[<prev] [next>] [day] [month] [year] [list]
Message-Id: <B26EE8AA-96E9-4E15-B0BF-751F455C883E@gmx.us>
Date: Tue, 13 Nov 2018 21:58:06 -0500
From: Qian Cai <cai@....us>
To: linux kernel <linux-kernel@...r.kernel.org>
Cc: catalin Marinas <catalin.marinas@....com>,
linuxppc-dev@...ts.ozlabs.org
Subject: Unable to handle kernel paging request for data at address
0xc000000001da0000
Running some container workloads on an IBM power9 server with the latest mainline (rc2) triggered this,
[ 1283.894167] Unable to handle kernel paging request for data at address 0xc000000001da0000
[ 1283.894215] Faulting instruction address: 0xc000000000487ab8
[ 1283.894223] Oops: Kernel access of bad area, sig: 11 [#1]
[ 1283.894227] LE SMP NR_CPUS=2048 DEBUG_PAGEALLOC NUMA pSeries
[ 1283.894235] Modules linked in: nf_conntrack_netlink xt_mark tun udp_diag tcp_diag inet_diag netlink_diag af_packet_diag unix_diag nft_chain_nat_ipv6 nf_nat_ipv6 xt_conntrack ipt_MASQUERADE nft_counter xt_comment nft_compat nft_chain_nat_ipv4 nf_nat_ipv4 nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nf_tables veth bridge stp llc nfnetlink overlay sg pseries_rng xfs libcrc32c sd_mod ibmvscsi ibmveth scsi_transport_srp dm_mirror dm_region_hash dm_log dm_mod
[ 1283.894275] CPU: 0 PID: 226 Comm: kmemleak Kdump: loaded Not tainted 4.20.0-rc2+ #1
[ 1283.894281] NIP: c000000000487ab8 LR: c000000000487ab0 CTR: 0000000000000000
[ 1283.894287] REGS: c0000005e94f3970 TRAP: 0300 Not tainted (4.20.0-rc2+)
[ 1283.894291] MSR: 800000010280b033 <SF,VEC,VSX,EE,FP,ME,IR,DR,RI,LE,TM[E]> CR: 24000822 XER: 00000000
[ 1283.894302] CFAR: c000000000487a04 DAR: c000000001da0000 DSISR: 40000000 IRQMASK: 1
GPR00: c000000000487ab0 c0000005e94f3bf8 c000000001c93400 0000000000000000
GPR04: c0000005d9380a90 0000000000000001 00000000e7d83172 c0000005d9380a90
GPR08: 0000000078811199 c0000005f1665ac8 c0000005d9380080 fffffffffce6b398
GPR12: 0000000000000000 c000000002de0000 c0000000001717b8 c0000005efa49ab8
GPR16: 0000000000000000 0000000000000000 0000000000000000 0000000000000000
GPR20: 0000000000000000 0000000000000000 0000000000000000 c000000001b85220
GPR24: c00000046a1d8848 c00000046a1d1b88 0000000000000000 0000000000000000
GPR28: c000000001da0ff9 c000000000f3b620 c000000001b85108 c000000001da0000
[ 1283.894352] NIP [c000000000487ab8] scan_block+0xa8/0x190
[ 1283.894357] LR [c000000000487ab0] scan_block+0xa0/0x190
[ 1283.894361] Call Trace:
[ 1283.894365] [c0000005e94f3bf8] [c000000000487ab0] scan_block+0xa0/0x190 (unreliable)
[ 1283.894372] [c0000005e94f3c58] [c000000000487c00] scan_large_block+0x60/0xa0
[ 1283.894378] [c0000005e94f3c98] [c00000000048857c] kmemleak_scan+0x24c/0xa10
[ 1283.894384] [c0000005e94f3d48] [c000000000489960] kmemleak_scan_thread+0xec/0x12c
[ 1283.894391] [c0000005e94f3db8] [c00000000017196c] kthread+0x1bc/0x1d0
[ 1283.894397] [c0000005e94f3e28] [c00000000000b860] ret_from_kernel_thread+0x5c/0x7c
[ 1283.894402] Instruction dump:
[ 1283.894408] 7fa3eb78 4883847d 60000000 60000000 60000000 60000000 3bff0008 7fbcf840
[ 1283.894416] 409d00b8 4bfffeed 2fa30000 409e00ac <e87f0000> e93e0108 7fa91840 419dffdc
[ 1283.894425] ---[ end trace 8e9576ac10ae13a1 ]---
[ 1283.897274]
[ 1283.897288] Sending IPI to other CPUs
[ 1285.021354] IPI complete
[ 1285.042568] kexec: Starting switchover sequence.
Powered by blists - more mailing lists