Bug 12405
Summary: | oops in __bounce_end_io_read under kvm | ||
---|---|---|---|
Product: | IO/Storage | Reporter: | Rafael J. Wysocki (rjw) |
Component: | Block Layer | Assignee: | Jens Axboe (axboe) |
Status: | CLOSED CODE_FIX | ||
Severity: | normal | CC: | hch, hch |
Priority: | P1 | ||
Hardware: | All | ||
OS: | Linux | ||
Kernel Version: | 2.6.28-rc9-xfs | Subsystem: | |
Regression: | Yes | Bisected commit-id: | |
Bug Depends on: | |||
Bug Blocks: | 11808 |
Description
Rafael J. Wysocki
2009-01-10 15:09:56 UTC
Christoph, Jens, what's happening to this bug? Reply-To: hch@lst.de On Mon, Mar 02, 2009 at 02:50:45PM -0800, bugme-daemon@bugzilla.kernel.org wrote: > ------- Comment #1 from rjw@sisk.pl 2009-03-02 14:50 ------- > Christoph, Jens, what's happening to this bug? I've disabled CONFIG_HIGHMEM so I could continue my xfsqa runs. Will give it a few tries with highmem enabled again. On Saturday 14 March 2009, Christoph Hellwig wrote:
> On Tue, Mar 03, 2009 at 08:41:32PM +0100, Rafael J. Wysocki wrote:
> > This message has been generated automatically as a part of a report
> > of regressions introduced between 2.6.27 and 2.6.28.
> >
> > The following bug entry is on the current list of known regressions
> > introduced between 2.6.27 and 2.6.28. Please verify if it still should
> > be listed and let me know (either way).
> >
> >
> > Bug-Entry : http://bugzilla.kernel.org/show_bug.cgi?id=12405
> > Subject : oops in __bounce_end_io_read under kvm
> > Submitter : Christoph Hellwig <hch@lst.de>
> > Date : 2008-12-26 17:36 (68 days old)
> > References : http://marc.info/?l=linux-kernel&m=123031303400676&w=4
>
> I haven't been able to hit this anymore for a while.
It's back in 2.6.30: [ 1146.263259] BUG: unable to handle kernel paging request at fffb9a00 [ 1146.265487] IP: [<c01c4d8b>] __bounce_end_io_read+0xcb/0x120 [ 1146.265487] *pde = 00cac067 *pte = 00000000 [ 1146.265487] Oops: 0002 [#1] SMP [ 1146.265487] last sysfs file: /sys/class/net/lo/operstate [ 1146.265487] Modules linked in: [ 1146.265487] [ 1146.265487] Pid: 13008, comm: xfs_repair Not tainted (2.6.30-xfs #306) [ 1146.265487] EIP: 0060:[<c01c4d8b>] EFLAGS: 00010086 CPU: 0 [ 1146.265487] EIP is at __bounce_end_io_read+0xcb/0x120 [ 1146.265487] EAX: fffb9000 EBX: 00000000 ECX: 00000180 EDX: 00000600 [ 1146.265487] ESI: f49e8a00 EDI: fffb9a00 EBP: f64b5d00 ESP: f64b5cd4 [ 1146.265487] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 [ 1146.265487] Process xfs_repair (pid: 13008, ti=f64b4000 task=f7190e90 task.ti=f64b4000) [ 1146.265487] Stack: [ 1146.265487] 00000180 00000000 f6bfb2f0 ef5e1550 f7126550 00000000 f712659c 00000086 [ 1146.265487] c01c4e00 00000000 00000000 f64b5d08 c01c4e10 f64b5d14 c01f772d ef5e1550 [ 1146.265487] f64b5d38 c05cd849 c05cda96 00000001 00000046 f7190e90 00001000 ef5e1550 [ 1146.265487] Call Trace: [ 1146.265487] [<c01c4e00>] ? bounce_end_io_read+0x0/0x20 [ 1146.265487] [<c01c4e10>] ? bounce_end_io_read+0x10/0x20 [ 1146.265487] [<c01f772d>] ? bio_endio+0x1d/0x40 [ 1146.265487] [<c05cd849>] ? req_bio_endio+0x99/0x100 [ 1146.265487] [<c05cda96>] ? __end_that_request_first+0x1e6/0x2e0 [ 1146.265487] [<c05cd97b>] ? __end_that_request_first+0xcb/0x2e0 [ 1146.265487] [<c05cda15>] ? __end_that_request_first+0x165/0x2e0 [ 1146.265487] [<c05cf2df>] ? __blk_end_request+0x1f/0x50 [ 1146.265487] [<c066127d>] ? blk_done+0x4d/0x90 [ 1146.265487] [<c070723a>] ? vring_interrupt+0x2a/0x40 [ 1146.265487] [<c07079aa>] ? vp_interrupt+0x7a/0xb0 [ 1146.265487] [<c018a110>] ? handle_IRQ_event+0x50/0x140 [ 1146.265487] [<c018bd9a>] ? handle_fasteoi_irq+0x5a/0xd0 [ 1146.265487] [<c018bda4>] ? handle_fasteoi_irq+0x64/0xd0 [ 1146.265487] [<c0123f24>] ? handle_irq+0x34/0x60 [ 1146.265487] [<c01236f6>] ? do_IRQ+0x46/0xb0 [ 1146.265487] [<c01ae384>] ? put_page+0x64/0xf0 [ 1146.265487] [<c01225ae>] ? common_interrupt+0x2e/0x34 [ 1146.265487] [<c01a00d8>] ? ftrace_raw_event_sched_process_free+0x98/0xb0 [ 1146.265487] [<c013a163>] ? kvm_leave_lazy_mmu+0x63/0x80 [ 1146.265487] [<c01ba342>] ? unmap_vmas+0x3b2/0x700 [ 1146.265487] [<c01be0f7>] ? unmap_region+0x97/0x130 [ 1146.265487] [<c01bf0a4>] ? do_munmap+0x1f4/0x290 [ 1146.265487] [<c01bf17d>] ? sys_munmap+0x3d/0x60 [ 1146.265487] [<c0121f71>] ? syscall_call+0x7/0xb [ 1146.265487] Code: 8b 55 ec 8b 04 1a ba 01 00 00 00 e8 10 c3 f7 ff 8b 4d ec 8b 54 19 04 89 c7 89 d1 c1 e9 02 89 4d d4 8b 4d ec 03 7c 19 08 8b 4d d4 <f3> a5 89 d1 83 e1 03 74 02 f3 a4 ba 01 00 00 00 e8 30 c1 f7 ff |