Comment 6 for bug 1628976

Revision history for this message
bugproxy (bugproxy) wrote : Comment bridged from LTC Bugzilla

------- Comment From <email address hidden> 2016-10-03 13:01 EDT-------
For the record, while trying to recreate bug 146776 using a 4.8.0 kernel in the guest, I faced the issue you mentioned in comment 17 which I was hoping to be fixed with the latest commit in 4.8.0.
I'd to mention that the host is running the Ubuntu kernel 4.8.0-17-generic.

Unable to handle kernel paging request for data at address 0x4200000001c10118
Faulting instruction address: 0xc00000000027bf6c
Oops: Kernel access of bad area, sig: 11 [#1]
SMP NR_CPUS=2048 NUMA pSeries
Modules linked in: virtio_balloon ip_tables x_tables autofs4 dm_crypt virtio_net virtio_blk virtio_pci virtio_ring virtio
CPU: 2 PID: 2934 Comm: mmstress Not tainted 4.8.0 #1
task: c000000de154ff80 task.stack: c000000de1c40000
NIP: c00000000027bf6c LR: c00000000027bf64 CTR: 0000000000000000
REGS: c000000de1c43820 TRAP: 0300 Not tainted (4.8.0)
MSR: 8000000000009033 <SF,EE,ME,IR,DR,RI,LE> CR: 84822884 XER: 20000000
CFAR: c0000000000eacd4 DAR: 4200000001c10118 DSISR: 40000000 SOFTE: 1
GPR00: c00000000027bf64 c000000de1c43aa0 c000000000e13300 c000000ddafb89e4
GPR04: c000000de1dee0f8 c000000d8ad558d8 0000000004210095 0000000095002104
GPR08: e000000d95002104 0000000000000001 042100950d0000e0 0000000004210095
GPR12: 0000000000002200 c00000000fe00800 c000000de1dee0f8 0000000000000000
GPR16: c1ffffffffffe7ff 00003fff5b000000 4200000001c10118 00003fff5c000000
GPR20: 0008000000000000 c000000dda304800 0405e700000000e0 0000000000010000
GPR24: c000000d8ad558d8 c000000ddafb8c90 c000000de1dee0f8 c000000ddafb89e4
GPR28: c000000de1c43b10 c000000d8ad558d8 00003fff5b000000 4200000001c10118
NIP [c00000000027bf6c] zap_huge_pmd+0x4c/0x470
LR [c00000000027bf64] zap_huge_pmd+0x44/0x470
Call Trace:
[c000000de1c43aa0] [c00000000027bf64] zap_huge_pmd+0x44/0x470 (unreliable)
[c000000de1c43af0] [c00000000022bbd8] unmap_page_range+0xcf8/0xed0
[c000000de1c43c30] [c00000000022c2d4] unmap_vmas+0x84/0x120
[c000000de1c43c80] [c000000000235448] unmap_region+0xd8/0x1b0
[c000000de1c43d80] [c0000000002378f0] do_munmap+0x2d0/0x4c0
[c000000de1c43df0] [c000000000237be4] SyS_munmap+0x64/0xb0
[c000000de1c43e30] [c000000000009560] system_call+0x38/0x108
Instruction dump:
fbe1fff8 fb81ffe0 7c7f1b78 7ca32b78 7cbd2b78 f8010010 7c9a2378 f821ffb1
7cde3378 4bfffea9 7c7b1b79 41820298 <e87f0000> 48000130 7fa5eb78 7fc4f378
---[ end trace 1bb70b176c9e87ad ]---