From: bugzilla-daemon@kernel.org
To: linux-xfs@vger.kernel.org
Subject: [Bug 216047] [generic/623 DAX with XFS] kernel BUG at mm/page_table_check.c:51!
Date: Mon, 30 May 2022 07:19:18 +0000 [thread overview]
Message-ID: <bug-216047-201763-oScwqvYUUE@https.bugzilla.kernel.org/> (raw)
In-Reply-To: <bug-216047-201763@https.bugzilla.kernel.org/>
https://bugzilla.kernel.org/show_bug.cgi?id=216047
--- Comment #1 from Zorro Lang (zlang@redhat.com) ---
I just tried the lastest mainline upstream linux, it's 100% reproducible for
me. And it's not only reproducible on xfs, ext4 with DAX can reproduce it
too[1]. So it might be a common bug from mm?
[1]
[ 291.434410] run fstests generic/623 at 2022-05-30 15:14:32
[ 291.768382] systemd[1]: Started fstests-generic-623.scope - /usr/bin/bash -c
test -w /proc/self/oom_score_adj && echo 250 > /proc/self/oom_score_adj; exec
./tests/generic/623.
[ 294.406254] EXT4-fs (pmem0p2): mounted filesystem with ordered data mode.
Quota mode: none.
[ 294.442928] EXT4-fs (pmem0p2): shut down requested (1)
[ 294.443089] Aborting journal on device pmem0p2-8.
[ 294.477893] EXT4-fs (pmem0p2): unmounting filesystem.
[ 294.479943] systemd[1]: mnt-scratch.mount: Deactivated successfully.
[ 294.960374] EXT4-fs (pmem0p2): mounted filesystem with ordered data mode.
Quota mode: none.
[ 295.043716] ------------[ cut here ]------------
[ 295.043722] kernel BUG at mm/page_table_check.c:51!
[ 295.043736] invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI
[ 295.112220] CPU: 23 PID: 1936 Comm: xfs_io Tainted: G S I
5.18.0-mainline+ #2
[ 295.149570] Hardware name: HP ProLiant DL380p Gen8, BIOS P70 08/02/2014
[ 295.180088] RIP: 0010:page_table_check_set.part.0+0x184/0x300
[ 295.208336] Code: 48 8b 04 24 80 38 00 0f 85 2b 01 00 00 48 83 c3 01 4c 03
3d 5e e9 5a 03 4c 39 eb 0f 84 05 01 00 00 4d 85 ff 0f 85 53 ff ff ff <0f> 0b f7
c3 ff 0f 00 00 0f 85 f5 fe ff ff
be 08 00 00 00 48 89 df
[ 295.293142] RSP: 0000:ffffc9000d50f708 EFLAGS: 00010246
[ 295.316834] RAX: dffffc0000000000 RBX: ffffea00092180c0 RCX:
ffffffff85a98a25
[ 295.349059] RDX: 1ffffd400124301b RSI: 0000000000000001 RDI:
ffffea00092180d8
[ 295.381191] RBP: ffffea00092180c0 R08: 0000000000000000 R09:
ffff88801bfa7607
[ 295.413394] R10: ffffed10037f4ec0 R11: 0000000000000005 R12:
0000000000000000
[ 295.445718] R13: 0000000000000001 R14: ffff88801bfa7600 R15:
0000000000000000
[ 295.477844] FS: 00007f590a83f740(0000) GS:ffff888085000000(0000)
knlGS:0000000000000000
[ 295.518073] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 295.547270] CR2: 00007f590aac1000 CR3: 0000000049404003 CR4:
00000000001706e0
[ 295.581391] Call Trace:
[ 295.602075] __page_table_check_pte_set+0x28f/0x350
[ 295.624144] ? __page_table_check_pte_clear+0x2b0/0x2b0
[ 295.647669] ? percpu_ref_put_many.constprop.0+0x1a0/0x1a0
[ 295.672391] ? __get_locked_pte+0x1b8/0x2e0
[ 295.691432] insert_pfn+0x22d/0x340
[ 295.707093] ? vm_map_pages_zero+0x10/0x10
[ 295.725738] ? pfn_modify_allowed+0x64/0x2b0
[ 295.745392] ? track_pfn_remap+0x1d0/0x1d0
[ 295.764201] __vm_insert_mixed+0x17f/0x1e0
[ 295.782965] ? vmf_insert_pfn+0x60/0x60
[ 295.800382] ? __dax_invalidate_entry+0x1c0/0x1c0
[ 295.822137] ? dax_direct_access+0x111/0x1b0
[ 295.841356] dax_fault_iter+0x100f/0x1bf0
[ 295.859436] ? grab_mapping_entry+0x4e0/0x4e0
[ 295.879076] ? iomap_iter+0xa02/0x10a0
[ 295.895964] dax_iomap_pte_fault+0x3f4/0xb80
[ 295.915252] ? dax_writeback_mapping_range+0xeb0/0xeb0
[ 295.938698] ? __ext4_journal_start_sb+0x345/0x460
[ 295.960264] ext4_dax_huge_fault+0x44f/0x940
[ 295.979436] ? ext4_file_open+0xa50/0xa50
[ 295.998477] ? var_wake_function+0x260/0x260
[ 296.020138] __do_fault+0xf8/0x4e0
[ 296.037077] do_fault+0x778/0xee0
[ 296.053492] ? restore_exclusive_pte+0x5d0/0x5d0
[ 296.076166] __handle_mm_fault+0xf82/0x26d0
[ 296.095032] ? vm_iomap_memory+0x140/0x140
[ 296.113504] ? count_memcg_events.constprop.0+0x40/0x50
[ 296.137317] handle_mm_fault+0x20e/0x750
[ 296.154958] do_user_addr_fault+0x345/0xd70
[ 296.173803] ? rcu_read_lock_sched_held+0x3c/0x70
[ 296.194972] exc_page_fault+0x65/0x100
[ 296.213635] asm_exc_page_fault+0x27/0x30
[ 296.232854] RIP: 0033:0x55d4406da88e
[ 296.249860] Code: c0 0f 84 e1 00 00 00 48 8b 05 8e c2 02 00 48 2b 58 10 49
8d 14 1c 45 85 f6 75 55 4d 85 e4 0f 8e c7 fe ff ff 48 8b 00 44 89 ee <44> 88 2c
18 48 8d 43 01 49 83 fc 01 0f 8e
af fe ff ff 48 8b 0d 59
[ 296.334980] RSP: 002b:00007fff29d58370 EFLAGS: 00010206
[ 296.358575] RAX: 00007f590aac1000 RBX: 0000000000000000 RCX:
0000000000001000
[ 296.390927] RDX: 0000000000001000 RSI: 0000000000000058 RDI:
0000000000000000
[ 296.423124] RBP: 000055d441b093e0 R08: 1999999999999999 R09:
0000000000000000
[ 296.455428] R10: 00007f590a9ebac0 R11: 00007f590a9ec3c0 R12:
0000000000001000
[ 296.489563] R13: 0000000000000058 R14: 0000000000000000 R15:
0000000000000200
[ 296.524615] </TASK>
[ 296.535495] Modules linked in: nft_fib_inet nft_fib_ipv4 nft_fib_ipv6
nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct
nft_chain_nat nf_nat nf_conntrack nf_defrag_ip
v6 iTCO_wdt intel_rapl_msr intel_pmc_bxt nf_defrag_ipv4 iTCO_vendor_support
intel_rapl_common sb_edac x86_pkg_temp_thermal intel_powerclamp ip_set coretemp
kvm_intel kvm irqbypass nf_tables rfkill rapl intel_cstate nfnetlink qrtr
intel_uncore dax_pmem pcspkr sunrpc lpc_ich hpilo pktcdvd ipmi_ssif acpi_ipmi
tg3 ioatdma ipmi_si acpi_power_meter dca fuse zram xfs nd_pmem nd_btt crct
10dif_pclmul crc32_pclmul nd_e820 crc32c_intel libnvdimm ghash_clmulni_intel
hpsa serio_raw mgag200 hpwdt scsi_transport_sas ata_generic pata_acpi
scsi_dh_rdac scsi_dh_emc scsi_dh_alua dm_mul
tipath ipmi_devintf ipmi_msghandler
[ 296.859756] ---[ end trace 0000000000000000 ]---
[ 296.897217] RIP: 0010:page_table_check_set.part.0+0x184/0x300
[ 296.897228] Code: 48 8b 04 24 80 38 00 0f 85 2b 01 00 00 48 83 c3 01 4c 03
3d 5e e9 5a 03 4c 39 eb 0f 84 05 01 00 00 4d 85 ff 0f 85 53 ff ff ff <0f> 0b f7
c3 ff 0f 00 00 0f 85 f5 fe ff ff
be 08 00 00 00 48 89 df
[ 296.897233] RSP: 0000:ffffc9000d50f708 EFLAGS: 00010246
[ 296.897238] RAX: dffffc0000000000 RBX: ffffea00092180c0 RCX:
ffffffff85a98a25
[ 296.897241] RDX: 1ffffd400124301b RSI: 0000000000000001 RDI:
ffffea00092180d8
[ 296.897244] RBP: ffffea00092180c0 R08: 0000000000000000 R09:
ffff88801bfa7607
[ 296.897247] R10: ffffed10037f4ec0 R11: 0000000000000005 R12:
0000000000000000
[ 296.897249] R13: 0000000000000001 R14: ffff88801bfa7600 R15:
0000000000000000
[ 296.897253] FS: 00007f590a83f740(0000) GS:ffff888085000000(0000)
knlGS:0000000000000000
[ 296.897256] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 296.897260] CR2: 00007f590aac1000 CR3: 0000000049404003 CR4:
00000000001706e0
[ 296.897264] note: xfs_io[1936] exited with preempt_count 1
--
You may reply to this email to add a comment.
You are receiving this mail because:
You are watching the assignee of the bug.
next prev parent reply other threads:[~2022-05-30 7:19 UTC|newest]
Thread overview: 5+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-05-29 9:46 [Bug 216047] New: [generic/623 DAX with XFS] kernel BUG at mm/page_table_check.c:51! bugzilla-daemon
2022-05-30 7:19 ` bugzilla-daemon [this message]
2022-05-30 7:42 ` [Bug 216047] [generic/623 DAX] " bugzilla-daemon
2022-05-30 15:18 ` bugzilla-daemon
2022-05-30 18:28 ` bugzilla-daemon
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=bug-216047-201763-oScwqvYUUE@https.bugzilla.kernel.org/ \
--to=bugzilla-daemon@kernel.org \
--cc=linux-xfs@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox