FWIW, kernel trace happens with the kernel in: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1753662/comments/77
But I will let it running anyway since I'm not sure if it affects to the testing or not.
==== [ 5.999557] rtc_cmos 00:00: setting system clock to 2018-04-11 15:52:23 UTC (1523461943) [ 5.999637] BIOS EDD facility v0.16 2004-Jun-25, 0 devices found [ 5.999637] EDD information not available. [ 6.856436] clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x229834d6ac9, max_idle_ns: 440795285103 ns [ 6.872996] Freeing unused kernel memory: 1844K (ffffffff81f71000 - ffffffff8213e000) [ 6.885727] Write protecting the kernel read-only data: 14336k [ 6.897566] Freeing unused kernel memory: 1964K (ffff880001815000 - ffff880001a00000) [ 6.911315] Freeing unused kernel memory: 272K (ffff880001dbc000 - ffff880001e00000) [ 6.924438] ------------[ cut here ]------------ [ 6.934158] WARNING: CPU: 16 PID: 1 at /home/jsalisbury/bugs/lp1753662/v4.4/linux/arch/x86/mm/dump_pagetables.c:225 note_page+0x649/0x840() [ 6.958330] x86/mm: Found insecure W+X mapping at address ffff880000010000/0xffff880000010000 [ 6.973431] Modules linked in: [ 6.982498] CPU: 16 PID: 1 Comm: swapper/0 Not tainted 4.4.0-040400-generic #201803261439 [ 6.997629] Hardware name: Dell Inc. PowerEdge R730/072T6D, BIOS 2.5.5 08/16/2017 [ 7.012149] 0000000000000000 000000009d064fa9 ffff883f6576fd48 ffffffff813da8d8 [ 7.026822] ffff883f6576fd90 ffff883f6576fd80 ffffffff8107ec52 ffff883f6576fe90 [ 7.041667] 8000000000000163 0000000000000004 0000000000000000 0000000000000000 [ 7.056684] Call Trace: [ 7.066183] [<ffffffff813da8d8>] dump_stack+0x44/0x5c [ 7.078824] [<ffffffff8107ec52>] warn_slowpath_common+0x82/0xc0 [ 7.092586] [<ffffffff8107ecec>] warn_slowpath_fmt+0x5c/0x80 [ 7.106139] [<ffffffff81070a09>] note_page+0x649/0x840 [ 7.119215] [<ffffffff81070ef9>] ptdump_walk_pgd_level_core+0x2f9/0x430 [ 7.134087] [<ffffffff81071067>] ptdump_walk_pgd_level_checkwx+0x17/0x20 [ 7.149121] [<ffffffff81066e2c>] mark_rodata_ro+0xec/0x100 [ 7.162852] [<ffffffff81801b60>] ? rest_init+0x80/0x80 [ 7.176273] [<ffffffff81801b7d>] kernel_init+0x1d/0xe0 [ 7.189752] [<ffffffff8180e18f>] ret_from_fork+0x3f/0x70 [ 7.203505] [<ffffffff81801b60>] ? rest_init+0x80/0x80 [ 7.217134] ---[ end trace 43f75b6421b8d01c ]--- [ 7.235677] x86/mm: Checked W+X mappings: FAILED, 235610 W+X pages found.
FWIW, kernel trace happens with the kernel in: /bugs.launchpad .net/ubuntu/ +source/ linux/+ bug/1753662/ comments/ 77
https:/
But I will let it running anyway since I'm not sure if it affects to the testing or not.
==== y/bugs/ lp1753662/ v4.4/linux/ arch/x86/ mm/dump_ pagetables. c:225 note_page+ 0x649/0x840( ) 0/0xffff8800000 10000 generic #201803261439 8d8>] dump_stack+ 0x44/0x5c c52>] warn_slowpath_ common+ 0x82/0xc0 cec>] warn_slowpath_ fmt+0x5c/ 0x80 a09>] note_page+ 0x649/0x840 ef9>] ptdump_ walk_pgd_ level_core+ 0x2f9/0x430 067>] ptdump_ walk_pgd_ level_checkwx+ 0x17/0x20 e2c>] mark_rodata_ ro+0xec/ 0x100 b60>] ? rest_init+0x80/0x80 b7d>] kernel_ init+0x1d/ 0xe0 18f>] ret_from_ fork+0x3f/ 0x70 b60>] ? rest_init+0x80/0x80
[ 5.999557] rtc_cmos 00:00: setting system clock to 2018-04-11 15:52:23 UTC (1523461943)
[ 5.999637] BIOS EDD facility v0.16 2004-Jun-25, 0 devices found
[ 5.999637] EDD information not available.
[ 6.856436] clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x229834d6ac9, max_idle_ns: 440795285103 ns
[ 6.872996] Freeing unused kernel memory: 1844K (ffffffff81f71000 - ffffffff8213e000)
[ 6.885727] Write protecting the kernel read-only data: 14336k
[ 6.897566] Freeing unused kernel memory: 1964K (ffff880001815000 - ffff880001a00000)
[ 6.911315] Freeing unused kernel memory: 272K (ffff880001dbc000 - ffff880001e00000)
[ 6.924438] ------------[ cut here ]------------
[ 6.934158] WARNING: CPU: 16 PID: 1 at /home/jsalisbur
[ 6.958330] x86/mm: Found insecure W+X mapping at address ffff88000001000
[ 6.973431] Modules linked in:
[ 6.982498] CPU: 16 PID: 1 Comm: swapper/0 Not tainted 4.4.0-040400-
[ 6.997629] Hardware name: Dell Inc. PowerEdge R730/072T6D, BIOS 2.5.5 08/16/2017
[ 7.012149] 0000000000000000 000000009d064fa9 ffff883f6576fd48 ffffffff813da8d8
[ 7.026822] ffff883f6576fd90 ffff883f6576fd80 ffffffff8107ec52 ffff883f6576fe90
[ 7.041667] 8000000000000163 0000000000000004 0000000000000000 0000000000000000
[ 7.056684] Call Trace:
[ 7.066183] [<ffffffff813da
[ 7.078824] [<ffffffff8107e
[ 7.092586] [<ffffffff8107e
[ 7.106139] [<ffffffff81070
[ 7.119215] [<ffffffff81070
[ 7.134087] [<ffffffff81071
[ 7.149121] [<ffffffff81066
[ 7.162852] [<ffffffff81801
[ 7.176273] [<ffffffff81801
[ 7.189752] [<ffffffff8180e
[ 7.203505] [<ffffffff81801
[ 7.217134] ---[ end trace 43f75b6421b8d01c ]---
[ 7.235677] x86/mm: Checked W+X mappings: FAILED, 235610 W+X pages found.