Comment 12 for bug 1708096

Revision history for this message
Juerg Haefliger (juergh) wrote :

I'm able to reproduce the OOPS by booting a Xenial VM with root on JFS:

[ 42.018954] Unable to handle kernel paging request for data at address 0x00000000
[ 42.019098] Faulting instruction address: 0xd00000000108e1cc
[ 42.019501] Oops: Kernel access of bad area, sig: 11 [#1]
[ 42.019611] SMP NR_CPUS=2048 NUMA pSeries
[ 42.020320] Modules linked in: iscsi_tcp(+) libiscsi_tcp libiscsi scsi_transport_iscsi autofs4 jfs btrfs raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear ibmvscsi
[ 42.021106] CPU: 0 PID: 1067 Comm: ureadahead Not tainted 4.4.0-96-generic #119-Ubuntu
[ 42.021285] task: c00000000474e7b0 ti: c000000004c4c000 task.ti: c000000004c4c000
[ 42.021361] NIP: d00000000108e1cc LR: d00000000108e168 CTR: c0000000001196c0
[ 42.021425] REGS: c000000004c4f570 TRAP: 0300 Not tainted (4.4.0-96-generic)
[ 42.021475] MSR: 8000000000009033 <SF,EE,ME,IR,DR,RI,LE> CR: 48048844 XER: 00000000
[ 42.021738] CFAR: c000000000008468 DAR: 0000000000000000 DSISR: 40000000 SOFTE: 1
GPR00: d00000000108e168 c000000004c4f7f0 d0000000010a90d0 c00000003ec8f658
GPR04: d00000000109fba0 d0000000010a2e58 0000000000005aca 0000000000000001
GPR08: 0000000000000000 0000000000000000 0000000000168660 d00000000109aad8
GPR12: c0000000001196c0 c00000000fb40000 0000000000000009 0000000000000000
GPR16: c00000003793ac20 c00000003793ab08 0000000000000000 c00000003793ad48
GPR20: c000000004c4fae0 c00000003a8059fe c000000004d06800 c000000004c4fa00
GPR24: 0000000000168660 0000000000001000 0000000000000000 d0000000010a2e38
GPR28: 0000000000168660 f00000000000d840 c000000004428e80 c00000003ec8f618
[ 42.023072] NIP [d00000000108e1cc] __get_metapage+0x1dc/0x650 [jfs]
[ 42.023171] LR [d00000000108e168] __get_metapage+0x178/0x650 [jfs]
[ 42.023283] Call Trace:
[ 42.023435] [c000000004c4f7f0] [d00000000108e168] __get_metapage+0x178/0x650 [jfs] (unreliable)
[ 42.023630] [c000000004c4f8d0] [d0000000010894e0] dtSearch+0x4c0/0xa20 [jfs]
[ 42.023737] [c000000004c4f9e0] [d000000001073b68] jfs_lookup+0x88/0x100 [jfs]
[ 42.024132] [c000000004c4fb10] [c0000000002f4924] lookup_real+0x64/0xe0
[ 42.024216] [c000000004c4fb50] [c0000000002fb3e4] do_last+0x9f4/0xff0
[ 42.024289] [c000000004c4fc10] [c0000000002fbbfc] path_openat+0xcc/0x3c0
[ 42.024361] [c000000004c4fc90] [c0000000002fdb1c] do_filp_open+0xfc/0x170
[ 42.024433] [c000000004c4fdb0] [c0000000002e4310] do_sys_open+0x1c0/0x3b0
[ 42.024569] [c000000004c4fe30] [c000000000009204] system_call+0x38/0xb4
[ 42.024685] Instruction dump:
[ 42.024947] f91f0020 f93f0028 fbdf0030 fb9f0038 e93d0000 7927afe3 418203fc ebdd0030
[ 42.025154] 41920034 e93d0008 e95f0038 811e0000 <e9290000> 39080001 81290090 911e0000
[ 42.025744] ---[ end trace 054e73e40709cbff ]---