Leann, A fresh set of Power9 patches for the kernel. Michael On 03/09/2017 11:29 AM, Launchpad Bug Tracker wrote: > bugproxy (bugproxy) has assigned this bug to you for Ubuntu: > > Dear Canonical, > > Currently Ubuntu is having some issues on a POWER9 machine, as: > > > [ 443.933079] ------------[ cut here ]------------ > [ 443.933102] WARNING: CPU: 10 PID: 10243 at /build/linux-iMfvOW/linux-4.10.0/arch/powerpc/mm/fault.c:428 do_page_fault+0x5d8/0x7d0 > [ 443.933105] Modules linked in: vmx_crypto ofpart cmdlinepart ipmi_powernv powernv_flash ipmi_devintf mtd uio_pdrv_genirq ipmi_msghandler ibmpowernv opal_prd uio ib_iser rdma_cm iw_cm ib_cm ib_core configfs iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 ses enclosure scsi_transport_sas btrfs raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear ast i2c_algo_bit ttm drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops crc32c_vpmsum drm i40e aacraid > [ 443.933206] CPU: 10 PID: 10243 Comm: apt-get Not tainted 4.10.0-9-generic #11-Ubuntu > [ 443.933211] task: c0000007adbc2c00 task.stack: c0000007adc60000 > [ 443.933214] NIP: c0000000000519d8 LR: c0000000000515b4 CTR: 0000000000000003 > [ 443.933217] REGS: c0000007adc63b00 TRAP: 0700 Not tainted (4.10.0-9-generic) > [ 443.933219] MSR: 9000000000029033 > [ 443.933237] CR: 48248422 XER: 00000000 > [ 443.933240] CFAR: c00000000005163c SOFTE: 1 > GPR00: c0000000000515b4 c0000007adc63d80 c00000000142c400 c0000007ad0a3b60 > GPR04: 00003fff7b7bc92c 0000000000000000 00000007fc020000 0000000000000000 > GPR08: 0000000000000003 0000000000000001 c0000000012ec400 0000000000000000 > GPR12: 0000000000004000 c00000000fb85a00 0000000000000001 00003fff7d640ea8 > GPR16: 00003fffdc1b6e78 00003fffdc1b6e70 00003fffdc1b6e68 00003fffdc1b6e58 > GPR20: 00003fff7d640e00 ffffffffffffffc0 0000000000030001 0000000000000000 > GPR24: 0000000000000054 c0000007b21e0b68 c0000007ad0a3b60 c0000007b21e0b00 > GPR28: 00003fff7b7bc92c 0000000008000000 0000000000000000 c0000007adc63ea0 > [ 443.933307] NIP [c0000000000519d8] do_page_fault+0x5d8/0x7d0 > [ 443.933312] LR [c0000000000515b4] do_page_fault+0x1b4/0x7d0 > [ 443.933314] Call Trace: > [ 443.933320] [c0000007adc63d80] [c0000000000515b4] do_page_fault+0x1b4/0x7d0 (unreliable) > [ 443.933328] [c0000007adc63e30] [c00000000000a4e8] handle_page_fault+0x10/0x30 > [ 443.933332] Instruction dump: > [ 443.933337] 60000000 60420000 71280007 4182fe1c 77a90800 4182fc94 3d42ffec 892ab491 > [ 443.933351] 2f890000 409efc84 39200001 992ab491 <0fe00000> 4bfffc74 7f86e378 7ec5b378 > [ 443.933366] ---[ end trace 4798790ae3dab875 ]--- > > > ====== > > > We would like to include the following patches to fix it: > > * cee216a696b2004017a5ecb583366093d90b1568 mm/autonuma: don't use > set_pte_at when updating protnone ptes > > * 288bc54949fc2625a4fd811a188fb200cc498946 mm/autonuma: let architecture > override how the write bit should be stashed in a protnone pte. > > * 595cd8f256d24face93b2722927ec9c980419c26 mm/ksm: handle protnone saved > writes when making page write protect > > * c137a2757b88658ce61c74b25ff650ecda7f09d8 switch ppc64 to its own > implementation of saved write > > * db08f2030a173fdb95b2e8e28d82c4e8c04df2ac mm/gup: check for protnone > only if it is a PTE entry > > * 9a8b300f2f7812ebf4630b8b40499da38b38e882 mm/thp/autonuma: use TNF flag > instead of vm fault > > > * power/mm: update pte_write and pte_wrprotect to handle savedwrite: http://ozlabs.org/~akpm/mmots/broken-out/power-mm-update-pte_write-and-pte_wrprotect-to-handle-savedwrite.patch > > * powerpc/mm: Handle protnone ptes on fork: > http://ozlabs.org/~akpm/mmots/broken-out/powerpc-mm-handle-protnone- > ptes-on-fork.patch > > > Thanks > > ** Affects: ubuntu > Importance: Undecided > Assignee: Taco Screen team (taco-screen-team) > Status: New > > > ** Tags: architecture-ppc64le bugnameltc-152432 severity-high targetmilestone-inin1604 -- Michael Hohnbaum OIL Program Manager Power (ppc64el) Development Project Manager Canonical, Ltd.