* [linux-next-20250320][btrfs] Kernel OOPs while running btrfs/108
@ 2025-03-21 10:20 Venkat Rao Bagalkote
2025-03-21 10:30 ` Venkat Rao Bagalkote
2025-03-21 15:56 ` Ritesh Harjani (IBM)
0 siblings, 2 replies; 9+ messages in thread
From: Venkat Rao Bagalkote @ 2025-03-21 10:20 UTC (permalink / raw)
To: LKML, linuxppc-dev, Madhavan Srinivasan, riteshh
Greetings!!!
I am observing Kernel oops while running brtfs/108 TC on IBM Power System.
Repo: Linux-Next (next-20250320)
Traces:
[ 418.392604] run fstests btrfs/108 at 2025-03-21 05:11:21
[ 418.560137] Kernel attempted to read user page (0) - exploit attempt?
(uid: 0)
[ 418.560156] BUG: Kernel NULL pointer dereference on read at 0x00000000
[ 418.560161] Faulting instruction address: 0xc0000000010ef8b0
[ 418.560166] Oops: Kernel access of bad area, sig: 11 [#1]
[ 418.560169] LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=8192 NUMA pSeries
[ 418.560174] Modules linked in: btrfs blake2b_generic xor raid6_pq
zstd_compress loop nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib
nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct
nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 bonding nf_defrag_ipv4
tls rfkill ip_set nf_tables nfnetlink sunrpc pseries_rng vmx_crypto fuse
ext4 mbcache jbd2 sd_mod sg ibmvscsi scsi_transport_srp ibmveth
[ 418.560212] CPU: 1 UID: 0 PID: 37583 Comm: rm Kdump: loaded Not
tainted 6.14.0-rc7-next-20250320 #1 VOLUNTARY
[ 418.560218] Hardware name: IBM,9080-HEX Power11
[ 418.560223] NIP: c0000000010ef8b0 LR: c00800000bb190ac CTR:
c0000000010ef888
[ 418.560227] REGS: c0000000a252f5a0 TRAP: 0300 Not tainted
(6.14.0-rc7-next-20250320)
[ 418.560232] MSR: 8000000000009033 <SF,EE,ME,IR,DR,RI,LE> CR:
44008444 XER: 20040000
[ 418.560240] CFAR: c00800000bc1df84 DAR: 0000000000000000 DSISR:
40000000 IRQMASK: 1
[ 418.560240] GPR00: c00800000bb190ac c0000000a252f840 c0000000016a8100
0000000000000000
[ 418.560240] GPR04: 0000000000000000 0000000000010000 0000000000000000
fffffffffffe0000
[ 418.560240] GPR08: c00000010724aad8 0000000000000003 0000000000001000
c00800000bc1df70
[ 418.560240] GPR12: c0000000010ef888 c000000affffdb00 0000000000000000
0000000000000000
[ 418.560240] GPR16: 0000000000000000 0000000000000000 0000000000000000
0000000000000000
[ 418.560240] GPR20: c0000000777a8000 c00000006a9c9000 c00000010724a950
c0000000777a8000
[ 418.560240] GPR24: fffffffffffffffe c00000010724aad8 0000000000010000
00000000000000a0
[ 418.560240] GPR28: 0000000000010000 c00c00000048c3c0 0000000000000000
0000000000000000
[ 418.560287] NIP [c0000000010ef8b0] _raw_spin_lock_irq+0x28/0x98
[ 418.560294] LR [c00800000bb190ac] wait_subpage_spinlock+0x64/0xd0 [btrfs]
[ 418.560339] Call Trace:
[ 418.560342] [c0000000a252f870] [c00800000bb205dc]
btrfs_invalidate_folio+0xa8/0x4f0 [btrfs]
[ 418.560384] [c0000000a252f930] [c0000000004cbcdc]
truncate_cleanup_folio+0x110/0x14c
[ 418.560391] [c0000000a252f960] [c0000000004ccc7c]
truncate_inode_pages_range+0x100/0x4dc
[ 418.560397] [c0000000a252fbd0] [c00800000bb20ba8]
btrfs_evict_inode+0x74/0x510 [btrfs]
[ 418.560437] [c0000000a252fc90] [c00000000065c71c] evict+0x164/0x334
[ 418.560443] [c0000000a252fd30] [c000000000647c9c] do_unlinkat+0x2f4/0x3a4
[ 418.560449] [c0000000a252fde0] [c000000000647da0] sys_unlinkat+0x54/0xac
[ 418.560454] [c0000000a252fe10] [c000000000033498]
system_call_exception+0x138/0x330
[ 418.560461] [c0000000a252fe50] [c00000000000d05c]
system_call_vectored_common+0x15c/0x2ec
[ 418.560468] --- interrupt: 3000 at 0x7fffb1b366bc
[ 418.560471] NIP: 00007fffb1b366bc LR: 00007fffb1b366bc CTR:
0000000000000000
[ 418.560475] REGS: c0000000a252fe80 TRAP: 3000 Not tainted
(6.14.0-rc7-next-20250320)
[ 418.560479] MSR: 800000000280f033
<SF,VEC,VSX,EE,PR,FP,ME,IR,DR,RI,LE> CR: 44008804 XER: 00000000
[ 418.560490] IRQMASK: 0
[ 418.560490] GPR00: 0000000000000124 00007ffffcb4e2b0 00007fffb1c37d00
ffffffffffffff9c
[ 418.560490] GPR04: 000000013d660380 0000000000000000 0000000000000000
0000000000000003
[ 418.560490] GPR08: 0000000000000000 0000000000000000 0000000000000000
0000000000000000
[ 418.560490] GPR12: 0000000000000000 00007fffb1dba5c0 00007ffffcb4e538
000000011972d0e8
[ 418.560490] GPR16: 000000011972d098 000000011972d060 000000011972d020
000000011972cff0
[ 418.560490] GPR20: 000000011972d298 000000011972cc10 0000000000000000
000000013d6615a0
[ 418.560490] GPR24: 0000000000000002 000000011972d0b8 000000011972cf98
000000011972d1d0
[ 418.560490] GPR28: 00007ffffcb4e538 000000013d6602f0 0000000000000000
0000000000100000
[ 418.560532] NIP [00007fffb1b366bc] 0x7fffb1b366bc
[ 418.560536] LR [00007fffb1b366bc] 0x7fffb1b366bc
[ 418.560538] --- interrupt: 3000
[ 418.560541] Code: 7c0803a6 4e800020 3c4c005c 38428878 7c0802a6
60000000 39200001 992d0932 a12d0008 3ce0fffe 5529083c 61290001
<7d001829> 7d063879 40c20018 7d063838
[ 418.560555] ---[ end trace 0000000000000000 ]---
If you happed to fix this, please add below tag.
Reported-by: Venkat Rao Bagalkote <venkat88@linux.ibm.com>
Regards,
Venkat.
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [linux-next-20250320][btrfs] Kernel OOPs while running btrfs/108
2025-03-21 10:20 [linux-next-20250320][btrfs] Kernel OOPs while running btrfs/108 Venkat Rao Bagalkote
@ 2025-03-21 10:30 ` Venkat Rao Bagalkote
2025-03-21 15:56 ` Ritesh Harjani (IBM)
1 sibling, 0 replies; 9+ messages in thread
From: Venkat Rao Bagalkote @ 2025-03-21 10:30 UTC (permalink / raw)
To: LKML, linuxppc-dev, Madhavan Srinivasan, riteshh
On 21/03/25 3:50 pm, Venkat Rao Bagalkote wrote:
> Greetings!!!
>
>
> I am observing Kernel oops while running brtfs/108 TC on IBM Power
> System.
>
> Repo: Linux-Next (next-20250320)
Additional Info:
BTRFS tool: btrfs-progs v6.12
BTRFS tool repo:
https://git.kernel.org/pub/scm/linux/kernel/git/kdave/btrfs-progs.git
XFS Repo:https://git.kernel.org/pub/scm/fs/xfs/xfstests-dev.git/
>
> Traces:
>
> [ 418.392604] run fstests btrfs/108 at 2025-03-21 05:11:21
> [ 418.560137] Kernel attempted to read user page (0) - exploit
> attempt? (uid: 0)
> [ 418.560156] BUG: Kernel NULL pointer dereference on read at 0x00000000
> [ 418.560161] Faulting instruction address: 0xc0000000010ef8b0
> [ 418.560166] Oops: Kernel access of bad area, sig: 11 [#1]
> [ 418.560169] LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=8192 NUMA pSeries
> [ 418.560174] Modules linked in: btrfs blake2b_generic xor raid6_pq
> zstd_compress loop nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib
> nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct
> nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 bonding
> nf_defrag_ipv4 tls rfkill ip_set nf_tables nfnetlink sunrpc
> pseries_rng vmx_crypto fuse ext4 mbcache jbd2 sd_mod sg ibmvscsi
> scsi_transport_srp ibmveth
> [ 418.560212] CPU: 1 UID: 0 PID: 37583 Comm: rm Kdump: loaded Not
> tainted 6.14.0-rc7-next-20250320 #1 VOLUNTARY
> [ 418.560218] Hardware name: IBM,9080-HEX Power11
> [ 418.560223] NIP: c0000000010ef8b0 LR: c00800000bb190ac CTR:
> c0000000010ef888
> [ 418.560227] REGS: c0000000a252f5a0 TRAP: 0300 Not tainted
> (6.14.0-rc7-next-20250320)
> [ 418.560232] MSR: 8000000000009033 <SF,EE,ME,IR,DR,RI,LE> CR:
> 44008444 XER: 20040000
> [ 418.560240] CFAR: c00800000bc1df84 DAR: 0000000000000000 DSISR:
> 40000000 IRQMASK: 1
> [ 418.560240] GPR00: c00800000bb190ac c0000000a252f840
> c0000000016a8100 0000000000000000
> [ 418.560240] GPR04: 0000000000000000 0000000000010000
> 0000000000000000 fffffffffffe0000
> [ 418.560240] GPR08: c00000010724aad8 0000000000000003
> 0000000000001000 c00800000bc1df70
> [ 418.560240] GPR12: c0000000010ef888 c000000affffdb00
> 0000000000000000 0000000000000000
> [ 418.560240] GPR16: 0000000000000000 0000000000000000
> 0000000000000000 0000000000000000
> [ 418.560240] GPR20: c0000000777a8000 c00000006a9c9000
> c00000010724a950 c0000000777a8000
> [ 418.560240] GPR24: fffffffffffffffe c00000010724aad8
> 0000000000010000 00000000000000a0
> [ 418.560240] GPR28: 0000000000010000 c00c00000048c3c0
> 0000000000000000 0000000000000000
> [ 418.560287] NIP [c0000000010ef8b0] _raw_spin_lock_irq+0x28/0x98
> [ 418.560294] LR [c00800000bb190ac] wait_subpage_spinlock+0x64/0xd0
> [btrfs]
> [ 418.560339] Call Trace:
> [ 418.560342] [c0000000a252f870] [c00800000bb205dc]
> btrfs_invalidate_folio+0xa8/0x4f0 [btrfs]
> [ 418.560384] [c0000000a252f930] [c0000000004cbcdc]
> truncate_cleanup_folio+0x110/0x14c
> [ 418.560391] [c0000000a252f960] [c0000000004ccc7c]
> truncate_inode_pages_range+0x100/0x4dc
> [ 418.560397] [c0000000a252fbd0] [c00800000bb20ba8]
> btrfs_evict_inode+0x74/0x510 [btrfs]
> [ 418.560437] [c0000000a252fc90] [c00000000065c71c] evict+0x164/0x334
> [ 418.560443] [c0000000a252fd30] [c000000000647c9c]
> do_unlinkat+0x2f4/0x3a4
> [ 418.560449] [c0000000a252fde0] [c000000000647da0]
> sys_unlinkat+0x54/0xac
> [ 418.560454] [c0000000a252fe10] [c000000000033498]
> system_call_exception+0x138/0x330
> [ 418.560461] [c0000000a252fe50] [c00000000000d05c]
> system_call_vectored_common+0x15c/0x2ec
> [ 418.560468] --- interrupt: 3000 at 0x7fffb1b366bc
> [ 418.560471] NIP: 00007fffb1b366bc LR: 00007fffb1b366bc CTR:
> 0000000000000000
> [ 418.560475] REGS: c0000000a252fe80 TRAP: 3000 Not tainted
> (6.14.0-rc7-next-20250320)
> [ 418.560479] MSR: 800000000280f033
> <SF,VEC,VSX,EE,PR,FP,ME,IR,DR,RI,LE> CR: 44008804 XER: 00000000
> [ 418.560490] IRQMASK: 0
> [ 418.560490] GPR00: 0000000000000124 00007ffffcb4e2b0
> 00007fffb1c37d00 ffffffffffffff9c
> [ 418.560490] GPR04: 000000013d660380 0000000000000000
> 0000000000000000 0000000000000003
> [ 418.560490] GPR08: 0000000000000000 0000000000000000
> 0000000000000000 0000000000000000
> [ 418.560490] GPR12: 0000000000000000 00007fffb1dba5c0
> 00007ffffcb4e538 000000011972d0e8
> [ 418.560490] GPR16: 000000011972d098 000000011972d060
> 000000011972d020 000000011972cff0
> [ 418.560490] GPR20: 000000011972d298 000000011972cc10
> 0000000000000000 000000013d6615a0
> [ 418.560490] GPR24: 0000000000000002 000000011972d0b8
> 000000011972cf98 000000011972d1d0
> [ 418.560490] GPR28: 00007ffffcb4e538 000000013d6602f0
> 0000000000000000 0000000000100000
> [ 418.560532] NIP [00007fffb1b366bc] 0x7fffb1b366bc
> [ 418.560536] LR [00007fffb1b366bc] 0x7fffb1b366bc
> [ 418.560538] --- interrupt: 3000
> [ 418.560541] Code: 7c0803a6 4e800020 3c4c005c 38428878 7c0802a6
> 60000000 39200001 992d0932 a12d0008 3ce0fffe 5529083c 61290001
> <7d001829> 7d063879 40c20018 7d063838
> [ 418.560555] ---[ end trace 0000000000000000 ]---
>
>
> If you happed to fix this, please add below tag.
>
>
> Reported-by: Venkat Rao Bagalkote <venkat88@linux.ibm.com>
>
>
> Regards,
>
> Venkat.
>
>
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [linux-next-20250320][btrfs] Kernel OOPs while running btrfs/108
2025-03-21 10:20 [linux-next-20250320][btrfs] Kernel OOPs while running btrfs/108 Venkat Rao Bagalkote
2025-03-21 10:30 ` Venkat Rao Bagalkote
@ 2025-03-21 15:56 ` Ritesh Harjani (IBM)
2025-03-21 21:18 ` Qu Wenruo
1 sibling, 1 reply; 9+ messages in thread
From: Ritesh Harjani (IBM) @ 2025-03-21 15:56 UTC (permalink / raw)
To: Venkat Rao Bagalkote, LKML, linuxppc-dev, Madhavan Srinivasan,
linux-btrfs, Ritesh Harjani (IBM)
+linux-btrfs
Venkat Rao Bagalkote <venkat88@linux.ibm.com> writes:
> Greetings!!!
>
>
> I am observing Kernel oops while running brtfs/108 TC on IBM Power System.
>
> Repo: Linux-Next (next-20250320)
Looks like this next tag had many btrfs related changes -
https://web.git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/log/fs/btrfs?h=next-20250320
>
> Traces:
>
> [ 418.392604] run fstests btrfs/108 at 2025-03-21 05:11:21
> [ 418.560137] Kernel attempted to read user page (0) - exploit attempt?
> (uid: 0)
> [ 418.560156] BUG: Kernel NULL pointer dereference on read at 0x00000000
NULL pointer dereference...
> [ 418.560161] Faulting instruction address: 0xc0000000010ef8b0
> [ 418.560166] Oops: Kernel access of bad area, sig: 11 [#1]
> [ 418.560169] LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=8192 NUMA pSeries
> [ 418.560174] Modules linked in: btrfs blake2b_generic xor raid6_pq
> zstd_compress loop nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib
> nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct
> nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 bonding nf_defrag_ipv4
> tls rfkill ip_set nf_tables nfnetlink sunrpc pseries_rng vmx_crypto fuse
> ext4 mbcache jbd2 sd_mod sg ibmvscsi scsi_transport_srp ibmveth
> [ 418.560212] CPU: 1 UID: 0 PID: 37583 Comm: rm Kdump: loaded Not
> tainted 6.14.0-rc7-next-20250320 #1 VOLUNTARY
> [ 418.560218] Hardware name: IBM,9080-HEX Power11
> [ 418.560223] NIP: c0000000010ef8b0 LR: c00800000bb190ac CTR:
> c0000000010ef888
> [ 418.560227] REGS: c0000000a252f5a0 TRAP: 0300 Not tainted
> (6.14.0-rc7-next-20250320)
> [ 418.560232] MSR: 8000000000009033 <SF,EE,ME,IR,DR,RI,LE> CR:
> 44008444 XER: 20040000
> [ 418.560240] CFAR: c00800000bc1df84 DAR: 0000000000000000 DSISR:
> 40000000 IRQMASK: 1
> [ 418.560240] GPR00: c00800000bb190ac c0000000a252f840 c0000000016a8100
> 0000000000000000
> [ 418.560240] GPR04: 0000000000000000 0000000000010000 0000000000000000
> fffffffffffe0000
> [ 418.560240] GPR08: c00000010724aad8 0000000000000003 0000000000001000
> c00800000bc1df70
> [ 418.560240] GPR12: c0000000010ef888 c000000affffdb00 0000000000000000
> 0000000000000000
> [ 418.560240] GPR16: 0000000000000000 0000000000000000 0000000000000000
> 0000000000000000
> [ 418.560240] GPR20: c0000000777a8000 c00000006a9c9000 c00000010724a950
> c0000000777a8000
> [ 418.560240] GPR24: fffffffffffffffe c00000010724aad8 0000000000010000
> 00000000000000a0
> [ 418.560240] GPR28: 0000000000010000 c00c00000048c3c0 0000000000000000
> 0000000000000000
> [ 418.560287] NIP [c0000000010ef8b0] _raw_spin_lock_irq+0x28/0x98
> [ 418.560294] LR [c00800000bb190ac] wait_subpage_spinlock+0x64/0xd0 [btrfs]
btrfs is working on subpage size support for a while now.
Adding +linux-btrfs, in case if they are already aware of this problem.
I am not that familiar with btrfs code. But does this look like that the
subpage (folio->private became NULL here) somehow?
-ritesh
> [ 418.560339] Call Trace:
> [ 418.560342] [c0000000a252f870] [c00800000bb205dc]
> btrfs_invalidate_folio+0xa8/0x4f0 [btrfs]
> [ 418.560384] [c0000000a252f930] [c0000000004cbcdc]
> truncate_cleanup_folio+0x110/0x14c
> [ 418.560391] [c0000000a252f960] [c0000000004ccc7c]
> truncate_inode_pages_range+0x100/0x4dc
> [ 418.560397] [c0000000a252fbd0] [c00800000bb20ba8]
> btrfs_evict_inode+0x74/0x510 [btrfs]
> [ 418.560437] [c0000000a252fc90] [c00000000065c71c] evict+0x164/0x334
> [ 418.560443] [c0000000a252fd30] [c000000000647c9c] do_unlinkat+0x2f4/0x3a4
> [ 418.560449] [c0000000a252fde0] [c000000000647da0] sys_unlinkat+0x54/0xac
> [ 418.560454] [c0000000a252fe10] [c000000000033498]
> system_call_exception+0x138/0x330
> [ 418.560461] [c0000000a252fe50] [c00000000000d05c]
> system_call_vectored_common+0x15c/0x2ec
> [ 418.560468] --- interrupt: 3000 at 0x7fffb1b366bc
> [ 418.560471] NIP: 00007fffb1b366bc LR: 00007fffb1b366bc CTR:
> 0000000000000000
> [ 418.560475] REGS: c0000000a252fe80 TRAP: 3000 Not tainted
> (6.14.0-rc7-next-20250320)
> [ 418.560479] MSR: 800000000280f033
> <SF,VEC,VSX,EE,PR,FP,ME,IR,DR,RI,LE> CR: 44008804 XER: 00000000
> [ 418.560490] IRQMASK: 0
> [ 418.560490] GPR00: 0000000000000124 00007ffffcb4e2b0 00007fffb1c37d00
> ffffffffffffff9c
> [ 418.560490] GPR04: 000000013d660380 0000000000000000 0000000000000000
> 0000000000000003
> [ 418.560490] GPR08: 0000000000000000 0000000000000000 0000000000000000
> 0000000000000000
> [ 418.560490] GPR12: 0000000000000000 00007fffb1dba5c0 00007ffffcb4e538
> 000000011972d0e8
> [ 418.560490] GPR16: 000000011972d098 000000011972d060 000000011972d020
> 000000011972cff0
> [ 418.560490] GPR20: 000000011972d298 000000011972cc10 0000000000000000
> 000000013d6615a0
> [ 418.560490] GPR24: 0000000000000002 000000011972d0b8 000000011972cf98
> 000000011972d1d0
> [ 418.560490] GPR28: 00007ffffcb4e538 000000013d6602f0 0000000000000000
> 0000000000100000
> [ 418.560532] NIP [00007fffb1b366bc] 0x7fffb1b366bc
> [ 418.560536] LR [00007fffb1b366bc] 0x7fffb1b366bc
> [ 418.560538] --- interrupt: 3000
> [ 418.560541] Code: 7c0803a6 4e800020 3c4c005c 38428878 7c0802a6
> 60000000 39200001 992d0932 a12d0008 3ce0fffe 5529083c 61290001
> <7d001829> 7d063879 40c20018 7d063838
> [ 418.560555] ---[ end trace 0000000000000000 ]---
>
>
> If you happed to fix this, please add below tag.
>
>
> Reported-by: Venkat Rao Bagalkote <venkat88@linux.ibm.com>
>
>
> Regards,
>
> Venkat.
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [linux-next-20250320][btrfs] Kernel OOPs while running btrfs/108
2025-03-21 15:56 ` Ritesh Harjani (IBM)
@ 2025-03-21 21:18 ` Qu Wenruo
2025-03-22 14:15 ` Venkat Rao Bagalkote
0 siblings, 1 reply; 9+ messages in thread
From: Qu Wenruo @ 2025-03-21 21:18 UTC (permalink / raw)
To: Ritesh Harjani (IBM), Venkat Rao Bagalkote, LKML, linuxppc-dev,
Madhavan Srinivasan, linux-btrfs
在 2025/3/22 02:26, Ritesh Harjani (IBM) 写道:
>
> +linux-btrfs
>
> Venkat Rao Bagalkote <venkat88@linux.ibm.com> writes:
>
>> Greetings!!!
>>
>>
>> I am observing Kernel oops while running brtfs/108 TC on IBM Power System.
>>
>> Repo: Linux-Next (next-20250320)
>
> Looks like this next tag had many btrfs related changes -
> https://web.git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/log/fs/btrfs?h=next-20250320
>
>>
>> Traces:
>>
>> [ 418.392604] run fstests btrfs/108 at 2025-03-21 05:11:21
>> [ 418.560137] Kernel attempted to read user page (0) - exploit attempt?
>> (uid: 0)
>> [ 418.560156] BUG: Kernel NULL pointer dereference on read at 0x00000000
>
> NULL pointer dereference...
>
>> [ 418.560161] Faulting instruction address: 0xc0000000010ef8b0
>> [ 418.560166] Oops: Kernel access of bad area, sig: 11 [#1]
>> [ 418.560169] LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=8192 NUMA pSeries
>> [ 418.560174] Modules linked in: btrfs blake2b_generic xor raid6_pq
>> zstd_compress loop nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib
>> nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct
>> nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 bonding nf_defrag_ipv4
>> tls rfkill ip_set nf_tables nfnetlink sunrpc pseries_rng vmx_crypto fuse
>> ext4 mbcache jbd2 sd_mod sg ibmvscsi scsi_transport_srp ibmveth
>> [ 418.560212] CPU: 1 UID: 0 PID: 37583 Comm: rm Kdump: loaded Not
>> tainted 6.14.0-rc7-next-20250320 #1 VOLUNTARY
>> [ 418.560218] Hardware name: IBM,9080-HEX Power11
>> [ 418.560223] NIP: c0000000010ef8b0 LR: c00800000bb190ac CTR:
>> c0000000010ef888
>> [ 418.560227] REGS: c0000000a252f5a0 TRAP: 0300 Not tainted
>> (6.14.0-rc7-next-20250320)
>> [ 418.560232] MSR: 8000000000009033 <SF,EE,ME,IR,DR,RI,LE> CR:
>> 44008444 XER: 20040000
>> [ 418.560240] CFAR: c00800000bc1df84 DAR: 0000000000000000 DSISR:
>> 40000000 IRQMASK: 1
>> [ 418.560240] GPR00: c00800000bb190ac c0000000a252f840 c0000000016a8100
>> 0000000000000000
>> [ 418.560240] GPR04: 0000000000000000 0000000000010000 0000000000000000
>> fffffffffffe0000
>> [ 418.560240] GPR08: c00000010724aad8 0000000000000003 0000000000001000
>> c00800000bc1df70
>> [ 418.560240] GPR12: c0000000010ef888 c000000affffdb00 0000000000000000
>> 0000000000000000
>> [ 418.560240] GPR16: 0000000000000000 0000000000000000 0000000000000000
>> 0000000000000000
>> [ 418.560240] GPR20: c0000000777a8000 c00000006a9c9000 c00000010724a950
>> c0000000777a8000
>> [ 418.560240] GPR24: fffffffffffffffe c00000010724aad8 0000000000010000
>> 00000000000000a0
>> [ 418.560240] GPR28: 0000000000010000 c00c00000048c3c0 0000000000000000
>> 0000000000000000
>> [ 418.560287] NIP [c0000000010ef8b0] _raw_spin_lock_irq+0x28/0x98
>> [ 418.560294] LR [c00800000bb190ac] wait_subpage_spinlock+0x64/0xd0 [btrfs]
>
>
> btrfs is working on subpage size support for a while now.
> Adding +linux-btrfs, in case if they are already aware of this problem.
>
> I am not that familiar with btrfs code. But does this look like that the
> subpage (folio->private became NULL here) somehow?
The for-next branch seems to have some conflicts, IIRC the following two
commits are no longer in our tree anymore:
btrfs: kill EXTENT_FOLIO_PRIVATE
btrfs: add mapping_set_release_always to inode's mapping
I believe those two may be the cause.
Mind to test with the our current for-next branch? Where that's all of
our development happening, and I run daily subpage fstests on it to make
sure at least that branch is safe:
https://github.com/btrfs/linux/tree/for-next
And appreciate if you can verify if the NULL pointer dereference is
still there on that branch.
Thanks,
Qu
>
> -ritesh
>
>> [ 418.560339] Call Trace:
>> [ 418.560342] [c0000000a252f870] [c00800000bb205dc]
>> btrfs_invalidate_folio+0xa8/0x4f0 [btrfs]
>> [ 418.560384] [c0000000a252f930] [c0000000004cbcdc]
>> truncate_cleanup_folio+0x110/0x14c
>> [ 418.560391] [c0000000a252f960] [c0000000004ccc7c]
>> truncate_inode_pages_range+0x100/0x4dc
>> [ 418.560397] [c0000000a252fbd0] [c00800000bb20ba8]
>> btrfs_evict_inode+0x74/0x510 [btrfs]
>> [ 418.560437] [c0000000a252fc90] [c00000000065c71c] evict+0x164/0x334
>> [ 418.560443] [c0000000a252fd30] [c000000000647c9c] do_unlinkat+0x2f4/0x3a4
>> [ 418.560449] [c0000000a252fde0] [c000000000647da0] sys_unlinkat+0x54/0xac
>> [ 418.560454] [c0000000a252fe10] [c000000000033498]
>> system_call_exception+0x138/0x330
>> [ 418.560461] [c0000000a252fe50] [c00000000000d05c]
>> system_call_vectored_common+0x15c/0x2ec
>> [ 418.560468] --- interrupt: 3000 at 0x7fffb1b366bc
>> [ 418.560471] NIP: 00007fffb1b366bc LR: 00007fffb1b366bc CTR:
>> 0000000000000000
>> [ 418.560475] REGS: c0000000a252fe80 TRAP: 3000 Not tainted
>> (6.14.0-rc7-next-20250320)
>> [ 418.560479] MSR: 800000000280f033
>> <SF,VEC,VSX,EE,PR,FP,ME,IR,DR,RI,LE> CR: 44008804 XER: 00000000
>> [ 418.560490] IRQMASK: 0
>> [ 418.560490] GPR00: 0000000000000124 00007ffffcb4e2b0 00007fffb1c37d00
>> ffffffffffffff9c
>> [ 418.560490] GPR04: 000000013d660380 0000000000000000 0000000000000000
>> 0000000000000003
>> [ 418.560490] GPR08: 0000000000000000 0000000000000000 0000000000000000
>> 0000000000000000
>> [ 418.560490] GPR12: 0000000000000000 00007fffb1dba5c0 00007ffffcb4e538
>> 000000011972d0e8
>> [ 418.560490] GPR16: 000000011972d098 000000011972d060 000000011972d020
>> 000000011972cff0
>> [ 418.560490] GPR20: 000000011972d298 000000011972cc10 0000000000000000
>> 000000013d6615a0
>> [ 418.560490] GPR24: 0000000000000002 000000011972d0b8 000000011972cf98
>> 000000011972d1d0
>> [ 418.560490] GPR28: 00007ffffcb4e538 000000013d6602f0 0000000000000000
>> 0000000000100000
>> [ 418.560532] NIP [00007fffb1b366bc] 0x7fffb1b366bc
>> [ 418.560536] LR [00007fffb1b366bc] 0x7fffb1b366bc
>> [ 418.560538] --- interrupt: 3000
>> [ 418.560541] Code: 7c0803a6 4e800020 3c4c005c 38428878 7c0802a6
>> 60000000 39200001 992d0932 a12d0008 3ce0fffe 5529083c 61290001
>> <7d001829> 7d063879 40c20018 7d063838
>> [ 418.560555] ---[ end trace 0000000000000000 ]---
>>
>>
>> If you happed to fix this, please add below tag.
>>
>>
>> Reported-by: Venkat Rao Bagalkote <venkat88@linux.ibm.com>
>>
>>
>> Regards,
>>
>> Venkat.
>
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [linux-next-20250320][btrfs] Kernel OOPs while running btrfs/108
2025-03-21 21:18 ` Qu Wenruo
@ 2025-03-22 14:15 ` Venkat Rao Bagalkote
0 siblings, 0 replies; 9+ messages in thread
From: Venkat Rao Bagalkote @ 2025-03-22 14:15 UTC (permalink / raw)
To: Qu Wenruo, Ritesh Harjani (IBM), LKML, linuxppc-dev,
Madhavan Srinivasan, linux-btrfs
On 22/03/25 2:48 am, Qu Wenruo wrote:
>
>
> 在 2025/3/22 02:26, Ritesh Harjani (IBM) 写道:
>>
>> +linux-btrfs
>>
>> Venkat Rao Bagalkote <venkat88@linux.ibm.com> writes:
>>
>>> Greetings!!!
>>>
>>>
>>> I am observing Kernel oops while running brtfs/108 TC on IBM Power
>>> System.
>>>
>>> Repo: Linux-Next (next-20250320)
>>
>> Looks like this next tag had many btrfs related changes -
>> https://web.git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/log/fs/btrfs?h=next-20250320
>>
>>
>>>
>>> Traces:
>>>
>>> [ 418.392604] run fstests btrfs/108 at 2025-03-21 05:11:21
>>> [ 418.560137] Kernel attempted to read user page (0) - exploit
>>> attempt?
>>> (uid: 0)
>>> [ 418.560156] BUG: Kernel NULL pointer dereference on read at
>>> 0x00000000
>>
>> NULL pointer dereference...
>>
>>> [ 418.560161] Faulting instruction address: 0xc0000000010ef8b0
>>> [ 418.560166] Oops: Kernel access of bad area, sig: 11 [#1]
>>> [ 418.560169] LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=8192 NUMA
>>> pSeries
>>> [ 418.560174] Modules linked in: btrfs blake2b_generic xor raid6_pq
>>> zstd_compress loop nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib
>>> nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct
>>> nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 bonding nf_defrag_ipv4
>>> tls rfkill ip_set nf_tables nfnetlink sunrpc pseries_rng vmx_crypto
>>> fuse
>>> ext4 mbcache jbd2 sd_mod sg ibmvscsi scsi_transport_srp ibmveth
>>> [ 418.560212] CPU: 1 UID: 0 PID: 37583 Comm: rm Kdump: loaded Not
>>> tainted 6.14.0-rc7-next-20250320 #1 VOLUNTARY
>>> [ 418.560218] Hardware name: IBM,9080-HEX Power11
>>> [ 418.560223] NIP: c0000000010ef8b0 LR: c00800000bb190ac CTR:
>>> c0000000010ef888
>>> [ 418.560227] REGS: c0000000a252f5a0 TRAP: 0300 Not tainted
>>> (6.14.0-rc7-next-20250320)
>>> [ 418.560232] MSR: 8000000000009033 <SF,EE,ME,IR,DR,RI,LE> CR:
>>> 44008444 XER: 20040000
>>> [ 418.560240] CFAR: c00800000bc1df84 DAR: 0000000000000000 DSISR:
>>> 40000000 IRQMASK: 1
>>> [ 418.560240] GPR00: c00800000bb190ac c0000000a252f840
>>> c0000000016a8100
>>> 0000000000000000
>>> [ 418.560240] GPR04: 0000000000000000 0000000000010000
>>> 0000000000000000
>>> fffffffffffe0000
>>> [ 418.560240] GPR08: c00000010724aad8 0000000000000003
>>> 0000000000001000
>>> c00800000bc1df70
>>> [ 418.560240] GPR12: c0000000010ef888 c000000affffdb00
>>> 0000000000000000
>>> 0000000000000000
>>> [ 418.560240] GPR16: 0000000000000000 0000000000000000
>>> 0000000000000000
>>> 0000000000000000
>>> [ 418.560240] GPR20: c0000000777a8000 c00000006a9c9000
>>> c00000010724a950
>>> c0000000777a8000
>>> [ 418.560240] GPR24: fffffffffffffffe c00000010724aad8
>>> 0000000000010000
>>> 00000000000000a0
>>> [ 418.560240] GPR28: 0000000000010000 c00c00000048c3c0
>>> 0000000000000000
>>> 0000000000000000
>>> [ 418.560287] NIP [c0000000010ef8b0] _raw_spin_lock_irq+0x28/0x98
>>> [ 418.560294] LR [c00800000bb190ac] wait_subpage_spinlock+0x64/0xd0
>>> [btrfs]
>>
>>
>> btrfs is working on subpage size support for a while now.
>> Adding +linux-btrfs, in case if they are already aware of this problem.
>>
>> I am not that familiar with btrfs code. But does this look like that the
>> subpage (folio->private became NULL here) somehow?
>
> The for-next branch seems to have some conflicts, IIRC the following two
> commits are no longer in our tree anymore:
>
> btrfs: kill EXTENT_FOLIO_PRIVATE
> btrfs: add mapping_set_release_always to inode's mapping
>
> I believe those two may be the cause.
>
> Mind to test with the our current for-next branch? Where that's all of
> our development happening, and I run daily subpage fstests on it to make
> sure at least that branch is safe:
>
> https://github.com/btrfs/linux/tree/for-next
>
> And appreciate if you can verify if the NULL pointer dereference is
> still there on that branch.
I verified with the for-next repo, and I dont see the issue. btrfs/108
passes.
./check btrfs/108
RECREATING -- btrfs on /dev/loop0
FSTYP -- btrfs
PLATFORM -- Linux/ppc64le ltcden8-lp1 6.14.0-rc7-g88d324e69ea9 #1
SMP Sat Mar 22 07:47:48 CDT 2025
MKFS_OPTIONS -- -f -s 4096 -n 4096 /dev/loop1
MOUNT_OPTIONS -- -o context=system_u:object_r:root_t:s0 /dev/loop1
/mnt/scratch
btrfs/108 1s
Ran: btrfs/108
Passed all 1 tests
Repo: https://github.com/btrfs/linux/tree/for-next
Regards,
Venkat.
>
> Thanks,
> Qu
>
>>
>> -ritesh
>>
>>> [ 418.560339] Call Trace:
>>> [ 418.560342] [c0000000a252f870] [c00800000bb205dc]
>>> btrfs_invalidate_folio+0xa8/0x4f0 [btrfs]
>>> [ 418.560384] [c0000000a252f930] [c0000000004cbcdc]
>>> truncate_cleanup_folio+0x110/0x14c
>>> [ 418.560391] [c0000000a252f960] [c0000000004ccc7c]
>>> truncate_inode_pages_range+0x100/0x4dc
>>> [ 418.560397] [c0000000a252fbd0] [c00800000bb20ba8]
>>> btrfs_evict_inode+0x74/0x510 [btrfs]
>>> [ 418.560437] [c0000000a252fc90] [c00000000065c71c] evict+0x164/0x334
>>> [ 418.560443] [c0000000a252fd30] [c000000000647c9c]
>>> do_unlinkat+0x2f4/0x3a4
>>> [ 418.560449] [c0000000a252fde0] [c000000000647da0]
>>> sys_unlinkat+0x54/0xac
>>> [ 418.560454] [c0000000a252fe10] [c000000000033498]
>>> system_call_exception+0x138/0x330
>>> [ 418.560461] [c0000000a252fe50] [c00000000000d05c]
>>> system_call_vectored_common+0x15c/0x2ec
>>> [ 418.560468] --- interrupt: 3000 at 0x7fffb1b366bc
>>> [ 418.560471] NIP: 00007fffb1b366bc LR: 00007fffb1b366bc CTR:
>>> 0000000000000000
>>> [ 418.560475] REGS: c0000000a252fe80 TRAP: 3000 Not tainted
>>> (6.14.0-rc7-next-20250320)
>>> [ 418.560479] MSR: 800000000280f033
>>> <SF,VEC,VSX,EE,PR,FP,ME,IR,DR,RI,LE> CR: 44008804 XER: 00000000
>>> [ 418.560490] IRQMASK: 0
>>> [ 418.560490] GPR00: 0000000000000124 00007ffffcb4e2b0
>>> 00007fffb1c37d00
>>> ffffffffffffff9c
>>> [ 418.560490] GPR04: 000000013d660380 0000000000000000
>>> 0000000000000000
>>> 0000000000000003
>>> [ 418.560490] GPR08: 0000000000000000 0000000000000000
>>> 0000000000000000
>>> 0000000000000000
>>> [ 418.560490] GPR12: 0000000000000000 00007fffb1dba5c0
>>> 00007ffffcb4e538
>>> 000000011972d0e8
>>> [ 418.560490] GPR16: 000000011972d098 000000011972d060
>>> 000000011972d020
>>> 000000011972cff0
>>> [ 418.560490] GPR20: 000000011972d298 000000011972cc10
>>> 0000000000000000
>>> 000000013d6615a0
>>> [ 418.560490] GPR24: 0000000000000002 000000011972d0b8
>>> 000000011972cf98
>>> 000000011972d1d0
>>> [ 418.560490] GPR28: 00007ffffcb4e538 000000013d6602f0
>>> 0000000000000000
>>> 0000000000100000
>>> [ 418.560532] NIP [00007fffb1b366bc] 0x7fffb1b366bc
>>> [ 418.560536] LR [00007fffb1b366bc] 0x7fffb1b366bc
>>> [ 418.560538] --- interrupt: 3000
>>> [ 418.560541] Code: 7c0803a6 4e800020 3c4c005c 38428878 7c0802a6
>>> 60000000 39200001 992d0932 a12d0008 3ce0fffe 5529083c 61290001
>>> <7d001829> 7d063879 40c20018 7d063838
>>> [ 418.560555] ---[ end trace 0000000000000000 ]---
>>>
>>>
>>> If you happed to fix this, please add below tag.
>>>
>>>
>>> Reported-by: Venkat Rao Bagalkote <venkat88@linux.ibm.com>
>>>
>>>
>>> Regards,
>>>
>>> Venkat.
>>
>
>
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [linux-next-20250320][btrfs] Kernel OOPs while running btrfs/108
@ 2025-05-07 9:01 Venkat
2025-05-07 13:04 ` Filipe Manana
0 siblings, 1 reply; 9+ messages in thread
From: Venkat @ 2025-05-07 9:01 UTC (permalink / raw)
To: quwenruo.btrfs
Cc: linux-btrfs, LKML, linuxppc-dev, maddy, ritesh.list, venkat88,
disgoel
+Disha,
Hello Qu,
I still see this failure on next-20250505.
May I know, when will this be fixed.
Same traces are seen, while running other Tests also.
Disha,
Can you please share the details of Test and the traces.
Regards,
Venkat.
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [linux-next-20250320][btrfs] Kernel OOPs while running btrfs/108
2025-05-07 9:01 Venkat
@ 2025-05-07 13:04 ` Filipe Manana
2025-05-07 14:14 ` David Sterba
0 siblings, 1 reply; 9+ messages in thread
From: Filipe Manana @ 2025-05-07 13:04 UTC (permalink / raw)
To: Venkat
Cc: quwenruo.btrfs, linux-btrfs, LKML, linuxppc-dev, maddy,
ritesh.list, disgoel, David Sterba
On Wed, May 7, 2025 at 10:02 AM Venkat <venkat88@linux.ibm.com> wrote:
>
> +Disha,
>
> Hello Qu,
>
> I still see this failure on next-20250505.
>
> May I know, when will this be fixed.
The two patches pointed out before by Qu are still being added to linux-next.
Qu reported this on the thread for the patches:
https://lore.kernel.org/linux-btrfs/0146825e-a1b1-4789-b4f5-a0894347babe@gmx.com/
There was no reply from the author and David added them again to
for-next/linux-next.
David, can you drop them out from for-next? Why are they being added
again when there were no changes since last time?
>
> Same traces are seen, while running other Tests also.
>
> Disha,
>
> Can you please share the details of Test and the traces.
>
> Regards,
> Venkat.
>
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [linux-next-20250320][btrfs] Kernel OOPs while running btrfs/108
2025-05-07 13:04 ` Filipe Manana
@ 2025-05-07 14:14 ` David Sterba
2025-05-08 10:44 ` Venkat Rao Bagalkote
0 siblings, 1 reply; 9+ messages in thread
From: David Sterba @ 2025-05-07 14:14 UTC (permalink / raw)
To: Filipe Manana
Cc: Venkat, quwenruo.btrfs, linux-btrfs, LKML, linuxppc-dev, maddy,
ritesh.list, disgoel, David Sterba
On Wed, May 07, 2025 at 02:04:47PM +0100, Filipe Manana wrote:
> On Wed, May 7, 2025 at 10:02 AM Venkat <venkat88@linux.ibm.com> wrote:
> >
> > +Disha,
> >
> > Hello Qu,
> >
> > I still see this failure on next-20250505.
> >
> > May I know, when will this be fixed.
>
> The two patches pointed out before by Qu are still being added to linux-next.
> Qu reported this on the thread for the patches:
>
> https://lore.kernel.org/linux-btrfs/0146825e-a1b1-4789-b4f5-a0894347babe@gmx.com/
>
> There was no reply from the author and David added them again to
> for-next/linux-next.
>
> David, can you drop them out from for-next? Why are they being added
> again when there were no changes since last time?
The patches have been there for like 4 -rc kernels without reported
problems. I will remove them again.
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [linux-next-20250320][btrfs] Kernel OOPs while running btrfs/108
2025-05-07 14:14 ` David Sterba
@ 2025-05-08 10:44 ` Venkat Rao Bagalkote
0 siblings, 0 replies; 9+ messages in thread
From: Venkat Rao Bagalkote @ 2025-05-08 10:44 UTC (permalink / raw)
To: dsterba, Filipe Manana
Cc: quwenruo.btrfs, linux-btrfs, LKML, linuxppc-dev, maddy,
ritesh.list, disgoel, David Sterba
On 07/05/25 7:44 pm, David Sterba wrote:
> On Wed, May 07, 2025 at 02:04:47PM +0100, Filipe Manana wrote:
>> On Wed, May 7, 2025 at 10:02 AM Venkat <venkat88@linux.ibm.com> wrote:
>>> +Disha,
>>>
>>> Hello Qu,
>>>
>>> I still see this failure on next-20250505.
>>>
>>> May I know, when will this be fixed.
>> The two patches pointed out before by Qu are still being added to linux-next.
>> Qu reported this on the thread for the patches:
>>
>> https://lore.kernel.org/linux-btrfs/0146825e-a1b1-4789-b4f5-a0894347babe@gmx.com/
>>
>> There was no reply from the author and David added them again to
>> for-next/linux-next.
Added again, was this removed? Can you please point me to patch or
commit id. I was under impression, it never got removed.
>>
>> David, can you drop them out from for-next? Why are they being added
>> again when there were no changes since last time?
> The patches have been there for like 4 -rc kernels without reported
> problems. I will remove them again.
David,
While reverting those patches, please add below tags. And really
appriciate, if you can keep me in CC.
Reported-by: Venkat Rao Bagalkote <venkat88@linux.ibm.com>
Reported-by: Disha Goel <disgoel@linux.ibm.com>
Tested-by: Venkat Rao Bagalkote <venkat88@linux.ibm.com>
Closes:
https://lore.kernel.org/all/e4b1ccf8-c626-4683-82db-219354a27e61@linux.ibm.com/
Regards,
Venkat.
^ permalink raw reply [flat|nested] 9+ messages in thread
end of thread, other threads:[~2025-05-08 10:45 UTC | newest]
Thread overview: 9+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-03-21 10:20 [linux-next-20250320][btrfs] Kernel OOPs while running btrfs/108 Venkat Rao Bagalkote
2025-03-21 10:30 ` Venkat Rao Bagalkote
2025-03-21 15:56 ` Ritesh Harjani (IBM)
2025-03-21 21:18 ` Qu Wenruo
2025-03-22 14:15 ` Venkat Rao Bagalkote
-- strict thread matches above, loose matches on Subject: below --
2025-05-07 9:01 Venkat
2025-05-07 13:04 ` Filipe Manana
2025-05-07 14:14 ` David Sterba
2025-05-08 10:44 ` Venkat Rao Bagalkote
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).