Same issue with upstream 4.14.0-rc2:
[ 12.034089] Unable to handle kernel paging request for data at address 0x00000000 [ 12.034374] Faulting instruction address: 0xc0000000005230b8 [ 12.034819] Oops: Kernel access of bad area, sig: 11 [#1] [ 12.034889] LE SMP NR_CPUS=2048 NUMA pSeries [ 12.035371] Modules linked in: [ 12.035817] CPU: 0 PID: 167 Comm: (solvconf) Not tainted 4.14.0-rc2 #1 [ 12.036080] task: c000000039a58a00 task.stack: c000000039a70000 [ 12.036180] NIP: c0000000005230b8 LR: c000000000523040 CTR: c000000000296950 [ 12.036262] REGS: c000000039a73530 TRAP: 0300 Not tainted (4.14.0-rc2) [ 12.036321] MSR: 800000000280b033 <SF,VEC,VSX,EE,FP,ME,IR,DR,RI,LE> CR: 44248882 XER: 00000000 [ 12.036721] CFAR: c000000000008708 DAR: 0000000000000000 DSISR: 40000000 SOFTE: 1 [ 12.036721] GPR00: c000000000523040 c000000039a737b0 c00000000172a100 c00000003a5ef3c0 [ 12.036721] GPR04: c000000000ff0e58 c000000001a3ddc0 000000000000483b 0000000000000000 [ 12.036721] GPR08: 0000000000000000 001ffffc0000102d 00000000002103b2 c00000000fdc0008 [ 12.036721] GPR12: 0000000000002000 c00000000fdc0000 c0000000377c8100 0000000000000000 [ 12.036721] GPR16: 0000000000000000 c000000037b1bb80 c0000000377ecaa0 c000000039e22f10 [ 12.036721] GPR20: c000000039a73bd0 0000000000000041 0000000080000000 0000000080000000 [ 12.036721] GPR24: 0000000000000001 00000000002103b2 0000000000000000 c0000000377e93a0 [ 12.036721] GPR28: 0000000000001000 f0000000000e6480 c00000003949f300 c00000003a5ef380 [ 12.038096] NIP [c0000000005230b8] __get_metapage+0x218/0x6d0 [ 12.038270] LR [c000000000523040] __get_metapage+0x1a0/0x6d0 [ 12.038375] Call Trace: [ 12.038499] [c000000039a737b0] [c000000000522ff4] __get_metapage+0x154/0x6d0 (unreliable) [ 12.038653] [c000000039a73890] [c0000000005115a0] diRead+0x130/0x250 [ 12.038745] [c000000039a73940] [c000000000507904] jfs_iget+0x64/0x1d0 [ 12.038804] [c000000039a73970] [c000000000508e7c] jfs_lookup+0xdc/0xf0 [ 12.038872] [c000000039a73aa0] [c00000000038af80] path_openat+0x1280/0x1460 [ 12.038938] [c000000039a73ba0] [c00000000038ca5c] do_filp_open+0xec/0x160 [ 12.038998] [c000000039a73cd0] [c00000000037d1e4] do_open_execat+0x84/0x210 [ 12.039067] [c000000039a73d30] [c00000000037feb4] do_execveat_common.isra.13+0x234/0x840 [ 12.039252] [c000000039a73e00] [c0000000003807a4] SyS_execve+0x54/0x70 [ 12.039336] [c000000039a73e30] [c00000000000b104] system_call+0x58/0x6c [ 12.039470] Instruction dump: [ 12.039682] 7fc9f214 39200001 fbdf0030 f93f0028 e93d0000 71281000 41820428 ebdd0030 [ 12.039818] 41920034 e8fd0008 811e0000 e95f0038 <e8c70000> 38e80001 81060090 90fe0000 [ 12.040789] ---[ end trace e842adbc1d2236a6 ]---
Same issue with upstream 4.14.0-rc2:
[ 12.034089] Unable to handle kernel paging request for data at address 0x00000000 VSX,EE, FP,ME,IR, DR,RI,LE> CR: 44248882 XER: 00000000 0x218/0x6d0 0x1a0/0x6d0 0x154/0x6d0 (unreliable) 0xdc/0xf0 0x1280/ 0x1460 open+0xec/ 0x160 execat+ 0x84/0x210 common. isra.13+ 0x234/0x840 0x54/0x70 call+0x58/ 0x6c
[ 12.034374] Faulting instruction address: 0xc0000000005230b8
[ 12.034819] Oops: Kernel access of bad area, sig: 11 [#1]
[ 12.034889] LE SMP NR_CPUS=2048 NUMA pSeries
[ 12.035371] Modules linked in:
[ 12.035817] CPU: 0 PID: 167 Comm: (solvconf) Not tainted 4.14.0-rc2 #1
[ 12.036080] task: c000000039a58a00 task.stack: c000000039a70000
[ 12.036180] NIP: c0000000005230b8 LR: c000000000523040 CTR: c000000000296950
[ 12.036262] REGS: c000000039a73530 TRAP: 0300 Not tainted (4.14.0-rc2)
[ 12.036321] MSR: 800000000280b033 <SF,VEC,
[ 12.036721] CFAR: c000000000008708 DAR: 0000000000000000 DSISR: 40000000 SOFTE: 1
[ 12.036721] GPR00: c000000000523040 c000000039a737b0 c00000000172a100 c00000003a5ef3c0
[ 12.036721] GPR04: c000000000ff0e58 c000000001a3ddc0 000000000000483b 0000000000000000
[ 12.036721] GPR08: 0000000000000000 001ffffc0000102d 00000000002103b2 c00000000fdc0008
[ 12.036721] GPR12: 0000000000002000 c00000000fdc0000 c0000000377c8100 0000000000000000
[ 12.036721] GPR16: 0000000000000000 c000000037b1bb80 c0000000377ecaa0 c000000039e22f10
[ 12.036721] GPR20: c000000039a73bd0 0000000000000041 0000000080000000 0000000080000000
[ 12.036721] GPR24: 0000000000000001 00000000002103b2 0000000000000000 c0000000377e93a0
[ 12.036721] GPR28: 0000000000001000 f0000000000e6480 c00000003949f300 c00000003a5ef380
[ 12.038096] NIP [c0000000005230b8] __get_metapage+
[ 12.038270] LR [c000000000523040] __get_metapage+
[ 12.038375] Call Trace:
[ 12.038499] [c000000039a737b0] [c000000000522ff4] __get_metapage+
[ 12.038653] [c000000039a73890] [c0000000005115a0] diRead+0x130/0x250
[ 12.038745] [c000000039a73940] [c000000000507904] jfs_iget+0x64/0x1d0
[ 12.038804] [c000000039a73970] [c000000000508e7c] jfs_lookup+
[ 12.038872] [c000000039a73aa0] [c00000000038af80] path_openat+
[ 12.038938] [c000000039a73ba0] [c00000000038ca5c] do_filp_
[ 12.038998] [c000000039a73cd0] [c00000000037d1e4] do_open_
[ 12.039067] [c000000039a73d30] [c00000000037feb4] do_execveat_
[ 12.039252] [c000000039a73e00] [c0000000003807a4] SyS_execve+
[ 12.039336] [c000000039a73e30] [c00000000000b104] system_
[ 12.039470] Instruction dump:
[ 12.039682] 7fc9f214 39200001 fbdf0030 f93f0028 e93d0000 71281000 41820428 ebdd0030
[ 12.039818] 41920034 e8fd0008 811e0000 e95f0038 <e8c70000> 38e80001 81060090 90fe0000
[ 12.040789] ---[ end trace e842adbc1d2236a6 ]---