From: bugzilla-daemon@kernel.org
To: linux-xfs@vger.kernel.org
Subject: [Bug 215804] [xfstests generic/670] Unable to handle kernel paging request at virtual address fffffbffff000008
Date: Tue, 05 Apr 2022 04:48:59 +0000 [thread overview]
Message-ID: <bug-215804-201763-M5B5LsSnTW@https.bugzilla.kernel.org/> (raw)
In-Reply-To: <bug-215804-201763@https.bugzilla.kernel.org/>
https://bugzilla.kernel.org/show_bug.cgi?id=215804
--- Comment #1 from Zorro Lang (zlang@redhat.com) ---
It's not 64k dir bsize related, just find another same panic on XFS with "-m
crc=1,finobt=1,reflink=1,rmapbt=1,bigtime=1,inobtcount=1 -b size=1024". Hmmm...
"maybe rmapbt and -b size=1024 is related???". And other same condition is 2
panic jobs are all on aarch64 machine.
[36463.624185] run fstests generic/670 at 2022-04-03 15:46:45
[36465.162010] XFS (nvme0n1p3): Mounting V5 Filesystem
[36465.177275] XFS (nvme0n1p3): Ending clean mount
[36465.214655] XFS (nvme0n1p3): Unmounting Filesystem
[36465.852627] XFS (nvme0n1p3): Mounting V5 Filesystem
[36465.869171] XFS (nvme0n1p3): Ending clean mount
[36466.599985] XFS (nvme0n1p3): Unmounting Filesystem
[36467.052055] XFS (nvme0n1p3): Mounting V5 Filesystem
[36467.068257] XFS (nvme0n1p3): Ending clean mount
[36471.061110] Unable to handle kernel paging request at virtual address
fffffbfffe000008
[36471.069061] KASAN: maybe wild-memory-access in range
[0x0003dffff0000040-0x0003dffff0000047]
[36471.078001] Mem abort info:
[36471.080788] ESR = 0x96000006
[36471.083852] EC = 0x25: DABT (current EL), IL = 32 bits
[36471.089155] SET = 0, FnV = 0
[36471.092206] EA = 0, S1PTW = 0
[36471.095338] FSC = 0x06: level 2 translation fault
[36471.100205] Data abort info:
[36471.103083] ISV = 0, ISS = 0x00000006
[36471.106908] CM = 0, WnR = 0
[36471.109867] swapper pgtable: 4k pages, 48-bit VAs, pgdp=000008064712b000
[36471.116572] [fffffbfffe000008] pgd=00000806488b1003, p4d=00000806488b1003,
pud=00000806488b2003, pmd=0000000000000000
[36471.127190] Internal error: Oops: 96000006 [#1] SMP
[36471.132059] Modules linked in: overlay dm_zero dm_log_writes dm_thin_pool
dm_persistent_data dm_bio_prison sg dm_snapshot dm_bufio ext4 mbcache jbd2 loop
dm_flakey dm_mod arm_spe_pmu rfkill mlx5_ib ast acpi_ipmi ib_uverbs
drm_vram_helper drm_ttm_helper ipmi_ssif ttm drm_kms_helper ib_core fb_sys_fops
syscopyarea sysfillrect sysimgblt ipmi_devintf arm_dmc620_pmu arm_cmn
ipmi_msghandler arm_dsu_pmu cppc_cpufreq sunrpc vfat fat drm fuse xfs libcrc32c
mlx5_core crct10dif_ce ghash_ce sha2_ce sha256_arm64 sha1_ce sbsa_gwdt nvme igb
mlxfw nvme_core tls i2c_algo_bit psample pci_hyperv_intf
i2c_designware_platform i2c_designware_core xgene_hwmon [last unloaded:
scsi_debug]
[36471.190920] CPU: 34 PID: 559440 Comm: xfs_io Kdump: loaded Tainted: G
W 5.17.0+ #1
[36471.199781] Hardware name: GIGABYTE R272-P30-JG/MP32-AR0-JG, BIOS F16f (SCP:
1.06.20210615) 07/01/2021
[36471.209075] pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[36471.216025] pc : __split_huge_pmd+0x1d8/0x34c
[36471.220375] lr : __split_huge_pmd+0x174/0x34c
[36471.224720] sp : ffff8000648f6fe0
[36471.228023] x29: ffff8000648f6fe0 x28: 0000000000000000 x27:
ffff080113ae1f00
[36471.235150] x26: 0000000000000000 x25: 0000000000000000 x24:
fffffc200a6cd800
[36471.242276] x23: 1ffff0000c91ee0a x22: ffff08070c7959c8 x21:
ffff080771475b88
[36471.249402] x20: ffff8000648f7080 x19: fffffbfffe000000 x18:
0000000000000000
[36471.256529] x17: 0000000000000000 x16: ffffde5c81d07e30 x15:
0000fffff07a68c0
[36471.263654] x14: 00000000f2040000 x13: 0000000000000000 x12:
ffff70000c91eded
[36471.270781] x11: 1ffff0000c91edec x10: ffff70000c91edec x9 :
dfff800000000000
[36471.277907] x8 : ffff8000648f6f63 x7 : 0000000000000001 x6 :
0000000000000003
[36471.285032] x5 : ffff8000648f6f60 x4 : ffff70000c91edec x3 :
1fffe106cbc34401
[36471.292158] x2 : 1fffff7fffc00001 x1 : 0000000000000000 x0 :
fffffbfffe000008
[36471.299284] Call trace:
[36471.301719] __split_huge_pmd+0x1d8/0x34c
[36471.305718] split_huge_pmd_address+0x10c/0x1a0
[36471.310238] try_to_unmap_one+0xb64/0x125c
[36471.314326] rmap_walk_file+0x1dc/0x4b0
[36471.318151] try_to_unmap+0x134/0x16c
[36471.321803] split_huge_page_to_list+0x5ec/0xcbc
[36471.326409] truncate_inode_partial_folio+0x194/0x2ec
[36471.331451] truncate_inode_pages_range+0x2e8/0x870
[36471.336318] truncate_pagecache_range+0xa0/0xc0
[36471.340837] xfs_flush_unmap_range+0xc8/0x10c [xfs]
[36471.345850] xfs_reflink_remap_prep+0x2f4/0x3ac [xfs]
[36471.351025] xfs_file_remap_range+0x170/0x770 [xfs]
[36471.356025] do_clone_file_range+0x198/0x5e0
[36471.360286] vfs_clone_file_range+0xa8/0x63c
[36471.364545] ioctl_file_clone+0x5c/0xc0
[36471.368372] do_vfs_ioctl+0x10d4/0x1684
[36471.372197] __arm64_sys_ioctl+0xcc/0x18c
[36471.376196] invoke_syscall.constprop.0+0x74/0x1e0
[36471.380978] el0_svc_common.constprop.0+0x224/0x2c0
[36471.385845] do_el0_svc+0xa4/0xf0
[36471.389150] el0_svc+0x5c/0x160
[36471.392281] el0t_64_sync_handler+0x9c/0x120
[36471.396540] el0t_64_sync+0x174/0x178
[36471.400193] Code: 91002260 d343fc02 38e16841 35000b41 (f9400660)
[36471.406279] SMP: stopping secondary CPUs
[36471.411145] Starting crashdump kernel...
[36471.415057] Bye!
--
You may reply to this email to add a comment.
You are receiving this mail because:
You are watching the assignee of the bug.
next prev parent reply other threads:[~2022-04-05 4:49 UTC|newest]
Thread overview: 17+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-04-05 4:44 [Bug 215804] New: [xfstests generic/670] Unable to handle kernel paging request at virtual address fffffbffff000008 bugzilla-daemon
2022-04-05 4:48 ` bugzilla-daemon [this message]
2022-04-05 5:13 ` [Bug 215804] " bugzilla-daemon
2022-04-05 5:26 ` [Bug 215804] New: " Dave Chinner
2022-04-05 5:27 ` [Bug 215804] " bugzilla-daemon
2022-04-05 16:27 ` bugzilla-daemon
2022-04-05 19:23 ` [Bug 215804] New: " Matthew Wilcox
2022-04-05 20:48 ` Yang Shi
2022-04-05 19:23 ` [Bug 215804] " bugzilla-daemon
2022-04-05 20:48 ` bugzilla-daemon
2022-04-05 22:57 ` bugzilla-daemon
2022-04-06 4:32 ` bugzilla-daemon
2022-04-06 12:57 ` bugzilla-daemon
2022-04-07 2:18 ` bugzilla-daemon
2022-04-07 2:33 ` bugzilla-daemon
2022-04-07 2:54 ` bugzilla-daemon
2022-04-08 18:54 ` bugzilla-daemon
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=bug-215804-201763-M5B5LsSnTW@https.bugzilla.kernel.org/ \
--to=bugzilla-daemon@kernel.org \
--cc=linux-xfs@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).