[LTP] next: ltp: fs: read_all: block sda: the capability attribute has been deprecated. - supervisor instruction fetch in kernel mode

Naresh Kamboju naresh.kamboju@linaro.org
Wed Jun 21 16:01:29 CEST 2023


While running LTP fs testing on x86_64 device the following kernel BUG:
notice with Linux next-20230621.

Reported-by: Linux Kernel Functional Testing <lkft@linaro.org>

Steps to reproduce:

# cd /opt/ltp
# ./runltp -f fs

Test log:
======
read_all.c:687: TPASS: Finished reading files
Summary:
passed   1
failed   0
broken   0
skipped  0
warnings 0
tst_test.c:1558: TINFO: Timeout per run is 0h 06m 40s
read_all.c:568: TINFO: Worker timeout set to 10% of max_runtime: 1000ms
[ 1344.664349] block sda: the capability attribute has been deprecated.
[ 1344.679885] BUG: kernel NULL pointer dereference, address: 0000000000000000
[ 1344.686839] #PF: supervisor instruction fetch in kernel mode
[ 1344.692490] #PF: error_code(0x0010) - not-present page
[ 1344.697620] PGD 8000000105569067 P4D 8000000105569067 PUD 1056ed067 PMD 0
[ 1344.704494] Oops: 0010 [#1] PREEMPT SMP PTI
[ 1344.708680] CPU: 0 PID: 5649 Comm: read_all Not tainted
6.4.0-rc7-next-20230621 #1
[ 1344.716245] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS
2.5 11/26/2020
[ 1344.723629] RIP: 0010:0x0
[ 1344.726257] Code: Unable to access opcode bytes at 0xffffffffffffffd6.
[ 1344.732780] RSP: 0018:ffff98d38123bd38 EFLAGS: 00010286
[ 1344.737998] RAX: 0000000000000000 RBX: ffffffffbea38720 RCX: 0000000000000000
[ 1344.745123] RDX: ffff979e42e31000 RSI: ffffffffbea38720 RDI: ffff979e40371900
[ 1344.752246] RBP: ffff98d38123bd48 R08: ffff979e4080a0f0 R09: 0000000000000001
[ 1344.759371] R10: ffff979e42e31000 R11: 0000000000000000 R12: ffff979e42e31000
[ 1344.766495] R13: 0000000000000001 R14: ffff979e432dd2f8 R15: ffff979e432dd2d0
[ 1344.773621] FS:  00007ff745d4b740(0000) GS:ffff97a1a7a00000(0000)
knlGS:0000000000000000
[ 1344.781704] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 1344.787442] CR2: ffffffffffffffd6 CR3: 000000010563c004 CR4: 00000000003706f0
[ 1344.794587] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 1344.801733] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 1344.808857] Call Trace:
[ 1344.811301]  <TASK>
[ 1344.813399]  ? show_regs+0x6e/0x80
[ 1344.816804]  ? __die+0x29/0x70
[ 1344.819857]  ? page_fault_oops+0x154/0x470
[ 1344.823957]  ? do_user_addr_fault+0x355/0x6c0
[ 1344.828314]  ? exc_page_fault+0x6e/0x170
[ 1344.832239]  ? asm_exc_page_fault+0x2b/0x30
[ 1344.836420]  max_phase_adjustment_show+0x23/0x50
[ 1344.841038]  dev_attr_show+0x1e/0x60
[ 1344.844616]  sysfs_kf_seq_show+0xb5/0x100
[ 1344.848628]  kernfs_seq_show+0x28/0x40
[ 1344.852374]  seq_read_iter+0x112/0x4a0
[ 1344.856125]  ? inode_security+0x27/0x60
[ 1344.859967]  kernfs_fop_read_iter+0x145/0x1a0
[ 1344.864325]  ? security_file_permission+0x52/0x60
[ 1344.869031]  vfs_read+0x1c7/0x310
[ 1344.872350]  ksys_read+0x6b/0xf0
[ 1344.875602]  __x64_sys_read+0x1d/0x30
[ 1344.879274]  do_syscall_64+0x3c/0x90
[ 1344.882846]  entry_SYSCALL_64_after_hwframe+0x6e/0xd8
[ 1344.887898] RIP: 0033:0x7ff745e4a292
[ 1344.891476] Code: c0 e9 d2 fe ff ff 50 48 8d 3d 6a d5 0b 00 e8 15
ed 01 00 0f 1f 44 00 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75
10 0f 05 <48> 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 ec 28 48 89
54 24
[ 1344.910213] RSP: 002b:00007fff8e8dd828 EFLAGS: 00000246 ORIG_RAX:
0000000000000000
[ 1344.917770] RAX: ffffffffffffffda RBX: 00000000008dabc0 RCX: 00007ff745e4a292
[ 1344.924896] RDX: 00000000000003ff RSI: 00007fff8e8dd8e0 RDI: 0000000000000003
[ 1344.932029] RBP: 00007ff745d40028 R08: 00000000001b4e6e R09: 00007fff8e903170
[ 1344.939159] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000030
[ 1344.946283] R13: 0000000000000003 R14: 00007ff745d3c000 R15: 0000000000001611
[ 1344.953411]  </TASK>
[ 1344.955617] Modules linked in: tun x86_pkg_temp_thermal
[ 1344.960836] CR2: 0000000000000000
[ 1344.964148] ---[ end trace 0000000000000000 ]---
[ 1344.964149] BUG: kernel NULL pointer dereference, address: 0000000000000000
[ 1344.968766] RIP: 0010:0x0
[ 1344.975717] #PF: supervisor instruction fetch in kernel mode
[ 1344.978334] Code: Unable to access opcode bytes at 0xffffffffffffffd6.
[ 1344.983983] #PF: error_code(0x0010) - not-present page
[ 1344.990502] RSP: 0018:ffff98d38123bd38 EFLAGS: 00010286
[ 1344.995633] PGD 800000011c4c4067 P4D 800000011c4c4067


Links:
https://lkft.validation.linaro.org/scheduler/job/6531405#L2063
https://qa-reports.linaro.org/lkft/linux-next-master/build/next-20230621/testrun/17701281/suite/log-parser-test/tests/
https://qa-reports.linaro.org/lkft/linux-next-master/build/next-20230621/testrun/17701281/suite/log-parser-test/test/check-kernel-bug/details/
https://qa-reports.linaro.org/lkft/linux-next-master/build/next-20230621/testrun/17701281/suite/log-parser-test/test/check-kernel-bug/log

metadata:
  git_ref: master
  git_repo: https://gitlab.com/Linaro/lkft/mirrors/next/linux-next
  git_sha: 15e71592dbae49a674429c618a10401d7f992ac3
  git_describe: next-20230621
  kernel_version: 6.4.0-rc7
  kernel-config:
    https://storage.tuxsuite.com/public/linaro/lkft/builds/2RVA4HTFTr9mUVGTxGUDk0W0i9b/config
  artifact-location:
    https://storage.tuxsuite.com/public/linaro/lkft/builds/2RVA4HTFTr9mUVGTxGUDk0W0i9b/

--
Linaro LKFT
https://lkft.linaro.org


More information about the ltp mailing list