Confirmed, was able to reproduce this, using the kernel as stated in the
bug. This also appears to break the networking after the failure.
transaction with reduced feature level UDP.
Mar 3 02:55:01 s2lp4 CRON[4294]: (root) CMD (command -v debian-sa1 > /dev/null
&& debian-sa1 1 1)
Mar 3 02:55:20 s2lp4 systemd[1]: Started Session 11 of user ubuntu.
Mar 3 02:56:48 s2lp4 systemd[1]: Started Session 12 of user ubuntu.
Mar 3 02:58:26 s2lp4 kernel: [ 320.392257]
Mar 3 02:58:26 s2lp4 kernel: [ 320.392258]
**********************************************************
Mar 3 02:58:26 s2lp4 kernel: [ 320.392259] ** NOTICE NOTICE NOTICE NOTICE
NOTICE NOTICE NOTICE **
Mar 3 02:58:26 s2lp4 kernel: [ 320.392259] **
**
Mar 3 02:58:26 s2lp4 kernel: [ 320.392260] ** trace_printk() being used.
Allocating extra memory. **
Mar 3 02:58:26 s2lp4 kernel: [ 320.392260] **
**
Mar 3 02:58:26 s2lp4 kernel: [ 320.392261] ** This means that this is a DEBUG
kernel and it is **
Mar 3 02:58:26 s2lp4 kernel: [ 320.392261] ** unsafe for production use.
**
Mar 3 02:58:26 s2lp4 kernel: [ 320.392262] **
**
Mar 3 02:58:26 s2lp4 kernel: [ 320.392263] ** If you see this message and you
are not debugging **
Mar 3 02:58:26 s2lp4 kernel: [ 320.392263] ** the kernel, report this
immediately to your vendor! **
Mar 3 02:58:26 s2lp4 kernel: [ 320.392264] **
**
Mar 3 02:58:26 s2lp4 kernel: [ 320.392264] ** NOTICE NOTICE NOTICE NOTICE
NOTICE NOTICE NOTICE **
Mar 3 02:58:26 s2lp4 kernel: [ 320.392265]
**********************************************************
Mar 3 02:58:37 s2lp4 kernel: [ 330.840545] sshd invoked oom-killer:
gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0
Connection to 10.245.80.42 closed by remote host.
Connection to 10.245.80.42 closed.
sfeole@bsg75:~$ ssh [email protected]
ssh_exchange_identification: read: Connection reset by peer
4: enP1p0s0d1: <BROADCAST,MULTICAST> mtu 1500 qdisc noop state DOWN mode
DEFAULT group default qlen 1000
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1856163
Title:
test_maps test from ubuntu_bpf will cause OOM on Eoan s390x LPAR
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1856163/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs