kernel-packages team mailing list archive
-
kernel-packages team
-
Mailing list archive
-
Message #39088
[Bug 1266396] Re: Call Traces seen when running hugemmap test suite
The Ubuntu-3.13.0-0.15 kernel has been copied into the bootstrap archive
and should be available for update. This kernel is based on the
v3.13-rc7 kernel. If we could retest with that kernel that would help.
Please report any testing here.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1266396
Title:
Call Traces seen when running hugemmap test suite
Status in “linux” package in Ubuntu:
Confirmed
Status in “linux” source package in Trusty:
Confirmed
Bug description:
Description
============
When running the hugetlb test cases specific to hugemmap, Call traces
as below are observed.
Unable to handle kernel paging request for data at address 0x00058206
Faulting instruction address: 0xc00000000046ebe8
Oops: Kernel access of bad area, sig: 11 [#2]
SMP NR_CPUS=2048 NUMA pSeries
Modules linked in: dm_crypt
CPU: 0 PID: 996 Comm: rm Tainted: G D W 3.13.0-0-generic #10+ppc64el-Ubuntu
task: c00000027913c3a0 ti: c000000279248000 task.ti: c000000279248000
NIP: c00000000046ebe8 LR: c00000000042108c CTR: c00000000046ebe0
REGS: c00000027924b920 TRAP: 0300 Tainted: G D W (3.13.0-0-generic)
MSR: 8000000000009033 <SF,EE,ME,IR,DR,RI,LE> CR: 22000482 XER: 20000000
CFAR: 00003fff928f16d4 DAR: 0000000000058206 DSISR: 40000000 SOFTE: 1
GPR00: c0000000001e34a8 c00000027924bba0 c000000001045c80 c00000027917b1a0
GPR04: c00000027db89e40 0000000000000001 c000000000e9e528 000000000002bab0
GPR08: 000000000073b000 c00000027db8b010 00000000000581b6 c00000027db89e40
GPR12: 0000000082000488 c00000000fe80000 0000000000000000 0000000000000000
GPR16: 0000000000000002 0000000000000000 0000000000000002 000000001000d770
GPR20: 000000001000d4c0 000000001000d740 000000001000d7b0 000000001000d7e8
GPR24: 00000100361a905c 000000001000d720 000000001000d668 c00000027924bdb0
GPR28: 00000100361b26b8 0000000000000004 c00000027924bdb0 c00000027924bd00
NIP [c00000000046ebe8] .apparmor_inode_getattr+0x8/0x70
LR [c00000000042108c] .security_inode_getattr+0x3c/0x60
Call Trace:
[c00000027924bba0] [c00000027924bc40] 0xc00000027924bc40 (unreliable)
[c00000027924bc10] [c0000000001e34a8] .vfs_getattr+0x28/0x70
[c00000027924bc90] [c0000000001e360c] .vfs_fstatat+0x8c/0x130
[c00000027924bd40] [c0000000001e3c64] .SyS_newfstatat+0x24/0x50
[c00000027924be30] [c000000000009e58] syscall_exit+0x0/0x98
Instruction dump:
60000000 60420000 7c691b78 7c852378 38600005 7d244b78 4bffff10 60000000
60000000 60420000 e9240030 e9490028 <e94a0050> 79480025 41820010 38600000
---[ end trace 8633e311dec7685f ]---
Segmentation fault
Easily recreatable.
./runltp -f hugetlb
cat hugetlb
hugemmap01 hugemmap01
Environment:
============
Host: Power8
Guest : ubuntu hosted on Power8
Command line to spawn the ubuntu guest:
qemu-system-ppc64 -enable-kvm -M pseries -cpu POWER8 -smp 1 -m 10G -nographic -nodefaults -monitor stdio -serial pty -append "root=/dev/sda" -kernel trusty-server-cloudimg-ppc64el-vmlinuz-generic -device spapr-vscsi -device spapr-vlan,netdev=net0,mac=6c:ae:8b:69:16:11 -netdev bridge,br=virbr0,id=net0 -drive file=trusty-server-cloudimg-ppc64el.img.qcow2
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1266396/+subscriptions