Bug 14343 - kernel BUG at drivers/block/aoe/aoeblk.c:177
kernel BUG at drivers/block/aoe/aoeblk.c:177
Status: CLOSED DUPLICATE of bug 13942
Product: IO/Storage
Classification: Unclassified
Component: Block Layer
All Linux
: P1 normal
Assigned To: Ed Cashin
:
Depends on:
Blocks: 13615
  Show dependency treegraph
 
Reported: 2009-10-07 17:39 UTC by rm+bko
Modified: 2009-10-07 22:39 UTC (History)
2 users (show)

See Also:
Kernel Version: 2.6.31.2
Tree: Mainline
Regression: Yes


Attachments

Description rm+bko 2009-10-07 17:39:45 UTC
After an upgrade from 2.6.30 to 2.6.31.2 and an attempt to mount XFS filesystem residing on an encrypted dmcrypt volume on an AoE device, I get:


[32071.864626] aoe: bi_io_vec is NULL
[32071.864666] ------------[ cut here ]------------
[32071.868555] kernel BUG at drivers/block/aoe/aoeblk.c:177!
[32071.868555] invalid opcode: 0000 [#1] SMP 
[32071.868555] last sysfs file: /sys/devices/virtual/block/dm-6/range
[32071.868555] CPU 1 
[32071.868555] Modules linked in: tun ppdev lp parport sit tunnel4 fuse nfsd nfs lockd fscache nfs_acl auth_rpcgss sunrpc nf_conntrack_ipv6 ip6t_REJECT ip6table_filter ip6_tables xt_tcpudp xt_DSCP ipt_MASQUERADE iptable_nat nf_nat_ftp nf_nat xt_TCPMSS ipt_LOG ipt_REJECT iptable_mangle iptable_filter xt_multiport xt_state xt_limit xt_conntrack nf_conntrack_ftp nf_conntrack_ipv4 nf_conntrack nf_defrag_ipv4 ip_tables x_tables ppp_async crc_ccitt ppp_generic slhc ext3 jbd mbcache aoe hwmon_vid sha256_generic cryptd aes_x86_64 aes_generic cbc dm_crypt pl2303 usbserial amd64_edac_mod k8temp psmouse edac_core evdev pcspkr serio_raw asus_atk0110 i2c_nforce2 i2c_core button processor xfs exportfs ata_generic pata_jmicron ide_pci_generic ahci ohci_hcd 3c59x r8169 forcedeth mii sd_mod crc_t10dif amd74xx ide_core ehci_hcd floppy thermal fan thermal_sys dm_mirror dm_region_hash dm_log dm_mod sata_nv libata scsi_mod [last unloaded: soundcore]
[32071.868555] Pid: 17905, comm: kdmflush Not tainted 2.6.31.2-rm #1 System Product Name
[32071.868555] RIP: 0010:[<ffffffffa039252e>]  [<ffffffffa039252e>] aoeblk_make_request+0x73/0x232 [aoe]
[32071.868555] RSP: 0018:ffff8800120adc70  EFLAGS: 00010282
[32071.868555] RAX: 000000000000002c RBX: ffff8800850f6e40 RCX: ffffffff81016ffb
[32071.868555] RDX: ffff88000164e000 RSI: 0000000000000046 RDI: 0000000000000282
[32071.868555] RBP: ffff8800b3daf000 R08: 0000000000000002 R09: ffffffff8137aadb
[32071.868555] R10: 0000000000000000 R11: 00000000000186a0 R12: 00000000000000ff
[32071.868555] R13: ffff8800bbceca88 R14: 0000000000000001 R15: ffffffffa006b818
[32071.868555] FS:  00007ffe3faf27d0(0000) GS:ffff88000164e000(0000) knlGS:0000000000000000
[32071.868555] CS:  0010 DS: 0018 ES: 0018 CR0: 000000008005003b
[32071.868555] CR2: 0000000001f0e000 CR3: 00000000b58bd000 CR4: 00000000000006e0
[32071.868555] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[32071.868555] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[32071.868555] Process kdmflush (pid: 17905, threadinfo ffff8800120ac000, task ffff8800bcb20730)
[32071.868555] Stack:
[32071.868555]  0000000000011210 ffff8800850f6e40 ffff8800120adcb8 ffffffff810a75d1
[32071.868555] <0> 0000000000011210 00000010120adcc0 ffff8800120adcd8 ffff8800850f6e40
[32071.868555] <0> ffff8800850f6e40 00000000000000ff ffff8800bbceca88 ffffffff8115839e
[32071.868555] Call Trace:
[32071.868555]  [<ffffffff810a75d1>] ? mempool_alloc+0x3f/0xf5
[32071.868555]  [<ffffffff8115839e>] ? generic_make_request+0x276/0x2c0
[32071.868555]  [<ffffffffa006b818>] ? dm_wq_work+0x0/0x166 [dm_mod]
[32071.868555]  [<ffffffffa006b42a>] ? __split_and_process_bio+0x1b1/0x546 [dm_mod]
[32071.868555]  [<ffffffff8105de65>] ? remove_wait_queue+0x12/0x41
[32071.868555]  [<ffffffff81040000>] ? find_busiest_group+0x229/0x7a8
[32071.868555]  [<ffffffffa006b818>] ? dm_wq_work+0x0/0x166 [dm_mod]
[32071.868555]  [<ffffffffa006b806>] ? dm_flush+0x47/0x59 [dm_mod]
[32071.868555]  [<ffffffffa006b8d0>] ? dm_wq_work+0xb8/0x166 [dm_mod]
[32071.868555]  [<ffffffff81059cea>] ? worker_thread+0x174/0x211
[32071.868555]  [<ffffffff8105dc7a>] ? autoremove_wake_function+0x0/0x2e
[32071.868555]  [<ffffffff81059b76>] ? worker_thread+0x0/0x211
[32071.868555]  [<ffffffff8105d91e>] ? kthread+0x8b/0x93
[32071.868555]  [<ffffffff81011aea>] ? child_rip+0xa/0x20
[32071.868555]  [<ffffffff8105d893>] ? kthread+0x0/0x93
[32071.868555]  [<ffffffff81011ae0>] ? child_rip+0x0/0x20
[32071.868555] Code: 85 ed 75 12 48 c7 c7 7a 53 39 a0 31 c0 e8 9d 3a f4 e0 0f 0b eb fe 48 83 7a 48 00 75 12 48 c7 c7 a1 53 39 a0 31 c0 e8 84 3a f4 e0 <0f> 0b eb fe 48 8b bd f8 00 00 00 be 10 00 00 00 e8 4f 50 d1 e0 
[32071.868555] RIP  [<ffffffffa039252e>] aoeblk_make_request+0x73/0x232 [aoe]
[32071.868555]  RSP <ffff8800120adc70>
[32071.871187] ---[ end trace 5a9faebcbe5f395d ]---
Comment 1 rm+bko 2009-10-07 21:32:12 UTC
This seems to have been already reported:
http://bugzilla.kernel.org/show_bug.cgi?id=13942
And fixed in this commit:
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=18d8217bc441630c3c5ec7416c5a65c69e8a0979
I have applied the patch above to my tree of 2.6.31.2, and after several mounts/unmounts, the issue did not occur again.
Sorry for bothering you.

*** This bug has been marked as a duplicate of bug 13942 ***

Note You need to log in before you can comment on or make changes to this bug.