[Bug 1266396] [NEW] Call Traces seen when running hugemmap test suite
Public bug reported: Description When running the hugetlb test cases specific to hugemmap, Call traces as below are observed. Unable to handle kernel paging request for data at address 0x00058206 Faulting instruction address: 0xc046ebe8 Oops: Kernel access of bad area, sig: 11 [#2] SMP NR_CPUS=2048 NUMA pSeries Modules linked in: dm_crypt CPU: 0 PID: 996 Comm: rm Tainted: G D W3.13.0-0-generic #10+ppc64el-Ubuntu task: c0027913c3a0 ti: c00279248000 task.ti: c00279248000 NIP: c046ebe8 LR: c042108c CTR: c046ebe0 REGS: c0027924b920 TRAP: 0300 Tainted: G D W (3.13.0-0-generic) MSR: 80009033 SF,EE,ME,IR,DR,RI,LE CR: 22000482 XER: 2000 CFAR: 3fff928f16d4 DAR: 00058206 DSISR: 4000 SOFTE: 1 GPR00: c01e34a8 c0027924bba0 c1045c80 c0027917b1a0 GPR04: c0027db89e40 0001 c0e9e528 0002bab0 GPR08: 0073b000 c0027db8b010 000581b6 c0027db89e40 GPR12: 82000488 cfe8 GPR16: 0002 0002 1000d770 GPR20: 1000d4c0 1000d740 1000d7b0 1000d7e8 GPR24: 0100361a905c 1000d720 1000d668 c0027924bdb0 GPR28: 0100361b26b8 0004 c0027924bdb0 c0027924bd00 NIP [c046ebe8] .apparmor_inode_getattr+0x8/0x70 LR [c042108c] .security_inode_getattr+0x3c/0x60 Call Trace: [c0027924bba0] [c0027924bc40] 0xc0027924bc40 (unreliable) [c0027924bc10] [c01e34a8] .vfs_getattr+0x28/0x70 [c0027924bc90] [c01e360c] .vfs_fstatat+0x8c/0x130 [c0027924bd40] [c01e3c64] .SyS_newfstatat+0x24/0x50 [c0027924be30] [c0009e58] syscall_exit+0x0/0x98 Instruction dump: 6000 6042 7c691b78 7c852378 3865 7d244b78 4b10 6000 6000 6042 e9240030 e9490028 e94a0050 79480025 41820010 3860 ---[ end trace 8633e311dec7685f ]--- Segmentation fault Easily recreatable. ./runltp -f hugetlb cat hugetlb hugemmap01 hugemmap01 Environment: Host: Power8 Guest : ubuntu hosted on Power8 Command line to spawn the ubuntu guest: qemu-system-ppc64 -enable-kvm -M pseries -cpu POWER8 -smp 1 -m 10G -nographic -nodefaults -monitor stdio -serial pty -append root=/dev/sda -kernel trusty-server-cloudimg-ppc64el-vmlinuz-generic -device spapr-vscsi -device spapr-vlan,netdev=net0,mac=6c:ae:8b:69:16:11 -netdev bridge,br=virbr0,id=net0 -drive file=trusty-server-cloudimg-ppc64el.img.qcow2 ** Affects: openldap (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to openldap in Ubuntu. https://bugs.launchpad.net/bugs/1266396 Title: Call Traces seen when running hugemmap test suite To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openldap/+bug/1266396/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1266396] [NEW] Call Traces seen when running hugemmap test suite
Public bug reported: Description When running the hugetlb test cases specific to hugemmap, Call traces as below are observed. Unable to handle kernel paging request for data at address 0x00058206 Faulting instruction address: 0xc046ebe8 Oops: Kernel access of bad area, sig: 11 [#2] SMP NR_CPUS=2048 NUMA pSeries Modules linked in: dm_crypt CPU: 0 PID: 996 Comm: rm Tainted: G D W3.13.0-0-generic #10+ppc64el-Ubuntu task: c0027913c3a0 ti: c00279248000 task.ti: c00279248000 NIP: c046ebe8 LR: c042108c CTR: c046ebe0 REGS: c0027924b920 TRAP: 0300 Tainted: G D W (3.13.0-0-generic) MSR: 80009033 SF,EE,ME,IR,DR,RI,LE CR: 22000482 XER: 2000 CFAR: 3fff928f16d4 DAR: 00058206 DSISR: 4000 SOFTE: 1 GPR00: c01e34a8 c0027924bba0 c1045c80 c0027917b1a0 GPR04: c0027db89e40 0001 c0e9e528 0002bab0 GPR08: 0073b000 c0027db8b010 000581b6 c0027db89e40 GPR12: 82000488 cfe8 GPR16: 0002 0002 1000d770 GPR20: 1000d4c0 1000d740 1000d7b0 1000d7e8 GPR24: 0100361a905c 1000d720 1000d668 c0027924bdb0 GPR28: 0100361b26b8 0004 c0027924bdb0 c0027924bd00 NIP [c046ebe8] .apparmor_inode_getattr+0x8/0x70 LR [c042108c] .security_inode_getattr+0x3c/0x60 Call Trace: [c0027924bba0] [c0027924bc40] 0xc0027924bc40 (unreliable) [c0027924bc10] [c01e34a8] .vfs_getattr+0x28/0x70 [c0027924bc90] [c01e360c] .vfs_fstatat+0x8c/0x130 [c0027924bd40] [c01e3c64] .SyS_newfstatat+0x24/0x50 [c0027924be30] [c0009e58] syscall_exit+0x0/0x98 Instruction dump: 6000 6042 7c691b78 7c852378 3865 7d244b78 4b10 6000 6000 6042 e9240030 e9490028 e94a0050 79480025 41820010 3860 ---[ end trace 8633e311dec7685f ]--- Segmentation fault Easily recreatable. ./runltp -f hugetlb cat hugetlb hugemmap01 hugemmap01 Environment: Host: Power8 Guest : ubuntu hosted on Power8 Command line to spawn the ubuntu guest: qemu-system-ppc64 -enable-kvm -M pseries -cpu POWER8 -smp 1 -m 10G -nographic -nodefaults -monitor stdio -serial pty -append root=/dev/sda -kernel trusty-server-cloudimg-ppc64el-vmlinuz-generic -device spapr-vscsi -device spapr-vlan,netdev=net0,mac=6c:ae:8b:69:16:11 -netdev bridge,br=virbr0,id=net0 -drive file=trusty-server-cloudimg-ppc64el.img.qcow2 ** Affects: openldap (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1266396 Title: Call Traces seen when running hugemmap test suite To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openldap/+bug/1266396/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs