Kevin, the oops above  is just the history-daemon process that
dereferences a stray pointer: i can reproduce it on every arm64
installation where i tried running the history-daemon (classic or
snappy), or a test.c prg like the one below.

(here is my raspberrypi3 in arm64 mode dereferencing a foobar ptr)

$ cat test.c
int main(void) {

        ((void(*)(void))0x18)();
}

$ gcc test.c
$ ./a.out

dmesg:
...
[  783.753484] a.out[447]: unhandled level 2 translation fault (11) at 
0x00000018, esr 0x82000006
[  783.753495] pgd = ffffffc037a7e000
[  783.757090] [00000018] *pgd=0000000036fdd003, *pud=0000000036fdd003, 
*pmd=0000000000000000

[  783.765693] CPU: 3 PID: 447 Comm: a.out Not tainted 4.8.0-1016-raspi2 
#18~ufaultfd
[  783.765698] Hardware name: Raspberry Pi 3 Model B Rev 1.2 (DT)
[  783.765704] task: ffffffc036dc8000 task.stack: ffffffc0356e4000
[  783.765711] PC is at 0x18
[  783.765716] LR is at 0x400580
[  783.765721] pc : [<0000000000000018>] lr : [<0000000000400580>] pstate: 
60000000
[  783.765725] sp : 0000007fc9fc7090
[  783.765729] x29: 0000007fc9fc7090 x28: 0000000000000000 
[  783.765738] x27: 0000000000000000 x26: 0000000000000000 
[  783.765747] x25: 0000000000000000 x24: 0000000000000000 
[  783.765756] x23: 0000000000000000 x22: 0000000000000000 
[  783.765765] x21: 0000000000000000 x20: 0000000000000000 
[  783.765774] x19: 0000000000400590 x18: 0000000000000a03 
[  783.765783] x17: 0000000000411000 x16: 0000007f8ca7c7c0 
[  783.765792] x15: 0000007f8cbcf000 x14: 0000000000000000 
[  783.765801] x13: 0000000000000402 x12: 0000007f8cbd0028 
[  783.765810] x11: 0000000000000020 x10: 0101010101010101 
[  783.765819] x9 : 000000ffffffffff x8 : ffffffffffffffff 
[  783.765829] x7 : 0000000004000000 x6 : 0000000000000000 
[  783.765837] x5 : 0000000000000000 x4 : 0000007fc9fc7108 
[  783.765846] x3 : 0000000000400570 x2 : 0000007fc9fc71f8 
[  783.765855] x1 : 0000007fc9fc71e8 x0 : 0000000000000018 

$ uname -a
Linux raspi64 4.8.0-1016-raspi2 #18 SMP Fri Oct 14 13:29:38 UTC 2016 aarch64 
aarch64 aarch64 GNU/Linux

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1625805

Title:
  arm64 kernel panic for l2 mmu with unity8 session snap

Status in Snappy:
  New
Status in linux package in Ubuntu:
  Confirmed

Bug description:
  we are running the unity8 session snap on amd64 without any problems.
  to setup and reproduce the problem follow the "on Dragonboard" section of 
  
https://docs.google.com/document/d/1o-jKITqUxRsujmN3OwRj3wRnn6dgblKuvrhKjeN8-Wc

  You can also find the panic signature at line 3276 of the attached
  syslog.

To manage notifications about this bug go to:
https://bugs.launchpad.net/snappy/+bug/1625805/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to