x90
[ 1076.422823] vfs_read+0x94/0x150
[ 1076.426038] SyS_read+0x74/0xf0
[ 1076.429171] el0_svc_naked+0x30/0x34
[ 1076.432736] Code: a88120c7 a8c12027 a88120c7 36180062 (f8408423)
[ 1076.438818] ---[ end trace 496ae41e9716bef3 ]--- |
|
2020-03-24 23:14:27 |
Ubuntu Kernel Bot |
tags |
4.15 arm64 sru-20200217 ubuntu-stress-smoke-test xenial |
4.15 arm64 sru-20200217 ubuntu-stress-smoke-test verification-needed-focal xenial |
|
2020-03-27 09:54:25 |
Po-Hsu Lin |
bug task added |
|
linux (Ubuntu) |
|
2020-03-27 09:54:38 |
Po-Hsu Lin |
nominated for series |
|
Ubuntu Focal |
|
2020-03-27 09:54:38 |
Po-Hsu Lin |
bug task added |
|
linux (Ubuntu Focal) |
|
2020-03-27 09:54:38 |
Po-Hsu Lin |
nominated for series |
|
Ubuntu Bionic |
|
2020-03-27 09:54:38 |
Po-Hsu Lin |
bug task added |
|
linux (Ubuntu Bionic) |
|
2020-03-27 09:54:38 |
Po-Hsu Lin |
nominated for series |
|
Ubuntu Eoan |
|
2020-03-27 09:54:38 |
Po-Hsu Lin |
bug task added |
|
linux (Ubuntu Eoan) |
|
2020-03-27 10:07:08 |
Ubuntu Kernel Bot |
linux (Ubuntu): status |
New |
Incomplete |
|
2020-03-27 10:07:10 |
Ubuntu Kernel Bot |
linux (Ubuntu Bionic): status |
New |
Incomplete |
|
2020-03-27 10:07:12 |
Ubuntu Kernel Bot |
linux (Ubuntu Eoan): status |
New |
Incomplete |
|
2020-03-27 10:07:55 |
Ubuntu Kernel Bot |
tags |
4.15 arm64 sru-20200217 ubuntu-stress-smoke-test verification-needed-focal xenial |
4.15 arm64 bionic sru-20200217 ubuntu-stress-smoke-test verification-needed-focal xenial |
|
2020-03-31 10:51:42 |
Launchpad Janitor |
linux (Ubuntu Focal): status |
Incomplete |
Fix Released |
|
2020-03-31 10:51:42 |
Launchpad Janitor |
cve linked |
|
2020-8835 |
|
2020-04-03 21:13:17 |
Kelsey Steele |
linux (Ubuntu Bionic): status |
Incomplete |
Fix Committed |
|
2020-04-03 21:13:22 |
Kelsey Steele |
linux (Ubuntu Eoan): status |
Incomplete |
Fix Committed |
|
2020-04-07 09:36:58 |
Ubuntu Kernel Bot |
tags |
4.15 arm64 bionic sru-20200217 ubuntu-stress-smoke-test verification-needed-focal xenial |
4.15 arm64 bionic sru-20200217 ubuntu-stress-smoke-test verification-needed-eoan verification-needed-focal xenial |
|
2020-04-07 10:48:19 |
Colin Ian King |
tags |
4.15 arm64 bionic sru-20200217 ubuntu-stress-smoke-test verification-needed-eoan verification-needed-focal xenial |
4.15 arm64 bionic sru-20200217 ubuntu-stress-smoke-test verification-done-eoan verification-needed-focal xenial |
|
2020-04-07 12:57:22 |
Colin Ian King |
tags |
4.15 arm64 bionic sru-20200217 ubuntu-stress-smoke-test verification-done-eoan verification-needed-focal xenial |
4.15 arm64 bionic sru-20200217 ubuntu-stress-smoke-test verification-done-eoan verification-done-focal xenial |
|
2020-04-08 02:37:39 |
Ubuntu Kernel Bot |
tags |
4.15 arm64 bionic sru-20200217 ubuntu-stress-smoke-test verification-done-eoan verification-done-focal xenial |
4.15 arm64 bionic sru-20200217 ubuntu-stress-smoke-test verification-done-eoan verification-done-focal verification-needed-bionic xenial |
|
2020-04-08 09:05:53 |
Colin Ian King |
tags |
4.15 arm64 bionic sru-20200217 ubuntu-stress-smoke-test verification-done-eoan verification-done-focal verification-needed-bionic xenial |
4.15 arm64 bionic sru-20200217 ubuntu-stress-smoke-test verification-done-bionic verification-done-eoan verification-done-focal xenial |
|
2020-04-28 10:17:26 |
Colin Ian King |
description |
== SRU Request [ BIONIC, EOAN, FOCAL ] ==
Reading /sys/firmware/acpi/tables/data/BERT as root at at odd byte offset will cause an oops. This is because the source address is I/O mapped and this needs to be read with an I/O memcpy rather than an memcpy.
== Fix ==
The fix is upstream (linux-next) commit that will land in 5.7, the backport to bionic, eoan and focal is just a minor context wiggle.
commit 08c07cefb3042a55bc9f8243814b504d5eff93f3
Author: Colin Ian King <colin.king@canonical.com>
Date: Thu Mar 12 11:13:45 2020 +0000
ACPI: sysfs: copy ACPI data using io memory copying
== Test ==
Running on hotdog with the reproducer below (run as root):
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <unistd.h>
#include <errno.h>
#include <stdio.h>
#include <string.h>
int main(void)
{
int fd;
char buffer[3];
ssize_t n;
fd = open("/sys/firmware/acpi/tables/data/BERT", O_RDONLY);
if (fd < 0) {
fprintf(stderr, "open failed: %d (%s)\n", errno, strerror(errno));
return -1;
}
do {
n = read(fd, buffer, sizeof(buffer));
} while (n > 0);
return 0;
}
Without the fix it will oops. With the fix it works OK.
== Regession Potential ==
This only affects the reading of the ACPI BERT table from /sys as root so it is limited in scope to just a very narrow use case. Normally the BERT table is just handled by the kernel, so access to this table is just for debugging purposes.
-----------------------
Issue found on new ARM64 node "hotdog" 4.15.0-91.92~16.04.1
Failed 2 of 2 attempts.
Test suite HEAD SHA1: 3f43e81
sysfs STARTING
sysfs RETURNED 0
sysfs FAILED (kernel oopsed)
[ 1075.760640] Unable to handle kernel paging request at virtual address ffff00004a70072a
[ 1075.763319] Unable to handle kernel paging request at virtual address ffff00004a70e4ba
[ 1075.768563] Mem abort info:
[ 1075.768566] ESR = 0x96000021
[ 1075.768568] Exception class = DABT (current EL), IL = 32 bits
[ 1075.768569] SET = 0, FnV = 0
[ 1075.768570] EA = 0, S1PTW = 0
[ 1075.768571] Data abort info:
[ 1075.768577] ISV = 0, ISS = 0x00000021
[ 1075.776489] Mem abort info:
[ 1075.776491] ESR = 0x96000021
[ 1075.776493] Exception class = DABT (current EL), IL = 32 bits
[ 1075.776494] SET = 0, FnV = 0
[ 1075.776495] EA = 0, S1PTW = 0
[ 1075.776496] Data abort info:
[ 1075.776500] ISV = 0, ISS = 0x00000021
[ 1075.779284] CM = 0, WnR = 0
[ 1075.779288] swapper pgtable: 4k pages, 48-bit VAs, pgd = 00000000facfed4f
[ 1075.779290] [ffff00004a70072a] *pgd=000000bffcffe003, *pud=0000009f6122c003, *pmd=000000bf5adf4003, *pte=0068000080280703
[ 1075.782342] CM = 0, WnR = 0
[ 1075.782346] swapper pgtable: 4k pages, 48-bit VAs, pgd = 00000000facfed4f
[ 1075.782352] [ffff00004a70e4ba] *pgd=000000bffcffe003, *pud=0000009f6122c003, *pmd=000000bf5adf4003, *pte=006800008028e703
[ 1075.788262] Internal error: Oops: 96000021 [#2] SMP
[ 1075.788269] Modules linked in: unix_diag binfmt_misc snd_seq snd_seq_device snd_timer snd soundcore userio vfio_iommu_type1 vfio hci_vhci bluetooth ecdh_generic uhid cuse vhost_vsock vmw_vsock_virtio_transport_common vhost_net vhost vsock tap dccp_ipv4 dccp ipx p8023 atm psnap p8022 llc algif_rng algif_aead anubis fcrypt khazad seed tea md4 michael_mic poly1305_generic rmd128 rmd160 rmd256 rmd320 sha3_generic sm3_generic tgr192 wp512 algif_hash chacha20_neon chacha20_generic blowfish_generic blowfish_common cast5_generic des_generic salsa20_generic camellia_generic cast6_generic cast_common serpent_generic twofish_generic twofish_common algif_skcipher af_alg nls_iso8859_1 ipmi_ssif ipmi_devintf joydev input_leds ipmi_msghandler shpchp i2c_xlp9xx(+) thunderx2_pmu ib_iser rdma_cm iw_cm ib_cm ib_core
[ 1075.942470] iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear hid_generic usbhid hid uas usb_storage aes_ce_blk aes_ce_cipher crc32_ce qede ast i2c_algo_bit crct10dif_ce ptp ghash_ce ttm drm_kms_helper sha2_ce pps_core syscopyarea sysfillrect sysimgblt fb_sys_fops sha256_arm64 sha1_ce mpt3sas qed drm raid_class scsi_transport_sas ahci libahci gpio_xlp aes_neon_bs aes_neon_blk crypto_simd cryptd aes_arm64
[ 1075.991997] Process stress-ng-sysfs (pid: 108395, stack limit = 0x000000009cb607b8)
[ 1075.999643] CPU: 100 PID: 108395 Comm: stress-ng-sysfs Tainted: G D 4.15.0-91-generic #92~16.04.1-Ubuntu
[ 1076.010324] Hardware name: To be filled by O.E.M. Saber/Saber, BIOS 0ACKL027 07/01/2019
[ 1076.018314] pstate: 80400009 (Nzcv daif +PAN -UAO)
[ 1076.023096] pc : __memcpy+0x84/0x180
[ 1076.026663] lr : memory_read_from_buffer+0x64/0x88
[ 1076.031441] sp : ffff00003ea2bd10
[ 1076.034743] x29: ffff00003ea2bd10 x28: ffff80be4d85cb00
[ 1076.040042] x27: ffff000008b42000 x26: 000000000000003f
[ 1076.045342] x25: 0000000000000124 x24: ffff00004a700000
[ 1076.050643] x23: ffff809e3a7e8500 x22: 000000000000000a
[ 1076.055942] x21: ffff00003ea2bd88 x20: 000000000000000a
[ 1076.061240] x19: 0000000000000734 x18: 0000000000000014
[ 1076.066540] x17: 0000ffffaf4e1a58 x16: ffff0000082e8e28
[ 1076.071839] x15: 00002d88734750e0 x14: 00181a0596c27059
[ 1076.077138] x13: 00000003e8000000 x12: 0000000000000018
[ 1076.082436] x11: 000000000006372e x10: 000000005e66c174
[ 1076.087735] x9 : 003b9aca00000000 x8 : 000000000000003f
[ 1076.093034] x7 : ffff000008645490 x6 : ffff809e3a7e8500
[ 1076.098333] x5 : 000000000000000a x4 : 0000000000010000
[ 1076.103633] x3 : ffff00004a700000 x2 : 000000000000000a
[ 1076.108932] x1 : ffff00004a70072a x0 : ffff809e3a7e8500
[ 1076.114231] Call trace:
[ 1076.116668] __memcpy+0x84/0x180
[ 1076.119887] acpi_data_show+0x54/0x80
[ 1076.123541] sysfs_kf_bin_read+0x6c/0xa8
[ 1076.127451] kernfs_fop_read+0xa4/0x1e0
[ 1076.131274] __vfs_read+0x48/0x90
[ 1076.134577] vfs_read+0x94/0x150
[ 1076.137792] SyS_read+0x74/0xf0
[ 1076.140923] el0_svc_naked+0x30/0x34
[ 1076.144487] Code: a88120c7 a8c12027 a88120c7 36180062 (f8408423)
[ 1076.150570] ---[ end trace 496ae41e9716bef2 ]---
[ 1076.155180] Internal error: Oops: 96000021 [#3] SMP
[ 1076.160054] Modules linked in: unix_diag binfmt_misc snd_seq snd_seq_device snd_timer snd soundcore userio vfio_iommu_type1 vfio hci_vhci bluetooth ecdh_generic uhid cuse vhost_vsock vmw_vsock_virtio_transport_common vhost_net vhost vsock tap dccp_ipv4 dccp ipx p8023 atm psnap p8022 llc algif_rng algif_aead anubis fcrypt khazad seed tea md4 michael_mic poly1305_generic rmd128 rmd160 rmd256 rmd320 sha3_generic sm3_generic tgr192 wp512 algif_hash chacha20_neon chacha20_generic blowfish_generic blowfish_common cast5_generic des_generic salsa20_generic camellia_generic cast6_generic cast_common serpent_generic twofish_generic twofish_common algif_skcipher af_alg nls_iso8859_1 ipmi_ssif ipmi_devintf joydev input_leds ipmi_msghandler shpchp i2c_xlp9xx(+) thunderx2_pmu ib_iser rdma_cm iw_cm ib_cm ib_core
[ 1076.230688] iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear hid_generic usbhid hid uas usb_storage aes_ce_blk aes_ce_cipher crc32_ce qede ast i2c_algo_bit crct10dif_ce ptp ghash_ce ttm drm_kms_helper sha2_ce pps_core syscopyarea sysfillrect sysimgblt fb_sys_fops sha256_arm64 sha1_ce mpt3sas qed drm raid_class scsi_transport_sas ahci libahci gpio_xlp aes_neon_bs aes_neon_blk crypto_simd cryptd aes_arm64
[ 1076.280211] Process stress-ng-sysfs (pid: 108405, stack limit = 0x00000000081889d7)
[ 1076.287856] CPU: 155 PID: 108405 Comm: stress-ng-sysfs Tainted: G D 4.15.0-91-generic #92~16.04.1-Ubuntu
[ 1076.298538] Hardware name: To be filled by O.E.M. Saber/Saber, BIOS 0ACKL027 07/01/2019
[ 1076.306530] pstate: 80400009 (Nzcv daif +PAN -UAO)
[ 1076.311319] pc : __memcpy+0x84/0x180
[ 1076.314890] lr : memory_read_from_buffer+0x64/0x88
[ 1076.319667] sp : ffff00003eea3d10
[ 1076.322969] x29: ffff00003eea3d10 x28: ffff80be4d858000
[ 1076.328269] x27: ffff000008b42000 x26: 000000000000003f
[ 1076.333568] x25: 0000000000000124 x24: ffff00004a700000
[ 1076.338868] x23: ffff80bec6fa7400 x22: 000000000000000d
[ 1076.344167] x21: ffff00003eea3d88 x20: 000000000000000d
[ 1076.349467] x19: 000000000000e4c7 x18: 0000000000000014
[ 1076.354767] x17: 0000ffffaf4e1a58 x16: ffff0000082e8e28
[ 1076.360068] x15: 0000566c10765956 x14: 00181a0596c27059
[ 1076.365368] x13: 00000003e8000000 x12: 0000000000000018
[ 1076.370667] x11: 00000000000641a6 x10: 000000005e66c174
[ 1076.375966] x9 : 003b9aca00000000 x8 : 000000000000003f
[ 1076.381265] x7 : ffff000008645490 x6 : ffff80bec6fa7400
[ 1076.386564] x5 : 000000000000000d x4 : 0000000000010000
[ 1076.391864] x3 : ffff00004a700000 x2 : 000000000000000d
[ 1076.397163] x1 : ffff00004a70e4ba x0 : ffff80bec6fa7400
[ 1076.402463] Call trace:
[ 1076.404901] __memcpy+0x84/0x180
[ 1076.408125] acpi_data_show+0x54/0x80
[ 1076.411785] sysfs_kf_bin_read+0x6c/0xa8
[ 1076.415696] kernfs_fop_read+0xa4/0x1e0
[ 1076.419520] __vfs_read+0x48/0x90
[ 1076.422823] vfs_read+0x94/0x150
[ 1076.426038] SyS_read+0x74/0xf0
[ 1076.429171] el0_svc_naked+0x30/0x34
[ 1076.432736] Code: a88120c7 a8c12027 a88120c7 36180062 (f8408423)
[ 1076.438818] ---[ end trace 496ae41e9716bef3 ]--- |
== SRU Request [ BIONIC, DISCO, EOAN, FOCAL ] ==
Reading /sys/firmware/acpi/tables/data/BERT as root at at odd byte offset will cause an oops. This is because the source address is I/O mapped and this needs to be read with an I/O memcpy rather than an memcpy.
== Fix ==
The fix is upstream (linux-next) commit that will land in 5.7, the backport to bionic, eoan and focal is just a minor context wiggle.
commit 08c07cefb3042a55bc9f8243814b504d5eff93f3
Author: Colin Ian King <colin.king@canonical.com>
Date: Thu Mar 12 11:13:45 2020 +0000
ACPI: sysfs: copy ACPI data using io memory copying
== Test ==
Running on hotdog with the reproducer below (run as root):
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <unistd.h>
#include <errno.h>
#include <stdio.h>
#include <string.h>
int main(void)
{
int fd;
char buffer[3];
ssize_t n;
fd = open("/sys/firmware/acpi/tables/data/BERT", O_RDONLY);
if (fd < 0) {
fprintf(stderr, "open failed: %d (%s)\n", errno, strerror(errno));
return -1;
}
do {
n = read(fd, buffer, sizeof(buffer));
} while (n > 0);
return 0;
}
Without the fix it will oops. With the fix it works OK.
== Regession Potential ==
This only affects the reading of the ACPI BERT table from /sys as root so it is limited in scope to just a very narrow use case. Normally the BERT table is just handled by the kernel, so access to this table is just for debugging purposes.
-----------------------
Issue found on new ARM64 node "hotdog" 4.15.0-91.92~16.04.1
Failed 2 of 2 attempts.
Test suite HEAD SHA1: 3f43e81
sysfs STARTING
sysfs RETURNED 0
sysfs FAILED (kernel oopsed)
[ 1075.760640] Unable to handle kernel paging request at virtual address ffff00004a70072a
[ 1075.763319] Unable to handle kernel paging request at virtual address ffff00004a70e4ba
[ 1075.768563] Mem abort info:
[ 1075.768566] ESR = 0x96000021
[ 1075.768568] Exception class = DABT (current EL), IL = 32 bits
[ 1075.768569] SET = 0, FnV = 0
[ 1075.768570] EA = 0, S1PTW = 0
[ 1075.768571] Data abort info:
[ 1075.768577] ISV = 0, ISS = 0x00000021
[ 1075.776489] Mem abort info:
[ 1075.776491] ESR = 0x96000021
[ 1075.776493] Exception class = DABT (current EL), IL = 32 bits
[ 1075.776494] SET = 0, FnV = 0
[ 1075.776495] EA = 0, S1PTW = 0
[ 1075.776496] Data abort info:
[ 1075.776500] ISV = 0, ISS = 0x00000021
[ 1075.779284] CM = 0, WnR = 0
[ 1075.779288] swapper pgtable: 4k pages, 48-bit VAs, pgd = 00000000facfed4f
[ 1075.779290] [ffff00004a70072a] *pgd=000000bffcffe003, *pud=0000009f6122c003, *pmd=000000bf5adf4003, *pte=0068000080280703
[ 1075.782342] CM = 0, WnR = 0
[ 1075.782346] swapper pgtable: 4k pages, 48-bit VAs, pgd = 00000000facfed4f
[ 1075.782352] [ffff00004a70e4ba] *pgd=000000bffcffe003, *pud=0000009f6122c003, *pmd=000000bf5adf4003, *pte=006800008028e703
[ 1075.788262] Internal error: Oops: 96000021 [#2] SMP
[ 1075.788269] Modules linked in: unix_diag binfmt_misc snd_seq snd_seq_device snd_timer snd soundcore userio vfio_iommu_type1 vfio hci_vhci bluetooth ecdh_generic uhid cuse vhost_vsock vmw_vsock_virtio_transport_common vhost_net vhost vsock tap dccp_ipv4 dccp ipx p8023 atm psnap p8022 llc algif_rng algif_aead anubis fcrypt khazad seed tea md4 michael_mic poly1305_generic rmd128 rmd160 rmd256 rmd320 sha3_generic sm3_generic tgr192 wp512 algif_hash chacha20_neon chacha20_generic blowfish_generic blowfish_common cast5_generic des_generic salsa20_generic camellia_generic cast6_generic cast_common serpent_generic twofish_generic twofish_common algif_skcipher af_alg nls_iso8859_1 ipmi_ssif ipmi_devintf joydev input_leds ipmi_msghandler shpchp i2c_xlp9xx(+) thunderx2_pmu ib_iser rdma_cm iw_cm ib_cm ib_core
[ 1075.942470] iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear hid_generic usbhid hid uas usb_storage aes_ce_blk aes_ce_cipher crc32_ce qede ast i2c_algo_bit crct10dif_ce ptp ghash_ce ttm drm_kms_helper sha2_ce pps_core syscopyarea sysfillrect sysimgblt fb_sys_fops sha256_arm64 sha1_ce mpt3sas qed drm raid_class scsi_transport_sas ahci libahci gpio_xlp aes_neon_bs aes_neon_blk crypto_simd cryptd aes_arm64
[ 1075.991997] Process stress-ng-sysfs (pid: 108395, stack limit = 0x000000009cb607b8)
[ 1075.999643] CPU: 100 PID: 108395 Comm: stress-ng-sysfs Tainted: G D 4.15.0-91-generic #92~16.04.1-Ubuntu
[ 1076.010324] Hardware name: To be filled by O.E.M. Saber/Saber, BIOS 0ACKL027 07/01/2019
[ 1076.018314] pstate: 80400009 (Nzcv daif +PAN -UAO)
[ 1076.023096] pc : __memcpy+0x84/0x180
[ 1076.026663] lr : memory_read_from_buffer+0x64/0x88
[ 1076.031441] sp : ffff00003ea2bd10
[ 1076.034743] x29: ffff00003ea2bd10 x28: ffff80be4d85cb00
[ 1076.040042] x27: ffff000008b42000 x26: 000000000000003f
[ 1076.045342] x25: 0000000000000124 x24: ffff00004a700000
[ 1076.050643] x23: ffff809e3a7e8500 x22: 000000000000000a
[ 1076.055942] x21: ffff00003ea2bd88 x20: 000000000000000a
[ 1076.061240] x19: 0000000000000734 x18: 0000000000000014
[ 1076.066540] x17: 0000ffffaf4e1a58 x16: ffff0000082e8e28
[ 1076.071839] x15: 00002d88734750e0 x14: 00181a0596c27059
[ 1076.077138] x13: 00000003e8000000 x12: 0000000000000018
[ 1076.082436] x11: 000000000006372e x10: 000000005e66c174
[ 1076.087735] x9 : 003b9aca00000000 x8 : 000000000000003f
[ 1076.093034] x7 : ffff000008645490 x6 : ffff809e3a7e8500
[ 1076.098333] x5 : 000000000000000a x4 : 0000000000010000
[ 1076.103633] x3 : ffff00004a700000 x2 : 000000000000000a
[ 1076.108932] x1 : ffff00004a70072a x0 : ffff809e3a7e8500
[ 1076.114231] Call trace:
[ 1076.116668] __memcpy+0x84/0x180
[ 1076.119887] acpi_data_show+0x54/0x80
[ 1076.123541] sysfs_kf_bin_read+0x6c/0xa8
[ 1076.127451] kernfs_fop_read+0xa4/0x1e0
[ 1076.131274] __vfs_read+0x48/0x90
[ 1076.134577] vfs_read+0x94/0x150
[ 1076.137792] SyS_read+0x74/0xf0
[ 1076.140923] el0_svc_naked+0x30/0x34
[ 1076.144487] Code: a88120c7 a8c12027 a88120c7 36180062 (f8408423)
[ 1076.150570] ---[ end trace 496ae41e9716bef2 ]---
[ 1076.155180] Internal error: Oops: 96000021 [#3] SMP
[ 1076.160054] Modules linked in: unix_diag binfmt_misc snd_seq snd_seq_device snd_timer snd soundcore userio vfio_iommu_type1 vfio hci_vhci bluetooth ecdh_generic uhid cuse vhost_vsock vmw_vsock_virtio_transport_common vhost_net vhost vsock tap dccp_ipv4 dccp ipx p8023 atm psnap p8022 llc algif_rng algif_aead anubis fcrypt khazad seed tea md4 michael_mic poly1305_generic rmd128 rmd160 rmd256 rmd320 sha3_generic sm3_generic tgr192 wp512 algif_hash chacha20_neon chacha20_generic blowfish_generic blowfish_common cast5_generic des_generic salsa20_generic camellia_generic cast6_generic cast_common serpent_generic twofish_generic twofish_common algif_skcipher af_alg nls_iso8859_1 ipmi_ssif ipmi_devintf joydev input_leds ipmi_msghandler shpchp i2c_xlp9xx(+) thunderx2_pmu ib_iser rdma_cm iw_cm ib_cm ib_core
[ 1076.230688] iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear hid_generic usbhid hid uas usb_storage aes_ce_blk aes_ce_cipher crc32_ce qede ast i2c_algo_bit crct10dif_ce ptp ghash_ce ttm drm_kms_helper sha2_ce pps_core syscopyarea sysfillrect sysimgblt fb_sys_fops sha256_arm64 sha1_ce mpt3sas qed drm raid_class scsi_transport_sas ahci libahci gpio_xlp aes_neon_bs aes_neon_blk crypto_simd cryptd aes_arm64
[ 1076.280211] Process stress-ng-sysfs (pid: 108405, stack limit = 0x00000000081889d7)
[ 1076.287856] CPU: 155 PID: 108405 Comm: stress-ng-sysfs Tainted: G D 4.15.0-91-generic #92~16.04.1-Ubuntu
[ 1076.298538] Hardware name: To be filled by O.E.M. Saber/Saber, BIOS 0ACKL027 07/01/2019
[ 1076.306530] pstate: 80400009 (Nzcv daif +PAN -UAO)
[ 1076.311319] pc : __memcpy+0x84/0x180
[ 1076.314890] lr : memory_read_from_buffer+0x64/0x88
[ 1076.319667] sp : ffff00003eea3d10
[ 1076.322969] x29: ffff00003eea3d10 x28: ffff80be4d858000
[ 1076.328269] x27: ffff000008b42000 x26: 000000000000003f
[ 1076.333568] x25: 0000000000000124 x24: ffff00004a700000
[ 1076.338868] x23: ffff80bec6fa7400 x22: 000000000000000d
[ 1076.344167] x21: ffff00003eea3d88 x20: 000000000000000d
[ 1076.349467] x19: 000000000000e4c7 x18: 0000000000000014
[ 1076.354767] x17: 0000ffffaf4e1a58 x16: ffff0000082e8e28
[ 1076.360068] x15: 0000566c10765956 x14: 00181a0596c27059
[ 1076.365368] x13: 00000003e8000000 x12: 0000000000000018
[ 1076.370667] x11: 00000000000641a6 x10: 000000005e66c174
[ 1076.375966] x9 : 003b9aca00000000 x8 : 000000000000003f
[ 1076.381265] x7 : ffff000008645490 x6 : ffff80bec6fa7400
[ 1076.386564] x5 : 000000000000000d x4 : 0000000000010000
[ 1076.391864] x3 : ffff00004a700000 x2 : 000000000000000d
[ 1076.397163] x1 : ffff00004a70e4ba x0 : ffff80bec6fa7400
[ 1076.402463] Call trace:
[ 1076.404901] __memcpy+0x84/0x180
[ 1076.408125] acpi_data_show+0x54/0x80
[ 1076.411785] sysfs_kf_bin_read+0x6c/0xa8
[ 1076.415696] kernfs_fop_read+0xa4/0x1e0
[ 1076.419520] __vfs_read+0x48/0x90
[ 1076.422823] vfs_read+0x94/0x150
[ 1076.426038] SyS_read+0x74/0xf0
[ 1076.429171] el0_svc_naked+0x30/0x34
[ 1076.432736] Code: a88120c7 a8c12027 a88120c7 36180062 (f8408423)
[ 1076.438818] ---[ end trace 496ae41e9716bef3 ]--- |
|
2020-04-28 19:47:28 |
Launchpad Janitor |
linux (Ubuntu Eoan): status |
Fix Committed |
Fix Released |
|
2020-04-28 19:47:28 |
Launchpad Janitor |
cve linked |
|
2020-11884 |
|
2020-04-28 19:47:58 |
Launchpad Janitor |
linux (Ubuntu Bionic): status |
Fix Committed |
Fix Released |
|
2020-05-19 14:39:24 |
Colin Ian King |
ubuntu-kernel-tests: status |
In Progress |
Fix Released |
|
2020-05-20 01:24:00 |
Po-Hsu Lin |
stress-ng: status |
New |
Invalid |
|