canonical-ubuntu-qa team mailing list archive
-
canonical-ubuntu-qa team
-
Mailing list archive
-
Message #07393
[Bug 1851829] Re: kernel trace found with ubuntu_bpf test on Eoan s390x LPAR
*** This bug is a duplicate of bug 1856163 ***
https://bugs.launchpad.net/bugs/1856163
** Tags added: kernel-daily-bug
--
You received this bug notification because you are a member of Canonical
Platform QA Team, which is subscribed to ubuntu-kernel-tests.
https://bugs.launchpad.net/bugs/1851829
Title:
kernel trace found with ubuntu_bpf test on Eoan s390x LPAR
Status in ubuntu-kernel-tests:
Triaged
Status in linux package in Ubuntu:
Incomplete
Status in linux source package in Eoan:
Incomplete
Bug description:
This trace can be seen right after you started the test on s390x LPAR.
**********************************************************
** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE **
** **
** trace_printk() being used. Allocating extra memory. **
** **
** This means that this is a DEBUG kernel and it is **
** unsafe for production use. **
** **
** If you see this message and you are not debugging **
** the kernel, report this immediately to your vendor! **
** **
** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE **
**********************************************************
WARNING: CPU: 0 PID: 3159 at mm/page_alloc.c:4702 __alloc_pages_nodemask+0x25e/0x318
Modules linked in: xt_conntrack ipt_REJECT nf_reject_ipv4 ip6table_mangle ip6table_nat nf_tables nfnetlink ip6table_filter ip6_tables iptable_mangle xt_CHECKSUM iptable_nat xt_MASQUERADE xt_tcpudp bridge iptable_filter bpfilter aufs overlay 8021q garp stp mrp llc openvswitch nsh nf_conncount nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 binfmt_misc zfs(PO) zunicode(PO) zavl(PO) icp(PO) zlua(PO) zcommon(PO) znvpair(PO) spl(O) genwqe_card crc_itu_t chsc_sch eadm_sch ctcm fsm vfio_ccw vfio_mdev mdev vfio_iommu_type1 vfio sch_fq_codel nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables x_tables btrfs zstd_compress zlib_deflate raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 linear dm_service_time pkey zcrypt crc32_vx_s390 ghash_s390 prng mlx4_en mlx4_ib ib_uverbs aes_s390 ib_core ptp pps_core qeth_l2 des_s390 des_generic sha512_s390 sha256_s390 sha1_s390 sha_common mlx4_core zfcp scsi_transport_fc qeth qdio ccwgroup
dasd_eckd_mod dasd_mod scsi_dh_emc scsi_dh_rdac scsi_dh_alua dm_multipath
CPU: 0 PID: 3159 Comm: test_verifier Tainted: P O 5.3.0-21-generic #22-Ubuntu
Hardware name: IBM 2964 N63 400 (LPAR)
Krnl PSW : 0704c00180000000 00000002fb832c9e (__alloc_pages_nodemask+0x25e/0x318)
R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:0 PM:0 RI:0 EA:3
Krnl GPRS: 00000003b7efcac0 0000000000040dc0 0000000000040dc0 000000000000000a
0000000000000000 0000000000000000 000000000000000a 00000002fb6386b8
00000000003d0900 0000000000000dc0 000003e00b067000 000003e00b067000
00000003a57a8000 000002aa0d1b28e0 000003e002b6bb28 000003e002b6baa8
Krnl Code: 00000002fb832c92: a7212000 tmll %r2,8192
00000002fb832c96: a774ff87 brc 7,2fb832ba4
#00000002fb832c9a: a7f40001 brc 15,2fb832c9c
>00000002fb832c9e: a7890000 lghi %r8,0
00000002fb832ca2: a7f4ff83 brc 15,2fb832ba8
00000002fb832ca6: a7180000 lhi %r1,0
00000002fb832caa: a7f4ff1b brc 15,2fb832ae0
00000002fb832cae: e31003400004 lg %r1,832
Call Trace:
([<000003e002b6bb88>] 0x3e002b6bb88)
[<00000002fb7ff3a0>] kmalloc_order_trace+0x40/0x100
[<00000002fb6386b8>] bpf_int_jit_compile+0x70/0x240
[<00000002fb7828ce>] bpf_prog_select_runtime+0x13e/0x190
[<00000002fb78614c>] bpf_prog_load+0x2dc/0x6a8
[<00000002fb786ca6>] __do_sys_bpf+0x78e/0x10c0
[<00000002fbe82228>] system_call+0xdc/0x2c8
Last Breaking-Event-Address:
[<00000002fb832c9a>] __alloc_pages_nodemask+0x25a/0x318
---[ end trace 1d8b7179967b64ff ]---
The test itself will get killed with oom-killer later, thus generating
a return code 137 for the test.
All the following tests in this test suite will be skipped.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1851829/+subscriptions