[Bug 1266396] [NEW] Call Traces seen when running hugemmap test suite

2014-01-06 Thread Anasuya M Shankar
Public bug reported:

Description


When running the hugetlb test cases specific to hugemmap, Call traces as
below are observed.


Unable to handle kernel paging request for data at address 0x00058206
Faulting instruction address: 0xc046ebe8
Oops: Kernel access of bad area, sig: 11 [#2]
SMP NR_CPUS=2048 NUMA pSeries
Modules linked in: dm_crypt
CPU: 0 PID: 996 Comm: rm Tainted: G  D W3.13.0-0-generic 
#10+ppc64el-Ubuntu
task: c0027913c3a0 ti: c00279248000 task.ti: c00279248000
NIP: c046ebe8 LR: c042108c CTR: c046ebe0
REGS: c0027924b920 TRAP: 0300   Tainted: G  D W (3.13.0-0-generic)
MSR: 80009033 SF,EE,ME,IR,DR,RI,LE  CR: 22000482  XER: 2000
CFAR: 3fff928f16d4 DAR: 00058206 DSISR: 4000 SOFTE: 1
GPR00: c01e34a8 c0027924bba0 c1045c80 c0027917b1a0
GPR04: c0027db89e40 0001 c0e9e528 0002bab0
GPR08: 0073b000 c0027db8b010 000581b6 c0027db89e40
GPR12: 82000488 cfe8  
GPR16: 0002  0002 1000d770
GPR20: 1000d4c0 1000d740 1000d7b0 1000d7e8
GPR24: 0100361a905c 1000d720 1000d668 c0027924bdb0
GPR28: 0100361b26b8 0004 c0027924bdb0 c0027924bd00
NIP [c046ebe8] .apparmor_inode_getattr+0x8/0x70
LR [c042108c] .security_inode_getattr+0x3c/0x60
Call Trace:
[c0027924bba0] [c0027924bc40] 0xc0027924bc40 (unreliable)
[c0027924bc10] [c01e34a8] .vfs_getattr+0x28/0x70
[c0027924bc90] [c01e360c] .vfs_fstatat+0x8c/0x130
[c0027924bd40] [c01e3c64] .SyS_newfstatat+0x24/0x50
[c0027924be30] [c0009e58] syscall_exit+0x0/0x98
Instruction dump:
6000 6042 7c691b78 7c852378 3865 7d244b78 4b10 6000
6000 6042 e9240030 e9490028 e94a0050 79480025 41820010 3860
---[ end trace 8633e311dec7685f ]---

Segmentation fault


Easily recreatable.

./runltp -f hugetlb
cat hugetlb 
hugemmap01 hugemmap01

Environment:


Host: Power8
Guest : ubuntu hosted on Power8

Command line to spawn the ubuntu guest:
qemu-system-ppc64 -enable-kvm -M pseries -cpu POWER8 -smp 1 -m 10G -nographic 
-nodefaults -monitor stdio -serial pty -append root=/dev/sda -kernel 
trusty-server-cloudimg-ppc64el-vmlinuz-generic -device spapr-vscsi -device 
spapr-vlan,netdev=net0,mac=6c:ae:8b:69:16:11 -netdev bridge,br=virbr0,id=net0 
-drive file=trusty-server-cloudimg-ppc64el.img.qcow2

** Affects: openldap (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openldap in Ubuntu.
https://bugs.launchpad.net/bugs/1266396

Title:
  Call Traces seen when running hugemmap test suite

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openldap/+bug/1266396/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1266396] [NEW] Call Traces seen when running hugemmap test suite

2014-01-06 Thread Anasuya M Shankar
Public bug reported:

Description


When running the hugetlb test cases specific to hugemmap, Call traces as
below are observed.


Unable to handle kernel paging request for data at address 0x00058206
Faulting instruction address: 0xc046ebe8
Oops: Kernel access of bad area, sig: 11 [#2]
SMP NR_CPUS=2048 NUMA pSeries
Modules linked in: dm_crypt
CPU: 0 PID: 996 Comm: rm Tainted: G  D W3.13.0-0-generic 
#10+ppc64el-Ubuntu
task: c0027913c3a0 ti: c00279248000 task.ti: c00279248000
NIP: c046ebe8 LR: c042108c CTR: c046ebe0
REGS: c0027924b920 TRAP: 0300   Tainted: G  D W (3.13.0-0-generic)
MSR: 80009033 SF,EE,ME,IR,DR,RI,LE  CR: 22000482  XER: 2000
CFAR: 3fff928f16d4 DAR: 00058206 DSISR: 4000 SOFTE: 1
GPR00: c01e34a8 c0027924bba0 c1045c80 c0027917b1a0
GPR04: c0027db89e40 0001 c0e9e528 0002bab0
GPR08: 0073b000 c0027db8b010 000581b6 c0027db89e40
GPR12: 82000488 cfe8  
GPR16: 0002  0002 1000d770
GPR20: 1000d4c0 1000d740 1000d7b0 1000d7e8
GPR24: 0100361a905c 1000d720 1000d668 c0027924bdb0
GPR28: 0100361b26b8 0004 c0027924bdb0 c0027924bd00
NIP [c046ebe8] .apparmor_inode_getattr+0x8/0x70
LR [c042108c] .security_inode_getattr+0x3c/0x60
Call Trace:
[c0027924bba0] [c0027924bc40] 0xc0027924bc40 (unreliable)
[c0027924bc10] [c01e34a8] .vfs_getattr+0x28/0x70
[c0027924bc90] [c01e360c] .vfs_fstatat+0x8c/0x130
[c0027924bd40] [c01e3c64] .SyS_newfstatat+0x24/0x50
[c0027924be30] [c0009e58] syscall_exit+0x0/0x98
Instruction dump:
6000 6042 7c691b78 7c852378 3865 7d244b78 4b10 6000
6000 6042 e9240030 e9490028 e94a0050 79480025 41820010 3860
---[ end trace 8633e311dec7685f ]---

Segmentation fault


Easily recreatable.

./runltp -f hugetlb
cat hugetlb 
hugemmap01 hugemmap01

Environment:


Host: Power8
Guest : ubuntu hosted on Power8

Command line to spawn the ubuntu guest:
qemu-system-ppc64 -enable-kvm -M pseries -cpu POWER8 -smp 1 -m 10G -nographic 
-nodefaults -monitor stdio -serial pty -append root=/dev/sda -kernel 
trusty-server-cloudimg-ppc64el-vmlinuz-generic -device spapr-vscsi -device 
spapr-vlan,netdev=net0,mac=6c:ae:8b:69:16:11 -netdev bridge,br=virbr0,id=net0 
-drive file=trusty-server-cloudimg-ppc64el.img.qcow2

** Affects: openldap (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1266396

Title:
  Call Traces seen when running hugemmap test suite

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openldap/+bug/1266396/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs