------- Comment From laurent.duf...@fr.ibm.com 2016-10-03 13:01 EDT------- For the record, while trying to recreate bug 146776 using a 4.8.0 kernel in the guest, I faced the issue you mentioned in comment 17 which I was hoping to be fixed with the latest commit in 4.8.0. I'd to mention that the host is running the Ubuntu kernel 4.8.0-17-generic.
Unable to handle kernel paging request for data at address 0x4200000001c10118 Faulting instruction address: 0xc00000000027bf6c Oops: Kernel access of bad area, sig: 11 [#1] SMP NR_CPUS=2048 NUMA pSeries Modules linked in: virtio_balloon ip_tables x_tables autofs4 dm_crypt virtio_net virtio_blk virtio_pci virtio_ring virtio CPU: 2 PID: 2934 Comm: mmstress Not tainted 4.8.0 #1 task: c000000de154ff80 task.stack: c000000de1c40000 NIP: c00000000027bf6c LR: c00000000027bf64 CTR: 0000000000000000 REGS: c000000de1c43820 TRAP: 0300 Not tainted (4.8.0) MSR: 8000000000009033 <SF,EE,ME,IR,DR,RI,LE> CR: 84822884 XER: 20000000 CFAR: c0000000000eacd4 DAR: 4200000001c10118 DSISR: 40000000 SOFTE: 1 GPR00: c00000000027bf64 c000000de1c43aa0 c000000000e13300 c000000ddafb89e4 GPR04: c000000de1dee0f8 c000000d8ad558d8 0000000004210095 0000000095002104 GPR08: e000000d95002104 0000000000000001 042100950d0000e0 0000000004210095 GPR12: 0000000000002200 c00000000fe00800 c000000de1dee0f8 0000000000000000 GPR16: c1ffffffffffe7ff 00003fff5b000000 4200000001c10118 00003fff5c000000 GPR20: 0008000000000000 c000000dda304800 0405e700000000e0 0000000000010000 GPR24: c000000d8ad558d8 c000000ddafb8c90 c000000de1dee0f8 c000000ddafb89e4 GPR28: c000000de1c43b10 c000000d8ad558d8 00003fff5b000000 4200000001c10118 NIP [c00000000027bf6c] zap_huge_pmd+0x4c/0x470 LR [c00000000027bf64] zap_huge_pmd+0x44/0x470 Call Trace: [c000000de1c43aa0] [c00000000027bf64] zap_huge_pmd+0x44/0x470 (unreliable) [c000000de1c43af0] [c00000000022bbd8] unmap_page_range+0xcf8/0xed0 [c000000de1c43c30] [c00000000022c2d4] unmap_vmas+0x84/0x120 [c000000de1c43c80] [c000000000235448] unmap_region+0xd8/0x1b0 [c000000de1c43d80] [c0000000002378f0] do_munmap+0x2d0/0x4c0 [c000000de1c43df0] [c000000000237be4] SyS_munmap+0x64/0xb0 [c000000de1c43e30] [c000000000009560] system_call+0x38/0x108 Instruction dump: fbe1fff8 fb81ffe0 7c7f1b78 7ca32b78 7cbd2b78 f8010010 7c9a2378 f821ffb1 7cde3378 4bfffea9 7c7b1b79 41820298 <e87f0000> 48000130 7fa5eb78 7fc4f378 ---[ end trace 1bb70b176c9e87ad ]--- -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1628976 Title: Ubuntu 16.10: Oops panic in move_page_tables/page_remove_rmap after running memory_stress_ng. Status in linux package in Ubuntu: New Bug description: FYI Canonical: We have been seeing various page handling issues during memory stress in the 4.8 kernels. The following is the most recent issue resulting in system panics on this host after the 4.8.0-17 update: == Comment: #17 - PAVITHRA R. PRAKASH - 2016-09-28 06:26:21 == Hi, Tried running on 4.8.0-17-generic kernel. Getting below call trace and system crashes. Attaching logs. [ 2959.364333] Unable to handle kernel paging request for data at address 0xf000000002fe4020 [ 2959.364345] Faulting instruction address: 0xc0000000002bb2a0 [ 2959.364356] Oops: Kernel access of bad area, sig: 11 [#1] [ 2959.364364] SMP NR_CPUS=2048 NUMA pSeries [ 2959.364377] Modules linked in: rpadlpar_io rpaphp dccp_diag dccp tcp_diag udp_diag inet_diag unix_diag af_packet_diag netlink_diag bnx2x mdio libcrc32c pseries_rng vmx_crypto binfmt_misc ip_tables x_tables autofs4 ibmvscsi crc32c_vpmsum [ 2959.364441] CPU: 13 PID: 108 Comm: oom_reaper Not tainted 4.8.0-17-generic #19-Ubuntu [ 2959.364452] task: c0000004fbdf9c00 task.stack: c0000004fbe00000 [ 2959.364461] NIP: c0000000002bb2a0 LR: c000000000300618 CTR: c00000000009ca40 [ 2959.364471] REGS: c0000004fbe036e0 TRAP: 0300 Not tainted (4.8.0-17-generic) [ 2959.364481] MSR: 800000010280b033 <SF,VEC,VSX,EE,FP,ME,IR,DR,RI,LE,TM[E]> CR: 24028844 XER: 2000000c [ 2959.364526] CFAR: c000000000300614 DAR: f000000002fe4020 DSISR: 40000000 SOFTE: 1 GPR00: c000000000300618 c0000004fbe03960 c0000000014e5e00 f000000002fe4000 GPR04: 0000000000000001 0000000000000800 0000000000000000 c000000001665e00 GPR08: 00000000f900a196 0000000000000001 0000000002fe4000 0000000000000000 GPR12: 0000000000008800 c000000001b37500 0008000000000000 c1ffffffffffe7ff GPR16: c0000004f62a55f0 00003fff9a000000 00003fff99000000 0000000000000000 GPR20: c0000004fbe03b80 c0000004e0713800 8e017c33020000c0 0000000000010000 GPR24: c0000000fb3614c8 c0000000fce9d990 c0000000fce9d6e4 96a100f90b000040 GPR28: f000000002fe4000 c0000000fb3614c8 0000000000000001 f000000002fe4000 [ 2959.364673] NIP [c0000000002bb2a0] page_remove_rmap+0x30/0x4b0 [ 2959.364685] LR [c000000000300618] zap_huge_pmd+0xf8/0x480 [ 2959.364692] Call Trace: [ 2959.364699] [c0000004fbe03960] [c0000004fbe039a0] 0xc0000004fbe039a0 (unreliable) [ 2959.364714] [c0000004fbe039a0] [c000000000300618] zap_huge_pmd+0xf8/0x480 [ 2959.364726] [c0000004fbe039f0] [c0000000002a68d8] unmap_page_range+0xd08/0xee0 [ 2959.364740] [c0000004fbe03b20] [c00000000025c474] __oom_reap_task+0x204/0x2c0 [ 2959.364752] [c0000004fbe03c80] [c00000000025cda8] oom_reaper+0x1e8/0x300 [ 2959.364765] [c0000004fbe03d80] [c0000000000fd120] kthread+0x110/0x130 [ 2959.364778] [c0000004fbe03e30] [c0000000000098f0] ret_from_kernel_thread+0x5c/0x6c [ 2959.364788] Instruction dump: [ 2959.364796] 3c4c0123 3842ab90 7c0802a6 fba1ffe8 fbc1fff0 fbe1fff8 f8010010 f821ffc1 [ 2959.364821] 7c7f1b78 7c9e2378 60000000 60000000 <e95f0020> 71480001 392affff 40820008 [ 2959.364871] ---[ end trace 178b14c6911b70dc ]--- [ 2959.372762] [ 2959.372798] Sending IPI to other CPUs [ 2959.373834] IPI complete Thanks, Pavithra To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1628976/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp