Looks it is same as https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2056706
-- You received this bug notification because you are a member of Canonical Platform QA Team, which is subscribed to ubuntu-kernel-tests. https://bugs.launchpad.net/bugs/2060719 Title: Bad page state in process swapper/0 pfn:02ee3 Status in ubuntu-kernel-tests: New Bug description: Test: * ubuntu-kernel-test Affected Series: Noble Cloud: AWS Instance_Type: t2.small Boot Kernel: 6.8.0-1001-aws Image_ID: ami-05dfc4aad5fc7b1f9 Affected Cycles: d2024.04.04 , d2024.02.07, This bug appears to be isolated to the aws, t2.small instance. Xen HVM domU, BIOS 4.11.amazon 08/24/2006 dmesg: [ 19.439388] RSP: 002b:00007ffe8c887f10 EFLAGS: 00000287 [ 19.439390] RAX: 0000000000b3b390 RBX: 0000000000000002 RCX: 000076e4dd91ce20 [ 19.439392] RDX: bd6a078635df035e RSI: 0000000000b3b080 RDI: 000076e4dd92bd80 [ 19.439394] RBP: 00007ffe8c887f90 R08: 000000000000000e R09: 000076e4dd91ce30 [ 19.439395] R10: 0000000000000004 R11: 000076e4dd92bd80 R12: bd6a078635df035e [ 19.439397] R13: 000076e4dd91ce00 R14: 0000000000b3b080 R15: 000000000000000f [ 19.439400] </TASK> [ 19.440945] BUG: Bad page state in process swapper/0 pfn:02ee3 [ 19.445260] page:00000000f373b374 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2ee3 [ 19.445263] flags: 0xfffffc0000000(node=0|zone=1|lastcpupid=0x1fffff) [ 19.445266] page_type: 0xffffffff() [ 19.445268] raw: 000fffffc0000000 dead000000000040 ffff8d83413d4800 0000000000000000 [ 19.445270] raw: 0000000000000000 0000000000000001 00000000ffffffff 0000000000000000 [ 19.445272] page dumped because: page_pool leak [ 19.445273] Modules linked in: 8021q garp mrp stp llc crct10dif_pclmul crc32_pclmul polyval_clmulni polyval_generic ghash_clmulni_intel sha256_ssse3 sha1_ssse3 aesni_intel crypto_simd cryptd binfmt_misc floppy psmouse nls_iso8859_1 input_leds serio_raw dm_multipath msr efi_pstore nfnetlink ip_tables x_tables autofs4 [ 19.445294] CPU: 0 PID: 0 Comm: swapper/0 Tainted: G B 6.8.0-1001-aws #1-Ubuntu [ 19.445299] Hardware name: Xen HVM domU, BIOS 4.11.amazon 08/24/2006 [ 19.445301] Call Trace: [ 19.445302] <IRQ> [ 19.445304] dump_stack_lvl+0x48/0x70 [ 19.445309] dump_stack+0x10/0x20 [ 19.445312] bad_page+0x76/0x120 [ 19.445316] free_page_is_bad_report+0x86/0xa0 [ 19.445318] free_unref_page_prepare+0x26d/0x3c0 [ 19.445320] free_unref_page+0x34/0x1c0 [ 19.445323] ? gnttab_end_foreign_access_ref+0x24/0x50 [ 19.445326] __folio_put+0x3c/0x90 [ 19.445329] __pskb_pull_tail+0x1fa/0x5e0 [ 19.445332] handle_incoming_queue+0x180/0x190 [ 19.445335] xennet_poll+0x50e/0x900 [ 19.445337] ? xen_irq_lateeoi_locked.part.0+0x14a/0x2c0 [ 19.445340] ? xennet_interrupt+0x7c/0x90 [ 19.445343] __napi_poll+0x33/0x1e0 [ 19.445346] net_rx_action+0x18a/0x2f0 [ 19.445349] ? evtchn_2l_handle_events+0x178/0x440 [ 19.445353] __do_softirq+0xde/0x32e [ 19.445357] __irq_exit_rcu+0x75/0xa0 [ 19.445359] irq_exit_rcu+0xe/0x20 [ 19.445362] sysvec_xen_hvm_callback+0x92/0xd0 [ 19.445365] </IRQ> [ 19.445366] <TASK> [ 19.445368] asm_sysvec_xen_hvm_callback+0x1b/0x20 [ 19.445370] RIP: 0010:pv_native_safe_halt+0xb/0x10 [ 19.445375] Code: 22 d7 31 ff c3 cc cc cc cc 66 0f 1f 44 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 90 0f 00 2d 19 05 42 00 fb f4 <c3> cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 83 [ 19.445377] RSP: 0018:ffffffffa5003d50 EFLAGS: 00000246 [ 19.445380] RAX: 0000000000004000 RBX: ffff8d834196ac64 RCX: 0000000000000000 [ 19.445381] RDX: 0000000000000001 RSI: ffff8d834196ac00 RDI: 0000000000000001 [ 19.445383] RBP: ffffffffa5003d58 R08: 0000000000000000 R09: 0000000000000000 [ 19.445385] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8d834196ac64 [ 19.445386] R13: 0000000000000000 R14: ffffffffa52f8000 R15: ffff8d83bd600000 [ 19.445389] ? acpi_safe_halt+0x19/0x60 [ 19.445392] acpi_idle_do_entry+0x40/0x80 [ 19.445394] acpi_idle_enter+0xb6/0x180 [ 19.445396] cpuidle_enter_state+0x91/0x6f0 [ 19.445400] ? finish_task_switch.isra.0+0x81/0x290 [ 19.445405] cpuidle_enter+0x2e/0x50 [ 19.445410] call_cpuidle+0x23/0x60 [ 19.445414] cpuidle_idle_call+0x10f/0x150 [ 19.445417] do_idle+0x82/0xf0 [ 19.445420] cpu_startup_entry+0x2a/0x30 [ 19.445423] rest_init+0xc2/0xf0 [ 19.445426] ? acpi_enable_subsystem+0xe6/0x2a0 [ 19.445429] ? static_key_disable+0x1f/0x30 [ 19.445432] arch_call_rest_init+0xe/0x30 [ 19.445435] start_kernel+0x34f/0x440 [ 19.445437] x86_64_start_reservations+0x18/0x30 [ 19.445442] x86_64_start_kernel+0xbf/0x110 [ 19.445445] secondary_startup_64_no_verify+0x184/0x18b [ 19.445450] </TASK> To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/2060719/+subscriptions -- Mailing list: https://launchpad.net/~canonical-ubuntu-qa Post to : canonical-ubuntu-qa@lists.launchpad.net Unsubscribe : https://launchpad.net/~canonical-ubuntu-qa More help : https://help.launchpad.net/ListHelp