------- Comment From laurent.duf...@fr.ibm.com 2016-10-03 13:01 EDT------- For the record, while trying to recreate bug 146776 using a 4.8.0 kernel in the guest, I faced the issue you mentioned in comment 17 which I was hoping to be fixed with the latest commit in 4.8.0. I'd to mention that the host is running the Ubuntu kernel 4.8.0-17-generic.
Unable to handle kernel paging request for data at address 0x4200000001c10118 Faulting instruction address: 0xc00000000027bf6c Oops: Kernel access of bad area, sig: 11 [#1] SMP NR_CPUS=2048 NUMA pSeries Modules linked in: virtio_balloon ip_tables x_tables autofs4 dm_crypt virtio_net virtio_blk virtio_pci virtio_ring virtio CPU: 2 PID: 2934 Comm: mmstress Not tainted 4.8.0 #1 task: c000000de154ff80 task.stack: c000000de1c40000 NIP: c00000000027bf6c LR: c00000000027bf64 CTR: 0000000000000000 REGS: c000000de1c43820 TRAP: 0300 Not tainted (4.8.0) MSR: 8000000000009033 <SF,EE,ME,IR,DR,RI,LE> CR: 84822884 XER: 20000000 CFAR: c0000000000eacd4 DAR: 4200000001c10118 DSISR: 40000000 SOFTE: 1 GPR00: c00000000027bf64 c000000de1c43aa0 c000000000e13300 c000000ddafb89e4 GPR04: c000000de1dee0f8 c000000d8ad558d8 0000000004210095 0000000095002104 GPR08: e000000d95002104 0000000000000001 042100950d0000e0 0000000004210095 GPR12: 0000000000002200 c00000000fe00800 c000000de1dee0f8 0000000000000000 GPR16: c1ffffffffffe7ff 00003fff5b000000 4200000001c10118 00003fff5c000000 GPR20: 0008000000000000 c000000dda304800 0405e700000000e0 0000000000010000 GPR24: c000000d8ad558d8 c000000ddafb8c90 c000000de1dee0f8 c000000ddafb89e4 GPR28: c000000de1c43b10 c000000d8ad558d8 00003fff5b000000 4200000001c10118 NIP [c00000000027bf6c] zap_huge_pmd+0x4c/0x470 LR [c00000000027bf64] zap_huge_pmd+0x44/0x470 Call Trace: [c000000de1c43aa0] [c00000000027bf64] zap_huge_pmd+0x44/0x470 (unreliable) [c000000de1c43af0] [c00000000022bbd8] unmap_page_range+0xcf8/0xed0 [c000000de1c43c30] [c00000000022c2d4] unmap_vmas+0x84/0x120 [c000000de1c43c80] [c000000000235448] unmap_region+0xd8/0x1b0 [c000000de1c43d80] [c0000000002378f0] do_munmap+0x2d0/0x4c0 [c000000de1c43df0] [c000000000237be4] SyS_munmap+0x64/0xb0 [c000000de1c43e30] [c000000000009560] system_call+0x38/0x108 Instruction dump: fbe1fff8 fb81ffe0 7c7f1b78 7ca32b78 7cbd2b78 f8010010 7c9a2378 f821ffb1 7cde3378 4bfffea9 7c7b1b79 41820298 <e87f0000> 48000130 7fa5eb78 7fc4f378 ---[ end trace 1bb70b176c9e87ad ]--- -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1628976 Title: Ubuntu 16.10: Oops panic in move_page_tables/page_remove_rmap after running memory_stress_ng. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1628976/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs