[OpenAFS-devel] OpenAFS on SGI's SLES9-SP4 oopses upon loading
Alf Wachsmann
alfw@slac.stanford.edu
Mon, 24 Mar 2008 12:22:41 -0700 (PDT)
Hi,
I just upgraded our SGI Altix system to the latest patchset,
Suse Enterprise Linux 4 Service Pack 4 (it was running SP3 before)
and I now get an oops when loading the OpenAFS kernel module.
This happens with OpenAFS 1.4.5 and also 1.4.7.rc1.
oops output and kdb's backtrace is below.
Is there a fix for this?
Many thanks,
Alf.
12:14:41 red login: insmod[15065]: Oops 11003706212352 [1]
12:14:41
12:14:41 Pid: 15065, CPU 3, comm: insmod
12:14:41 psr : 0000121008126030 ifs : 80000000000013ad ip : [<a0000001001173d1>] Tainted: PF U (2.6.5-7.308.PTF.
352466.0-sn2 SLES9_SP4_BRANCH-20071210113640)
12:14:41 ip is at load_module+0x16b1/0x25e0
12:14:41 unat: 0000000000000000 pfs : 00000000000013ad rsc : 0000000000000003
12:14:41 rnat: 0000000047e7fda1 bsps: 0000000002e14299 pr : 6669655695565965
12:14:41 ldrs: 0000000000000000 ccv : 0000000000000000 fpsr: 0009804c8a70033f
12:14:41 csd : 0000000000000000 ssd : 0000000000000000
12:14:41 b0 : a000000100116e40 b6 : a000000100012fc0 b7 : a0000001000c4660
12:14:41 f6 : 000000000000000000000 f7 : 1003e0000000002e3dcd9
12:14:41 f8 : 1003e00000000143b09ef f9 : 1003e0000000000000000
12:14:41 f10 : 100029000000000000000 f11 : 1003e0000000000000009
12:14:41 r1 : a000000100a55110 r2 : a000000225988006 r3 : a000000225988007
12:14:41 r8 : 0000000000000000 r9 : 0000000000000002 r10 : 0000000000000000
12:14:41 r11 : 6669655595560a65 r12 : e00000b8f55b7d90 r13 : e00000b8f55b0000
12:14:41 r14 : 0000000000004000 r15 : a000000225900628 r16 : a000000225ad0680
12:14:41 r17 : a000000225abbe1e r18 : a000000225abbe1f r19 : a000000225987fa0
12:14:41 r20 : a000000225abbdb8 r21 : 0000000000000000 r22 : 0000000000000024
12:14:41 r23 : 0000000000000042 r24 : 0000000000000000 r25 : 0000000000000053
12:14:41 r26 : 0000000000000044 r27 : 746e457465475f4c r28 : 6575516c6c614365
12:14:41 r29 : 0000000000010188 r30 : 0000000000010180 r31 : a000000225900378
12:14:41
12:14:41 Call Trace:
12:14:42 [<a000000100019300>] show_stack+0x80/0xa0
12:14:42 sp=e00000b8f55b7960 bsp=e00000b8f55b10c8
12:14:42 [<a00000010003dd40>] die+0x1c0/0x2e0
12:14:42 sp=e00000b8f55b7b30 bsp=e00000b8f55b1090
12:14:42 [<a0000001000604f0>] ia64_do_page_fault+0x710/0xa40
12:14:42 sp=e00000b8f55b7b30 bsp=e00000b8f55b1028
12:14:42 [<a000000100010000>] ia64_leave_kernel+0x0/0x260
12:14:42 sp=e00000b8f55b7bc0 bsp=e00000b8f55b1028
12:14:42 [<a0000001001173d0>] load_module+0x16b0/0x25e0
12:14:42 sp=e00000b8f55b7d90 bsp=e00000b8f55b0eb8
12:14:42 [<a000000100118580>] sys_init_module+0xe0/0x6e0
12:14:42 sp=e00000b8f55b7e30 bsp=e00000b8f55b0e40
12:14:42 [<a00000010000fe80>] ia64_ret_from_syscall+0x0/0x20
12:14:42 sp=e00000b8f55b7e30 bsp=e00000b8f55b0e40
12:14:42 [<a000000000010640>] 0xa000000000010640
12:14:42 sp=e00000b8f55b8000 bsp=e00000b8f55b0e40
12:14:42
12:14:42 Entering kdb (current=0xe00000b8f55b0000, pid 15065) on processor 3 Oops: <NULL>
12:14:42 due to oops @ 0xa0000001001173d1
12:14:42 psr: 0x0000121008126030 ifs: 0x80000000000013ad ip: 0xa0000001001173d0
12:14:42 unat: 0x0000000000000000 pfs: 0x00000000000013ad rsc: 0x0000000000000003
12:14:42 rnat: 0x0000000047e7fda1 bsps: 0x0000000002e14299 pr: 0x6669655695565965
12:14:42 ldrs: 0x0000000000000000 ccv: 0x0000000000000000 fpsr: 0x0009804c8a70033f
12:14:42 b0: 0xa000000100116e40 b6: 0xa000000100012fc0 b7: 0xa0000001000c4660
12:14:42 r1: 0xa000000100a55110 r2: 0xa000000225988006 r3: 0xa000000225988007
12:14:42 r8: 0x0000000000000000 r9: 0x0000000000000002 r10: 0x0000000000000000
12:14:42 r11: 0x6669655595560a65 r12: 0xe00000b8f55b7d90 r13: 0xe00000b8f55b0000
12:14:42 r14: 0x0000000000004000 r15: 0xa000000225900628 r16: 0xa000000225ad0680
12:14:42 r17: 0xa000000225abbe1e r18: 0xa000000225abbe1f r19: 0xa000000225987fa0
12:14:42 r20: 0xa000000225abbdb8 r21: 0x0000000000000000 r22: 0x0000000000000024
12:14:42 r23: 0x0000000000000042 r24: 0x0000000000000000 r25: 0x0000000000000053
12:14:42 r26: 0x0000000000000044 r27: 0x746e457465475f4c r28: 0x6575516c6c614365
12:14:42 r29: 0x0000000000010188 r30: 0x0000000000010180 r31: 0xa000000225900378
12:14:42 ®s = e00000b8f55b7bd0
[3]kdb> bt
Stack traceback for pid 15065
0xe00000b8f55b0000 15065 15052 1 3 R 0xe00000b8f55b04b0 *insmod
0xa0000001001173d0 load_module+0x16b0
args (0xa0000002258ffd68, 0x24, 0xa000000225900630, 0xa000000225900638, 0x24)
0xa000000100118580 sys_init_module+0xe0
args (0x2000000000288010, 0x1a0006, 0x6000000000010010, 0x200000, 0x40000000000021b0)
0xa00000010000fe80 ia64_ret_from_syscall
args (0x2000000000288010, 0x1a0006, 0x6000000000010010, 0x200000, 0x40000000000021b0)
0xa000000000010640 - No name. May be an area that has no unwind data