[Bug 1266396] [NEW] Call Traces seen when running hugemmap test suite

Anasuya M Shankar anasuyams at in.ibm.com
Mon Jan 6 09:13:12 UTC 2014


Public bug reported:

Description
============

When running the hugetlb test cases specific to hugemmap, Call traces as
below are observed.


Unable to handle kernel paging request for data at address 0x00058206
Faulting instruction address: 0xc00000000046ebe8
Oops: Kernel access of bad area, sig: 11 [#2]
SMP NR_CPUS=2048 NUMA pSeries
Modules linked in: dm_crypt
CPU: 0 PID: 996 Comm: rm Tainted: G      D W    3.13.0-0-generic #10+ppc64el-Ubuntu
task: c00000027913c3a0 ti: c000000279248000 task.ti: c000000279248000
NIP: c00000000046ebe8 LR: c00000000042108c CTR: c00000000046ebe0
REGS: c00000027924b920 TRAP: 0300   Tainted: G      D W     (3.13.0-0-generic)
MSR: 8000000000009033 <SF,EE,ME,IR,DR,RI,LE>  CR: 22000482  XER: 20000000
CFAR: 00003fff928f16d4 DAR: 0000000000058206 DSISR: 40000000 SOFTE: 1
GPR00: c0000000001e34a8 c00000027924bba0 c000000001045c80 c00000027917b1a0
GPR04: c00000027db89e40 0000000000000001 c000000000e9e528 000000000002bab0
GPR08: 000000000073b000 c00000027db8b010 00000000000581b6 c00000027db89e40
GPR12: 0000000082000488 c00000000fe80000 0000000000000000 0000000000000000
GPR16: 0000000000000002 0000000000000000 0000000000000002 000000001000d770
GPR20: 000000001000d4c0 000000001000d740 000000001000d7b0 000000001000d7e8
GPR24: 00000100361a905c 000000001000d720 000000001000d668 c00000027924bdb0
GPR28: 00000100361b26b8 0000000000000004 c00000027924bdb0 c00000027924bd00
NIP [c00000000046ebe8] .apparmor_inode_getattr+0x8/0x70
LR [c00000000042108c] .security_inode_getattr+0x3c/0x60
Call Trace:
[c00000027924bba0] [c00000027924bc40] 0xc00000027924bc40 (unreliable)
[c00000027924bc10] [c0000000001e34a8] .vfs_getattr+0x28/0x70
[c00000027924bc90] [c0000000001e360c] .vfs_fstatat+0x8c/0x130
[c00000027924bd40] [c0000000001e3c64] .SyS_newfstatat+0x24/0x50
[c00000027924be30] [c000000000009e58] syscall_exit+0x0/0x98
Instruction dump:
60000000 60420000 7c691b78 7c852378 38600005 7d244b78 4bffff10 60000000
60000000 60420000 e9240030 e9490028 <e94a0050> 79480025 41820010 38600000
---[ end trace 8633e311dec7685f ]---

Segmentation fault


Easily recreatable.

./runltp -f hugetlb
cat hugetlb 
hugemmap01 hugemmap01

Environment:
============

Host: Power8
Guest : ubuntu hosted on Power8

Command line to spawn the ubuntu guest:
qemu-system-ppc64 -enable-kvm -M pseries -cpu POWER8 -smp 1 -m 10G -nographic -nodefaults -monitor stdio -serial pty -append "root=/dev/sda" -kernel trusty-server-cloudimg-ppc64el-vmlinuz-generic -device spapr-vscsi -device spapr-vlan,netdev=net0,mac=6c:ae:8b:69:16:11 -netdev bridge,br=virbr0,id=net0 -drive file=trusty-server-cloudimg-ppc64el.img.qcow2

** Affects: openldap (Ubuntu)
     Importance: Undecided
         Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openldap in Ubuntu.
https://bugs.launchpad.net/bugs/1266396

Title:
  Call Traces seen when running hugemmap test suite

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openldap/+bug/1266396/+subscriptions



More information about the Ubuntu-server-bugs mailing list