------- Comment From heinz-werner_se...@de.ibm.com 2019-11-13 03:56 EDT-------
---Problem Description---
Running LTP test results in the following warning stack trace in the 
journalctl.  Please let me know if any additional data is needed.

Oct 29 22:47:43 t35lp04 kernel: ltp_block_dev: Test Case 5: register_blkdev() 
with major=512/4294967295
Oct 29 22:47:43 t35lp04 kernel: register_blkdev: major requested (512) is 
greater than the maximum (512) for ltp_block_dev
Oct 29 22:47:43 t35lp04 kernel: register_blkdev: major requested (-1) is 
greater than the maximum (512) for ltp_block_dev
Oct 29 22:47:43 t35lp04 kernel: ltp_block_dev: Test Case Result: PASS
Oct 29 22:47:43 t35lp04 kernel: ltp_block_dev: Test Case 6: register_blkdev() 
with name=""
Oct 29 22:47:43 t35lp04 kernel: ltp_block_dev: Test Case Result: PASS
Oct 29 22:47:43 t35lp04 kernel: ltp_block_dev: Test Case 7: unregister_blkdev() 
with major=0
Oct 29 22:47:43 t35lp04 kernel: ------------[ cut here ]------------
Oct 29 22:47:43 t35lp04 kernel: WARNING: CPU: 10 PID: 93645 at 
/build/linux-ru4Kqk/linux-4.15.0/block/genhd.c:412 unregister_blkdev+0xb6/0x110
Oct 29 22:47:43 t35lp04 kernel: Modules linked in: ltp_block_dev(OE) vmac 
chacha20_generic poly1305_generic chacha20poly1305 algif_aead authenc pcrypt 
crypto_user xfrm_user xfrm_algo sha3_generic algif_hash salsa20_generic 
algif_skcipher af_alg msdos dummy veth binfmt_misc sctp brd nls_utf8 
nls_iso8859_1 ntfs btrfs xor zstd_compress zlib_deflate raid6_pq xfs libcrc32c 
overlay dm_multipath scsi_dh_rdac scsi_dh_emc scsi_dh_alua s390_trng ghash_s390 
prng aes_s390 des_s390 des_generic qeth_l2 sha512_s390 sha256_s390 sha1_s390 
sha_common chsc_sch eadm_sch qeth ccwgroup vfio_ccw vfio_mdev mdev 
vfio_iommu_type1 vfio sch_fq_codel ip_tables x_tables crc32_vx_s390 zfcp qdio 
scsi_transport_fc dasd_eckd_mod dasd_mod [last unloaded: ltp_fw_load]
Oct 29 22:47:43 t35lp04 kernel: CPU: 10 PID: 93645 Comm: block_dev Tainted: G   
        OE    4.15.0-66-generic #75-Ubuntu
Oct 29 22:47:43 t35lp04 kernel: Hardware name: IBM 8561 T01 403 (LPAR)
Oct 29 22:47:43 t35lp04 kernel: Krnl PSW : 00000000dbddaa8b 00000000a41f3293 
(unregister_blkdev+0xb6/0x110)
Oct 29 22:47:43 t35lp04 kernel:            R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 
AS:3 CC:0 PM:0 RI:0 EA:3
Oct 29 22:47:43 t35lp04 kernel: Krnl GPRS: 0000000000000800 0000000000000006 
0000000000000024 0000000000000007
Oct 29 22:47:43 t35lp04 kernel:            00000000005c6672 000000007fe03000 
0000000000000001 000002aa3f9de4c0
Oct 29 22:47:43 t35lp04 kernel:            00000004569dbf00 0000000000000001 
000003ff800be11c 0000000000000000
Oct 29 22:47:43 t35lp04 kernel:            0000000000000000 000000000094ebb0 
00000000005c6672 00000004569dbd10
Oct 29 22:47:43 t35lp04 kernel: Krnl Code: 00000000005c6666: c02000260c97       
larl    %r2,a87f94
00000000005c666c: c0e5ffe0f502       brasl   %r14,1e5070
#00000000005c6672: a7f40001           brc     15,5c6674
>00000000005c6676: a7c90000           lghi    %r12,0
00000000005c667a: a7f4001c           brc     15,5c66b2
00000000005c667e: ec2c1dbc0359       risbgn  %r2,%r12,29,188,3
00000000005c6684: b90400c1           lgr     %r12,%r1
00000000005c6688: c010004cd4b8       larl    %r1,f60ff8
Oct 29 22:47:43 t35lp04 kernel: Call Trace:
Oct 29 22:47:43 t35lp04 kernel: ([<00000000005c6672>] 
unregister_blkdev+0xb2/0x110)
Oct 29 22:47:43 t35lp04 kernel:  [<000003ff800bd798>] sys_tcase+0x560/0x9a0 
[ltp_block_dev]
Oct 29 22:47:43 t35lp04 kernel:  [<000000000042c7fc>] 
kernfs_fop_write+0xdc/0x218
Oct 29 22:47:43 t35lp04 kernel:  [<000000000038a1fc>] vfs_write+0x184/0x1e8
Oct 29 22:47:43 t35lp04 kernel:  [<000000000038a444>] SyS_write+0x6c/0xf0
Oct 29 22:47:43 t35lp04 kernel:  [<00000000008f7454>] system_call+0xd8/0x2c8
Oct 29 22:47:43 t35lp04 kernel: Last Breaking-Event-Address:
Oct 29 22:47:43 t35lp04 kernel:  [<00000000005c6672>] 
unregister_blkdev+0xb2/0x110
Oct 29 22:47:43 t35lp04 kernel: ---[ end trace e89fa54649b0cc78 ]---
Oct 29 22:47:43 t35lp04 kernel: ltp_block_dev: Test Case Result: PASS
Oct 29 22:47:43 t35lp04 kernel: ltp_block_dev: device released
Oct 29 22:47:43 t35lp04 LTP: starting tpci
Oct 29 22:47:43 t35lp04 LTP: starting tbio

---uname output---
Linux t35lp04 4.15.0-66-generic #75-Ubuntu SMP Tue Oct 1 05:22:41 UTC 2019 
s390x s390x s390x GNU/Linux

Machine Type = T35 LPAR T35LP04

---Debugger---
A debugger is not configured

---Steps to Reproduce---
Ran CI Regression Test case for LTP which:
- installs ubuntu18.04.3
- installs, builds, configures the LTP test case downloaded from github
- runs the test: echo y | /opt/ltp/runltp -S /root/ltp-skip.txt
where ltp-skip.txt contains:
root@t35lp04:~# cat ltp-skip.txt
fork13
max_map_count
min_free_kbytes
perf_event_open02
oom01
oom02
oom03
oom04
oom05
root@t35lp04:~#


Stack trace output:
Oct 29 22:47:43 t35lp04 kernel: ------------[ cut here ]------------
Oct 29 22:47:43 t35lp04 kernel: WARNING: CPU: 10 PID: 93645 at 
/build/linux-ru4Kqk/linux-4.15.0/block/genhd.c:412 unregister_blkdev+0xb6/0x110
Oct 29 22:47:43 t35lp04 kernel: Modules linked in: ltp_block_dev(OE) vmac 
chacha20_generic poly1305_generic chacha20poly1305 algif_aead authenc pcrypt 
crypto_user xfrm_user xfrm_algo sha3_generic algif_hash salsa20_generic 
algif_skcipher af_alg msdos dummy veth binfmt_misc sctp brd nls_utf8 
nls_iso8859_1 ntfs btrfs xor zstd_compress zlib_deflate raid6_pq xfs libcrc32c 
overlay dm_multipath scsi_dh_rdac scsi_dh_emc scsi_dh_alua s390_trng ghash_s390 
prng aes_s390 des_s390 des_generic qeth_l2 sha512_s390 sha256_s390 sha1_s390 
sha_common chsc_sch eadm_sch qeth ccwgroup vfio_ccw vfio_mdev mdev 
vfio_iommu_type1 vfio sch_fq_codel ip_tables x_tables crc32_vx_s390 zfcp qdio 
scsi_transport_fc dasd_eckd_mod dasd_mod [last unloaded: ltp_fw_load]
Oct 29 22:47:43 t35lp04 kernel: CPU: 10 PID: 93645 Comm: block_dev Tainted: G   
        OE    4.15.0-66-generic #75-Ubuntu
Oct 29 22:47:43 t35lp04 kernel: Hardware name: IBM 8561 T01 403 (LPAR)
Oct 29 22:47:43 t35lp04 kernel: Krnl PSW : 00000000dbddaa8b 00000000a41f3293 
(unregister_blkdev+0xb6/0x110)
Oct 29 22:47:43 t35lp04 kernel:            R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 
AS:3 CC:0 PM:0 RI:0 EA:3
Oct 29 22:47:43 t35lp04 kernel: Krnl GPRS: 0000000000000800 0000000000000006 
0000000000000024 0000000000000007
Oct 29 22:47:43 t35lp04 kernel:            00000000005c6672 000000007fe03000 
0000000000000001 000002aa3f9de4c0
Oct 29 22:47:43 t35lp04 kernel:            00000004569dbf00 0000000000000001 
000003ff800be11c 0000000000000000
Oct 29 22:47:43 t35lp04 kernel:            0000000000000000 000000000094ebb0 
00000000005c6672 00000004569dbd10
Oct 29 22:47:43 t35lp04 kernel: Krnl Code: 00000000005c6666: c02000260c97       
larl    %r2,a87f94
00000000005c666c: c0e5ffe0f502       brasl   %r14,1e5070
#00000000005c6672: a7f40001           brc     15,5c6674
>00000000005c6676: a7c90000           lghi    %r12,0
00000000005c667a: a7f4001c           brc     15,5c66b2
00000000005c667e: ec2c1dbc0359       risbgn  %r2,%r12,29,188,3
00000000005c6684: b90400c1           lgr     %r12,%r1
00000000005c6688: c010004cd4b8       larl    %r1,f60ff8
Oct 29 22:47:43 t35lp04 kernel: Call Trace:
Oct 29 22:47:43 t35lp04 kernel: ([<00000000005c6672>] 
unregister_blkdev+0xb2/0x110)
Oct 29 22:47:43 t35lp04 kernel:  [<000003ff800bd798>] sys_tcase+0x560/0x9a0 
[ltp_block_dev]
Oct 29 22:47:43 t35lp04 kernel:  [<000000000042c7fc>] 
kernfs_fop_write+0xdc/0x218
Oct 29 22:47:43 t35lp04 kernel:  [<000000000038a1fc>] vfs_write+0x184/0x1e8
Oct 29 22:47:43 t35lp04 kernel:  [<000000000038a444>] SyS_write+0x6c/0xf0
Oct 29 22:47:43 t35lp04 kernel:  [<00000000008f7454>] system_call+0xd8/0x2c8
Oct 29 22:47:43 t35lp04 kernel: Last Breaking-Event-Address:
Oct 29 22:47:43 t35lp04 kernel:  [<00000000005c6672>] 
unregister_blkdev+0xb2/0x110
Oct 29 22:47:43 t35lp04 kernel: ---[ end trace e89fa54649b0cc78 ]---


Oops output:
no

Userspace tool common name: LTP

Userspace rpm: n/a

The userspace tool has the following bit modes: 64-bit

System Dump Info:
The system was configured to capture a dump, however a dump was not produced.

Userspace tool obtained from project website:  git://github.com/linux-
test-project/ltp.git

*Additional Instructions :

Created attachment 139034 [details]
sysctl -a output

root@t35lp04:~# sysctl -a > sysctl-a.output
sysctl: reading key "net.ipv6.conf.all.stable_secret"
sysctl: reading key "net.ipv6.conf.default.stable_secret"
sysctl: reading key "net.ipv6.conf.encbd00.stable_secret"
sysctl: reading key "net.ipv6.conf.lo.stable_secret"
root@t35lp04:~#

Created attachment 139036 [details]
ltrace output

root@t35lp04:/opt/ltp/testcases/bin# ltrace -o 
/root/ltrace.t35lp04.ubuntu18.04.3.ltp_block_dev.bug_182146.output ./block_dev
block_dev    1  TPASS  :  Test-case '1'
block_dev    2  TPASS  :  Test-case '2'
block_dev    3  TPASS  :  Test-case '3'
block_dev    4  TPASS  :  Test-case '4'
block_dev    5  TPASS  :  Test-case '5'
block_dev    6  TPASS  :  Test-case '6'
block_dev    7  TPASS  :  Test-case '7'
root@t35lp04:/opt/ltp/testcases/bin#

Created attachment 139037 [details]
strace output

root@t35lp04:/opt/ltp/testcases/bin# strace -o 
/root/strace.t35lp04.ubuntu18.04.3.ltp_block_dev.bug_182146.output ./block_dev
block_dev    1  TPASS  :  Test-case '1'
block_dev    2  TPASS  :  Test-case '2'
block_dev    3  TPASS  :  Test-case '3'
block_dev    4  TPASS  :  Test-case '4'
block_dev    5  TPASS  :  Test-case '5'
block_dev    6  TPASS  :  Test-case '6'
block_dev    7  TPASS  :  Test-case '7'
root@t35lp04:/opt/ltp/testcases/bin#

Created attachment 139038 [details]
journalctl -f output when recreating the problem

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1852294

Title:
  Ubuntu18.04.3 - LTP testcase gets stacktrace running 'kernel:
  ltp_block_dev: Test Case 7: unregister_blkdev() with major=0'

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1852294/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to