*** This bug is a duplicate of bug 1856163 ***
    https://bugs.launchpad.net/bugs/1856163

It's the test_map test, see bug 1856163

** This bug has been marked a duplicate of bug 1856163
   test_maps test from ubuntu_bpf will cause OOM on Eoan s390x LPAR

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1851829

Title:
  kernel trace found with ubuntu_bpf test on Eoan s390x LPAR

Status in ubuntu-kernel-tests:
  Triaged
Status in linux package in Ubuntu:
  Incomplete
Status in linux source package in Eoan:
  Incomplete

Bug description:
  This trace can be seen right after you started the test on s390x LPAR.

  
   **********************************************************
   **   NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE   **
   **                                                      **
   ** trace_printk() being used. Allocating extra memory.  **
   **                                                      **
   ** This means that this is a DEBUG kernel and it is     **
   ** unsafe for production use.                           **
   **                                                      **
   ** If you see this message and you are not debugging    **
   ** the kernel, report this immediately to your vendor!  **
   **                                                      **
   **   NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE   **
   **********************************************************
   WARNING: CPU: 0 PID: 3159 at mm/page_alloc.c:4702 
__alloc_pages_nodemask+0x25e/0x318
   Modules linked in: xt_conntrack ipt_REJECT nf_reject_ipv4 ip6table_mangle 
ip6table_nat nf_tables nfnetlink ip6table_filter ip6_tables iptable_mangle 
xt_CHECKSUM iptable_nat xt_MASQUERADE xt_tcpudp bridge iptable_filter bpfilter 
aufs overlay 8021q garp stp mrp llc openvswitch nsh nf_conncount nf_nat 
nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 binfmt_misc zfs(PO) zunicode(PO) 
zavl(PO) icp(PO) zlua(PO) zcommon(PO) znvpair(PO) spl(O) genwqe_card crc_itu_t 
chsc_sch eadm_sch ctcm fsm vfio_ccw vfio_mdev mdev vfio_iommu_type1 vfio 
sch_fq_codel nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables x_tables 
btrfs zstd_compress zlib_deflate raid10 raid456 async_raid6_recov async_memcpy 
async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 linear 
dm_service_time pkey zcrypt crc32_vx_s390 ghash_s390 prng mlx4_en mlx4_ib 
ib_uverbs aes_s390 ib_core ptp pps_core qeth_l2 des_s390 des_generic 
sha512_s390 sha256_s390 sha1_s390 sha_common mlx4_core zfcp scsi_transport_fc 
qeth qdio ccwgroup
    dasd_eckd_mod dasd_mod scsi_dh_emc scsi_dh_rdac scsi_dh_alua dm_multipath
   CPU: 0 PID: 3159 Comm: test_verifier Tainted: P           O      
5.3.0-21-generic #22-Ubuntu
   Hardware name: IBM 2964 N63 400 (LPAR)
   Krnl PSW : 0704c00180000000 00000002fb832c9e 
(__alloc_pages_nodemask+0x25e/0x318)
              R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:0 PM:0 RI:0 EA:3
   Krnl GPRS: 00000003b7efcac0 0000000000040dc0 0000000000040dc0 
000000000000000a
              0000000000000000 0000000000000000 000000000000000a 
00000002fb6386b8
              00000000003d0900 0000000000000dc0 000003e00b067000 
000003e00b067000
              00000003a57a8000 000002aa0d1b28e0 000003e002b6bb28 
000003e002b6baa8
   Krnl Code: 00000002fb832c92: a7212000                tmll    %r2,8192
              00000002fb832c96: a774ff87                brc     7,2fb832ba4
             #00000002fb832c9a: a7f40001                brc     15,2fb832c9c
             >00000002fb832c9e: a7890000                lghi    %r8,0
              00000002fb832ca2: a7f4ff83                brc     15,2fb832ba8
              00000002fb832ca6: a7180000                lhi     %r1,0
              00000002fb832caa: a7f4ff1b                brc     15,2fb832ae0
              00000002fb832cae: e31003400004    lg      %r1,832
   Call Trace:
   ([<000003e002b6bb88>] 0x3e002b6bb88)
    [<00000002fb7ff3a0>] kmalloc_order_trace+0x40/0x100 
    [<00000002fb6386b8>] bpf_int_jit_compile+0x70/0x240 
    [<00000002fb7828ce>] bpf_prog_select_runtime+0x13e/0x190 
    [<00000002fb78614c>] bpf_prog_load+0x2dc/0x6a8 
    [<00000002fb786ca6>] __do_sys_bpf+0x78e/0x10c0 
    [<00000002fbe82228>] system_call+0xdc/0x2c8 
   Last Breaking-Event-Address:
    [<00000002fb832c9a>] __alloc_pages_nodemask+0x25a/0x318
   ---[ end trace 1d8b7179967b64ff ]---

  The test itself will get killed with oom-killer later, thus generating
  a return code 137 for the test.

  All the following tests in this test suite will be skipped.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1851829/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to