From: bugzilla-daemon@kernel.org
To: linux-xfs@vger.kernel.org
Subject: [Bug 215804] [xfstests generic/670] Unable to handle kernel paging request at virtual address fffffbffff000008
Date: Tue, 05 Apr 2022 05:13:09 +0000 [thread overview]
Message-ID: <bug-215804-201763-GnXdtcIYV5@https.bugzilla.kernel.org/> (raw)
In-Reply-To: <bug-215804-201763@https.bugzilla.kernel.org/>
https://bugzilla.kernel.org/show_bug.cgi?id=215804
--- Comment #2 from Zorro Lang (zlang@redhat.com) ---
Hmm... another similar panic testing job, triggered by trinity test tool on XFS
(-m reflink=1,rmapbt=1). It's rmapbt enabled again, and on aarch64 too:
[43380.585988] XFS (vda3): Mounting V5 Filesystem
[43380.596159] XFS (vda3): Ending clean mount
[43397.622777] futex_wake_op: trinity-c1 tries to shift op by -1; fix this
program
[43408.337391] futex_wake_op: trinity-c1 tries to shift op by 525; fix this
program
[43434.008520] restraintd[2046]: *** Current Time: Sun Apr 03 18:09:11 2022
Localwatchdog at: Tue Apr 05 00:08:11 2022
[43439.502831] Unable to handle kernel paging request at virtual address
fffffbffff000008
[43439.503774] KASAN: maybe wild-memory-access in range
[0x0003dffff8000040-0x0003dffff8000047]
[43439.504287] Mem abort info:
[43439.504461] ESR = 0x96000006
[43439.504651] EC = 0x25: DABT (current EL), IL = 32 bits
[43439.504978] SET = 0, FnV = 0
[43439.505168] EA = 0, S1PTW = 0
[43439.505364] FSC = 0x06: level 2 translation fault
[43439.505661] Data abort info:
[43439.505842] ISV = 0, ISS = 0x00000006
[43439.506081] CM = 0, WnR = 0
[43439.506267] swapper pgtable: 4k pages, 48-bit VAs, pgdp=000000072e56b000
[43439.506672] [fffffbffff000008] pgd=000000072fcf1003, p4d=000000072fcf1003,
pud=000000072fcf2003, pmd=0000000000000000
[43439.507533] Internal error: Oops: 96000006 [#1] SMP
[43439.507845] Modules linked in: can_isotp 8021q garp mrp bridge stp llc
vsock_loopback vmw_vsock_virtio_transport_common vsock af_key mpls_router
ip_tunnel qrtr can_bcm can_raw can pptp gre l2tp_ppp l2tp_netlink l2tp_core
pppoe pppox ppp_generic slhc crypto_user ib_core nfnetlink scsi_transport_iscsi
atm sctp ip6_udp_tunnel udp_tunnel tls rfkill sunrpc vfat fat drm fuse xfs
libcrc32c crct10dif_ce ghash_ce sha2_ce sha256_arm64 virtio_console virtio_blk
sha1_ce virtio_net net_failover failover virtio_mmio
[43439.510640] CPU: 6 PID: 518132 Comm: trinity-c3 Kdump: loaded Not tainted
5.17.0+ #1
[43439.511121] Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015
[43439.511551] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[43439.511984] pc : __split_huge_pmd+0x1d8/0x34c
[43439.512265] lr : __split_huge_pmd+0x174/0x34c
[43439.512540] sp : ffff80000e267140
[43439.512750] x29: ffff80000e267140 x28: 0000000000000000 x27:
ffff000148b01780
[43439.513208] x26: 0000000000000000 x25: 0000000000000000 x24:
fffffc0005828700
[43439.513655] x23: 1ffff00001c4ce36 x22: ffff0000d7bb0108 x21:
ffff000116c94220
[43439.514103] x20: ffff80000e2671e0 x19: fffffbffff000000 x18:
1ffff00001c4cd43
[43439.514551] x17: 8f0100002d0e0000 x16: ffffb2d9f2347da0 x15:
0000000000000000
[43439.514999] x14: 0000000000000000 x13: 0000000000000000 x12:
ffff700001c4ce19
[43439.515449] x11: 1ffff00001c4ce18 x10: ffff700001c4ce18 x9 :
dfff800000000000
[43439.515897] x8 : ffff80000e2670c3 x7 : 0000000000000001 x6 :
0000000000000003
[43439.516346] x5 : ffff80000e2670c0 x4 : ffff700001c4ce18 x3 :
1fffe0019b499e01
[43439.516796] x2 : 1fffff7fffe00001 x1 : 0000000000000000 x0 :
fffffbffff000008
[43439.517244] Call trace:
[43439.517400] __split_huge_pmd+0x1d8/0x34c
[43439.517655] split_huge_pmd_address+0x10c/0x1a0
[43439.517943] try_to_unmap_one+0xb64/0x125c
[43439.518206] rmap_walk_file+0x1dc/0x4b0
[43439.518450] try_to_unmap+0x134/0x16c
[43439.518695] split_huge_page_to_list+0x5ec/0xcbc
[43439.518987] truncate_inode_partial_folio+0x194/0x2ec
[43439.519307] truncate_inode_pages_range+0x2e8/0x870
[43439.519615] truncate_pagecache+0x6c/0xa0
[43439.519869] truncate_setsize+0x50/0x90
[43439.520111] xfs_setattr_size+0x280/0x93c [xfs]
[43439.520545] xfs_vn_setattr_size+0xd4/0x124 [xfs]
[43439.520979] xfs_vn_setattr+0x100/0x24c [xfs]
[43439.521390] notify_change+0x720/0xbf0
[43439.521630] do_truncate+0xf4/0x194
[43439.521854] do_sys_ftruncate+0x1d8/0x2b4
[43439.522109] __arm64_sys_ftruncate+0x58/0x7c
[43439.522380] invoke_syscall.constprop.0+0x74/0x1e0
[43439.522685] el0_svc_common.constprop.0+0x224/0x2c0
[43439.522993] do_el0_svc+0xa4/0xf0
[43439.523212] el0_svc+0x5c/0x160
[43439.523415] el0t_64_sync_handler+0x9c/0x120
[43439.523684] el0t_64_sync+0x174/0x178
[43439.523920] Code: 91002260 d343fc02 38e16841 35000b41 (f9400660)
[43439.524304] SMP: stopping secondary CPUs
[43439.525427] Starting crashdump kernel...
[43439.525668] Bye!
[ 0.000000] Booting Linux on physical CPU 0x0000000006 [0x413fd0c1]
--
You may reply to this email to add a comment.
You are receiving this mail because:
You are watching the assignee of the bug.
next prev parent reply other threads:[~2022-04-05 5:13 UTC|newest]
Thread overview: 17+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-04-05 4:44 [Bug 215804] New: [xfstests generic/670] Unable to handle kernel paging request at virtual address fffffbffff000008 bugzilla-daemon
2022-04-05 4:48 ` [Bug 215804] " bugzilla-daemon
2022-04-05 5:13 ` bugzilla-daemon [this message]
2022-04-05 5:26 ` [Bug 215804] New: " Dave Chinner
2022-04-05 5:27 ` [Bug 215804] " bugzilla-daemon
2022-04-05 16:27 ` bugzilla-daemon
2022-04-05 19:23 ` [Bug 215804] New: " Matthew Wilcox
2022-04-05 20:48 ` Yang Shi
2022-04-05 19:23 ` [Bug 215804] " bugzilla-daemon
2022-04-05 20:48 ` bugzilla-daemon
2022-04-05 22:57 ` bugzilla-daemon
2022-04-06 4:32 ` bugzilla-daemon
2022-04-06 12:57 ` bugzilla-daemon
2022-04-07 2:18 ` bugzilla-daemon
2022-04-07 2:33 ` bugzilla-daemon
2022-04-07 2:54 ` bugzilla-daemon
2022-04-08 18:54 ` bugzilla-daemon
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=bug-215804-201763-GnXdtcIYV5@https.bugzilla.kernel.org/ \
--to=bugzilla-daemon@kernel.org \
--cc=linux-xfs@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).