[Kernel-packages] [Bug 1851829] Re: kernel trace found with ubuntu_bpf test on Eoan s390x LPAR
*** This bug is a duplicate of bug 1856163 *** https://bugs.launchpad.net/bugs/1856163 It's the test_map test, see bug 1856163 ** This bug has been marked a duplicate of bug 1856163 test_maps test from ubuntu_bpf will cause OOM on Eoan s390x LPAR -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1851829 Title: kernel trace found with ubuntu_bpf test on Eoan s390x LPAR Status in ubuntu-kernel-tests: Triaged Status in linux package in Ubuntu: Incomplete Status in linux source package in Eoan: Incomplete Bug description: This trace can be seen right after you started the test on s390x LPAR. ** ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** ** ** ** trace_printk() being used. Allocating extra memory. ** ** ** ** This means that this is a DEBUG kernel and it is ** ** unsafe for production use. ** ** ** ** If you see this message and you are not debugging** ** the kernel, report this immediately to your vendor! ** ** ** ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** ** WARNING: CPU: 0 PID: 3159 at mm/page_alloc.c:4702 __alloc_pages_nodemask+0x25e/0x318 Modules linked in: xt_conntrack ipt_REJECT nf_reject_ipv4 ip6table_mangle ip6table_nat nf_tables nfnetlink ip6table_filter ip6_tables iptable_mangle xt_CHECKSUM iptable_nat xt_MASQUERADE xt_tcpudp bridge iptable_filter bpfilter aufs overlay 8021q garp stp mrp llc openvswitch nsh nf_conncount nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 binfmt_misc zfs(PO) zunicode(PO) zavl(PO) icp(PO) zlua(PO) zcommon(PO) znvpair(PO) spl(O) genwqe_card crc_itu_t chsc_sch eadm_sch ctcm fsm vfio_ccw vfio_mdev mdev vfio_iommu_type1 vfio sch_fq_codel nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables x_tables btrfs zstd_compress zlib_deflate raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 linear dm_service_time pkey zcrypt crc32_vx_s390 ghash_s390 prng mlx4_en mlx4_ib ib_uverbs aes_s390 ib_core ptp pps_core qeth_l2 des_s390 des_generic sha512_s390 sha256_s390 sha1_s390 sha_common mlx4_core zfcp scsi_transport_fc qeth qdio ccwgroup dasd_eckd_mod dasd_mod scsi_dh_emc scsi_dh_rdac scsi_dh_alua dm_multipath CPU: 0 PID: 3159 Comm: test_verifier Tainted: P O 5.3.0-21-generic #22-Ubuntu Hardware name: IBM 2964 N63 400 (LPAR) Krnl PSW : 0704c0018000 0002fb832c9e (__alloc_pages_nodemask+0x25e/0x318) R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:0 PM:0 RI:0 EA:3 Krnl GPRS: 0003b7efcac0 00040dc0 00040dc0 000a 000a 0002fb6386b8 003d0900 0dc0 03e00b067000 03e00b067000 0003a57a8000 02aa0d1b28e0 03e002b6bb28 03e002b6baa8 Krnl Code: 0002fb832c92: a7212000tmll%r2,8192 0002fb832c96: a774ff87brc 7,2fb832ba4 #0002fb832c9a: a7f40001brc 15,2fb832c9c >0002fb832c9e: a789lghi%r8,0 0002fb832ca2: a7f4ff83brc 15,2fb832ba8 0002fb832ca6: a718lhi %r1,0 0002fb832caa: a7f4ff1bbrc 15,2fb832ae0 0002fb832cae: e3100344lg %r1,832 Call Trace: ([<03e002b6bb88>] 0x3e002b6bb88) [<0002fb7ff3a0>] kmalloc_order_trace+0x40/0x100 [<0002fb6386b8>] bpf_int_jit_compile+0x70/0x240 [<0002fb7828ce>] bpf_prog_select_runtime+0x13e/0x190 [<0002fb78614c>] bpf_prog_load+0x2dc/0x6a8 [<0002fb786ca6>] __do_sys_bpf+0x78e/0x10c0 [<0002fbe82228>] system_call+0xdc/0x2c8 Last Breaking-Event-Address: [<0002fb832c9a>] __alloc_pages_nodemask+0x25a/0x318 ---[ end trace 1d8b7179967b64ff ]--- The test itself will get killed with oom-killer later, thus generating a return code 137 for the test. All the following tests in this test suite will be skipped. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1851829/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1851829] Re: kernel trace found with ubuntu_bpf test on Eoan s390x LPAR
Hi Sean, there is no report available on the result page, as the job was terminated abnormally. For the log on jenkins, you can see that it suddenly stopped: 04:43:31 DEBUG| [stdout] Fork 100 tasks to 'test_hashmap' 04:43:31 DEBUG| [stdout] Fork 100 tasks to 'test_hashmap_percpu' + ARCHIVE=/var/lib/jenkins/jobs/sru-1__E_s390x.LPAR generic__using_s2lp4__for_kernel/builds/3/archive + scp -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null -o LogLevel=quiet -r ubuntu@s2lp4:kernel-test-results /var/lib/jenkins/jobs/sru-1__E_s390x.LPAR- generic__using_s2lp4__for_kernel/builds/3/archive http://10.246.72.4:8080/view/sut-s2lp4/job/sru-1__E_s390x.LPAR- generic__using_s2lp4__for_kernel/3/consoleText Or here if the link above is not working: https://pastebin.ubuntu.com/p/jCDvWBXSKw/ This issue can be reproduced if you run this manually. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1851829 Title: kernel trace found with ubuntu_bpf test on Eoan s390x LPAR Status in ubuntu-kernel-tests: Triaged Status in linux package in Ubuntu: Incomplete Status in linux source package in Eoan: Incomplete Bug description: This trace can be seen right after you started the test on s390x LPAR. ** ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** ** ** ** trace_printk() being used. Allocating extra memory. ** ** ** ** This means that this is a DEBUG kernel and it is ** ** unsafe for production use. ** ** ** ** If you see this message and you are not debugging** ** the kernel, report this immediately to your vendor! ** ** ** ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** ** WARNING: CPU: 0 PID: 3159 at mm/page_alloc.c:4702 __alloc_pages_nodemask+0x25e/0x318 Modules linked in: xt_conntrack ipt_REJECT nf_reject_ipv4 ip6table_mangle ip6table_nat nf_tables nfnetlink ip6table_filter ip6_tables iptable_mangle xt_CHECKSUM iptable_nat xt_MASQUERADE xt_tcpudp bridge iptable_filter bpfilter aufs overlay 8021q garp stp mrp llc openvswitch nsh nf_conncount nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 binfmt_misc zfs(PO) zunicode(PO) zavl(PO) icp(PO) zlua(PO) zcommon(PO) znvpair(PO) spl(O) genwqe_card crc_itu_t chsc_sch eadm_sch ctcm fsm vfio_ccw vfio_mdev mdev vfio_iommu_type1 vfio sch_fq_codel nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables x_tables btrfs zstd_compress zlib_deflate raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 linear dm_service_time pkey zcrypt crc32_vx_s390 ghash_s390 prng mlx4_en mlx4_ib ib_uverbs aes_s390 ib_core ptp pps_core qeth_l2 des_s390 des_generic sha512_s390 sha256_s390 sha1_s390 sha_common mlx4_core zfcp scsi_transport_fc qeth qdio ccwgroup dasd_eckd_mod dasd_mod scsi_dh_emc scsi_dh_rdac scsi_dh_alua dm_multipath CPU: 0 PID: 3159 Comm: test_verifier Tainted: P O 5.3.0-21-generic #22-Ubuntu Hardware name: IBM 2964 N63 400 (LPAR) Krnl PSW : 0704c0018000 0002fb832c9e (__alloc_pages_nodemask+0x25e/0x318) R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:0 PM:0 RI:0 EA:3 Krnl GPRS: 0003b7efcac0 00040dc0 00040dc0 000a 000a 0002fb6386b8 003d0900 0dc0 03e00b067000 03e00b067000 0003a57a8000 02aa0d1b28e0 03e002b6bb28 03e002b6baa8 Krnl Code: 0002fb832c92: a7212000tmll%r2,8192 0002fb832c96: a774ff87brc 7,2fb832ba4 #0002fb832c9a: a7f40001brc 15,2fb832c9c >0002fb832c9e: a789lghi%r8,0 0002fb832ca2: a7f4ff83brc 15,2fb832ba8 0002fb832ca6: a718lhi %r1,0 0002fb832caa: a7f4ff1bbrc 15,2fb832ae0 0002fb832cae: e3100344lg %r1,832 Call Trace: ([<03e002b6bb88>] 0x3e002b6bb88) [<0002fb7ff3a0>] kmalloc_order_trace+0x40/0x100 [<0002fb6386b8>] bpf_int_jit_compile+0x70/0x240 [<0002fb7828ce>] bpf_prog_select_runtime+0x13e/0x190 [<0002fb78614c>] bpf_prog_load+0x2dc/0x6a8 [<0002fb786ca6>] __do_sys_bpf+0x78e/0x10c0 [<0002fbe82228>] system_call+0xdc/0x2c8 Last Breaking-Event-Address: [<0002fb832c9a>]
[Kernel-packages] [Bug 1851829] Re: kernel trace found with ubuntu_bpf test on Eoan s390x LPAR
Sam, can you point me to the last failure we have recorded? I could not find it in the logs. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1851829 Title: kernel trace found with ubuntu_bpf test on Eoan s390x LPAR Status in ubuntu-kernel-tests: Triaged Status in linux package in Ubuntu: Incomplete Status in linux source package in Eoan: Incomplete Bug description: This trace can be seen right after you started the test on s390x LPAR. ** ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** ** ** ** trace_printk() being used. Allocating extra memory. ** ** ** ** This means that this is a DEBUG kernel and it is ** ** unsafe for production use. ** ** ** ** If you see this message and you are not debugging** ** the kernel, report this immediately to your vendor! ** ** ** ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** ** WARNING: CPU: 0 PID: 3159 at mm/page_alloc.c:4702 __alloc_pages_nodemask+0x25e/0x318 Modules linked in: xt_conntrack ipt_REJECT nf_reject_ipv4 ip6table_mangle ip6table_nat nf_tables nfnetlink ip6table_filter ip6_tables iptable_mangle xt_CHECKSUM iptable_nat xt_MASQUERADE xt_tcpudp bridge iptable_filter bpfilter aufs overlay 8021q garp stp mrp llc openvswitch nsh nf_conncount nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 binfmt_misc zfs(PO) zunicode(PO) zavl(PO) icp(PO) zlua(PO) zcommon(PO) znvpair(PO) spl(O) genwqe_card crc_itu_t chsc_sch eadm_sch ctcm fsm vfio_ccw vfio_mdev mdev vfio_iommu_type1 vfio sch_fq_codel nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables x_tables btrfs zstd_compress zlib_deflate raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 linear dm_service_time pkey zcrypt crc32_vx_s390 ghash_s390 prng mlx4_en mlx4_ib ib_uverbs aes_s390 ib_core ptp pps_core qeth_l2 des_s390 des_generic sha512_s390 sha256_s390 sha1_s390 sha_common mlx4_core zfcp scsi_transport_fc qeth qdio ccwgroup dasd_eckd_mod dasd_mod scsi_dh_emc scsi_dh_rdac scsi_dh_alua dm_multipath CPU: 0 PID: 3159 Comm: test_verifier Tainted: P O 5.3.0-21-generic #22-Ubuntu Hardware name: IBM 2964 N63 400 (LPAR) Krnl PSW : 0704c0018000 0002fb832c9e (__alloc_pages_nodemask+0x25e/0x318) R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:0 PM:0 RI:0 EA:3 Krnl GPRS: 0003b7efcac0 00040dc0 00040dc0 000a 000a 0002fb6386b8 003d0900 0dc0 03e00b067000 03e00b067000 0003a57a8000 02aa0d1b28e0 03e002b6bb28 03e002b6baa8 Krnl Code: 0002fb832c92: a7212000tmll%r2,8192 0002fb832c96: a774ff87brc 7,2fb832ba4 #0002fb832c9a: a7f40001brc 15,2fb832c9c >0002fb832c9e: a789lghi%r8,0 0002fb832ca2: a7f4ff83brc 15,2fb832ba8 0002fb832ca6: a718lhi %r1,0 0002fb832caa: a7f4ff1bbrc 15,2fb832ae0 0002fb832cae: e3100344lg %r1,832 Call Trace: ([<03e002b6bb88>] 0x3e002b6bb88) [<0002fb7ff3a0>] kmalloc_order_trace+0x40/0x100 [<0002fb6386b8>] bpf_int_jit_compile+0x70/0x240 [<0002fb7828ce>] bpf_prog_select_runtime+0x13e/0x190 [<0002fb78614c>] bpf_prog_load+0x2dc/0x6a8 [<0002fb786ca6>] __do_sys_bpf+0x78e/0x10c0 [<0002fbe82228>] system_call+0xdc/0x2c8 Last Breaking-Event-Address: [<0002fb832c9a>] __alloc_pages_nodemask+0x25a/0x318 ---[ end trace 1d8b7179967b64ff ]--- The test itself will get killed with oom-killer later, thus generating a return code 137 for the test. All the following tests in this test suite will be skipped. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1851829/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1851829] Re: kernel trace found with ubuntu_bpf test on Eoan s390x LPAR
** Changed in: ubuntu-kernel-tests Assignee: (unassigned) => Sean Feole (sfeole) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1851829 Title: kernel trace found with ubuntu_bpf test on Eoan s390x LPAR Status in ubuntu-kernel-tests: Triaged Status in linux package in Ubuntu: Incomplete Status in linux source package in Eoan: Incomplete Bug description: This trace can be seen right after you started the test on s390x LPAR. ** ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** ** ** ** trace_printk() being used. Allocating extra memory. ** ** ** ** This means that this is a DEBUG kernel and it is ** ** unsafe for production use. ** ** ** ** If you see this message and you are not debugging** ** the kernel, report this immediately to your vendor! ** ** ** ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** ** WARNING: CPU: 0 PID: 3159 at mm/page_alloc.c:4702 __alloc_pages_nodemask+0x25e/0x318 Modules linked in: xt_conntrack ipt_REJECT nf_reject_ipv4 ip6table_mangle ip6table_nat nf_tables nfnetlink ip6table_filter ip6_tables iptable_mangle xt_CHECKSUM iptable_nat xt_MASQUERADE xt_tcpudp bridge iptable_filter bpfilter aufs overlay 8021q garp stp mrp llc openvswitch nsh nf_conncount nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 binfmt_misc zfs(PO) zunicode(PO) zavl(PO) icp(PO) zlua(PO) zcommon(PO) znvpair(PO) spl(O) genwqe_card crc_itu_t chsc_sch eadm_sch ctcm fsm vfio_ccw vfio_mdev mdev vfio_iommu_type1 vfio sch_fq_codel nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables x_tables btrfs zstd_compress zlib_deflate raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 linear dm_service_time pkey zcrypt crc32_vx_s390 ghash_s390 prng mlx4_en mlx4_ib ib_uverbs aes_s390 ib_core ptp pps_core qeth_l2 des_s390 des_generic sha512_s390 sha256_s390 sha1_s390 sha_common mlx4_core zfcp scsi_transport_fc qeth qdio ccwgroup dasd_eckd_mod dasd_mod scsi_dh_emc scsi_dh_rdac scsi_dh_alua dm_multipath CPU: 0 PID: 3159 Comm: test_verifier Tainted: P O 5.3.0-21-generic #22-Ubuntu Hardware name: IBM 2964 N63 400 (LPAR) Krnl PSW : 0704c0018000 0002fb832c9e (__alloc_pages_nodemask+0x25e/0x318) R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:0 PM:0 RI:0 EA:3 Krnl GPRS: 0003b7efcac0 00040dc0 00040dc0 000a 000a 0002fb6386b8 003d0900 0dc0 03e00b067000 03e00b067000 0003a57a8000 02aa0d1b28e0 03e002b6bb28 03e002b6baa8 Krnl Code: 0002fb832c92: a7212000tmll%r2,8192 0002fb832c96: a774ff87brc 7,2fb832ba4 #0002fb832c9a: a7f40001brc 15,2fb832c9c >0002fb832c9e: a789lghi%r8,0 0002fb832ca2: a7f4ff83brc 15,2fb832ba8 0002fb832ca6: a718lhi %r1,0 0002fb832caa: a7f4ff1bbrc 15,2fb832ae0 0002fb832cae: e3100344lg %r1,832 Call Trace: ([<03e002b6bb88>] 0x3e002b6bb88) [<0002fb7ff3a0>] kmalloc_order_trace+0x40/0x100 [<0002fb6386b8>] bpf_int_jit_compile+0x70/0x240 [<0002fb7828ce>] bpf_prog_select_runtime+0x13e/0x190 [<0002fb78614c>] bpf_prog_load+0x2dc/0x6a8 [<0002fb786ca6>] __do_sys_bpf+0x78e/0x10c0 [<0002fbe82228>] system_call+0xdc/0x2c8 Last Breaking-Event-Address: [<0002fb832c9a>] __alloc_pages_nodemask+0x25a/0x318 ---[ end trace 1d8b7179967b64ff ]--- The test itself will get killed with oom-killer later, thus generating a return code 137 for the test. All the following tests in this test suite will be skipped. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1851829/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1851829] Re: kernel trace found with ubuntu_bpf test on Eoan s390x LPAR
** Changed in: ubuntu-kernel-tests Status: New => Triaged -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1851829 Title: kernel trace found with ubuntu_bpf test on Eoan s390x LPAR Status in ubuntu-kernel-tests: Triaged Status in linux package in Ubuntu: Incomplete Status in linux source package in Eoan: Incomplete Bug description: This trace can be seen right after you started the test on s390x LPAR. ** ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** ** ** ** trace_printk() being used. Allocating extra memory. ** ** ** ** This means that this is a DEBUG kernel and it is ** ** unsafe for production use. ** ** ** ** If you see this message and you are not debugging** ** the kernel, report this immediately to your vendor! ** ** ** ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** ** WARNING: CPU: 0 PID: 3159 at mm/page_alloc.c:4702 __alloc_pages_nodemask+0x25e/0x318 Modules linked in: xt_conntrack ipt_REJECT nf_reject_ipv4 ip6table_mangle ip6table_nat nf_tables nfnetlink ip6table_filter ip6_tables iptable_mangle xt_CHECKSUM iptable_nat xt_MASQUERADE xt_tcpudp bridge iptable_filter bpfilter aufs overlay 8021q garp stp mrp llc openvswitch nsh nf_conncount nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 binfmt_misc zfs(PO) zunicode(PO) zavl(PO) icp(PO) zlua(PO) zcommon(PO) znvpair(PO) spl(O) genwqe_card crc_itu_t chsc_sch eadm_sch ctcm fsm vfio_ccw vfio_mdev mdev vfio_iommu_type1 vfio sch_fq_codel nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables x_tables btrfs zstd_compress zlib_deflate raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 linear dm_service_time pkey zcrypt crc32_vx_s390 ghash_s390 prng mlx4_en mlx4_ib ib_uverbs aes_s390 ib_core ptp pps_core qeth_l2 des_s390 des_generic sha512_s390 sha256_s390 sha1_s390 sha_common mlx4_core zfcp scsi_transport_fc qeth qdio ccwgroup dasd_eckd_mod dasd_mod scsi_dh_emc scsi_dh_rdac scsi_dh_alua dm_multipath CPU: 0 PID: 3159 Comm: test_verifier Tainted: P O 5.3.0-21-generic #22-Ubuntu Hardware name: IBM 2964 N63 400 (LPAR) Krnl PSW : 0704c0018000 0002fb832c9e (__alloc_pages_nodemask+0x25e/0x318) R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:0 PM:0 RI:0 EA:3 Krnl GPRS: 0003b7efcac0 00040dc0 00040dc0 000a 000a 0002fb6386b8 003d0900 0dc0 03e00b067000 03e00b067000 0003a57a8000 02aa0d1b28e0 03e002b6bb28 03e002b6baa8 Krnl Code: 0002fb832c92: a7212000tmll%r2,8192 0002fb832c96: a774ff87brc 7,2fb832ba4 #0002fb832c9a: a7f40001brc 15,2fb832c9c >0002fb832c9e: a789lghi%r8,0 0002fb832ca2: a7f4ff83brc 15,2fb832ba8 0002fb832ca6: a718lhi %r1,0 0002fb832caa: a7f4ff1bbrc 15,2fb832ae0 0002fb832cae: e3100344lg %r1,832 Call Trace: ([<03e002b6bb88>] 0x3e002b6bb88) [<0002fb7ff3a0>] kmalloc_order_trace+0x40/0x100 [<0002fb6386b8>] bpf_int_jit_compile+0x70/0x240 [<0002fb7828ce>] bpf_prog_select_runtime+0x13e/0x190 [<0002fb78614c>] bpf_prog_load+0x2dc/0x6a8 [<0002fb786ca6>] __do_sys_bpf+0x78e/0x10c0 [<0002fbe82228>] system_call+0xdc/0x2c8 Last Breaking-Event-Address: [<0002fb832c9a>] __alloc_pages_nodemask+0x25a/0x318 ---[ end trace 1d8b7179967b64ff ]--- The test itself will get killed with oom-killer later, thus generating a return code 137 for the test. All the following tests in this test suite will be skipped. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1851829/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1851829] Re: kernel trace found with ubuntu_bpf test on Eoan s390x LPAR
This can be reproduced with 5.3.0-20 on the same node as well: WARNING: CPU: 1 PID: 2799 at mm/page_alloc.c:4702 __alloc_pages_nodemask+0x25e/0x318 Modules linked in: xt_conntrack ipt_REJECT nf_reject_ipv4 ip6table_mangle ip6table_nat nf_tables nfnetlink ip6table_filter ip6_tables iptable_mangle xt_CHECKSUM iptable_nat xt_MASQUERADE xt_tcpudp bridge iptable_filter bpfilter aufs overlay 8021q garp stp mrp llc openvswitch nsh nf_conncount nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 binfmt_misc zfs(PO) zunicode(PO) zavl(PO) icp(PO) zlua(PO) zcommon(PO) znvpair(PO) spl(O) genwqe_card crc_itu_t chsc_sch eadm_sch ctcm fsm vfio_ccw vfio_mdev mdev vfio_iommu_type1 vfio sch_fq_codel nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables x_tables btrfs zstd_compress zlib_deflate raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 linear dm_service_time pkey zcrypt crc32_vx_s390 ghash_s390 prng aes_s390 mlx4_ib ib_uverbs mlx4_en qeth_l2 des_s390 des_generic ptp pps_core ib_core sha512_s390 sha256_s390 sha1_s390 sha_common mlx4_core zfcp scsi_transport_fc qeth qdio ccwgroup dasd_eckd_mod dasd_mod scsi_dh_emc scsi_dh_rdac scsi_dh_alua dm_multipath CPU: 1 PID: 2799 Comm: test_verifier Tainted: P O 5.3.0-20-generic #21-Ubuntu Hardware name: IBM 2964 N63 400 (LPAR) Krnl PSW : 0704c0018000 0002ec206c9e (__alloc_pages_nodemask+0x25e/0x318) R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:0 PM:0 RI:0 EA:3 Krnl GPRS: da15f4fd64a5a47d 00040dc0 00040dc0 000a 000a 0002ec00c6b8 003d0900 0dc0 03e00a16b000 03e00a16b000 0003a6c2 02aa09e798e0 03e00279bb28 03e00279baa8 Krnl Code: 0002ec206c92: a7212000 tmll%r2,8192 0002ec206c96: a774ff87 brc 7,2ec206ba4 #0002ec206c9a: a7f40001 brc 15,2ec206c9c >0002ec206c9e: a789 lghi%r8,0 0002ec206ca2: a7f4ff83 brc 15,2ec206ba8 0002ec206ca6: a718 lhi %r1,0 0002ec206caa: a7f4ff1b brc 15,2ec206ae0 0002ec206cae: e3100344 lg %r1,832 Call Trace: ([<03e00279bb88>] 0x3e00279bb88) [<0002ec1d33a0>] kmalloc_order_trace+0x40/0x100 [<0002ec00c6b8>] bpf_int_jit_compile+0x70/0x240 [<0002ec1568ce>] bpf_prog_select_runtime+0x13e/0x190 [<0002ec15a14c>] bpf_prog_load+0x2dc/0x6a8 [<0002ec15aca6>] __do_sys_bpf+0x78e/0x10c0 [<0002ec856228>] system_call+0xdc/0x2c8 Last Breaking-Event-Address: [<0002ec206c9a>] __alloc_pages_nodemask+0x25a/0x318 ---[ end trace d7b63e2466552ed4 ]--- ** Tags added: 5.3 eoan s390x sru-20191021 ubuntu-bpf ** Also affects: linux (Ubuntu) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Eoan) Importance: Undecided Status: New -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1851829 Title: kernel trace found with ubuntu_bpf test on Eoan s390x LPAR Status in ubuntu-kernel-tests: New Status in linux package in Ubuntu: New Status in linux source package in Eoan: New Bug description: This trace can be seen right after you started the test on s390x LPAR. ** ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** ** ** ** trace_printk() being used. Allocating extra memory. ** ** ** ** This means that this is a DEBUG kernel and it is ** ** unsafe for production use. ** ** ** ** If you see this message and you are not debugging** ** the kernel, report this immediately to your vendor! ** ** ** ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** ** WARNING: CPU: 0 PID: 3159 at mm/page_alloc.c:4702 __alloc_pages_nodemask+0x25e/0x318 Modules linked in: xt_conntrack ipt_REJECT nf_reject_ipv4 ip6table_mangle ip6table_nat nf_tables nfnetlink ip6table_filter ip6_tables iptable_mangle xt_CHECKSUM iptable_nat xt_MASQUERADE xt_tcpudp bridge iptable_filter bpfilter aufs overlay 8021q garp stp mrp llc openvswitch nsh nf_conncount nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 binfmt_misc zfs(PO) zunicode(PO) zavl(PO) icp(PO) zlua(PO) zcommon(PO) znvpair(PO) spl(O) genwqe_card crc_itu_t chsc_sch eadm_sch ctcm fsm vfio_ccw vfio_mdev mdev vfio_iommu_type1 vfio sch_fq_codel nfsd