[OpenAFS-devel] OpenAFS on SGI's SLES9-SP4 oopses upon loading

Alf Wachsmann alfw@slac.stanford.edu
Mon, 24 Mar 2008 12:22:41 -0700 (PDT)


Hi,

I just upgraded our SGI Altix system to the latest patchset,
Suse Enterprise Linux 4 Service Pack 4 (it was running SP3 before)
and I now get an oops when loading the OpenAFS kernel module.
This happens with OpenAFS 1.4.5 and also 1.4.7.rc1.

oops output and kdb's backtrace is below.

Is there a fix for this?

Many thanks,
                   Alf.

12:14:41 red login: insmod[15065]: Oops 11003706212352 [1]
12:14:41
12:14:41 Pid: 15065, CPU 3, comm:               insmod
12:14:41 psr : 0000121008126030 ifs : 80000000000013ad ip  : [<a0000001001173d1>]    Tainted: PF  U   (2.6.5-7.308.PTF.
352466.0-sn2 SLES9_SP4_BRANCH-20071210113640)
12:14:41 ip is at load_module+0x16b1/0x25e0
12:14:41 unat: 0000000000000000 pfs : 00000000000013ad rsc : 0000000000000003
12:14:41 rnat: 0000000047e7fda1 bsps: 0000000002e14299 pr  : 6669655695565965
12:14:41 ldrs: 0000000000000000 ccv : 0000000000000000 fpsr: 0009804c8a70033f
12:14:41 csd : 0000000000000000 ssd : 0000000000000000
12:14:41 b0  : a000000100116e40 b6  : a000000100012fc0 b7  : a0000001000c4660
12:14:41 f6  : 000000000000000000000 f7  : 1003e0000000002e3dcd9
12:14:41 f8  : 1003e00000000143b09ef f9  : 1003e0000000000000000
12:14:41 f10 : 100029000000000000000 f11 : 1003e0000000000000009
12:14:41 r1  : a000000100a55110 r2  : a000000225988006 r3  : a000000225988007
12:14:41 r8  : 0000000000000000 r9  : 0000000000000002 r10 : 0000000000000000
12:14:41 r11 : 6669655595560a65 r12 : e00000b8f55b7d90 r13 : e00000b8f55b0000
12:14:41 r14 : 0000000000004000 r15 : a000000225900628 r16 : a000000225ad0680
12:14:41 r17 : a000000225abbe1e r18 : a000000225abbe1f r19 : a000000225987fa0
12:14:41 r20 : a000000225abbdb8 r21 : 0000000000000000 r22 : 0000000000000024
12:14:41 r23 : 0000000000000042 r24 : 0000000000000000 r25 : 0000000000000053
12:14:41 r26 : 0000000000000044 r27 : 746e457465475f4c r28 : 6575516c6c614365
12:14:41 r29 : 0000000000010188 r30 : 0000000000010180 r31 : a000000225900378
12:14:41
12:14:41 Call Trace:
12:14:42  [<a000000100019300>] show_stack+0x80/0xa0
12:14:42                                 sp=e00000b8f55b7960 bsp=e00000b8f55b10c8
12:14:42  [<a00000010003dd40>] die+0x1c0/0x2e0
12:14:42                                 sp=e00000b8f55b7b30 bsp=e00000b8f55b1090
12:14:42  [<a0000001000604f0>] ia64_do_page_fault+0x710/0xa40
12:14:42                                 sp=e00000b8f55b7b30 bsp=e00000b8f55b1028
12:14:42  [<a000000100010000>] ia64_leave_kernel+0x0/0x260
12:14:42                                 sp=e00000b8f55b7bc0 bsp=e00000b8f55b1028
12:14:42  [<a0000001001173d0>] load_module+0x16b0/0x25e0
12:14:42                                 sp=e00000b8f55b7d90 bsp=e00000b8f55b0eb8
12:14:42  [<a000000100118580>] sys_init_module+0xe0/0x6e0
12:14:42                                 sp=e00000b8f55b7e30 bsp=e00000b8f55b0e40
12:14:42  [<a00000010000fe80>] ia64_ret_from_syscall+0x0/0x20
12:14:42                                 sp=e00000b8f55b7e30 bsp=e00000b8f55b0e40
12:14:42  [<a000000000010640>] 0xa000000000010640
12:14:42                                 sp=e00000b8f55b8000 bsp=e00000b8f55b0e40
12:14:42
12:14:42 Entering kdb (current=0xe00000b8f55b0000, pid 15065) on processor 3 Oops: <NULL>
12:14:42 due to oops @ 0xa0000001001173d1
12:14:42  psr: 0x0000121008126030   ifs: 0x80000000000013ad    ip: 0xa0000001001173d0
12:14:42 unat: 0x0000000000000000   pfs: 0x00000000000013ad   rsc: 0x0000000000000003
12:14:42 rnat: 0x0000000047e7fda1  bsps: 0x0000000002e14299    pr: 0x6669655695565965
12:14:42 ldrs: 0x0000000000000000   ccv: 0x0000000000000000  fpsr: 0x0009804c8a70033f
12:14:42   b0: 0xa000000100116e40    b6: 0xa000000100012fc0    b7: 0xa0000001000c4660
12:14:42   r1: 0xa000000100a55110    r2: 0xa000000225988006    r3: 0xa000000225988007
12:14:42   r8: 0x0000000000000000    r9: 0x0000000000000002   r10: 0x0000000000000000
12:14:42  r11: 0x6669655595560a65   r12: 0xe00000b8f55b7d90   r13: 0xe00000b8f55b0000
12:14:42  r14: 0x0000000000004000   r15: 0xa000000225900628   r16: 0xa000000225ad0680
12:14:42  r17: 0xa000000225abbe1e   r18: 0xa000000225abbe1f   r19: 0xa000000225987fa0
12:14:42  r20: 0xa000000225abbdb8   r21: 0x0000000000000000   r22: 0x0000000000000024
12:14:42  r23: 0x0000000000000042   r24: 0x0000000000000000   r25: 0x0000000000000053
12:14:42  r26: 0x0000000000000044   r27: 0x746e457465475f4c   r28: 0x6575516c6c614365
12:14:42  r29: 0x0000000000010188   r30: 0x0000000000010180   r31: 0xa000000225900378
12:14:42 &regs = e00000b8f55b7bd0


[3]kdb> bt
Stack traceback for pid 15065
0xe00000b8f55b0000    15065    15052  1    3   R  0xe00000b8f55b04b0 *insmod
0xa0000001001173d0 load_module+0x16b0
         args (0xa0000002258ffd68, 0x24, 0xa000000225900630, 0xa000000225900638, 0x24)
0xa000000100118580 sys_init_module+0xe0
         args (0x2000000000288010, 0x1a0006, 0x6000000000010010, 0x200000, 0x40000000000021b0)
0xa00000010000fe80 ia64_ret_from_syscall
         args (0x2000000000288010, 0x1a0006, 0x6000000000010010, 0x200000, 0x40000000000021b0)
0xa000000000010640 - No name.  May be an area that has no unwind data