This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:

apport-collect 1851829

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a comment stating that fact and change
the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the
Ubuntu Kernel Team.

** Changed in: linux (Ubuntu)
       Status: New => Incomplete

** Changed in: linux (Ubuntu Eoan)
       Status: New => Incomplete

You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.

  kernel trace found with ubuntu_bpf test on Eoan s390x LPAR

Status in ubuntu-kernel-tests:
Status in linux package in Ubuntu:
Status in linux source package in Eoan:

Bug description:
  This trace can be seen right after you started the test on s390x LPAR.

   **                                                      **
   ** trace_printk() being used. Allocating extra memory.  **
   **                                                      **
   ** This means that this is a DEBUG kernel and it is     **
   ** unsafe for production use.                           **
   **                                                      **
   ** If you see this message and you are not debugging    **
   ** the kernel, report this immediately to your vendor!  **
   **                                                      **
   WARNING: CPU: 0 PID: 3159 at mm/page_alloc.c:4702 
   Modules linked in: xt_conntrack ipt_REJECT nf_reject_ipv4 ip6table_mangle 
ip6table_nat nf_tables nfnetlink ip6table_filter ip6_tables iptable_mangle 
xt_CHECKSUM iptable_nat xt_MASQUERADE xt_tcpudp bridge iptable_filter bpfilter 
aufs overlay 8021q garp stp mrp llc openvswitch nsh nf_conncount nf_nat 
nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 binfmt_misc zfs(PO) zunicode(PO) 
zavl(PO) icp(PO) zlua(PO) zcommon(PO) znvpair(PO) spl(O) genwqe_card crc_itu_t 
chsc_sch eadm_sch ctcm fsm vfio_ccw vfio_mdev mdev vfio_iommu_type1 vfio 
sch_fq_codel nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables x_tables 
btrfs zstd_compress zlib_deflate raid10 raid456 async_raid6_recov async_memcpy 
async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 linear 
dm_service_time pkey zcrypt crc32_vx_s390 ghash_s390 prng mlx4_en mlx4_ib 
ib_uverbs aes_s390 ib_core ptp pps_core qeth_l2 des_s390 des_generic 
sha512_s390 sha256_s390 sha1_s390 sha_common mlx4_core zfcp scsi_transport_fc 
qeth qdio ccwgroup
    dasd_eckd_mod dasd_mod scsi_dh_emc scsi_dh_rdac scsi_dh_alua dm_multipath
   CPU: 0 PID: 3159 Comm: test_verifier Tainted: P           O      
5.3.0-21-generic #22-Ubuntu
   Hardware name: IBM 2964 N63 400 (LPAR)
   Krnl PSW : 0704c00180000000 00000002fb832c9e 
              R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:0 PM:0 RI:0 EA:3
   Krnl GPRS: 00000003b7efcac0 0000000000040dc0 0000000000040dc0 
              0000000000000000 0000000000000000 000000000000000a 
              00000000003d0900 0000000000000dc0 000003e00b067000 
              00000003a57a8000 000002aa0d1b28e0 000003e002b6bb28 
   Krnl Code: 00000002fb832c92: a7212000                tmll    %r2,8192
              00000002fb832c96: a774ff87                brc     7,2fb832ba4
             #00000002fb832c9a: a7f40001                brc     15,2fb832c9c
             >00000002fb832c9e: a7890000                lghi    %r8,0
              00000002fb832ca2: a7f4ff83                brc     15,2fb832ba8
              00000002fb832ca6: a7180000                lhi     %r1,0
              00000002fb832caa: a7f4ff1b                brc     15,2fb832ae0
              00000002fb832cae: e31003400004    lg      %r1,832
   Call Trace:
   ([<000003e002b6bb88>] 0x3e002b6bb88)
    [<00000002fb7ff3a0>] kmalloc_order_trace+0x40/0x100 
    [<00000002fb6386b8>] bpf_int_jit_compile+0x70/0x240 
    [<00000002fb7828ce>] bpf_prog_select_runtime+0x13e/0x190 
    [<00000002fb78614c>] bpf_prog_load+0x2dc/0x6a8 
    [<00000002fb786ca6>] __do_sys_bpf+0x78e/0x10c0 
    [<00000002fbe82228>] system_call+0xdc/0x2c8 
   Last Breaking-Event-Address:
    [<00000002fb832c9a>] __alloc_pages_nodemask+0x25a/0x318
   ---[ end trace 1d8b7179967b64ff ]---

  The test itself will get killed with oom-killer later, thus generating
  a return code 137 for the test.

  All the following tests in this test suite will be skipped.

To manage notifications about this bug go to:

Mailing list:
Post to     :
Unsubscribe :
More help   :

Reply via email to