Open JasonFengJ9 opened 1 year ago
JDK11 ppc64le_linux(rhel8le-rt1-3
)
java version "11.0.18" 2023-01-17
IBM Semeru Runtime Certified Edition 11.0.18+4 (build 11.0.18+4)
Eclipse OpenJ9 VM 11.0.18+4 (build master-8206cebaa, JRE 11 Linux ppc64le-64-Bit Compressed References 20221125_447 (JIT enabled, AOT enabled)
OpenJ9 - 8206cebaa
OMR - dc42afa38
JCL - 2c5043df7e based on jdk-11.0.18+4)
[2022-11-26T03:05:20.403Z] variation: NoOptions
[2022-11-26T03:05:20.403Z] JVM_OPTIONS:
[2022-11-26T03:05:23.901Z] Unhandled exception
[2022-11-26T03:05:23.901Z] Type=Illegal instruction vmState=0x00040000
[2022-11-26T03:05:23.901Z] J9Generic_Signal_Number=00000048 Signal_Number=00000004 Error_Value=00000000 Signal_Code=00000001
[2022-11-26T03:05:23.901Z] Handler1=00007FFF7DFB4960 Handler2=00007FFF7DEDD440
[2022-11-26T03:05:23.901Z] R0=00007FFF54707CEC R1=00007FFF7E69C030 R2=00007FFF548C7F00 R3=00000000FFFAF580
[2022-11-26T03:05:23.901Z] R4=00000000FFFAE1E8 R5=00000000000009A0 R6=00007FFF78172FC0 R7=00007FFF78172DF8
[2022-11-26T03:05:23.901Z] R8=00007FFF78172E38 R9=00000000000001B0 R10=0000000000000002 R11=00007FFF54637F60
[2022-11-26T03:05:23.901Z] R12=0000000000004400 R13=00007FFF7E6A68E0 R14=000000000017ABC0 R15=00007FFF549000C8
[2022-11-26T03:05:23.901Z] R16=00000000FFFAEBA0 R17=00000000FFFAF580 R18=00000000FFFAE1E8 R19=00000000FFF3F9F8
[2022-11-26T03:05:23.901Z] R20=0000000000000000 R21=00007FFF78172E38 R22=00007FFF78172FC0 R23=0000000100000000
[2022-11-26T03:05:23.901Z] R24=00000000FFFAE1E8 R25=00000000FFFAF580 R26=00000000000009A0 R27=0000000000000000
[2022-11-26T03:05:23.901Z] R28=0000000000000000 R29=0000000000000000 R30=000000000000009A R31=00007FFF78172DF8
[2022-11-26T03:05:23.901Z] NIP=00007FFF54631B0C MSR=800000000288F033 ORIG_GPR3=C0000000000027E0 CTR=00007FFF54637F60
[2022-11-26T03:05:23.901Z] LINK=00007FFF54707CEC XER=0000000020000000 CCR=0000000048242444 SOFTE=0000000000000001
[2022-11-26T03:05:23.901Z] TRAP=0000000000000700 DAR=00007FFF784D0298 dsisr=0000000042000000 RESULT=0000000000000000
[2022-11-26T03:05:23.901Z] FPR0 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-11-26T03:05:23.901Z] FPR1 4050dcb960000000 (f: 1610612736.000000, d: 6.744881e+01)
[2022-11-26T03:05:23.901Z] FPR2 41e0000000000000 (f: 0.000000, d: 2.147484e+09)
[2022-11-26T03:05:23.901Z] FPR3 3fee666660000000 (f: 1610612736.000000, d: 9.500000e-01)
[2022-11-26T03:05:23.901Z] FPR4 3fce840b4ac4e4d2 (f: 1254417664.000000, d: 2.384047e-01)
[2022-11-26T03:05:23.901Z] FPR5 bfe7154748bef6c8 (f: 1220474624.000000, d: -7.213475e-01)
[2022-11-26T03:05:23.901Z] FPR6 3fe62e42fefa39ef (f: 4277811712.000000, d: 6.931472e-01)
[2022-11-26T03:05:23.901Z] FPR7 bfc6574f0ac07758 (f: 180385632.000000, d: -1.745395e-01)
[2022-11-26T03:05:23.901Z] FPR8 f6a7c4eec27af487 (f: 3262838016.000000, d: -3.742330e+263)
[2022-11-26T03:05:23.901Z] FPR9 f6a7c4eec27af487 (f: 3262838016.000000, d: -3.742330e+263)
[2022-11-26T03:05:23.901Z] FPR10 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-11-26T03:05:23.901Z] FPR11 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-11-26T03:05:23.901Z] FPR12 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-11-26T03:05:23.901Z] FPR13 0000000000095700 (f: 612096.000000, d: 3.024156e-318)
[2022-11-26T03:05:23.901Z] FPR14 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-11-26T03:05:23.901Z] FPR15 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-11-26T03:05:23.901Z] FPR16 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-11-26T03:05:23.901Z] FPR17 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-11-26T03:05:23.901Z] FPR18 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-11-26T03:05:23.901Z] FPR19 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-11-26T03:05:23.901Z] FPR20 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-11-26T03:05:23.901Z] FPR21 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-11-26T03:05:23.901Z] FPR22 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-11-26T03:05:23.901Z] FPR23 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-11-26T03:05:23.901Z] FPR24 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-11-26T03:05:23.901Z] FPR25 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-11-26T03:05:23.901Z] FPR26 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-11-26T03:05:23.901Z] FPR27 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-11-26T03:05:23.901Z] FPR28 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-11-26T03:05:23.901Z] FPR29 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-11-26T03:05:23.901Z] FPR30 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-11-26T03:05:23.901Z] FPR31 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-11-26T03:05:23.901Z] Module=/lib64/libcrypto.so.3
[2022-11-26T03:05:23.901Z] Module_base_address=00007FFF543C0000
[2022-11-26T03:05:23.901Z] Target=2_90_20221125_447 (Linux 4.18.0-425.3.1.el8.ppc64le)
[2022-11-26T03:05:23.901Z] CPU=ppc64le (4 logical CPUs) (0x1dccb0000 RAM)
[2022-11-26T03:05:23.901Z] ----------- Stack Backtrace -----------
[2022-11-26T03:05:23.901Z] (0x00007FFF54631B0C [libcrypto.so.3+0x271b0c])
[2022-11-26T03:05:23.901Z] (0x00007FFF54707CEC [libcrypto.so.3+0x347cec])
[2022-11-26T03:05:23.901Z] (0x00007FFF54708210 [libcrypto.so.3+0x348210])
[2022-11-26T03:05:23.901Z] (0x00007FFF54763D34 [libcrypto.so.3+0x3a3d34])
[2022-11-26T03:05:23.901Z] (0x00007FFF54764DF4 [libcrypto.so.3+0x3a4df4])
[2022-11-26T03:05:23.901Z] EVP_DecryptUpdate+0xd4 (0x00007FFF545DB9F4 [libcrypto.so.3+0x21b9f4])
[2022-11-26T03:05:23.901Z] Java_jdk_crypto_jniprovider_NativeCrypto_GCMDecrypt+0x410 (0x00007FFF548E59E0 [libjncrypto.so+0x59e0])
[2022-11-26T03:05:23.901Z] (0x00007FFF7E17CDA8 [libj9vm29.so+0x20cda8])
[2022-11-26T03:05:23.901Z] ffi_call_int+0xd4 (0x00007FFF7E17CA74 [libj9vm29.so+0x20ca74])
[2022-11-26T03:05:23.901Z] bytecodeLoopCompressed+0x129b8 (0x00007FFF7E039808 [libj9vm29.so+0xc9808])
[2022-11-26T03:05:23.901Z] (0x00007FFF7E0E7750 [libj9vm29.so+0x177750])
[2022-11-26T03:05:23.901Z] sidecarInvokeReflectMethodImpl+0x3c0 (0x00007FFF7DF8E640 [libj9vm29.so+0x1e640])
[2022-11-26T03:05:23.901Z] sidecarInvokeReflectMethod+0x38 (0x00007FFF7DF8FAD8 [libj9vm29.so+0x1fad8])
[2022-11-26T03:05:23.901Z] JVM_InvokeMethod_Impl+0xb4 (0x00007FFF7C291A84 [libjclse29.so+0x81a84])
[2022-11-26T03:05:23.901Z] JVM_InvokeMethod+0x40 (0x00007FFF7E5D4350 [libjvm.so+0x24350])
[2022-11-26T03:05:23.901Z] JVM_InvokeMethod+0x34 (0x00007FFF7E6A6C04 [libjvm.so+0x6c04])
[2022-11-26T03:05:23.901Z] Java_jdk_internal_reflect_NativeMethodAccessorImpl_invoke0+0x24 (0x00007FFF5C22D174 [libjava.so+0xd174])
[2022-11-26T03:05:23.901Z] (0x00007FFF5D0A52A4 [<unknown>+0x0])
[2022-11-26T03:05:23.901Z] runCallInMethod+0x270 (0x00007FFF7DF8DF30 [libj9vm29.so+0x1df30])
[2022-11-26T03:05:23.901Z] gpProtectedRunCallInMethod+0x50 (0x00007FFF7DFB9CE0 [libj9vm29.so+0x49ce0])
[2022-11-26T03:05:23.901Z] signalProtectAndRunGlue+0x28 (0x00007FFF7E0F7C98 [libj9vm29.so+0x187c98])
[2022-11-26T03:05:23.901Z] omrsig_protect+0x358 (0x00007FFF7DEDE848 [libj9prt29.so+0x3e848])
[2022-11-26T03:05:23.901Z] gpProtectAndRun+0xac (0x00007FFF7E0F7D6C [libj9vm29.so+0x187d6c])
[2022-11-26T03:05:23.901Z] gpCheckCallin+0xc4 (0x00007FFF7DFBC7B4 [libj9vm29.so+0x4c7b4])
[2022-11-26T03:05:23.901Z] callStaticVoidMethod+0x48 (0x00007FFF7DFB92E8 [libj9vm29.so+0x492e8])
[2022-11-26T03:05:23.901Z] JavaMain+0x11c0 (0x00007FFF7E93C240 [libjli.so+0xc240])
[2022-11-26T03:05:23.901Z] ThreadJavaMain+0x18 (0x00007FFF7E942128 [libjli.so+0x12128])
[2022-11-26T03:05:23.901Z] start_thread+0xf8 (0x00007FFF7E979718 [libpthread.so.0+0x9718])
[2022-11-26T03:05:23.901Z] clone+0x74 (0x00007FFF7E81B498 [libc.so.6+0x13b498])
[2022-11-26T03:05:23.901Z] ---------------------------------------
[2022-11-26T03:05:23.901Z] JVMDUMP039I Processing dump event "gpf", detail "" at 2022/11/25 19:05:23 - please wait.
[2022-11-26T03:05:24.738Z]
[2022-11-26T03:05:24.738Z] SecurityTests_0_FAILED
50x grinder - all passed 50x grinder -Djdk.nativeGCM=false - no failure (some infra related issues)
JDK11 0.36.0 milestone 1 build(rhel8le-rt1-3
)
openjdk version "11.0.18" 2023-01-17
IBM Semeru Runtime Open Edition 11.0.18.0-m1 (build 11.0.18+4)
Eclipse OpenJ9 VM 11.0.18.0-m1 (build v0.36.0-release-f98e55973, JRE 11 Linux ppc64le-64-Bit Compressed References 20221130_553 (JIT enabled, AOT enabled)
OpenJ9 - f98e55973
OMR - acdbafc4a
JCL - acdae91f88 based on jdk-11.0.18+4)
[2022-12-01T05:35:56.469Z] variation: NoOptions
[2022-12-01T05:35:56.469Z] JVM_OPTIONS:
[2022-12-01T05:35:59.979Z] Unhandled exception
[2022-12-01T05:35:59.979Z] Type=Illegal instruction vmState=0x00040000
[2022-12-01T05:35:59.979Z] J9Generic_Signal_Number=00000048 Signal_Number=00000004 Error_Value=00000000 Signal_Code=00000001
[2022-12-01T05:35:59.979Z] Handler1=00007FFFACF04960 Handler2=00007FFFACE2D440
[2022-12-01T05:35:59.979Z] R0=00007FFF88657CEC R1=00007FFFAD5EC030 R2=00007FFF88817F00 R3=00000000FFF226D8
[2022-12-01T05:35:59.979Z] R4=00000000FFF21340 R5=00000000000009A0 R6=00007FFFA8173110 R7=00007FFFA8172F48
[2022-12-01T05:35:59.979Z] R8=00007FFFA8172F88 R9=00000000000001B0 R10=0000000000000002 R11=00007FFF88587F60
[2022-12-01T05:35:59.979Z] R12=0000000000004400 R13=00007FFFAD5F68E0 R14=000000000017ABC0 R15=00007FFF888400C8
[2022-12-01T05:35:59.979Z] R16=00000000FFF21CF8 R17=00000000FFF226D8 R18=00000000FFF21340 R19=00000000FFF20868
[2022-12-01T05:35:59.979Z] R20=0000000000000000 R21=00007FFFA8172F88 R22=00007FFFA8173110 R23=0000000100000000
[2022-12-01T05:35:59.979Z] R24=00000000FFF21340 R25=00000000FFF226D8 R26=00000000000009A0 R27=0000000000000000
[2022-12-01T05:35:59.979Z] R28=0000000000000000 R29=0000000000000000 R30=000000000000009A R31=00007FFFA8172F48
[2022-12-01T05:35:59.979Z] NIP=00007FFF88581B0C MSR=800000000288F033 ORIG_GPR3=C0000000000027E0 CTR=00007FFF88587F60
[2022-12-01T05:35:59.979Z] LINK=00007FFF88657CEC XER=0000000020000000 CCR=0000000048242444 SOFTE=0000000000000001
[2022-12-01T05:35:59.979Z] TRAP=0000000000000700 DAR=00007FFFA84D0228 dsisr=0000000042000000 RESULT=0000000000000000
[2022-12-01T05:35:59.979Z] FPR0 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-12-01T05:35:59.979Z] FPR1 4053af9a60000000 (f: 1610612736.000000, d: 7.874380e+01)
[2022-12-01T05:35:59.979Z] FPR2 41e0000000000000 (f: 0.000000, d: 2.147484e+09)
[2022-12-01T05:35:59.979Z] FPR3 3fee666660000000 (f: 1610612736.000000, d: 9.500000e-01)
[2022-12-01T05:35:59.979Z] FPR4 3fce840b4ac4e4d2 (f: 1254417664.000000, d: 2.384047e-01)
[2022-12-01T05:35:59.979Z] FPR5 bfe7154748bef6c8 (f: 1220474624.000000, d: -7.213475e-01)
[2022-12-01T05:35:59.979Z] FPR6 3fe62e42fefa39ef (f: 4277811712.000000, d: 6.931472e-01)
[2022-12-01T05:35:59.979Z] FPR7 bfcb31d8a68224e9 (f: 2793547008.000000, d: -2.124587e-01)
[2022-12-01T05:35:59.979Z] FPR8 744c2dcfd8ac1f15 (f: 3635158784.000000, d: 1.614029e+252)
[2022-12-01T05:35:59.979Z] FPR9 1e67b456a3efa5ff (f: 2750391808.000000, d: 3.293079e-162)
[2022-12-01T05:35:59.979Z] FPR10 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-12-01T05:35:59.979Z] FPR11 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-12-01T05:35:59.979Z] FPR12 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-12-01T05:35:59.979Z] FPR13 0000000000095700 (f: 612096.000000, d: 3.024156e-318)
[2022-12-01T05:35:59.979Z] FPR14 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-12-01T05:35:59.979Z] FPR15 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-12-01T05:35:59.979Z] FPR16 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-12-01T05:35:59.979Z] FPR17 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-12-01T05:35:59.979Z] FPR18 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-12-01T05:35:59.979Z] FPR19 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-12-01T05:35:59.979Z] FPR20 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-12-01T05:35:59.979Z] FPR21 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-12-01T05:35:59.979Z] FPR22 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-12-01T05:35:59.979Z] FPR23 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-12-01T05:35:59.979Z] FPR24 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-12-01T05:35:59.979Z] FPR25 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-12-01T05:35:59.979Z] FPR26 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-12-01T05:35:59.979Z] FPR27 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-12-01T05:35:59.979Z] FPR28 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-12-01T05:35:59.979Z] FPR29 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-12-01T05:35:59.979Z] FPR30 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-12-01T05:35:59.979Z] FPR31 0000000000000000 (f: 0.000000, d: 0.000000e+00)
[2022-12-01T05:35:59.979Z] Module=/lib64/libcrypto.so.3
[2022-12-01T05:35:59.979Z] Module_base_address=00007FFF88310000
[2022-12-01T05:35:59.979Z] Target=2_90_20221130_553 (Linux 4.18.0-425.3.1.el8.ppc64le)
[2022-12-01T05:35:59.980Z] CPU=ppc64le (4 logical CPUs) (0x1dccb0000 RAM)
[2022-12-01T05:35:59.980Z] ----------- Stack Backtrace -----------
[2022-12-01T05:35:59.980Z] (0x00007FFF88581B0C [libcrypto.so.3+0x271b0c])
[2022-12-01T05:35:59.980Z] (0x00007FFF88657CEC [libcrypto.so.3+0x347cec])
[2022-12-01T05:35:59.980Z] (0x00007FFF88658210 [libcrypto.so.3+0x348210])
[2022-12-01T05:35:59.980Z] (0x00007FFF886B3D34 [libcrypto.so.3+0x3a3d34])
[2022-12-01T05:35:59.980Z] (0x00007FFF886B4DF4 [libcrypto.so.3+0x3a4df4])
[2022-12-01T05:35:59.980Z] EVP_DecryptUpdate+0xd4 (0x00007FFF8852B9F4 [libcrypto.so.3+0x21b9f4])
[2022-12-01T05:35:59.980Z] Java_jdk_crypto_jniprovider_NativeCrypto_GCMDecrypt+0x410 (0x00007FFF888259E0 [libjncrypto.so+0x59e0])
[2022-12-01T05:35:59.980Z] (0x00007FFFAD0CCDA8 [libj9vm29.so+0x20cda8])
[2022-12-01T05:35:59.980Z] ffi_call_int+0xd4 (0x00007FFFAD0CCA74 [libj9vm29.so+0x20ca74])
[2022-12-01T05:35:59.980Z] bytecodeLoopCompressed+0x129b8 (0x00007FFFACF89808 [libj9vm29.so+0xc9808])
[2022-12-01T05:35:59.980Z] (0x00007FFFAD037750 [libj9vm29.so+0x177750])
[2022-12-01T05:35:59.980Z] sidecarInvokeReflectMethodImpl+0x3c0 (0x00007FFFACEDE640 [libj9vm29.so+0x1e640])
[2022-12-01T05:35:59.980Z] sidecarInvokeReflectMethod+0x38 (0x00007FFFACEDFAD8 [libj9vm29.so+0x1fad8])
[2022-12-01T05:35:59.980Z] JVM_InvokeMethod_Impl+0xb4 (0x00007FFFAC141A84 [libjclse29.so+0x81a84])
[2022-12-01T05:35:59.980Z] JVM_InvokeMethod+0x40 (0x00007FFFAD524350 [libjvm.so+0x24350])
[2022-12-01T05:35:59.980Z] JVM_InvokeMethod+0x34 (0x00007FFFAD5F6C04 [libjvm.so+0x6c04])
[2022-12-01T05:35:59.980Z] Java_jdk_internal_reflect_NativeMethodAccessorImpl_invoke0+0x24 (0x00007FFF8A16D174 [libjava.so+0xd174])
[2022-12-01T05:35:59.980Z] (0x00007FFF8BFE3E24 [<unknown>+0x0])
[2022-12-01T05:35:59.980Z] runCallInMethod+0x270 (0x00007FFFACEDDF30 [libj9vm29.so+0x1df30])
[2022-12-01T05:35:59.980Z] gpProtectedRunCallInMethod+0x50 (0x00007FFFACF09CE0 [libj9vm29.so+0x49ce0])
[2022-12-01T05:35:59.980Z] signalProtectAndRunGlue+0x28 (0x00007FFFAD047C98 [libj9vm29.so+0x187c98])
[2022-12-01T05:35:59.980Z] omrsig_protect+0x358 (0x00007FFFACE2E848 [libj9prt29.so+0x3e848])
[2022-12-01T05:35:59.980Z] gpProtectAndRun+0xac (0x00007FFFAD047D6C [libj9vm29.so+0x187d6c])
[2022-12-01T05:35:59.980Z] gpCheckCallin+0xc4 (0x00007FFFACF0C7B4 [libj9vm29.so+0x4c7b4])
[2022-12-01T05:35:59.980Z] callStaticVoidMethod+0x48 (0x00007FFFACF092E8 [libj9vm29.so+0x492e8])
[2022-12-01T05:35:59.980Z] JavaMain+0x11c0 (0x00007FFFAD88C240 [libjli.so+0xc240])
[2022-12-01T05:35:59.980Z] ThreadJavaMain+0x18 (0x00007FFFAD892128 [libjli.so+0x12128])
[2022-12-01T05:35:59.980Z] start_thread+0xf8 (0x00007FFFAD8C9718 [libpthread.so.0+0x9718])
[2022-12-01T05:35:59.980Z] clone+0x74 (0x00007FFFAD76B498 [libc.so.6+0x13b498])
[2022-12-01T05:35:59.980Z] ---------------------------------------
[2022-12-01T05:35:59.980Z] JVMDUMP039I Processing dump event "gpf", detail "" at 2022/11/30 21:35:59 - please wait.
[2022-12-01T05:36:00.827Z] SecurityTests_0_FAILED
500x grinder - one infra failure, other passed
The jenkins agent is crashing in libcrypto.so.3 (OpenSSL 3) on plinux rhel 8 trying to run Semeru testing. Details below are from rhel8le-rt1-4, but it occurs often on multiple machines. Signal 4 is SIGILL, illegal instruction.
Copied diags16371.zip with core, javacore, etc. to team/pshipton
openssl atm is 3.0.1-43.el8.1 (latest version) on rhel8le-rt1-4.
1CIJAVAVERSION JRE 17 Linux ppc64le-64 (build 17.0.5+8)
1CIVMVERSION 20221018_307
1CIJ9VMTAG openj9-0.35.0
1CIJ9VMVERSION e04a7f6c1
1CIJITVERSION j9jit_20221031_1741_jenkins
1CIOMRVERSION 85a21674f_CMPRSS
1CIJCLVERSION 32d2c409a33 based on jdk-17.0.5+8
1TISIGINFO Dump Event "gpf" (00002000) received
0SECTION GPINFO subcomponent dump routine
NULL ================================
2XHOSLEVEL OS Level : Linux 4.18.0-425.10.1.el8_7.ppc64le
2XHCPUS Processors -
3XHCPUARCH Architecture : ppc64le
3XHNUMCPUS How Many : 4
3XHNUMASUP NUMA is either not supported or has been disabled by user
NULL
1XHEXCPCODE J9Generic_Signal_Number: 00000048
1XHEXCPCODE Signal_Number: 00000004
1XHEXCPCODE Error_Value: 00000000
1XHEXCPCODE Signal_Code: 00000001
1XHEXCPCODE Handler1: 00007FFFB8FCF270
1XHEXCPCODE Handler2: 00007FFFB8EF87E0
NULL
1XHEXCPMODULE Module: /lib64/libcrypto.so.3
1XHEXCPMODULE Module_base_address: 00007FFF944D0000
NULL
1XHREGISTERS Registers:
2XHREGISTER R0: 00007FFF94817CEC
2XHREGISTER R1: 00007FFF9431AB10
2XHREGISTER R2: 00007FFF949D7F00
2XHREGISTER R3: 00000000FFCC4688
2XHREGISTER R4: 00000000FFCC2290
2XHREGISTER R5: 00000000000010F0
2XHREGISTER R6: 00007FFF3C2428E0
2XHREGISTER R7: 00007FFF3C242718
2XHREGISTER R8: 00007FFF3C242758
2XHREGISTER R9: 00000000000001B0
2XHREGISTER R10: 0000000000000002
2XHREGISTER R11: 00007FFF94747F60
2XHREGISTER R12: 0000000000004400
2XHREGISTER R13: 00007FFF943268E0
2XHREGISTER R14: 00007FFF9498A7B8
2XHREGISTER R15: 0000000000000005
2XHREGISTER R16: 0000000000000010
2XHREGISTER R17: 000000000000000C
2XHREGISTER R18: 0000000000000000
2XHREGISTER R19: 00000000FFCC3548
2XHREGISTER R20: 0000000000001101
2XHREGISTER R21: 00007FFF3C242758
2XHREGISTER R22: 00007FFF3C2428E0
2XHREGISTER R23: 0000000100000000
2XHREGISTER R24: 00000000FFCC2290
2XHREGISTER R25: 00000000FFCC4688
2XHREGISTER R26: 00000000000010F0
2XHREGISTER R27: 0000000000000000
2XHREGISTER R28: 0000000000000000
2XHREGISTER R29: 0000000000000000
2XHREGISTER R30: 000000000000010F
2XHREGISTER R31: 00007FFF3C242718
2XHREGISTER FPR0: 000000000000000E
2XHREGISTER FPR1: 40518CBD40000000
2XHREGISTER FPR2: 3FF009E8AB742AEB
2XHREGISTER FPR3: 3FEE666660000000
2XHREGISTER FPR4: 3FCE840B4AC4E4D2
2XHREGISTER FPR5: BFE7154748BEF6C8
2XHREGISTER FPR6: 3FE62E42FEFA39EF
2XHREGISTER FPR7: 3FD4043057B6EE09
2XHREGISTER FPR8: 3A206062E0000000
2XHREGISTER FPR9: BFD00EA348B88334
2XHREGISTER FPR10: 0000000000000000
2XHREGISTER FPR11: 0000000000000000
2XHREGISTER FPR12: 0000000000000000
2XHREGISTER FPR13: 4031400000000000
2XHREGISTER FPR14: 0000000000000000
2XHREGISTER FPR15: 0000000000000000
2XHREGISTER FPR16: 0000000000000000
2XHREGISTER FPR17: 0000000000000000
2XHREGISTER FPR18: 0000000000000000
2XHREGISTER FPR19: 0000000000000000
2XHREGISTER FPR20: 0000000000000000
2XHREGISTER FPR21: 0000000000000000
2XHREGISTER FPR22: 0000000000000000
2XHREGISTER FPR23: 0000000000000000
2XHREGISTER FPR24: 0000000000000000
2XHREGISTER FPR25: 0000000000000000
2XHREGISTER FPR26: 0000000000000000
2XHREGISTER FPR27: 0000000000000000
2XHREGISTER FPR28: 0000000000000000
2XHREGISTER FPR29: 0000000000000000
2XHREGISTER FPR30: 0000000000000000
2XHREGISTER FPR31: 0000000000000000
2XHREGISTER NIP: 00007FFF94741B0C
2XHREGISTER MSR: 800000000288F033
2XHREGISTER ORIG_GPR3: C0000000000087D0
2XHREGISTER CTR: 00007FFF94747F60
2XHREGISTER LINK: 00007FFF94817CEC
2XHREGISTER XER: 0000000020000000
2XHREGISTER CCR: 0000000048242444
2XHREGISTER SOFTE: 0000000000000001
2XHREGISTER TRAP: 0000000000000700
2XHREGISTER DAR: 0000000000CA7C20
2XHREGISTER dsisr: 0000000042000000
2XHREGISTER RESULT: 0000000000000000
NULL
1XHFLAGS VM flags:0000000000040000
1XMCURTHDINFO Current thread
3XMTHREADINFO "consumer_0" J9VMThread:0x00000000004E0400, omrthread_t:0x00007FFF2013C878, java/lang/Thread:0x0000000089AF6708, state:R, prio=5
3XMJAVALTHREAD (java/lang/Thread getId:0x14E, isDaemon:false)
3XMJAVALTHRCCL hudson/remoting/RemoteClassLoader(0x00000000898FA640)
3XMTHREADINFO1 (native thread ID:0x27EE39, native priority:0x5, native policy:UNKNOWN, vmstate:R, vm thread flags:0x40400020)
3XMTHREADINFO2 (native stack address range from:0x00007FFF942A0000, to:0x00007FFF94320000, size:0x80000)
3XMCPUTIME CPU usage total: 1.606200068 secs, current category="Application"
3XMHEAPALLOC Heap bytes allocated since last GC cycle=3430280 (0x345788)
3XMTHREADINFO3 Java callstack:
4XESTACKTRACE at jdk/crypto/jniprovider/NativeCrypto.GCMDecrypt(Native Method)
4XESTACKTRACE at com/sun/crypto/provider/NativeGaloisCounterMode$GCMDecrypt.doFinal(NativeGaloisCounterMode.java:963)
5XESTACKTRACE (entered lock: com/sun/crypto/provider/NativeGaloisCounterMode$GCMDecrypt@0x00000000FFCC3498, entry count: 1)
4XESTACKTRACE at com/sun/crypto/provider/NativeGaloisCounterMode$GCMDecrypt.doFinal(NativeGaloisCounterMode.java:1001)
4XESTACKTRACE at com/sun/crypto/provider/NativeGaloisCounterMode.engineDoFinal(NativeGaloisCounterMode.java:454)
4XESTACKTRACE at javax/crypto/Cipher.doFinal(Cipher.java:2500)
4XESTACKTRACE at sun/security/ssl/SSLCipher$T13GcmReadCipherGenerator$GcmReadCipher.decrypt(SSLCipher.java:1933)
4XESTACKTRACE at sun/security/ssl/SSLSocketInputRecord.decodeInputRecord(SSLSocketInputRecord.java:260)
4XESTACKTRACE at sun/security/ssl/SSLSocketInputRecord.decode(SSLSocketInputRecord.java:181)
4XESTACKTRACE at sun/security/ssl/SSLTransport.decode(SSLTransport.java:111)
4XESTACKTRACE at sun/security/ssl/SSLSocketImpl.decode(SSLSocketImpl.java:1505)
4XESTACKTRACE at sun/security/ssl/SSLSocketImpl.readHandshakeRecord(SSLSocketImpl.java:1420)
4XESTACKTRACE at sun/security/ssl/SSLSocketImpl.startHandshake(SSLSocketImpl.java:455)
4XESTACKTRACE at sun/security/ssl/SSLSocketImpl.startHandshake(SSLSocketImpl.java:426)
4XESTACKTRACE at org/apache/http/conn/ssl/SSLConnectionSocketFactory.createLayeredSocket(SSLConnectionSocketFactory.java:436)
4XESTACKTRACE at org/apache/http/conn/ssl/SSLConnectionSocketFactory.connectSocket(SSLConnectionSocketFactory.java:384)
4XESTACKTRACE at org/apache/http/impl/conn/DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:142)
4XESTACKTRACE at org/apache/http/impl/conn/PoolingHttpClientConnectionManager.connect(PoolingHttpClientConnectionManager.java:376)
4XESTACKTRACE at org/apache/http/impl/execchain/MainClientExec.establishRoute(MainClientExec.java:393)
4XESTACKTRACE at org/apache/http/impl/execchain/MainClientExec.execute(MainClientExec.java:236)
4XESTACKTRACE at org/apache/http/impl/execchain/ProtocolExec.execute(ProtocolExec.java:186)
4XESTACKTRACE at org/apache/http/impl/execchain/RetryExec.execute(RetryExec.java:89)
4XESTACKTRACE at org/apache/http/impl/execchain/ServiceUnavailableRetryExec.execute(ServiceUnavailableRetryExec.java:85)
4XESTACKTRACE at org/apache/http/impl/execchain/RedirectExec.execute(RedirectExec.java:110)
4XESTACKTRACE at org/apache/http/impl/client/InternalHttpClient.doExecute(InternalHttpClient.java:185)
4XESTACKTRACE at org/apache/http/impl/client/CloseableHttpClient.execute(CloseableHttpClient.java:83)
4XESTACKTRACE at org/jfrog/build/client/PreemptiveHttpClient.execute(PreemptiveHttpClient.java:72)
4XESTACKTRACE at org/jfrog/build/client/JFrogHttpClient.sendRequest(JFrogHttpClient.java:133)
4XESTACKTRACE at org/jfrog/build/extractor/clientConfiguration/client/JFrogService.execute(JFrogService.java:112)
4XESTACKTRACE at org/jfrog/build/extractor/clientConfiguration/client/artifactory/services/Upload$TryChecksumUpload.ensureRequirements(Upload.java:122)
4XESTACKTRACE at org/jfrog/build/extractor/clientConfiguration/client/JFrogService.execute(JFrogService.java:111)
4XESTACKTRACE at org/jfrog/build/extractor/clientConfiguration/client/artifactory/services/Upload.tryChecksumUpload(Upload.java:83)
4XESTACKTRACE at org/jfrog/build/extractor/clientConfiguration/client/artifactory/services/Upload.execute(Upload.java:72)
4XESTACKTRACE at org/jfrog/build/extractor/clientConfiguration/client/artifactory/ArtifactoryManager.upload(ArtifactoryManager.java:262)
4XESTACKTRACE at org/jfrog/build/extractor/clientConfiguration/client/artifactory/ArtifactoryManager.upload(ArtifactoryManager.java:257)
4XESTACKTRACE at org/jfrog/build/extractor/clientConfiguration/util/spec/SpecDeploymentConsumer.consumerRun(SpecDeploymentConsumer.java:39)
4XESTACKTRACE at org/jfrog/build/extractor/producerConsumer/ConsumerRunnableBase.run(ConsumerRunnableBase.java:11)
4XESTACKTRACE at java/lang/Thread.run(Thread.java:857)
3XMTHREADINFO3 Native callstack:
4XENATIVESTACK protectedBacktrace+0x24 (0x00007FFFB8EF2C74 [libj9prt29.so+0x32c74])
4XENATIVESTACK omrsig_protect+0x3f4 (0x00007FFFB8EF9CB4 [libj9prt29.so+0x39cb4])
4XENATIVESTACK omrintrospect_backtrace_thread_raw+0xe0 (0x00007FFFB8EF3290 [libj9prt29.so+0x33290])
4XENATIVESTACK protectedIntrospectBacktraceThread+0x24 (0x00007FFFB8EF28B4 [libj9prt29.so+0x328b4])
4XENATIVESTACK omrsig_protect+0x3f4 (0x00007FFFB8EF9CB4 [libj9prt29.so+0x39cb4])
4XENATIVESTACK omrintrospect_backtrace_thread+0x94 (0x00007FFFB8EF29C4 [libj9prt29.so+0x329c4])
4XENATIVESTACK setup_native_thread+0x234 (0x00007FFFB8EF47F4 [libj9prt29.so+0x347f4])
4XENATIVESTACK omrintrospect_threads_startDo_with_signal+0x484 (0x00007FFFB8EF5704 [libj9prt29.so+0x35704])
4XENATIVESTACK protectedStartDoWithSignal+0x30 (0x00007FFFB88D8CC0 [libj9dmp29.so+0x18cc0])
4XENATIVESTACK omrsig_protect+0x3f4 (0x00007FFFB8EF9CB4 [libj9prt29.so+0x39cb4])
4XENATIVESTACK _ZN18JavaCoreDumpWriter28writeThreadsWithNativeStacksEv+0x3a8 (0x00007FFFB88E3D48 [libj9dmp29.so+0x23d48])
4XENATIVESTACK protectedWriteThreadsWithNativeStacks+0x1c (0x00007FFFB88E455C [libj9dmp29.so+0x2455c])
4XENATIVESTACK omrsig_protect+0x3f4 (0x00007FFFB8EF9CB4 [libj9prt29.so+0x39cb4])
4XENATIVESTACK _ZN18JavaCoreDumpWriter18writeThreadSectionEv+0x1a4 (0x00007FFFB88DFAA4 [libj9dmp29.so+0x1faa4])
4XENATIVESTACK protectedWriteSection+0x48 (0x00007FFFB88D8C68 [libj9dmp29.so+0x18c68])
4XENATIVESTACK omrsig_protect+0x3f4 (0x00007FFFB8EF9CB4 [libj9prt29.so+0x39cb4])
4XENATIVESTACK _ZN18JavaCoreDumpWriterC2EPKcP16J9RASdumpContextP14J9RASdumpAgent+0x440 (0x00007FFFB88DA9E0 [libj9dmp29.so+0x1a9e0])
4XENATIVESTACK runJavadump+0x34 (0x00007FFFB88E7EF4 [libj9dmp29.so+0x27ef4])
4XENATIVESTACK doJavaDump+0x6c (0x00007FFFB88C5D5C [libj9dmp29.so+0x5d5c])
4XENATIVESTACK protectedDumpFunction+0x30 (0x00007FFFB88C4ED0 [libj9dmp29.so+0x4ed0])
4XENATIVESTACK omrsig_protect+0x3f4 (0x00007FFFB8EF9CB4 [libj9prt29.so+0x39cb4])
4XENATIVESTACK runDumpFunction+0x6c (0x00007FFFB88CA63C [libj9dmp29.so+0xa63c])
4XENATIVESTACK runDumpAgent+0x198 (0x00007FFFB88CA838 [libj9dmp29.so+0xa838])
4XENATIVESTACK 0x00007FFFB88EB7E0
4XENATIVESTACK 0x00007FFFB8FCF238
4XENATIVESTACK 0x00007FFFB8EF9CB4
4XENATIVESTACK 0x00007FFFB8FCF408
4XENATIVESTACK 0x00007FFFB8EF8A74
4XENATIVESTACK 0x00007FFFB9A604D8
4XENATIVESTACK (0x00007FFF94741B0C [libcrypto.so.3+0x271b0c])
4XENATIVESTACK 0x00007FFF94817CEC
4XENATIVESTACK 0x00007FFF94818210
4XENATIVESTACK 0x00007FFF94873D34
4XENATIVESTACK 0x00007FFF94874DF4
4XENATIVESTACK 0x00007FFF946EB9F4
4XENATIVESTACK 0x00007FFF949F52DC
4XENATIVESTACK 0x00007FFFB9181AF8
4XENATIVESTACK 0x00007FFFB91817C4
4XENATIVESTACK 0x00007FFFB905151C
4XENATIVESTACK 0x00007FFFB90F1C98
4XENATIVESTACK 0x00007FFFB8FA68F0
4XENATIVESTACK 0x00007FFFB903E3A8
4XENATIVESTACK 0x00007FFFB8EF9CB4
4XENATIVESTACK 0x00007FFFB9039CC0
4XENATIVESTACK 0x00007FFFB8E8CBC0
4XENATIVESTACK 0x00007FFFB9989718
4XENATIVESTACK 0x00007FFFB986B498
I added additional debugging information to a custom Java 11 ppcle
build that is based upon the latest Java 11 code. I then attempted to recreate this issue in two ways:
SecurityTests_0
against my build. I ran Grinder with 500 iterations without failure. This job and its debug output can be seen here https://hyc-runtimes-jenkins.swg-devops.com/job/Grinder/30976/For number 2 above, I ran my test on a ppcle
environment as follows:
I built openssl 3.0.1 which reports the following:
# openssl version
OpenSSL 3.0.1 14 Dec 2021 (Library: OpenSSL 3.0.1 14 Dec 2021)
# uname -a
Linux katonicabuildjdk11j9c1.fyre.ibm.com 4.18.0-372.32.1.el8_6.ppc64le #1 SMP Fri Oct 7 11:37:39 EDT 2022 ppc64le ppc64le ppc64le GNU/Linux
# cat /etc/os-release
NAME="Red Hat Enterprise Linux"
VERSION="8.6 (Ootpa)"
ID="rhel"
ID_LIKE="fedora"
VERSION_ID="8.6"
PLATFORM_ID="platform:el8"
PRETTY_NAME="Red Hat Enterprise Linux 8.6 (Ootpa)"
ANSI_COLOR="0;31"
CPE_NAME="cpe:/o:redhat:enterprise_linux:8::baseos"
HOME_URL="https://www.redhat.com/"
DOCUMENTATION_URL="https://access.redhat.com/documentation/red_hat_enterprise_linux/8/"
BUG_REPORT_URL="https://bugzilla.redhat.com/"
REDHAT_BUGZILLA_PRODUCT="Red Hat Enterprise Linux 8"
REDHAT_BUGZILLA_PRODUCT_VERSION=8.6
REDHAT_SUPPORT_PRODUCT="Red Hat Enterprise Linux"
REDHAT_SUPPORT_PRODUCT_VERSION="8.6"
I am unsure why I cant recreate this in grinder at the moment as originally reported.
Perhaps this could have something to do with the rhel8le-rt1-5
OS vs the vanilla RHEL 8.6
. I am unsure what Grinder is running on for my test job run above. My local system does not have the real time kernel installed so perhaps this is a factor here??
We couldn't recreate the test suite failure either, but there didn't seem to be a problem recreating the problem using the last release (0.35) JVM as the jenkins agent, as per https://github.com/eclipse-openj9/openj9/issues/16371#issuecomment-1409235060. Assuming it can be recreated, what is the next step? We are currently running the jenkins agent using -Djdk.nativeGCM=false
but that can be removed to recreate the crash.
I am unsure what Grinder is running on for my test job run above.
The grinder shows rhel7lert-11, it's near the top of the grinder page.
Hello, If this can be recreated through the Jenkins agent could we run the Jenkins agent with -Djdk.nativeGCM=false
removed and the agent running with my debug Java 11 SDK from the following location?
If we do observe a crash with this SDK, I should be able to see all the debug values sent to stdout for the GCM operation. Once I have those I could attempt to recreate this outside of the Jenkins agent.
In the meantime I will also try to install the real time kernel from RH described here to see if that makes any difference on my system:
@AdamBrousseau can we make the previous comment happen?
@jasonkatonica In the meantime, try updating your test machine to 8.7, which is where the jenkins crash occurred. That may get you to the same kernel level Linux 4.18.0-425.10.1.el8_7.ppc64le where we saw the crash.
The grinder shows rhel7lert-11, it's near the top of the grinder page.
OK thank you I see it now.
@jasonkatonica In the meantime, try updating your test machine to 8.7, which is where the jenkins crash occurred. That may get you to the same kernel level Linux 4.18.0-425.10.1.el8_7.ppc64le where we saw the crash.
Sure ill give this a try and see what happens.
We couldn't recreate the test suite failure either, but there didn't seem to be a problem recreating the problem using the last release (0.35) JVM
Just launched a 100x grinder against 0.35 release.
@JasonFengJ9 pls direct the grinder to sw.os.rhel.8
50x grinder at sw.os.rhel.8 w/ JDK11 0.35 release reproduced Illegal instruction vmState=0x00040000
16:19:44 openjdk version "11.0.17" 2022-10-18
16:19:44 IBM Semeru Runtime Open Edition 11.0.17.0 (build 11.0.17+8)
16:19:44 Eclipse OpenJ9 VM 11.0.17.0 (build openj9-0.35.0, JRE 11 Linux ppc64le-64-Bit Compressed References 20221031_530 (JIT enabled, AOT enabled)
16:19:44 OpenJ9 - e04a7f6c1
16:19:44 OMR - 85a21674f
16:19:44 JCL - a94c231303 based on jdk-11.0.17+8)
variation: NoOptions
JVM_OPTIONS:
Unhandled exception
Type=Illegal instruction vmState=0x00040000
J9Generic_Signal_Number=00000048 Signal_Number=00000004 Error_Value=00000000 Signal_Code=00000001
Handler1=00007FFF912848F0 Handler2=00007FFF911AD180
R0=00007FFF13C27CEC R1=00007FFF9196C030 R2=00007FFF13DE7F00 R3=00000000FFFDFE58
R4=00000000FFFDE880 R5=0000000000000AC0 R6=00007FFF8C171370 R7=00007FFF8C1711A8
R8=00007FFF8C1711E8 R9=00000000000001B0 R10=0000000000000002 R11=00007FFF13B57F60
R12=0000000000004400 R13=00007FFF919768E0 R14=000000000017AB60 R15=00007FFF680500C0
R16=00000000FFFDF358 R17=00000000FFFDFE58 R18=00000000FFFDE880 R19=00000000FFFDDC88
R20=0000000000000000 R21=00007FFF8C1711E8 R22=00007FFF8C171370 R23=0000000100000000
R24=00000000FFFDE880 R25=00000000FFFDFE58 R26=0000000000000AC0 R27=0000000000000000
R28=0000000000000000 R29=0000000000000000 R30=00000000000000AC R31=00007FFF8C1711A8
NIP=00007FFF13B51B0C MSR=800000000288F033 ORIG_GPR3=C0000000000027E0 CTR=00007FFF13B57F60
LINK=00007FFF13C27CEC XER=0000000020000000 CCR=0000000048242444 SOFTE=0000000000000001
TRAP=0000000000000700 DAR=00007FFF8C4D00A8 dsisr=0000000042000000 RESULT=0000000000000000
FPR0 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR1 4053a15e00000000 (f: 0.000000, d: 7.852136e+01)
FPR2 41e0000000000000 (f: 0.000000, d: 2.147484e+09)
FPR3 3fee666660000000 (f: 1610612736.000000, d: 9.500000e-01)
FPR4 3fce840b4ac4e4d2 (f: 1254417664.000000, d: 2.384047e-01)
FPR5 bfe7154748bef6c8 (f: 1220474624.000000, d: -7.213475e-01)
FPR6 3fe62e42fefa39ef (f: 4277811712.000000, d: 6.931472e-01)
FPR7 bfd01eae7f513a67 (f: 2136029824.000000, d: -2.518727e-01)
FPR8 e995cdd0e3441bbd (f: 3812891648.000000, d: -4.172465e+200)
FPR9 00905441e85fbf9e (f: 3898589184.000000, d: 5.813363e-306)
FPR10 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR11 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR12 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR13 0000000000095700 (f: 612096.000000, d: 3.024156e-318)
FPR14 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR15 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR16 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR17 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR18 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR19 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR20 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR21 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR22 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR23 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR24 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR25 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR26 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR27 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR28 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR29 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR30 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR31 0000000000000000 (f: 0.000000, d: 0.000000e+00)
Module=/lib64/libcrypto.so.3
Module_base_address=00007FFF138E0000
Target=2_90_20221031_530 (Linux 4.18.0-425.10.1.el8_7.ppc64le)
CPU=ppc64le (4 logical CPUs) (0x1dccb0000 RAM)
----------- Stack Backtrace -----------
(0x00007FFF13B51B0C [libcrypto.so.3+0x271b0c])
(0x00007FFF13C27CEC [libcrypto.so.3+0x347cec])
(0x00007FFF13C28210 [libcrypto.so.3+0x348210])
(0x00007FFF13C83D34 [libcrypto.so.3+0x3a3d34])
(0x00007FFF13C84DF4 [libcrypto.so.3+0x3a4df4])
EVP_DecryptUpdate+0xd4 (0x00007FFF13AFB9F4 [libcrypto.so.3+0x21b9f4])
Java_jdk_crypto_jniprovider_NativeCrypto_GCMDecrypt+0x410 (0x00007FFF68035970 [libjncrypto.so+0x5970])
(0x00007FFF9144C868 [libj9vm29.so+0x20c868])
ffi_call_int+0xd4 (0x00007FFF9144C534 [libj9vm29.so+0x20c534])
bytecodeLoopCompressed+0x129b8 (0x00007FFF913093C8 [libj9vm29.so+0xc93c8])
(0x00007FFF913B7310 [libj9vm29.so+0x177310])
sidecarInvokeReflectMethodImpl+0x3c0 (0x00007FFF9125E5E0 [libj9vm29.so+0x1e5e0])
sidecarInvokeReflectMethod+0x38 (0x00007FFF9125FA78 [libj9vm29.so+0x1fa78])
JVM_InvokeMethod_Impl+0xb4 (0x00007FFF904D1664 [libjclse29.so+0x81664])
JVM_InvokeMethod+0x40 (0x00007FFF918A42F0 [libjvm.so+0x242f0])
JVM_InvokeMethod+0x34 (0x00007FFF91976C04 [libjvm.so+0x6c04])
Java_jdk_internal_reflect_NativeMethodAccessorImpl_invoke0+0x24 (0x00007FFF6A52CFD4 [libjava.so+0xcfd4])
(0x00007FFF703D3F24 [<unknown>+0x0])
runCallInMethod+0x270 (0x00007FFF9125DED0 [libj9vm29.so+0x1ded0])
gpProtectedRunCallInMethod+0x50 (0x00007FFF91289C60 [libj9vm29.so+0x49c60])
signalProtectAndRunGlue+0x28 (0x00007FFF913C7758 [libj9vm29.so+0x187758])
omrsig_protect+0x358 (0x00007FFF911AE588 [libj9prt29.so+0x3e588])
gpProtectAndRun+0xac (0x00007FFF913C782C [libj9vm29.so+0x18782c])
gpCheckCallin+0xc4 (0x00007FFF9128C734 [libj9vm29.so+0x4c734])
callStaticVoidMethod+0x48 (0x00007FFF91289268 [libj9vm29.so+0x49268])
JavaMain+0x11c0 (0x00007FFF91C0C240 [libjli.so+0xc240])
ThreadJavaMain+0x18 (0x00007FFF91C12128 [libjli.so+0x12128])
start_thread+0xf8 (0x00007FFF91C49718 [libpthread.so.0+0x9718])
clone+0x74 (0x00007FFF91AEB498 [libc.so.6+0x13b498])
---------------------------------------
JVMDUMP039I Processing dump event "gpf", detail "" at 2023/02/10 13:23:51 - please wait.
JVMDUMP032I JVM requested System dump using '/home/jenkins/workspace/Grinder_iteration_4/aqa-tests/TKG/output_1676064226331/SecurityTests_0/core.20230210.132351.148681.0001.dmp' in response to an event
JVMDUMP010I System dump written to /home/jenkins/workspace/Grinder_iteration_4/aqa-tests/TKG/output_1676064226331/SecurityTests_0/core.20230210.132351.148681.0001.dmp
JVMDUMP032I JVM requested Java dump using '/home/jenkins/workspace/Grinder_iteration_4/aqa-tests/TKG/output_1676064226331/SecurityTests_0/javacore.20230210.132351.148681.0002.txt' in response to an event
JVMDUMP010I Java dump written to /home/jenkins/workspace/Grinder_iteration_4/aqa-tests/TKG/output_1676064226331/SecurityTests_0/javacore.20230210.132351.148681.0002.txt
JVMDUMP032I JVM requested Snap dump using '/home/jenkins/workspace/Grinder_iteration_4/aqa-tests/TKG/output_1676064226331/SecurityTests_0/Snap.20230210.132351.148681.0003.trc' in response to an event
JVMDUMP010I Snap dump written to /home/jenkins/workspace/Grinder_iteration_4/aqa-tests/TKG/output_1676064226331/SecurityTests_0/Snap.20230210.132351.148681.0003.trc
JVMDUMP032I JVM requested JIT dump using '/home/jenkins/workspace/Grinder_iteration_4/aqa-tests/TKG/output_1676064226331/SecurityTests_0/jitdump.20230210.132351.148681.0004.dmp' in response to an event
JVMDUMP051I JIT dump occurred in 'main' thread 0x0000000000095700
JVMDUMP010I JIT dump written to /home/jenkins/workspace/Grinder_iteration_4/aqa-tests/TKG/output_1676064226331/SecurityTests_0/jitdump.20230210.132351.148681.0004.dmp
JVMDUMP013I Processed dump event "gpf", detail "".
-----------------------------------
SecurityTests_0_FAILED
FYI @jasonkatonica
FYI there are a couple of optimizations you can use in a grinder now. Set TKG_ITERATIONS instead of ITERATIONS, and it should run a bit faster. You can also set EXIT_FAILURE in order to stop after the first failure if that is all you need, rather than running them all.
It seems like this fails every time when running Grinder against the label ci.role.test&&hw.arch.ppc64le&&sw.os.rhel.8&&rhel8le-rt1-2.fyre.ibm.com
, this always runs the job on the rhel8le-rt1-2.fyre.ibm.com
machine so there must be something specific going on with that env.
I attempted to run the test on that machine with my own debug SDK with: https://hyc-runtimes-jenkins.swg-devops.com/job/Grinder/30997/
This ended up failing as reported above but did not give me any debug messages which should be sent to stdout as I had hoped.
I also managed to update my RHEL system to the same level as above which is kernel 4.18.0-425.10.1.el8_7.ppc64le
and version 8.7
, yet I did not encounter any problems with my stand alone test so far:
# cat /etc/os-release
NAME="Red Hat Enterprise Linux"
VERSION="8.7 (Ootpa)"
ID="rhel"
ID_LIKE="fedora"
VERSION_ID="8.7"
PLATFORM_ID="platform:el8"
PRETTY_NAME="Red Hat Enterprise Linux 8.7 (Ootpa)"
ANSI_COLOR="0;31"
CPE_NAME="cpe:/o:redhat:enterprise_linux:8::baseos"
HOME_URL="https://www.redhat.com/"
DOCUMENTATION_URL="https://access.redhat.com/documentation/red_hat_enterprise_linux/8/"
BUG_REPORT_URL="https://bugzilla.redhat.com/"
REDHAT_BUGZILLA_PRODUCT="Red Hat Enterprise Linux 8"
REDHAT_BUGZILLA_PRODUCT_VERSION=8.7
REDHAT_SUPPORT_PRODUCT="Red Hat Enterprise Linux"
REDHAT_SUPPORT_PRODUCT_VERSION="8.7"
# uname -a
Linux katonicabuildjdk11j9d1.fyre.ibm.com 4.18.0-425.10.1.el8_7.ppc64le #1 SMP Wed Dec 14 15:45:58 EST 2022 ppc64le ppc64le ppc64le GNU/Linux
I am still trying to figure out how to update the system to the real time kernel to see if that makes a difference.
Does the stand alone test fail on rhel8le-rt1-2.fyre.ibm.com? You can reserve the machine and try it. You can also try running the test that does fail on your machine.
Does rhel8le-rt1-2.fyre.ibm.com use a real time kernel? You just mentioned you already have the same kernel version.
Hi @pshipton do you happen to have a link to the process to sign out rhel8le-rt1-2.fyre.ibm.com
? I can certainly give my stand alone test a try on the system once I am able to login.
My personal system has this kernel:
# uname -r
4.18.0-425.10.1.el8_7.ppc64le
Which indeed does match the value that is in my failing jobs when I run on rhel8le-rt1-2.fyre.ibm.com
.
Given that this value matches what is failing in the Jenkins job, the real time kernel perhaps is not configured there, since Id expect a rt
value in the kernel name.
See this internal link
@pshipton Thanks for the link this allowed me to reserve that system and run a simple test case.
My simple test case which exercises AES/GCM cipher also crashes similar to the Jenkins job the first call to AES/GCM services in openssl. I used the default version of Java for the jenkins user which is:
[jenkins@rhel8le-rt1-2] java -version
openjdk version "17.0.5" 2022-10-18
IBM Semeru Runtime Open Edition 17.0.5.0 (build 17.0.5+8)
Eclipse OpenJ9 VM 17.0.5.0 (build openj9-0.35.0, JRE 17 Linux ppc64le-64-Bit Compressed References 20221018_307 (JIT enabled, AOT enabled)
OpenJ9 - e04a7f6c1
OMR - 85a21674f
JCL - 32d2c409a33 based on jdk-17.0.5+8)
My test code: AESGCMCrank.zip
The results:
[jenkins@rhel8le-rt1-2] java AESGCMCrank
Iteration: 0 with length: 4332
Unhandled exception
Type=Illegal instruction vmState=0x00040000
J9Generic_Signal_Number=00000048 Signal_Number=00000004 Error_Value=00000000 Signal_Code=00000001
Handler1=00007FFF989AF270 Handler2=00007FFF988D87E0
R0=00007FFF745F7C60 R1=00007FFF990CCBE0 R2=00007FFF747B7F00 R3=00000000FFE16020
R4=00000000FFE13E00 R5=00000000000010E0 R6=00007FFF94360AA0 R7=00007FFF943608D8
R8=00007FFF94360918 R9=00000000000001B0 R10=0000000000000002 R11=00007FFF74654DC0
R12=0000000000004400 R13=00007FFF990D68E0 R14=00007FFF990CD0DC R15=000000000000000D
R16=0000000000000010 R17=00000000000010EC R18=0000000000000000 R19=0000000000000000
R20=00000000FFE16020 R21=00007FFF94360918 R22=00007FFF94360AA0 R23=0000000100000000
R24=00000000FFE13E00 R25=00000000FFE16020 R26=00000000000010E0 R27=0000000000000000
R28=0000000000000000 R29=0000000000000000 R30=000000000000010E R31=00007FFF943608D8
NIP=00007FFF7452122C MSR=800000000288F033 ORIG_GPR3=C0000000000027E0 CTR=00007FFF74527F60
LINK=00007FFF745F7C60 XER=0000000020000000 CCR=0000000048224444 SOFTE=0000000000000001
TRAP=0000000000000700 DAR=00007FFF94360018 dsisr=0000000042000000 RESULT=0000000000000000
FPR0 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR1 40550fdc80000000 (f: 2147483648.000000, d: 8.424783e+01)
FPR2 40085621e0000000 (f: 3758096384.000000, d: 3.042057e+00)
FPR3 3fee666660000000 (f: 1610612736.000000, d: 9.500000e-01)
FPR4 40130ed080000000 (f: 2147483648.000000, d: 4.764467e+00)
FPR5 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR6 3fe62e42fefa39ef (f: 4277811712.000000, d: 6.931472e-01)
FPR7 3fbc5e53aa362eb4 (f: 2855677696.000000, d: 1.108143e-01)
FPR8 b7008733169a6723 (f: 379217696.000000, d: -9.264334e-44)
FPR9 3bc1b67d80000000 (f: 2147483648.000000, d: 7.501685e-21)
FPR10 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR11 41cdcd6500000000 (f: 0.000000, d: 1.000000e+09)
FPR12 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR13 00007fff9401d0d0 (f: 2483147008.000000, d: 6.953266e-310)
FPR14 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR15 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR16 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR17 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR18 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR19 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR20 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR21 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR22 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR23 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR24 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR25 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR26 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR27 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR28 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR29 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR30 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR31 0000000000000000 (f: 0.000000, d: 0.000000e+00)
Module=/lib64/libcrypto.so.3
Module_base_address=00007FFF742B0000
Target=2_90_20221018_307 (Linux 4.18.0-425.10.1.el8_7.ppc64le)
CPU=ppc64le (4 logical CPUs) (0x1dccb0000 RAM)
----------- Stack Backtrace -----------
(0x00007FFF7452122C [libcrypto.so.3+0x27122c])
(0x00007FFF745F7C60 [libcrypto.so.3+0x347c60])
(0x00007FFF745F8180 [libcrypto.so.3+0x348180])
(0x00007FFF74653D34 [libcrypto.so.3+0x3a3d34])
(0x00007FFF74654DF4 [libcrypto.so.3+0x3a4df4])
EVP_EncryptUpdate+0xb0 (0x00007FFF744CB2B0 [libcrypto.so.3+0x21b2b0])
EVP_CipherUpdate+0x24 (0x00007FFF744CBF04 [libcrypto.so.3+0x21bf04])
Java_jdk_crypto_jniprovider_NativeCrypto_GCMEncrypt+0x280 (0x00007FFF747D4AA0 [libjncrypto.so+0x4aa0])
(0x00007FFF98B61AF8 [libj9vm29.so+0x1f1af8])
ffi_call_int+0xd4 (0x00007FFF98B617C4 [libj9vm29.so+0x1f17c4])
bytecodeLoopCompressed+0x126dc (0x00007FFF98A3151C [libj9vm29.so+0xc151c])
(0x00007FFF98AD1C98 [libj9vm29.so+0x161c98])
runCallInMethod+0x258 (0x00007FFF98989B18 [libj9vm29.so+0x19b18])
gpProtectedRunCallInMethod+0x54 (0x00007FFF989B3604 [libj9vm29.so+0x43604])
signalProtectAndRunGlue+0x28 (0x00007FFF98AE1818 [libj9vm29.so+0x171818])
omrsig_protect+0x3f4 (0x00007FFF988D9CB4 [libj9prt29.so+0x39cb4])
gpProtectAndRun+0xa8 (0x00007FFF98AE18E8 [libj9vm29.so+0x1718e8])
gpCheckCallin+0xc4 (0x00007FFF989B5CC4 [libj9vm29.so+0x45cc4])
callStaticVoidMethod+0x48 (0x00007FFF989B2C08 [libj9vm29.so+0x42c08])
JavaMain+0x11e4 (0x00007FFF993B7304 [libjli.so+0x7304])
ThreadJavaMain+0x18 (0x00007FFF993BD258 [libjli.so+0xd258])
start_thread+0xf8 (0x00007FFF99369718 [libpthread.so.0+0x9718])
clone+0x74 (0x00007FFF9924B498 [libc.so.6+0x13b498])
---------------------------------------
JVMDUMP039I Processing dump event "gpf", detail "" at 2023/02/13 08:28:34 - please wait.
JVMDUMP032I JVM requested System dump using '/home/jenkins/jasonkatonica/issue_gcmcrash_72_16371/core.20230213.082834.515043.0001.dmp' in response to an event
JVMDUMP010I System dump written to /home/jenkins/jasonkatonica/issue_gcmcrash_72_16371/core.20230213.082834.515043.0001.dmp
JVMDUMP032I JVM requested Java dump using '/home/jenkins/jasonkatonica/issue_gcmcrash_72_16371/javacore.20230213.082834.515043.0002.txt' in response to an event
JVMDUMP010I Java dump written to /home/jenkins/jasonkatonica/issue_gcmcrash_72_16371/javacore.20230213.082834.515043.0002.txt
JVMDUMP032I JVM requested Snap dump using '/home/jenkins/jasonkatonica/issue_gcmcrash_72_16371/Snap.20230213.082834.515043.0003.trc' in response to an event
JVMDUMP010I Snap dump written to /home/jenkins/jasonkatonica/issue_gcmcrash_72_16371/Snap.20230213.082834.515043.0003.trc
JVMDUMP032I JVM requested JIT dump using '/home/jenkins/jasonkatonica/issue_gcmcrash_72_16371/jitdump.20230213.082834.515043.0004.dmp' in response to an event
JVMDUMP051I JIT dump occurred in 'main' thread 0x0000000000095700
JVMDUMP010I JIT dump written to /home/jenkins/jasonkatonica/issue_gcmcrash_72_16371/jitdump.20230213.082834.515043.0004.dmp
JVMDUMP013I Processed dump event "gpf", detail "".
I did notice that the openssl version
is the following by default on the system:
[jenkins@rhel8le-rt1-2] openssl version
OpenSSL 1.1.1k FIPS 25 Mar 2021
So unless this is overwritten someplace in an environment variable when Jenkins runs it seems that the system openssl version is 1.1.1k
. I will attempt to switch some of my other working systems ( ppc + rhel 8.7 ) to this version of openssl to see if it crashes in the same way.
Turning on debug traces ( -Djdk.nativeCryptoTrace=true
and -Djava.security.auth.debug=all
) with this simple AESGCMCrank
test indicates that 3.0.1
of openssl is really being loaded. The code is indeed loading version 3.0.1
when it crashes on the system rhel8le-rt1-2.fyre.ibm.com
. It is NOT loading version 1.1.1k
.
provider: NativePRNG.MIXED seedFile: /dev/random nextFile: /dev/urandom
Attempt to load OpenSSL /lib64/libcrypto.so.3
Using OpenSSL version: OpenSSL 3.0.1 14 Dec 2021 (/lib64)
In any case I attempted to make use of both 3.0.1
and 1.1.1k
on another working ppc system and did not observe any crashes there yet.
I was able to get my AESGCMCrank
test working on the system rhel8le-rt1-2.fyre.ibm.com
by installing a version of the openssl 3.0.1
library that I built myself from source. I then configured the failing system rhel8le-rt1-2.fyre.ibm.com
for my login as follows:
export LD_LIBRARY_PATH=/home/jenkins/jasonkatonica/issue_gcmcrash_72_16371/openssl/openssl-3.0.1/lib
export LDFLAGS="-L /home/jenkins/jasonkatonica/issue_gcmcrash_72_16371/openssl/openssl-3.0.1/lib/ -Wl,-rpath,/home/jenkins/jasonkatonica/issue_gcmcrash_72_16371/openssl/openssl-3.0.1/lib/"
export PATH=/home/jenkins/jasonkatonica/issue_gcmcrash_72_16371/openssl/openssl-3.0.1/apps/:$PATH
After making this change to use a library that I built from source, I no longer received any crashes. I am not exactly sure why the 3.0.1 library present on the system at /lib64/libcrypto.so.3
is working differently and causing crashes. I did notice that the library came from this package on the failing system.:
rpm -qf /lib64/libcrypto.so.3
openssl3-libs-3.0.1-43.el8.1.ppc64le
I am not sure how this package was installed on the system.
I was able to recreate this issue on my system. I needed to install that openssl package from the EPL repository. I did that as follows:
To install the EPEL repository:
yum -y install https://dl.fedoraproject.org/pub/epel/epel-release-latest-8.noarch.rpm
To install openssl:
yum install openssl3
I then ran my test on the system and it crashed on the first call to the openssl library.
There is certainly an issue with this version of the EPL library.
I tried to create a minimum size test as possible in a C program that is able to replicate the problem. It does appear that the epel library on ppc has some sort of illegal instruction
:
Test Code:
To Compile:
gcc gcmEncrypt2.c -o crashgcm -I /usr/include/openssl3 -ldl
Execution output against the epel library on ppc. Notice it fails at the bottom with Illegal instruction (core dumped)
:
# ./crashgcm /lib64/libcrypto.so.3
OpenSSL version: OpenSSL 3.0.1 14 Dec 2021
Symbol EVP_CIPHER_CTX_new found in library: /lib64/libcrypto.so.3
Symbol EVP_EncryptInit found in library: /lib64/libcrypto.so.3
Symbol EVP_EncryptUpdate found in library: /lib64/libcrypto.so.3
Symbol EVP_aes_256_gcm found in library: /lib64/libcrypto.so.3
Initialize Context.
Initialize Context Done.
Initialize done.
Encrypt.
Illegal instruction (core dumped)
Executing output against my own openssl 3.0.1 level of the code that I built on ppc. Notice that it works and completes encrypting:
# ./crashgcm /root/openssl/openssl-3.0.1/lib/libcrypto.so.3
OpenSSL version: OpenSSL 3.0.1 14 Dec 2021
Symbol EVP_CIPHER_CTX_new found in library: /root/openssl/openssl-3.0.1/lib/libcrypto.so.3
Symbol EVP_EncryptInit found in library: /root/openssl/openssl-3.0.1/lib/libcrypto.so.3
Symbol EVP_EncryptUpdate found in library: /root/openssl/openssl-3.0.1/lib/libcrypto.so.3
Symbol EVP_aes_256_gcm found in library: /root/openssl/openssl-3.0.1/lib/libcrypto.so.3
Initialize Context.
Initialize Context Done.
Initialize done.
Encrypt.
Encrypt done.
I should also note that this test works correctly against the elel library installed at /lib64/libcrypto.so.3
on a x86 machine that I have.
Wanted to also state the exact version of the failing EPEL library on PPC is this one:
# rpm -qf /lib64/libcrypto.so.3
openssl3-libs-3.0.1-43.el8.1.ppc64le
This version works on x86:
# rpm -qf /lib64/libcrypto.so.3
openssl3-libs-3.0.1-43.el8.1.x86_64
JDK17 ppc64le_linux(rhel8le-rt1-1
)
java version "17.0.7-beta" 2023-04-18
IBM Semeru Runtime Certified Edition 17.0.7+5-202303232332 (build 17.0.7-beta+5-202303232332)
Eclipse OpenJ9 VM 17.0.7+5-202303232332 (build master-7e14589c2, JRE 17 Linux ppc64le-64-Bit Compressed References 20230323_366 (JIT enabled, AOT enabled)
OpenJ9 - 7e14589c2
OMR - c766c4155
JCL - a87ab94e85 based on jdk-17.0.7+5)
[2023-03-24T00:47:15.570Z] variation: Mode150
[2023-03-24T00:47:15.570Z] JVM_OPTIONS: -XX:+UseCompressedOops
[2023-03-24T00:47:37.279Z] STF 17:47:36.813 - Overall result: **FAILED**
[2023-03-24T00:47:37.279Z] -----------------------------------
[2023-03-24T00:47:37.279Z] TestJlmRemoteThreadAuth_0_FAILED
aqa-tests/TKG/output_16796174769767/TestIBMJlmRemoteMemoryAuth_0/20230323-180352-TestIBMJlmRemoteMemoryAuth/results/3.LT1.stderr
Unhandled exception
Type=Illegal instruction vmState=0x00040000
J9Generic_Signal_Number=00000048 Signal_Number=00000004 Error_Value=00000000 Signal_Code=00000001
Handler1=00007FFF867B01C0 Handler2=00007FFF866D8B00
R0=00007FFEAFE3C530 R1=00007FFE57AEAB20 R2=00007FFEAFFF7F00 R3=00007FFF7FB7A748
R4=00007FFF7FB7A08D R5=00000000000001D0 R6=00007FFED008E4A0 R7=00007FFED008E2D8
R8=00007FFED008E318 R9=00000000000001B0 R10=0000000000000002 R11=00007FFEAFE9A030
R12=0000000000004400 R13=00007FFE57AF68E0 R14=00007FFE57AEB01C R15=0000000000000005
R16=0000000000000010 R17=00000000000001D8 R18=0000000000000005 R19=0000000000000000
R20=00007FFF7FB7A748 R21=00007FFED008E318 R22=00007FFED008E4A0 R23=0000000100000000
R24=00007FFF7FB7A08D R25=00007FFF7FB7A748 R26=00000000000001D0 R27=0000000000000000
R28=0000000000000000 R29=0000000000000000 R30=000000000000001D R31=00007FFED008E2D8
NIP=00007FFEAFD6452C MSR=800000000288F033 ORIG_GPR3=00007FFEAFE3C52C CTR=00007FFEAFD6B260
LINK=00007FFEAFE3C530 XER=0000000020000000 CCR=0000000048224444 SOFTE=0000000000000001
TRAP=0000000000000700 DAR=00007FFE55A50048 dsisr=0000000042000000 RESULT=0000000000000000
FPR0 000000000000000e (f: 14.000000, d: 6.916919e-323)
FPR1 4046d0e8c0000000 (f: 3221225472.000000, d: 4.563210e+01)
FPR2 3fefe64b9fc82b3a (f: 2680695552.000000, d: 9.968622e-01)
FPR3 3fee666660000000 (f: 1610612736.000000, d: 9.500000e-01)
FPR4 3fce840b4ac4e4d2 (f: 1254417664.000000, d: 2.384047e-01)
FPR5 bfe7154748bef6c8 (f: 1220474624.000000, d: -7.213475e-01)
FPR6 3fe62e42fefa39ef (f: 4277811712.000000, d: 6.931472e-01)
FPR7 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR8 38206062e0000000 (f: 3758096384.000000, d: 2.406312e-38)
FPR9 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR10 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR11 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR12 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR13 00007fff800e3b00 (f: 2148416256.000000, d: 6.953250e-310)
FPR14 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR15 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR16 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR17 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR18 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR19 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR20 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR21 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR22 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR23 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR24 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR25 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR26 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR27 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR28 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR29 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR30 0000000000000000 (f: 0.000000, d: 0.000000e+00)
FPR31 0000000000000000 (f: 0.000000, d: 0.000000e+00)
Module=/lib64/libcrypto.so.3
Module_base_address=00007FFEAFAF0000
Target=2_90_20230323_366 (Linux 4.18.0-425.13.1.el8_7.ppc64le)
CPU=ppc64le (4 logical CPUs) (0x1dcca0000 RAM)
----------- Stack Backtrace -----------
(0x00007FFEAFD6452C [libcrypto.so.3+0x27452c])
(0x00007FFEAFE3C530 [libcrypto.so.3+0x34c530])
(0x00007FFEAFE3CA50 [libcrypto.so.3+0x34ca50])
(0x00007FFEAFE98F94 [libcrypto.so.3+0x3a8f94])
(0x00007FFEAFE9A064 [libcrypto.so.3+0x3aa064])
EVP_EncryptUpdate+0xac (0x00007FFEAFD0DB0C [libcrypto.so.3+0x21db0c])
EVP_CipherUpdate+0x24 (0x00007FFEAFD0E754 [libcrypto.so.3+0x21e754])
Java_jdk_crypto_jniprovider_NativeCrypto_GCMEncrypt+0x280 (0x00007FFEB4834AE0 [libjncrypto.so+0x4ae0])
(0x00007FFF86970938 [libj9vm29.so+0x200938])
ffi_call_int+0xd4 (0x00007FFF86970604 [libj9vm29.so+0x200604])
bytecodeLoopFull+0x13c28 (0x00007FFF86862CC8 [libj9vm29.so+0xf2cc8])
(0x00007FFF868DD208 [libj9vm29.so+0x16d208])
runJavaThread+0x240 (0x00007FFF86786F30 [libj9vm29.so+0x16f30])
javaProtectedThreadProc+0x138 (0x00007FFF86823FC8 [libj9vm29.so+0xb3fc8])
omrsig_protect+0x3f4 (0x00007FFF866D9FD4 [libj9prt29.so+0x39fd4])
javaThreadProc+0x60 (0x00007FFF8681F8A0 [libj9vm29.so+0xaf8a0])
thread_wrapper+0x190 (0x00007FFF8666CBC0 [libj9thr29.so+0xcbc0])
start_thread+0xf8 (0x00007FFF87169718 [libpthread.so.0+0x9718])
clone+0x74 (0x00007FFF8704B498 [libc.so.6+0x13b498])
---------------------------------------
JVMDUMP039I Processing dump event "gpf", detail "" at 2023/03/23 18:04:12 - please wait.
JVMDUMP032I JVM requested System dump using '/home/jenkins/workspace/Test_openjdk17_j9_sanity.system_ppc64le_linux_testList_2/aqa-tests/TKG/output_16796174769767/TestIBMJlmRemoteMemoryAuth_0/20230323-180352-TestIBMJlmRemoteMemoryAuth/results/core.20230323.180412.1280052.0001.dmp' in response to an event
JVMDUMP010I System dump written to /home/jenkins/workspace/Test_openjdk17_j9_sanity.system_ppc64le_linux_testList_2/aqa-tests/TKG/output_16796174769767/TestIBMJlmRemoteMemoryAuth_0/20230323-180352-TestIBMJlmRemoteMemoryAuth/results/core.20230323.180412.1280052.0001.dmp
JVMDUMP032I JVM requested Java dump using '/home/jenkins/workspace/Test_openjdk17_j9_sanity.system_ppc64le_linux_testList_2/aqa-tests/TKG/output_16796174769767/TestIBMJlmRemoteMemoryAuth_0/20230323-180352-TestIBMJlmRemoteMemoryAuth/results/javacore.20230323.180412.1280052.0002.txt' in response to an event
javacore file generated - /home/jenkins/workspace/Test_openjdk17_j9_sanity.system_ppc64le_linux_testList_2/aqa-tests/TKG/output_16796174769767/TestIBMJlmRemoteMemoryAuth_0/20230323-180352-TestIBMJlmRemoteMemoryAuth/results/javacore.20230323.180412.1280052.0002.txt
core file generated - /home/jenkins/workspace/Test_openjdk17_j9_sanity.system_ppc64le_linux_testList_2/aqa-tests/TKG/output_16796174769767/TestIBMJlmRemoteMemoryAuth_0/20230323-180352-TestIBMJlmRemoteMemoryAuth/results/core.20230323.180412.1280052.0001.dmp
JVMDUMP010I Java dump written to /home/jenkins/workspace/Test_openjdk17_j9_sanity.system_ppc64le_linux_testList_2/aqa-tests/TKG/output_16796174769767/TestIBMJlmRemoteMemoryAuth_0/20230323-180352-TestIBMJlmRemoteMemoryAuth/results/javacore.20230323.180412.1280052.0002.txt
JVMDUMP032I JVM requested Snap dump using '/home/jenkins/workspace/Test_openjdk17_j9_sanity.system_ppc64le_linux_testList_2/aqa-tests/TKG/output_16796174769767/TestIBMJlmRemoteMemoryAuth_0/20230323-180352-TestIBMJlmRemoteMemoryAuth/results/Snap.20230323.180412.1280052.0003.trc' in response to an event
JVMDUMP010I Snap dump written to /home/jenkins/workspace/Test_openjdk17_j9_sanity.system_ppc64le_linux_testList_2/aqa-tests/TKG/output_16796174769767/TestIBMJlmRemoteMemoryAuth_0/20230323-180352-TestIBMJlmRemoteMemoryAuth/results/Snap.20230323.180412.1280052.0003.trc
JVMDUMP032I JVM requested JIT dump using '/home/jenkins/workspace/Test_openjdk17_j9_sanity.system_ppc64le_linux_testList_2/aqa-tests/TKG/output_16796174769767/TestIBMJlmRemoteMemoryAuth_0/20230323-180352-TestIBMJlmRemoteMemoryAuth/results/jitdump.20230323.180412.1280052.0004.dmp' in response to an event
JVMDUMP051I JIT dump occurred in 'RMI TCP Connection(2)-9.30.182.222' thread 0x00007FFEA40BFA00
JVMDUMP010I JIT dump written to /home/jenkins/workspace/Test_openjdk17_j9_sanity.system_ppc64le_linux_testList_2/aqa-tests/TKG/output_16796174769767/TestIBMJlmRemoteMemoryAuth_0/20230323-180352-TestIBMJlmRemoteMemoryAuth/results/jitdump.20230323.180412.1280052.0004.dmp
JVMDUMP013I Processed dump event "gpf", detail "".
Snap file generated - /home/jenkins/workspace/Test_openjdk17_j9_sanity.system_ppc64le_linux_testList_2/aqa-tests/TKG/output_16796174769767/TestIBMJlmRemoteMemoryAuth_0/20230323-180352-TestIBMJlmRemoteMemoryAuth/results/Snap.20230323.180412.1280052.0003.trc
JDK17 ppc64le_linux(rhel8le-rtp-rt3-1
)
[2024-04-09T20:20:34.694Z] variation: Mode650
[2024-04-09T20:20:34.694Z] JVM_OPTIONS: -XX:-UseCompressedOops -Xverbosegclog
[2024-04-09T20:23:42.931Z] TEST: sun/security/krb5/auto/HttpsCB.java
[2024-04-09T20:23:42.934Z] Unhandled exception
[2024-04-09T20:23:42.934Z] Type=Illegal instruction vmState=0x00040000
[2024-04-09T20:28:18.489Z] jdk_security4_1_FAILED
Failure link
From an internal build(
rhel8le-rt1-5
):Rerun in Grinder - Change TARGET to run only the failed test targets.
Optional info
Failure output (captured from console output)
50x internal grinder - all passed 50x internal grinder -Djdk.nativeGCM=false - all passed