[Expired for linux (Ubuntu) because there has been no activity for 60 days.]
** Changed in: linux (Ubuntu) Status: Incomplete => Expired -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1919472 Title: 5.4.0-1040-azure taints kernel with a warning (512) Status in linux package in Ubuntu: Expired Bug description: Since GitHub Actions has been updated to 5.4.0-1040-azure our CI (https://github.com/checkpoint-restore/criu/issues/1390) fails because a user space test leads to a kernel warning: [ 226.964883] writing to auto_msgmni has no effect [ 226.978221] ------------[ cut here ]------------ [ 226.978226] refcount_t hit zero at __nft_mt_tg_destroy+0x20/0x30 [nft_compat] in kworker/u4:4[103], uid/euid: 0/0 [ 226.978232] WARNING: CPU: 1 PID: 103 at kernel/panic.c:677 refcount_error_report+0x9b/0xab [ 226.978233] Modules linked in: nft_counter xt_mark nft_compat nf_tables raw_diag udp_diag tcp_diag inet_diag netlink_diag af_packet_diag unix_diag veth xfs dm_thin_pool dm_persistent_data dm_bio_prison dm_bufio xt_MASQUERADE nf_conntrack_netlink nfnetlink xfrm_user xfrm_algo xt_addrtype iptable_filter iptable_nat nf_nat br_netfilter bridge stp llc xt_owner iptable_security xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c bpfilter aufs overlay binfmt_misc nls_iso8859_1 dm_multipath scsi_dh_rdac scsi_dh_emc scsi_dh_alua joydev hid_generic crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel crypto_simd cryptd glue_helper hv_netvsc serio_raw pata_acpi hv_balloon hyperv_fb hyperv_keyboard cfbfillrect hid_hyperv cfbimgblt hid cfbcopyarea hv_utils sch_fq_codel drm drm_panel_orientation_quirks i2c_core ip_tables x_tables autofs4 [ 226.978254] CPU: 1 PID: 103 Comm: kworker/u4:4 Not tainted 5.4.0-1040-azure #42-Ubuntu [ 226.978255] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS 090008 12/07/2018 [ 226.978260] Workqueue: netns cleanup_net [ 226.978262] RIP: 0010:refcount_error_report+0x9b/0xab [ 226.978264] Code: 00 45 8b 85 c0 08 00 00 48 8b 93 80 00 00 00 49 8d 8d b0 0a 00 00 41 56 41 89 c1 4c 89 e6 48 c7 c7 20 40 91 88 e8 10 00 00 00 <0f> 0b 58 48 8d 65 e0 5b 41 5c 41 5d 41 5e 5d c3 0f 1f 44 00 00 55 [ 226.978265] RSP: 0000:ffffa0768027baa0 EFLAGS: 00010286 [ 226.978266] RAX: 0000000000000000 RBX: ffffa0768027bbd8 RCX: 0000000000000006 [ 226.978267] RDX: 0000000000000007 RSI: 0000000000000096 RDI: ffff88d5b8b16580 [ 226.978268] RBP: ffffa0768027bac8 R08: 0000000000000406 R09: 0000000000000004 [ 226.978269] R10: 0000000000000000 R11: 0000000000000001 R12: ffffffff88910e83 [ 226.978270] R13: ffff88d5b7010000 R14: 0000000000000000 R15: ffff88d5b7010000 [ 226.978271] FS: 0000000000000000(0000) GS:ffff88d5b8b00000(0000) knlGS:0000000000000000 [ 226.978272] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 226.978273] CR2: 00007f5cc79e340c CR3: 00000001930e8003 CR4: 00000000003706e0 [ 226.978275] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 226.978276] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 226.978276] Call Trace: [ 226.978282] ex_handler_refcount+0x50/0x70 [ 226.978283] fixup_exception+0x4a/0x61 [ 226.978286] do_trap+0x4e/0xf0 [ 226.978288] do_error_trap+0x7c/0xb0 [ 226.978290] ? nft_target_dump+0xc1/0xcc [nft_compat] [ 226.978292] do_invalid_op+0x3c/0x50 [ 226.978293] ? nft_target_dump+0xc1/0xcc [nft_compat] [ 226.978296] invalid_op+0x28/0x30 [ 226.978298] RIP: 0010:__nft_mt_tg_destroy+0x20/0x30 [nft_compat] [ 226.978299] Code: c3 66 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 55 48 89 e5 53 48 89 f3 f0 ff 0d bc 2e 00 00 0f 84 c0 10 00 00 0f 88 ba 10 00 00 <e8> fb f7 f4 c6 48 8b 3b e8 43 5c 0a c7 5b 5d c3 0f 1f 44 00 00 55 [ 226.978300] RSP: 0000:ffffa0768027bc88 EFLAGS: 00010246 [ 226.978301] RAX: 0000000000000000 RBX: ffff88d4e683f6d8 RCX: ffffffffc07f2000 [ 226.978301] RDX: ffff88d4e683f6d8 RSI: ffff88d4e683f6d8 RDI: ffffffffc07f7100 [ 226.978302] RBP: ffffa0768027bc90 R08: 00000000ffffff00 R09: ffff88d4ec580000 [ 226.978303] R10: ffff88d4e683f780 R11: 0000000000000001 R12: ffff88d4e683f6d8 [ 226.978304] R13: ffffffffc07f7100 R14: dead000000000100 R15: ffff88d4e683f8a0 [ 226.978307] __nft_match_destroy.isra.0+0x5b/0x80 [nft_compat] [ 226.978309] nft_match_destroy+0x1c/0x20 [nft_compat] [ 226.978313] nf_tables_expr_destroy+0x1f/0x30 [nf_tables] [ 226.978316] nf_tables_rule_destroy+0x49/0x70 [nf_tables] [ 226.978320] nf_tables_exit_net+0x1ae/0x3e0 [nf_tables] [ 226.978323] ops_exit_list.isra.0+0x3b/0x70 [ 226.978325] cleanup_net+0x1f0/0x300 [ 226.978329] process_one_work+0x1e5/0x3a0 [ 226.978331] worker_thread+0x4d/0x3f0 [ 226.978333] kthread+0x104/0x140 [ 226.978334] ? process_one_work+0x3a0/0x3a0 [ 226.978336] ? kthread_park+0x90/0x90 [ 226.978337] ret_from_fork+0x35/0x40 [ 226.978339] ---[ end trace e1d9a47b641e4e0a ]--- Our test checks before each test if the tainted value has changed and aborts the CI run with a failure if the kernel is tainted. So in this case the kernel is tainted and our tests are aborted. This did not happen with 5.4.0-1039-azure. So this is a regression introduce with 5.4.0-1040-azure. https://github.com/checkpoint-restore/criu/issues/1390 https://github.com/actions/virtual-environments/issues/2848 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1919472/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp