[Kernel-packages] [Bug 1851829] Re: kernel trace found with ubuntu_bpf test on Eoan s390x LPAR

2019-12-12 Thread Po-Hsu Lin
*** This bug is a duplicate of bug 1856163 ***
https://bugs.launchpad.net/bugs/1856163

It's the test_map test, see bug 1856163

** This bug has been marked a duplicate of bug 1856163
   test_maps test from ubuntu_bpf will cause OOM on Eoan s390x LPAR

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1851829

Title:
  kernel trace found with ubuntu_bpf test on Eoan s390x LPAR

Status in ubuntu-kernel-tests:
  Triaged
Status in linux package in Ubuntu:
  Incomplete
Status in linux source package in Eoan:
  Incomplete

Bug description:
  This trace can be seen right after you started the test on s390x LPAR.

  
   **
   **   NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE   **
   **  **
   ** trace_printk() being used. Allocating extra memory.  **
   **  **
   ** This means that this is a DEBUG kernel and it is **
   ** unsafe for production use.   **
   **  **
   ** If you see this message and you are not debugging**
   ** the kernel, report this immediately to your vendor!  **
   **  **
   **   NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE   **
   **
   WARNING: CPU: 0 PID: 3159 at mm/page_alloc.c:4702 
__alloc_pages_nodemask+0x25e/0x318
   Modules linked in: xt_conntrack ipt_REJECT nf_reject_ipv4 ip6table_mangle 
ip6table_nat nf_tables nfnetlink ip6table_filter ip6_tables iptable_mangle 
xt_CHECKSUM iptable_nat xt_MASQUERADE xt_tcpudp bridge iptable_filter bpfilter 
aufs overlay 8021q garp stp mrp llc openvswitch nsh nf_conncount nf_nat 
nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 binfmt_misc zfs(PO) zunicode(PO) 
zavl(PO) icp(PO) zlua(PO) zcommon(PO) znvpair(PO) spl(O) genwqe_card crc_itu_t 
chsc_sch eadm_sch ctcm fsm vfio_ccw vfio_mdev mdev vfio_iommu_type1 vfio 
sch_fq_codel nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables x_tables 
btrfs zstd_compress zlib_deflate raid10 raid456 async_raid6_recov async_memcpy 
async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 linear 
dm_service_time pkey zcrypt crc32_vx_s390 ghash_s390 prng mlx4_en mlx4_ib 
ib_uverbs aes_s390 ib_core ptp pps_core qeth_l2 des_s390 des_generic 
sha512_s390 sha256_s390 sha1_s390 sha_common mlx4_core zfcp scsi_transport_fc 
qeth qdio ccwgroup
dasd_eckd_mod dasd_mod scsi_dh_emc scsi_dh_rdac scsi_dh_alua dm_multipath
   CPU: 0 PID: 3159 Comm: test_verifier Tainted: P   O  
5.3.0-21-generic #22-Ubuntu
   Hardware name: IBM 2964 N63 400 (LPAR)
   Krnl PSW : 0704c0018000 0002fb832c9e 
(__alloc_pages_nodemask+0x25e/0x318)
  R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:0 PM:0 RI:0 EA:3
   Krnl GPRS: 0003b7efcac0 00040dc0 00040dc0 
000a
    000a 
0002fb6386b8
  003d0900 0dc0 03e00b067000 
03e00b067000
  0003a57a8000 02aa0d1b28e0 03e002b6bb28 
03e002b6baa8
   Krnl Code: 0002fb832c92: a7212000tmll%r2,8192
  0002fb832c96: a774ff87brc 7,2fb832ba4
 #0002fb832c9a: a7f40001brc 15,2fb832c9c
 >0002fb832c9e: a789lghi%r8,0
  0002fb832ca2: a7f4ff83brc 15,2fb832ba8
  0002fb832ca6: a718lhi %r1,0
  0002fb832caa: a7f4ff1bbrc 15,2fb832ae0
  0002fb832cae: e3100344lg  %r1,832
   Call Trace:
   ([<03e002b6bb88>] 0x3e002b6bb88)
[<0002fb7ff3a0>] kmalloc_order_trace+0x40/0x100 
[<0002fb6386b8>] bpf_int_jit_compile+0x70/0x240 
[<0002fb7828ce>] bpf_prog_select_runtime+0x13e/0x190 
[<0002fb78614c>] bpf_prog_load+0x2dc/0x6a8 
[<0002fb786ca6>] __do_sys_bpf+0x78e/0x10c0 
[<0002fbe82228>] system_call+0xdc/0x2c8 
   Last Breaking-Event-Address:
[<0002fb832c9a>] __alloc_pages_nodemask+0x25a/0x318
   ---[ end trace 1d8b7179967b64ff ]---

  The test itself will get killed with oom-killer later, thus generating
  a return code 137 for the test.

  All the following tests in this test suite will be skipped.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1851829/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1851829] Re: kernel trace found with ubuntu_bpf test on Eoan s390x LPAR

2019-11-13 Thread Po-Hsu Lin
Hi Sean,
there is no report available on the result page, as the job was terminated 
abnormally.

For the log on jenkins, you can see that it suddenly stopped:
  04:43:31 DEBUG| [stdout] Fork 100 tasks to 'test_hashmap'
  04:43:31 DEBUG| [stdout] Fork 100 tasks to 'test_hashmap_percpu'
  + ARCHIVE=/var/lib/jenkins/jobs/sru-1__E_s390x.LPAR
  generic__using_s2lp4__for_kernel/builds/3/archive
  + scp -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null -o 
LogLevel=quiet -r 
  ubuntu@s2lp4:kernel-test-results /var/lib/jenkins/jobs/sru-1__E_s390x.LPAR-
  generic__using_s2lp4__for_kernel/builds/3/archive

http://10.246.72.4:8080/view/sut-s2lp4/job/sru-1__E_s390x.LPAR-
generic__using_s2lp4__for_kernel/3/consoleText

Or here if the link above is not working:
https://pastebin.ubuntu.com/p/jCDvWBXSKw/

This issue can be reproduced if you run this manually.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1851829

Title:
  kernel trace found with ubuntu_bpf test on Eoan s390x LPAR

Status in ubuntu-kernel-tests:
  Triaged
Status in linux package in Ubuntu:
  Incomplete
Status in linux source package in Eoan:
  Incomplete

Bug description:
  This trace can be seen right after you started the test on s390x LPAR.

  
   **
   **   NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE   **
   **  **
   ** trace_printk() being used. Allocating extra memory.  **
   **  **
   ** This means that this is a DEBUG kernel and it is **
   ** unsafe for production use.   **
   **  **
   ** If you see this message and you are not debugging**
   ** the kernel, report this immediately to your vendor!  **
   **  **
   **   NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE   **
   **
   WARNING: CPU: 0 PID: 3159 at mm/page_alloc.c:4702 
__alloc_pages_nodemask+0x25e/0x318
   Modules linked in: xt_conntrack ipt_REJECT nf_reject_ipv4 ip6table_mangle 
ip6table_nat nf_tables nfnetlink ip6table_filter ip6_tables iptable_mangle 
xt_CHECKSUM iptable_nat xt_MASQUERADE xt_tcpudp bridge iptable_filter bpfilter 
aufs overlay 8021q garp stp mrp llc openvswitch nsh nf_conncount nf_nat 
nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 binfmt_misc zfs(PO) zunicode(PO) 
zavl(PO) icp(PO) zlua(PO) zcommon(PO) znvpair(PO) spl(O) genwqe_card crc_itu_t 
chsc_sch eadm_sch ctcm fsm vfio_ccw vfio_mdev mdev vfio_iommu_type1 vfio 
sch_fq_codel nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables x_tables 
btrfs zstd_compress zlib_deflate raid10 raid456 async_raid6_recov async_memcpy 
async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 linear 
dm_service_time pkey zcrypt crc32_vx_s390 ghash_s390 prng mlx4_en mlx4_ib 
ib_uverbs aes_s390 ib_core ptp pps_core qeth_l2 des_s390 des_generic 
sha512_s390 sha256_s390 sha1_s390 sha_common mlx4_core zfcp scsi_transport_fc 
qeth qdio ccwgroup
dasd_eckd_mod dasd_mod scsi_dh_emc scsi_dh_rdac scsi_dh_alua dm_multipath
   CPU: 0 PID: 3159 Comm: test_verifier Tainted: P   O  
5.3.0-21-generic #22-Ubuntu
   Hardware name: IBM 2964 N63 400 (LPAR)
   Krnl PSW : 0704c0018000 0002fb832c9e 
(__alloc_pages_nodemask+0x25e/0x318)
  R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:0 PM:0 RI:0 EA:3
   Krnl GPRS: 0003b7efcac0 00040dc0 00040dc0 
000a
    000a 
0002fb6386b8
  003d0900 0dc0 03e00b067000 
03e00b067000
  0003a57a8000 02aa0d1b28e0 03e002b6bb28 
03e002b6baa8
   Krnl Code: 0002fb832c92: a7212000tmll%r2,8192
  0002fb832c96: a774ff87brc 7,2fb832ba4
 #0002fb832c9a: a7f40001brc 15,2fb832c9c
 >0002fb832c9e: a789lghi%r8,0
  0002fb832ca2: a7f4ff83brc 15,2fb832ba8
  0002fb832ca6: a718lhi %r1,0
  0002fb832caa: a7f4ff1bbrc 15,2fb832ae0
  0002fb832cae: e3100344lg  %r1,832
   Call Trace:
   ([<03e002b6bb88>] 0x3e002b6bb88)
[<0002fb7ff3a0>] kmalloc_order_trace+0x40/0x100 
[<0002fb6386b8>] bpf_int_jit_compile+0x70/0x240 
[<0002fb7828ce>] bpf_prog_select_runtime+0x13e/0x190 
[<0002fb78614c>] bpf_prog_load+0x2dc/0x6a8 
[<0002fb786ca6>] __do_sys_bpf+0x78e/0x10c0 
[<0002fbe82228>] system_call+0xdc/0x2c8 
   Last Breaking-Event-Address:
[<0002fb832c9a>] 

[Kernel-packages] [Bug 1851829] Re: kernel trace found with ubuntu_bpf test on Eoan s390x LPAR

2019-11-13 Thread Sean Feole
Sam, can you point me to the last failure we have recorded?  I could not
find it in the logs.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1851829

Title:
  kernel trace found with ubuntu_bpf test on Eoan s390x LPAR

Status in ubuntu-kernel-tests:
  Triaged
Status in linux package in Ubuntu:
  Incomplete
Status in linux source package in Eoan:
  Incomplete

Bug description:
  This trace can be seen right after you started the test on s390x LPAR.

  
   **
   **   NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE   **
   **  **
   ** trace_printk() being used. Allocating extra memory.  **
   **  **
   ** This means that this is a DEBUG kernel and it is **
   ** unsafe for production use.   **
   **  **
   ** If you see this message and you are not debugging**
   ** the kernel, report this immediately to your vendor!  **
   **  **
   **   NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE   **
   **
   WARNING: CPU: 0 PID: 3159 at mm/page_alloc.c:4702 
__alloc_pages_nodemask+0x25e/0x318
   Modules linked in: xt_conntrack ipt_REJECT nf_reject_ipv4 ip6table_mangle 
ip6table_nat nf_tables nfnetlink ip6table_filter ip6_tables iptable_mangle 
xt_CHECKSUM iptable_nat xt_MASQUERADE xt_tcpudp bridge iptable_filter bpfilter 
aufs overlay 8021q garp stp mrp llc openvswitch nsh nf_conncount nf_nat 
nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 binfmt_misc zfs(PO) zunicode(PO) 
zavl(PO) icp(PO) zlua(PO) zcommon(PO) znvpair(PO) spl(O) genwqe_card crc_itu_t 
chsc_sch eadm_sch ctcm fsm vfio_ccw vfio_mdev mdev vfio_iommu_type1 vfio 
sch_fq_codel nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables x_tables 
btrfs zstd_compress zlib_deflate raid10 raid456 async_raid6_recov async_memcpy 
async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 linear 
dm_service_time pkey zcrypt crc32_vx_s390 ghash_s390 prng mlx4_en mlx4_ib 
ib_uverbs aes_s390 ib_core ptp pps_core qeth_l2 des_s390 des_generic 
sha512_s390 sha256_s390 sha1_s390 sha_common mlx4_core zfcp scsi_transport_fc 
qeth qdio ccwgroup
dasd_eckd_mod dasd_mod scsi_dh_emc scsi_dh_rdac scsi_dh_alua dm_multipath
   CPU: 0 PID: 3159 Comm: test_verifier Tainted: P   O  
5.3.0-21-generic #22-Ubuntu
   Hardware name: IBM 2964 N63 400 (LPAR)
   Krnl PSW : 0704c0018000 0002fb832c9e 
(__alloc_pages_nodemask+0x25e/0x318)
  R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:0 PM:0 RI:0 EA:3
   Krnl GPRS: 0003b7efcac0 00040dc0 00040dc0 
000a
    000a 
0002fb6386b8
  003d0900 0dc0 03e00b067000 
03e00b067000
  0003a57a8000 02aa0d1b28e0 03e002b6bb28 
03e002b6baa8
   Krnl Code: 0002fb832c92: a7212000tmll%r2,8192
  0002fb832c96: a774ff87brc 7,2fb832ba4
 #0002fb832c9a: a7f40001brc 15,2fb832c9c
 >0002fb832c9e: a789lghi%r8,0
  0002fb832ca2: a7f4ff83brc 15,2fb832ba8
  0002fb832ca6: a718lhi %r1,0
  0002fb832caa: a7f4ff1bbrc 15,2fb832ae0
  0002fb832cae: e3100344lg  %r1,832
   Call Trace:
   ([<03e002b6bb88>] 0x3e002b6bb88)
[<0002fb7ff3a0>] kmalloc_order_trace+0x40/0x100 
[<0002fb6386b8>] bpf_int_jit_compile+0x70/0x240 
[<0002fb7828ce>] bpf_prog_select_runtime+0x13e/0x190 
[<0002fb78614c>] bpf_prog_load+0x2dc/0x6a8 
[<0002fb786ca6>] __do_sys_bpf+0x78e/0x10c0 
[<0002fbe82228>] system_call+0xdc/0x2c8 
   Last Breaking-Event-Address:
[<0002fb832c9a>] __alloc_pages_nodemask+0x25a/0x318
   ---[ end trace 1d8b7179967b64ff ]---

  The test itself will get killed with oom-killer later, thus generating
  a return code 137 for the test.

  All the following tests in this test suite will be skipped.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1851829/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1851829] Re: kernel trace found with ubuntu_bpf test on Eoan s390x LPAR

2019-11-13 Thread Sean Feole
** Changed in: ubuntu-kernel-tests
 Assignee: (unassigned) => Sean Feole (sfeole)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1851829

Title:
  kernel trace found with ubuntu_bpf test on Eoan s390x LPAR

Status in ubuntu-kernel-tests:
  Triaged
Status in linux package in Ubuntu:
  Incomplete
Status in linux source package in Eoan:
  Incomplete

Bug description:
  This trace can be seen right after you started the test on s390x LPAR.

  
   **
   **   NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE   **
   **  **
   ** trace_printk() being used. Allocating extra memory.  **
   **  **
   ** This means that this is a DEBUG kernel and it is **
   ** unsafe for production use.   **
   **  **
   ** If you see this message and you are not debugging**
   ** the kernel, report this immediately to your vendor!  **
   **  **
   **   NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE   **
   **
   WARNING: CPU: 0 PID: 3159 at mm/page_alloc.c:4702 
__alloc_pages_nodemask+0x25e/0x318
   Modules linked in: xt_conntrack ipt_REJECT nf_reject_ipv4 ip6table_mangle 
ip6table_nat nf_tables nfnetlink ip6table_filter ip6_tables iptable_mangle 
xt_CHECKSUM iptable_nat xt_MASQUERADE xt_tcpudp bridge iptable_filter bpfilter 
aufs overlay 8021q garp stp mrp llc openvswitch nsh nf_conncount nf_nat 
nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 binfmt_misc zfs(PO) zunicode(PO) 
zavl(PO) icp(PO) zlua(PO) zcommon(PO) znvpair(PO) spl(O) genwqe_card crc_itu_t 
chsc_sch eadm_sch ctcm fsm vfio_ccw vfio_mdev mdev vfio_iommu_type1 vfio 
sch_fq_codel nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables x_tables 
btrfs zstd_compress zlib_deflate raid10 raid456 async_raid6_recov async_memcpy 
async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 linear 
dm_service_time pkey zcrypt crc32_vx_s390 ghash_s390 prng mlx4_en mlx4_ib 
ib_uverbs aes_s390 ib_core ptp pps_core qeth_l2 des_s390 des_generic 
sha512_s390 sha256_s390 sha1_s390 sha_common mlx4_core zfcp scsi_transport_fc 
qeth qdio ccwgroup
dasd_eckd_mod dasd_mod scsi_dh_emc scsi_dh_rdac scsi_dh_alua dm_multipath
   CPU: 0 PID: 3159 Comm: test_verifier Tainted: P   O  
5.3.0-21-generic #22-Ubuntu
   Hardware name: IBM 2964 N63 400 (LPAR)
   Krnl PSW : 0704c0018000 0002fb832c9e 
(__alloc_pages_nodemask+0x25e/0x318)
  R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:0 PM:0 RI:0 EA:3
   Krnl GPRS: 0003b7efcac0 00040dc0 00040dc0 
000a
    000a 
0002fb6386b8
  003d0900 0dc0 03e00b067000 
03e00b067000
  0003a57a8000 02aa0d1b28e0 03e002b6bb28 
03e002b6baa8
   Krnl Code: 0002fb832c92: a7212000tmll%r2,8192
  0002fb832c96: a774ff87brc 7,2fb832ba4
 #0002fb832c9a: a7f40001brc 15,2fb832c9c
 >0002fb832c9e: a789lghi%r8,0
  0002fb832ca2: a7f4ff83brc 15,2fb832ba8
  0002fb832ca6: a718lhi %r1,0
  0002fb832caa: a7f4ff1bbrc 15,2fb832ae0
  0002fb832cae: e3100344lg  %r1,832
   Call Trace:
   ([<03e002b6bb88>] 0x3e002b6bb88)
[<0002fb7ff3a0>] kmalloc_order_trace+0x40/0x100 
[<0002fb6386b8>] bpf_int_jit_compile+0x70/0x240 
[<0002fb7828ce>] bpf_prog_select_runtime+0x13e/0x190 
[<0002fb78614c>] bpf_prog_load+0x2dc/0x6a8 
[<0002fb786ca6>] __do_sys_bpf+0x78e/0x10c0 
[<0002fbe82228>] system_call+0xdc/0x2c8 
   Last Breaking-Event-Address:
[<0002fb832c9a>] __alloc_pages_nodemask+0x25a/0x318
   ---[ end trace 1d8b7179967b64ff ]---

  The test itself will get killed with oom-killer later, thus generating
  a return code 137 for the test.

  All the following tests in this test suite will be skipped.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1851829/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1851829] Re: kernel trace found with ubuntu_bpf test on Eoan s390x LPAR

2019-11-13 Thread Sean Feole
** Changed in: ubuntu-kernel-tests
   Status: New => Triaged

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1851829

Title:
  kernel trace found with ubuntu_bpf test on Eoan s390x LPAR

Status in ubuntu-kernel-tests:
  Triaged
Status in linux package in Ubuntu:
  Incomplete
Status in linux source package in Eoan:
  Incomplete

Bug description:
  This trace can be seen right after you started the test on s390x LPAR.

  
   **
   **   NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE   **
   **  **
   ** trace_printk() being used. Allocating extra memory.  **
   **  **
   ** This means that this is a DEBUG kernel and it is **
   ** unsafe for production use.   **
   **  **
   ** If you see this message and you are not debugging**
   ** the kernel, report this immediately to your vendor!  **
   **  **
   **   NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE   **
   **
   WARNING: CPU: 0 PID: 3159 at mm/page_alloc.c:4702 
__alloc_pages_nodemask+0x25e/0x318
   Modules linked in: xt_conntrack ipt_REJECT nf_reject_ipv4 ip6table_mangle 
ip6table_nat nf_tables nfnetlink ip6table_filter ip6_tables iptable_mangle 
xt_CHECKSUM iptable_nat xt_MASQUERADE xt_tcpudp bridge iptable_filter bpfilter 
aufs overlay 8021q garp stp mrp llc openvswitch nsh nf_conncount nf_nat 
nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 binfmt_misc zfs(PO) zunicode(PO) 
zavl(PO) icp(PO) zlua(PO) zcommon(PO) znvpair(PO) spl(O) genwqe_card crc_itu_t 
chsc_sch eadm_sch ctcm fsm vfio_ccw vfio_mdev mdev vfio_iommu_type1 vfio 
sch_fq_codel nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables x_tables 
btrfs zstd_compress zlib_deflate raid10 raid456 async_raid6_recov async_memcpy 
async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 linear 
dm_service_time pkey zcrypt crc32_vx_s390 ghash_s390 prng mlx4_en mlx4_ib 
ib_uverbs aes_s390 ib_core ptp pps_core qeth_l2 des_s390 des_generic 
sha512_s390 sha256_s390 sha1_s390 sha_common mlx4_core zfcp scsi_transport_fc 
qeth qdio ccwgroup
dasd_eckd_mod dasd_mod scsi_dh_emc scsi_dh_rdac scsi_dh_alua dm_multipath
   CPU: 0 PID: 3159 Comm: test_verifier Tainted: P   O  
5.3.0-21-generic #22-Ubuntu
   Hardware name: IBM 2964 N63 400 (LPAR)
   Krnl PSW : 0704c0018000 0002fb832c9e 
(__alloc_pages_nodemask+0x25e/0x318)
  R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:0 PM:0 RI:0 EA:3
   Krnl GPRS: 0003b7efcac0 00040dc0 00040dc0 
000a
    000a 
0002fb6386b8
  003d0900 0dc0 03e00b067000 
03e00b067000
  0003a57a8000 02aa0d1b28e0 03e002b6bb28 
03e002b6baa8
   Krnl Code: 0002fb832c92: a7212000tmll%r2,8192
  0002fb832c96: a774ff87brc 7,2fb832ba4
 #0002fb832c9a: a7f40001brc 15,2fb832c9c
 >0002fb832c9e: a789lghi%r8,0
  0002fb832ca2: a7f4ff83brc 15,2fb832ba8
  0002fb832ca6: a718lhi %r1,0
  0002fb832caa: a7f4ff1bbrc 15,2fb832ae0
  0002fb832cae: e3100344lg  %r1,832
   Call Trace:
   ([<03e002b6bb88>] 0x3e002b6bb88)
[<0002fb7ff3a0>] kmalloc_order_trace+0x40/0x100 
[<0002fb6386b8>] bpf_int_jit_compile+0x70/0x240 
[<0002fb7828ce>] bpf_prog_select_runtime+0x13e/0x190 
[<0002fb78614c>] bpf_prog_load+0x2dc/0x6a8 
[<0002fb786ca6>] __do_sys_bpf+0x78e/0x10c0 
[<0002fbe82228>] system_call+0xdc/0x2c8 
   Last Breaking-Event-Address:
[<0002fb832c9a>] __alloc_pages_nodemask+0x25a/0x318
   ---[ end trace 1d8b7179967b64ff ]---

  The test itself will get killed with oom-killer later, thus generating
  a return code 137 for the test.

  All the following tests in this test suite will be skipped.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1851829/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1851829] Re: kernel trace found with ubuntu_bpf test on Eoan s390x LPAR

2019-11-08 Thread Po-Hsu Lin
This can be reproduced with 5.3.0-20 on the same node as well:

 WARNING: CPU: 1 PID: 2799 at mm/page_alloc.c:4702 
__alloc_pages_nodemask+0x25e/0x318
 Modules linked in: xt_conntrack ipt_REJECT nf_reject_ipv4 ip6table_mangle 
ip6table_nat nf_tables nfnetlink ip6table_filter ip6_tables iptable_mangle 
xt_CHECKSUM iptable_nat xt_MASQUERADE xt_tcpudp bridge iptable_filter bpfilter 
aufs overlay 8021q garp stp mrp llc openvswitch nsh nf_conncount nf_nat 
nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 binfmt_misc zfs(PO) zunicode(PO) 
zavl(PO) icp(PO) zlua(PO) zcommon(PO) znvpair(PO) spl(O) genwqe_card crc_itu_t 
chsc_sch eadm_sch ctcm fsm vfio_ccw vfio_mdev mdev vfio_iommu_type1 vfio 
sch_fq_codel nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables x_tables 
btrfs zstd_compress zlib_deflate raid10 raid456 async_raid6_recov async_memcpy 
async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 linear 
dm_service_time pkey zcrypt crc32_vx_s390 ghash_s390 prng aes_s390 mlx4_ib 
ib_uverbs mlx4_en qeth_l2 des_s390 des_generic ptp pps_core ib_core sha512_s390 
sha256_s390 sha1_s390 sha_common mlx4_core zfcp scsi_transport_fc qeth qdio 
ccwgroup
  dasd_eckd_mod dasd_mod scsi_dh_emc scsi_dh_rdac scsi_dh_alua dm_multipath
 CPU: 1 PID: 2799 Comm: test_verifier Tainted: P   O  
5.3.0-20-generic #21-Ubuntu
 Hardware name: IBM 2964 N63 400 (LPAR)
 Krnl PSW : 0704c0018000 0002ec206c9e 
(__alloc_pages_nodemask+0x25e/0x318)
R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:0 PM:0 RI:0 EA:3
 Krnl GPRS: da15f4fd64a5a47d 00040dc0 00040dc0 000a
  000a 0002ec00c6b8
003d0900 0dc0 03e00a16b000 03e00a16b000
0003a6c2 02aa09e798e0 03e00279bb28 03e00279baa8
 Krnl Code: 0002ec206c92: a7212000  tmll%r2,8192
0002ec206c96: a774ff87  brc 7,2ec206ba4
   #0002ec206c9a: a7f40001  brc 15,2ec206c9c
   >0002ec206c9e: a789  lghi%r8,0
0002ec206ca2: a7f4ff83  brc 15,2ec206ba8
0002ec206ca6: a718  lhi %r1,0
0002ec206caa: a7f4ff1b  brc 15,2ec206ae0
0002ec206cae: e3100344  lg  %r1,832
 Call Trace:
 ([<03e00279bb88>] 0x3e00279bb88)
  [<0002ec1d33a0>] kmalloc_order_trace+0x40/0x100 
  [<0002ec00c6b8>] bpf_int_jit_compile+0x70/0x240 
  [<0002ec1568ce>] bpf_prog_select_runtime+0x13e/0x190 
  [<0002ec15a14c>] bpf_prog_load+0x2dc/0x6a8 
  [<0002ec15aca6>] __do_sys_bpf+0x78e/0x10c0 
  [<0002ec856228>] system_call+0xdc/0x2c8 
 Last Breaking-Event-Address:
  [<0002ec206c9a>] __alloc_pages_nodemask+0x25a/0x318
 ---[ end trace d7b63e2466552ed4 ]---


** Tags added: 5.3 eoan s390x sru-20191021 ubuntu-bpf

** Also affects: linux (Ubuntu)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Eoan)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1851829

Title:
  kernel trace found with ubuntu_bpf test on Eoan s390x LPAR

Status in ubuntu-kernel-tests:
  New
Status in linux package in Ubuntu:
  New
Status in linux source package in Eoan:
  New

Bug description:
  This trace can be seen right after you started the test on s390x LPAR.

  
   **
   **   NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE   **
   **  **
   ** trace_printk() being used. Allocating extra memory.  **
   **  **
   ** This means that this is a DEBUG kernel and it is **
   ** unsafe for production use.   **
   **  **
   ** If you see this message and you are not debugging**
   ** the kernel, report this immediately to your vendor!  **
   **  **
   **   NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE   **
   **
   WARNING: CPU: 0 PID: 3159 at mm/page_alloc.c:4702 
__alloc_pages_nodemask+0x25e/0x318
   Modules linked in: xt_conntrack ipt_REJECT nf_reject_ipv4 ip6table_mangle 
ip6table_nat nf_tables nfnetlink ip6table_filter ip6_tables iptable_mangle 
xt_CHECKSUM iptable_nat xt_MASQUERADE xt_tcpudp bridge iptable_filter bpfilter 
aufs overlay 8021q garp stp mrp llc openvswitch nsh nf_conncount nf_nat 
nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 binfmt_misc zfs(PO) zunicode(PO) 
zavl(PO) icp(PO) zlua(PO) zcommon(PO) znvpair(PO) spl(O) genwqe_card crc_itu_t 
chsc_sch eadm_sch ctcm fsm vfio_ccw vfio_mdev mdev vfio_iommu_type1 vfio 
sch_fq_codel nfsd