Bug 12405 - oops in __bounce_end_io_read under kvm
Summary: oops in __bounce_end_io_read under kvm
Status: CLOSED CODE_FIX
Alias: None
Product: IO/Storage
Classification: Unclassified
Component: Block Layer (show other bugs)
Hardware: All Linux
: P1 normal
Assignee: Jens Axboe
URL:
Keywords:
Depends on:
Blocks: 11808
  Show dependency tree
 
Reported: 2009-01-10 15:09 UTC by Rafael J. Wysocki
Modified: 2009-06-13 10:39 UTC (History)
2 users (show)

See Also:
Kernel Version: 2.6.28-rc9-xfs
Subsystem:
Regression: Yes
Bisected commit-id:


Attachments

Description Rafael J. Wysocki 2009-01-10 15:09:56 UTC
Subject    : oops in __bounce_end_io_read under kvm
Submitter  : Christoph Hellwig <hch@lst.de>
Date       : 2008-12-26 17:36
References : http://marc.info/?l=linux-kernel&m=123031303400676&w=4
Handled-By : Jens Axboe <jens.axboe@oracle.com>

This entry is being used for tracking a regression from 2.6.27.  Please don't
close it until the problem is fixed in the mainline.
Comment 1 Rafael J. Wysocki 2009-03-02 14:50:45 UTC
Christoph, Jens, what's happening to this bug?
Comment 2 Anonymous Emailer 2009-03-03 08:12:02 UTC
Reply-To: hch@lst.de

On Mon, Mar 02, 2009 at 02:50:45PM -0800, bugme-daemon@bugzilla.kernel.org wrote:
> ------- Comment #1 from rjw@sisk.pl  2009-03-02 14:50 -------
> Christoph, Jens, what's happening to this bug?

I've disabled CONFIG_HIGHMEM so I could continue my xfsqa runs.  Will
give it a few tries with highmem enabled again.
Comment 3 Rafael J. Wysocki 2009-03-14 11:23:25 UTC
On Saturday 14 March 2009, Christoph Hellwig wrote:
> On Tue, Mar 03, 2009 at 08:41:32PM +0100, Rafael J. Wysocki wrote:
> > This message has been generated automatically as a part of a report
> > of regressions introduced between 2.6.27 and 2.6.28.
> > 
> > The following bug entry is on the current list of known regressions
> > introduced between 2.6.27 and 2.6.28.  Please verify if it still should
> > be listed and let me know (either way).
> > 
> > 
> > Bug-Entry   : http://bugzilla.kernel.org/show_bug.cgi?id=12405
> > Subject             : oops in __bounce_end_io_read under kvm
> > Submitter   : Christoph Hellwig <hch@lst.de>
> > Date                : 2008-12-26 17:36 (68 days old)
> > References  : http://marc.info/?l=linux-kernel&m=123031303400676&w=4
> 
> I haven't been able to hit this anymore for a while.
Comment 4 Christoph Hellwig 2009-06-13 10:39:05 UTC
It's back in 2.6.30:

[ 1146.263259] BUG: unable to handle kernel paging request at fffb9a00
[ 1146.265487] IP: [<c01c4d8b>] __bounce_end_io_read+0xcb/0x120
[ 1146.265487] *pde = 00cac067 *pte = 00000000 
[ 1146.265487] Oops: 0002 [#1] SMP 
[ 1146.265487] last sysfs file: /sys/class/net/lo/operstate
[ 1146.265487] Modules linked in:
[ 1146.265487] 
[ 1146.265487] Pid: 13008, comm: xfs_repair Not tainted (2.6.30-xfs #306) 
[ 1146.265487] EIP: 0060:[<c01c4d8b>] EFLAGS: 00010086 CPU: 0
[ 1146.265487] EIP is at __bounce_end_io_read+0xcb/0x120
[ 1146.265487] EAX: fffb9000 EBX: 00000000 ECX: 00000180 EDX: 00000600
[ 1146.265487] ESI: f49e8a00 EDI: fffb9a00 EBP: f64b5d00 ESP: f64b5cd4
[ 1146.265487]  DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068
[ 1146.265487] Process xfs_repair (pid: 13008, ti=f64b4000 task=f7190e90 task.ti=f64b4000)
[ 1146.265487] Stack:
[ 1146.265487]  00000180 00000000 f6bfb2f0 ef5e1550 f7126550 00000000 f712659c 00000086
[ 1146.265487]  c01c4e00 00000000 00000000 f64b5d08 c01c4e10 f64b5d14 c01f772d ef5e1550
[ 1146.265487]  f64b5d38 c05cd849 c05cda96 00000001 00000046 f7190e90 00001000 ef5e1550
[ 1146.265487] Call Trace:
[ 1146.265487]  [<c01c4e00>] ? bounce_end_io_read+0x0/0x20
[ 1146.265487]  [<c01c4e10>] ? bounce_end_io_read+0x10/0x20
[ 1146.265487]  [<c01f772d>] ? bio_endio+0x1d/0x40
[ 1146.265487]  [<c05cd849>] ? req_bio_endio+0x99/0x100
[ 1146.265487]  [<c05cda96>] ? __end_that_request_first+0x1e6/0x2e0
[ 1146.265487]  [<c05cd97b>] ? __end_that_request_first+0xcb/0x2e0
[ 1146.265487]  [<c05cda15>] ? __end_that_request_first+0x165/0x2e0
[ 1146.265487]  [<c05cf2df>] ? __blk_end_request+0x1f/0x50
[ 1146.265487]  [<c066127d>] ? blk_done+0x4d/0x90
[ 1146.265487]  [<c070723a>] ? vring_interrupt+0x2a/0x40
[ 1146.265487]  [<c07079aa>] ? vp_interrupt+0x7a/0xb0
[ 1146.265487]  [<c018a110>] ? handle_IRQ_event+0x50/0x140
[ 1146.265487]  [<c018bd9a>] ? handle_fasteoi_irq+0x5a/0xd0
[ 1146.265487]  [<c018bda4>] ? handle_fasteoi_irq+0x64/0xd0
[ 1146.265487]  [<c0123f24>] ? handle_irq+0x34/0x60
[ 1146.265487]  [<c01236f6>] ? do_IRQ+0x46/0xb0
[ 1146.265487]  [<c01ae384>] ? put_page+0x64/0xf0
[ 1146.265487]  [<c01225ae>] ? common_interrupt+0x2e/0x34
[ 1146.265487]  [<c01a00d8>] ? ftrace_raw_event_sched_process_free+0x98/0xb0
[ 1146.265487]  [<c013a163>] ? kvm_leave_lazy_mmu+0x63/0x80
[ 1146.265487]  [<c01ba342>] ? unmap_vmas+0x3b2/0x700
[ 1146.265487]  [<c01be0f7>] ? unmap_region+0x97/0x130
[ 1146.265487]  [<c01bf0a4>] ? do_munmap+0x1f4/0x290
[ 1146.265487]  [<c01bf17d>] ? sys_munmap+0x3d/0x60
[ 1146.265487]  [<c0121f71>] ? syscall_call+0x7/0xb
[ 1146.265487] Code: 8b 55 ec 8b 04 1a ba 01 00 00 00 e8 10 c3 f7 ff 8b 4d ec 8b 54 19 04 89 c7 89 d1 c1 e9 02 89 4d d4 8b 4d ec 03 7c 19 08 8b 4d d4 <f3> a5 89 d1 83 e1 03 74 02 f3 a4 ba 01 00 00 00 e8 30 c1 f7 ff

Note You need to log in before you can comment on or make changes to this bug.