This bug is awaiting verification that the kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed- trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you! ** Tags added: verification-needed-trusty ** Tags added: verification-needed-xenial -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1628976 Title: Ubuntu 16.10: Oops panic in move_page_tables/page_remove_rmap after running memory_stress_ng. Status in linux package in Ubuntu: Fix Committed Status in linux source package in Trusty: Fix Committed Status in linux source package in Xenial: Fix Committed Status in linux source package in Yakkety: Fix Committed Bug description: FYI Canonical: We have been seeing various page handling issues during memory stress in the 4.8 kernels. The following is the most recent issue resulting in system panics on this host after the 4.8.0-17 update: == Comment: #17 - PAVITHRA R. PRAKASH - 2016-09-28 06:26:21 == Hi, Tried running on 4.8.0-17-generic kernel. Getting below call trace and system crashes. Attaching logs. [ 2959.364333] Unable to handle kernel paging request for data at address 0xf000000002fe4020 [ 2959.364345] Faulting instruction address: 0xc0000000002bb2a0 [ 2959.364356] Oops: Kernel access of bad area, sig: 11 [#1] [ 2959.364364] SMP NR_CPUS=2048 NUMA pSeries [ 2959.364377] Modules linked in: rpadlpar_io rpaphp dccp_diag dccp tcp_diag udp_diag inet_diag unix_diag af_packet_diag netlink_diag bnx2x mdio libcrc32c pseries_rng vmx_crypto binfmt_misc ip_tables x_tables autofs4 ibmvscsi crc32c_vpmsum [ 2959.364441] CPU: 13 PID: 108 Comm: oom_reaper Not tainted 4.8.0-17-generic #19-Ubuntu [ 2959.364452] task: c0000004fbdf9c00 task.stack: c0000004fbe00000 [ 2959.364461] NIP: c0000000002bb2a0 LR: c000000000300618 CTR: c00000000009ca40 [ 2959.364471] REGS: c0000004fbe036e0 TRAP: 0300 Not tainted (4.8.0-17-generic) [ 2959.364481] MSR: 800000010280b033 <SF,VEC,VSX,EE,FP,ME,IR,DR,RI,LE,TM[E]> CR: 24028844 XER: 2000000c [ 2959.364526] CFAR: c000000000300614 DAR: f000000002fe4020 DSISR: 40000000 SOFTE: 1 GPR00: c000000000300618 c0000004fbe03960 c0000000014e5e00 f000000002fe4000 GPR04: 0000000000000001 0000000000000800 0000000000000000 c000000001665e00 GPR08: 00000000f900a196 0000000000000001 0000000002fe4000 0000000000000000 GPR12: 0000000000008800 c000000001b37500 0008000000000000 c1ffffffffffe7ff GPR16: c0000004f62a55f0 00003fff9a000000 00003fff99000000 0000000000000000 GPR20: c0000004fbe03b80 c0000004e0713800 8e017c33020000c0 0000000000010000 GPR24: c0000000fb3614c8 c0000000fce9d990 c0000000fce9d6e4 96a100f90b000040 GPR28: f000000002fe4000 c0000000fb3614c8 0000000000000001 f000000002fe4000 [ 2959.364673] NIP [c0000000002bb2a0] page_remove_rmap+0x30/0x4b0 [ 2959.364685] LR [c000000000300618] zap_huge_pmd+0xf8/0x480 [ 2959.364692] Call Trace: [ 2959.364699] [c0000004fbe03960] [c0000004fbe039a0] 0xc0000004fbe039a0 (unreliable) [ 2959.364714] [c0000004fbe039a0] [c000000000300618] zap_huge_pmd+0xf8/0x480 [ 2959.364726] [c0000004fbe039f0] [c0000000002a68d8] unmap_page_range+0xd08/0xee0 [ 2959.364740] [c0000004fbe03b20] [c00000000025c474] __oom_reap_task+0x204/0x2c0 [ 2959.364752] [c0000004fbe03c80] [c00000000025cda8] oom_reaper+0x1e8/0x300 [ 2959.364765] [c0000004fbe03d80] [c0000000000fd120] kthread+0x110/0x130 [ 2959.364778] [c0000004fbe03e30] [c0000000000098f0] ret_from_kernel_thread+0x5c/0x6c [ 2959.364788] Instruction dump: [ 2959.364796] 3c4c0123 3842ab90 7c0802a6 fba1ffe8 fbc1fff0 fbe1fff8 f8010010 f821ffc1 [ 2959.364821] 7c7f1b78 7c9e2378 60000000 60000000 <e95f0020> 71480001 392affff 40820008 [ 2959.364871] ---[ end trace 178b14c6911b70dc ]--- [ 2959.372762] [ 2959.372798] Sending IPI to other CPUs [ 2959.373834] IPI complete Thanks, Pavithra To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1628976/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : email@example.com Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp