2018-01-30 11:29:59 |
bugproxy |
bug |
|
|
added bug |
2018-01-30 11:30:01 |
bugproxy |
tags |
|
architecture-ppc64le bugnameltc-164107 severity-critical targetmilestone-inin1804 |
|
2018-01-30 11:30:03 |
bugproxy |
ubuntu: assignee |
|
Ubuntu on IBM Power Systems Bug Triage (ubuntu-power-triage) |
|
2018-01-30 11:30:06 |
bugproxy |
affects |
ubuntu |
kernel-package (Ubuntu) |
|
2018-01-30 11:31:35 |
Andrew Cloke |
bug task added |
|
ubuntu-power-systems |
|
2018-01-30 11:31:51 |
Andrew Cloke |
ubuntu-power-systems: assignee |
|
Canonical Kernel Team (canonical-kernel-team) |
|
2018-01-30 11:32:08 |
Andrew Cloke |
ubuntu-power-systems: importance |
Undecided |
Critical |
|
2018-01-30 11:32:22 |
Andrew Cloke |
tags |
architecture-ppc64le bugnameltc-164107 severity-critical targetmilestone-inin1804 |
architecture-ppc64le bugnameltc-164107 severity-critical targetmilestone-inin1804 triage-g |
|
2018-01-30 20:34:41 |
Joseph Salisbury |
tags |
architecture-ppc64le bugnameltc-164107 severity-critical targetmilestone-inin1804 triage-g |
architecture-ppc64le bugnameltc-164107 kernel-da-key severity-critical targetmilestone-inin1804 triage-g |
|
2018-01-30 20:34:50 |
Joseph Salisbury |
kernel-package (Ubuntu): importance |
Undecided |
Critical |
|
2018-01-30 20:35:03 |
Joseph Salisbury |
affects |
kernel-package (Ubuntu) |
linux (Ubuntu) |
|
2018-01-31 17:25:49 |
Joseph Salisbury |
linux (Ubuntu): status |
New |
In Progress |
|
2018-01-31 17:25:53 |
Joseph Salisbury |
linux (Ubuntu): assignee |
Ubuntu on IBM Power Systems Bug Triage (ubuntu-power-triage) |
Joseph Salisbury (jsalisbury) |
|
2018-01-31 17:26:00 |
Joseph Salisbury |
nominated for series |
|
Ubuntu Artful |
|
2018-01-31 17:26:00 |
Joseph Salisbury |
bug task added |
|
linux (Ubuntu Artful) |
|
2018-01-31 17:26:00 |
Joseph Salisbury |
nominated for series |
|
Ubuntu Bionic |
|
2018-01-31 17:26:00 |
Joseph Salisbury |
bug task added |
|
linux (Ubuntu Bionic) |
|
2018-01-31 17:26:06 |
Joseph Salisbury |
linux (Ubuntu Artful): status |
New |
In Progress |
|
2018-01-31 17:26:09 |
Joseph Salisbury |
linux (Ubuntu Artful): importance |
Undecided |
Critical |
|
2018-01-31 17:26:12 |
Joseph Salisbury |
linux (Ubuntu Artful): assignee |
|
Joseph Salisbury (jsalisbury) |
|
2018-01-31 17:55:05 |
Frank Heimes |
ubuntu-power-systems: status |
New |
In Progress |
|
2018-02-02 20:48:47 |
Joseph Salisbury |
description |
== Comment: #0 - Shriya R. Kulkarni <shriykul@in.ibm.com> - 2018-01-30 03:24:47 ==
Problem Description :
==============
Perf fuzzer resulted in crash and system goes for reboot and the call trace is shown below . It is due to grouping of different PMU events.
Machine details :
==========
OS : Ubuntu 1804
uname -r : 4.13.0-25-generic
system : Witherspoon + DD2.1
perf -v : perf version 4.13.13
ltc-wspoon12 login: [78592.995848] Unable to handle kernel paging request for instruction fetch
[78592.995914] Faulting instruction address: 0x00000000
[78592.995950] Oops: Kernel access of bad area, sig: 11 [#1]
[78592.995982] SMP NR_CPUS=2048
[78592.995985] NUMA
[78592.996011] PowerNV
[78592.996045] Modules linked in: vmx_crypto idt_89hpesx crct10dif_vpmsum at24 ofpart uio_pdrv_genirq uio cmdlinepart powernv_flash mtd ibmpowernv opal_prd ipmi_powernv ipmi_devintf ipmi_msghandler sch_fq_codel ip_tables x_tables autofs4 nouveau lpfc ast i2c_algo_bit crc32c_vpmsum ttm drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops drm mlx5_core nvmet_fc nvmet tg3 nvme_fc nvme_fabrics ahci nvme_core libahci mlxfw devlink scsi_transport_fc
[78592.996367] CPU: 69 PID: 6010 Comm: perf_fuzzer Tainted: G W 4.13.0-25-generic #29-Ubuntu
[78592.996422] task: c000003f77b5b500 task.stack: c000003d0b0c8000
[78592.996462] NIP: 0000000000000000 LR: c0000000000e9b1c CTR: 0000000000000000
[78592.996509] REGS: c000003d0b0cb780 TRAP: 0400 Tainted: G W (4.13.0-25-generic)
[78592.996562] MSR: 9000000040009033 <SF,HV,EE,ME,IR,DR,RI,LE>
[78592.996588] CR: 48002874 XER: 00000000
[78592.996642] CFAR: c0000000000e9b18 SOFTE: 1
[78592.996642] GPR00: c0000000000eb128 c000003d0b0cba00 c0000000015f6200 0000000000000000
[78592.996642] GPR04: c000003d0b0cbba0 c000003d0b0cbc20 0000000000000002 c000000001596b10
[78592.996642] GPR08: 0000000000000002 0000000000000000 c000000001596b10 c000003fecad0028
[78592.996642] GPR12: 0000000000000000 c000000007a8d480 0000000000000000 0000000000000000
[78592.996642] GPR16: 0000000000000000 0000000000000000 0000000000000000 0000000000000000
[78592.996642] GPR20: 0000000000000001 c000003d0b0cbc1c c000003d0b0cbc24 c000003d0b0cbb98
[78592.996642] GPR24: c000003d0b0cbba0 c000003d0b0cbc20 0000000000001555 c000003fefeb4ea0
[78592.996642] GPR28: c000003d0b0cbc20 0000000000000002 0000000000003000 c000003fefeb5190
[78592.997170] NIP [0000000000000000] (null)
[78592.997208] LR [c0000000000e9b1c] power_check_constraints+0x13c/0x5a0
[78592.997247] Call Trace:
[78592.997267] [c000003d0b0cba00] [c000003d0b0cbaa0] 0xc000003d0b0cbaa0 (unreliable)
[78592.997321] [c000003d0b0cbb80] [c0000000000eb128] power_pmu_event_init+0x298/0x6a0
[78592.997373] [c000003d0b0cbc70] [c00000000029e6b4] perf_try_init_event+0xd4/0x120
[78592.997424] [c000003d0b0cbcb0] [c0000000002a1038] perf_event_alloc.part.23+0x7b8/0xb90
[78592.997475] [c000003d0b0cbd30] [c0000000002aa0dc] SyS_perf_event_open+0x69c/0xfa0
[78592.997527] [c000003d0b0cbe30] [c00000000000b184] system_call+0x58/0x6c
[78592.997568] Instruction dump:
[78592.997597] XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
[78592.997664] XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
[78592.997733] ---[ end trace 57fb7542c4083583 ]---
[78594.008780]
[78594.008932] Sending IP[78773.335857584,5] OPAL: Switch to big-endian OS
I to other CPUs
[78594.01029
Steps to reproduce :
============
#! /bin/bash
set -x
git clone https://github.com/deater/perf_event_tests.git
cd perf_event_tests/include
mkdir asm
cd asm
wget http://9.114.13.132/repo/shriya/perf_regs.h
cd ../../lib
make
sleep 10
cd ../fuzzer
make
sleep 10
echo 0 > /proc/sys/kernel/nmi_watchdog
echo 2 > /proc/sys/kernel/perf_event_paranoid
echo 100000 > /proc/sys/kernel/perf_event_max_sample_rate
./perf_fuzzer -r 1492143527 |
== SRU Justification ==
Due to this bug, perf fuzzer resulted in crash and system goes for a reboot
and results in a call trace shown in the bug. It is due to grouping of
different PMU events, which is fixed by mainline commit 5aa04b3eb6fca63d2e9827be656dcadc26d54e1
Commit 5aa04b3eb6fca63d2e9827be656dcadc26d54e11 is in mailine as of v4.15-rc5.
== Fix ==
commit 5aa04b3eb6fca63d2e9827be656dcadc26d54e11
Author: Ravi Bangoria <ravi.bangoria@linux.vnet.ibm.com>
Date: Thu Nov 30 14:03:22 2017 +0530
powerpc/perf: Fix oops when grouping different pmu events
== Regression Potential ==
Low. This fix is specific to powerpc.
== Test Case ==
A test kernel was built with this patch and tested by the original bug reporter.
The bug reporter states the test kernel resolved the bug.
==Original Bug Description==
== Comment: #0 - Shriya R. Kulkarni <shriykul@in.ibm.com> - 2018-01-30 03:24:47 ==
Problem Description :
==============
Perf fuzzer resulted in crash and system goes for reboot and the call trace is shown below . It is due to grouping of different PMU events.
Machine details :
==========
OS : Ubuntu 1804
uname -r : 4.13.0-25-generic
system : Witherspoon + DD2.1
perf -v : perf version 4.13.13
ltc-wspoon12 login: [78592.995848] Unable to handle kernel paging request for instruction fetch
[78592.995914] Faulting instruction address: 0x00000000
[78592.995950] Oops: Kernel access of bad area, sig: 11 [#1]
[78592.995982] SMP NR_CPUS=2048
[78592.995985] NUMA
[78592.996011] PowerNV
[78592.996045] Modules linked in: vmx_crypto idt_89hpesx crct10dif_vpmsum at24 ofpart uio_pdrv_genirq uio cmdlinepart powernv_flash mtd ibmpowernv opal_prd ipmi_powernv ipmi_devintf ipmi_msghandler sch_fq_codel ip_tables x_tables autofs4 nouveau lpfc ast i2c_algo_bit crc32c_vpmsum ttm drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops drm mlx5_core nvmet_fc nvmet tg3 nvme_fc nvme_fabrics ahci nvme_core libahci mlxfw devlink scsi_transport_fc
[78592.996367] CPU: 69 PID: 6010 Comm: perf_fuzzer Tainted: G W 4.13.0-25-generic #29-Ubuntu
[78592.996422] task: c000003f77b5b500 task.stack: c000003d0b0c8000
[78592.996462] NIP: 0000000000000000 LR: c0000000000e9b1c CTR: 0000000000000000
[78592.996509] REGS: c000003d0b0cb780 TRAP: 0400 Tainted: G W (4.13.0-25-generic)
[78592.996562] MSR: 9000000040009033 <SF,HV,EE,ME,IR,DR,RI,LE>
[78592.996588] CR: 48002874 XER: 00000000
[78592.996642] CFAR: c0000000000e9b18 SOFTE: 1
[78592.996642] GPR00: c0000000000eb128 c000003d0b0cba00 c0000000015f6200 0000000000000000
[78592.996642] GPR04: c000003d0b0cbba0 c000003d0b0cbc20 0000000000000002 c000000001596b10
[78592.996642] GPR08: 0000000000000002 0000000000000000 c000000001596b10 c000003fecad0028
[78592.996642] GPR12: 0000000000000000 c000000007a8d480 0000000000000000 0000000000000000
[78592.996642] GPR16: 0000000000000000 0000000000000000 0000000000000000 0000000000000000
[78592.996642] GPR20: 0000000000000001 c000003d0b0cbc1c c000003d0b0cbc24 c000003d0b0cbb98
[78592.996642] GPR24: c000003d0b0cbba0 c000003d0b0cbc20 0000000000001555 c000003fefeb4ea0
[78592.996642] GPR28: c000003d0b0cbc20 0000000000000002 0000000000003000 c000003fefeb5190
[78592.997170] NIP [0000000000000000] (null)
[78592.997208] LR [c0000000000e9b1c] power_check_constraints+0x13c/0x5a0
[78592.997247] Call Trace:
[78592.997267] [c000003d0b0cba00] [c000003d0b0cbaa0] 0xc000003d0b0cbaa0 (unreliable)
[78592.997321] [c000003d0b0cbb80] [c0000000000eb128] power_pmu_event_init+0x298/0x6a0
[78592.997373] [c000003d0b0cbc70] [c00000000029e6b4] perf_try_init_event+0xd4/0x120
[78592.997424] [c000003d0b0cbcb0] [c0000000002a1038] perf_event_alloc.part.23+0x7b8/0xb90
[78592.997475] [c000003d0b0cbd30] [c0000000002aa0dc] SyS_perf_event_open+0x69c/0xfa0
[78592.997527] [c000003d0b0cbe30] [c00000000000b184] system_call+0x58/0x6c
[78592.997568] Instruction dump:
[78592.997597] XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
[78592.997664] XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
[78592.997733] ---[ end trace 57fb7542c4083583 ]---
[78594.008780]
[78594.008932] Sending IP[78773.335857584,5] OPAL: Switch to big-endian OS
I to other CPUs
[78594.01029
Steps to reproduce :
============
#! /bin/bash
set -x
git clone https://github.com/deater/perf_event_tests.git
cd perf_event_tests/include
mkdir asm
cd asm
wget http://9.114.13.132/repo/shriya/perf_regs.h
cd ../../lib
make
sleep 10
cd ../fuzzer
make
sleep 10
echo 0 > /proc/sys/kernel/nmi_watchdog
echo 2 > /proc/sys/kernel/perf_event_paranoid
echo 100000 > /proc/sys/kernel/perf_event_max_sample_rate
./perf_fuzzer -r 1492143527 |
|
2018-02-03 17:14:46 |
Seth Forshee |
linux (Ubuntu Bionic): status |
In Progress |
Fix Committed |
|
2018-02-27 16:38:00 |
Joseph Salisbury |
linux (Ubuntu Bionic): status |
Fix Committed |
Fix Released |
|
2018-03-01 12:09:44 |
Kleber Sacilotto de Souza |
linux (Ubuntu Artful): status |
In Progress |
Fix Committed |
|
2018-03-05 14:49:21 |
Manoj Iyer |
ubuntu-power-systems: status |
In Progress |
Fix Committed |
|
2018-03-19 10:56:38 |
Stefan Bader |
tags |
architecture-ppc64le bugnameltc-164107 kernel-da-key severity-critical targetmilestone-inin1804 triage-g |
architecture-ppc64le bugnameltc-164107 kernel-da-key severity-critical targetmilestone-inin1804 triage-g verification-needed-artful |
|
2018-03-26 13:43:24 |
Manoj Iyer |
tags |
architecture-ppc64le bugnameltc-164107 kernel-da-key severity-critical targetmilestone-inin1804 triage-g verification-needed-artful |
architecture-ppc64le bugnameltc-164107 kernel-da-key severity-critical targetmilestone-inin1804 triage-g verification-done-artful |
|
2018-04-03 14:10:10 |
Launchpad Janitor |
linux (Ubuntu Artful): status |
Fix Committed |
Fix Released |
|
2018-04-03 14:10:10 |
Launchpad Janitor |
cve linked |
|
2017-0861 |
|
2018-04-03 14:10:10 |
Launchpad Janitor |
cve linked |
|
2017-1000407 |
|
2018-04-03 14:10:10 |
Launchpad Janitor |
cve linked |
|
2017-15129 |
|
2018-04-03 14:10:10 |
Launchpad Janitor |
cve linked |
|
2017-16994 |
|
2018-04-03 14:10:10 |
Launchpad Janitor |
cve linked |
|
2017-17448 |
|
2018-04-03 14:10:10 |
Launchpad Janitor |
cve linked |
|
2017-17450 |
|
2018-04-03 14:10:10 |
Launchpad Janitor |
cve linked |
|
2017-17741 |
|
2018-04-03 14:10:10 |
Launchpad Janitor |
cve linked |
|
2017-17805 |
|
2018-04-03 14:10:10 |
Launchpad Janitor |
cve linked |
|
2017-17806 |
|
2018-04-03 14:10:10 |
Launchpad Janitor |
cve linked |
|
2017-17807 |
|
2018-04-03 14:10:10 |
Launchpad Janitor |
cve linked |
|
2018-1000026 |
|
2018-04-03 14:10:10 |
Launchpad Janitor |
cve linked |
|
2018-5332 |
|
2018-04-03 14:10:10 |
Launchpad Janitor |
cve linked |
|
2018-5333 |
|
2018-04-03 14:10:10 |
Launchpad Janitor |
cve linked |
|
2018-5344 |
|
2018-04-04 16:51:27 |
Frank Heimes |
ubuntu-power-systems: status |
Fix Committed |
Fix Released |
|