All of lore.kernel.org
 help / color / mirror / Atom feed
* raid6: general protection fault in async_copy_data
@ 2015-05-05  8:14 Alexander Lyakas
  2015-05-06  4:21 ` NeilBrown
  0 siblings, 1 reply; 3+ messages in thread
From: Alexander Lyakas @ 2015-05-05  8:14 UTC (permalink / raw)
  To: linux-raid; +Cc: Neil Brown

Hi Neil,
we had the following crash:

[86399.862150] general protection fault: 0000 [#1] SMP
[86399.881970] CPU 1
[86399.882264] Pid: 17989, comm: md4_raid6 Tainted: GF       W  O
3.8.13-030813-generic #201305111843 Bochs Bochs
[86399.883681] RIP: 0010:[<ffffffff8135d446>]  [<ffffffff8135d446>]
memcpy+0x6/0x110
[86399.884886] RSP: 0018:ffff8800a78e5a80  EFLAGS: 00010286
[86399.885629] RAX: 4588966d912cea06 RBX: ffff8800a78e4000 RCX: 0000000000001000
[86399.886605] RDX: 0000000000001000 RSI: ffff8800a7ed2000 RDI: 4588966d912cea06
[86399.887586] RBP: ffff8800a78e5ae8 R08: 0000000000001000 R09: ffff8800a78e5b20
[86399.888603] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[86399.889593] R13: ffff8800a78e5b20 R14: 0000000000001000 R15: 0000000000000000
[86399.890551] FS:  0000000000000000(0000) GS:ffff88011fd00000(0000)
knlGS:0000000000000000
[86399.891648] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[86399.892504] CR2: 00007f10cb8ae966 CR3: 0000000113bfc000 CR4: 00000000001406e0
[86399.893493] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[86399.894458] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[86399.895426] Process md4_raid6 (pid: 17989, threadinfo
ffff8800a78e4000, task ffff8800a7dc0000)
[86399.896629] Stack:
[86399.896930]  ffffffffa05061c5 ffff88000ab6fa06 ffffffff816ed725
ffffea00029fb480
[86399.898005]  51160e39b619d7e4 0000000000000000 000000000ab6fa06
ffff8800c696b938
[86399.899082]  000000003eca7624 ffff880084dc1ac0 0000000000001000
0000000000000002
[86399.900293] Call Trace:
[86399.900660]  [<ffffffffa05061c5>] ? async_memcpy+0x1c5/0x1000 [async_memcpy]
[86399.901653]  [<ffffffff816ed725>] ? _raw_spin_lock_irq+0x15/0x20
[86399.902655]  [<ffffffffa05a5090>] async_copy_data+0x100/0x140 [raid456]
[86399.903557]  [<ffffffffa05abe20>] handle_stripe+0x13e0/0x2380 [raid456]
[86399.904531]  [<ffffffff815739de>] ? dm_dispatch_request+0x3e/0x70
[86399.905388]  [<ffffffff81097c33>] ? update_curr+0x143/0x1f0
[86399.906151]  [<ffffffff816eb03d>] ? mutex_lock+0x1d/0x50
[86399.906888]  [<ffffffffa05adea5>] handle_active_stripes+0x165/0x200 [raid456]
[86399.907857]  [<ffffffff8156ab8e>] ? md_check_recovery.part.49+0x3e/0x530
[86399.908811]  [<ffffffffa05ae28a>] raid5d+0x34a/0x570 [raid456]
[86399.909614]  [<ffffffff8156344d>] md_thread+0x10d/0x140
[86399.910356]  [<ffffffff8107fc10>] ? add_wait_queue+0x60/0x60
[86399.911149]  [<ffffffff81563340>] ? md_rdev_init+0x140/0x140
[86399.911955]  [<ffffffff8107f050>] kthread+0xc0/0xd0
[86399.912668]  [<ffffffff8107ef90>] ? flush_kthread_worker+0xb0/0xb0
[86399.913528]  [<ffffffff816f61ec>] ret_from_fork+0x7c/0xb0
[86399.914267]  [<ffffffff8107ef90>] ? flush_kthread_worker+0xb0/0xb0
[86399.915109] Code: 74 13 48 8b 43 58 48 2b 43 50 88 43 4e 48 83 c4
08 5b 5d c3 90 e8 fb fd ff ff eb e6 90 90 90 90 90 90 90 90 90 48 89
f8 48 89 d1 <f3> a4 c3 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3 20 4c 8b 06
4c 8b
[86399.919028] RIP  [<ffffffff8135d446>] memcpy+0x6/0x110

Can you maybe advise what is happening here? Our kernel is 3.8.13.

Thanks,
Alex.

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: raid6: general protection fault in async_copy_data
  2015-05-05  8:14 raid6: general protection fault in async_copy_data Alexander Lyakas
@ 2015-05-06  4:21 ` NeilBrown
  2015-05-10  8:05   ` Alexander Lyakas
  0 siblings, 1 reply; 3+ messages in thread
From: NeilBrown @ 2015-05-06  4:21 UTC (permalink / raw)
  To: Alexander Lyakas; +Cc: linux-raid

[-- Attachment #1: Type: text/plain, Size: 3640 bytes --]

On Tue, 5 May 2015 10:14:18 +0200 Alexander Lyakas <alex.bolshoy@gmail.com>
wrote:

> Hi Neil,
> we had the following crash:
> 
> [86399.862150] general protection fault: 0000 [#1] SMP
> [86399.881970] CPU 1
> [86399.882264] Pid: 17989, comm: md4_raid6 Tainted: GF       W  O
> 3.8.13-030813-generic #201305111843 Bochs Bochs
> [86399.883681] RIP: 0010:[<ffffffff8135d446>]  [<ffffffff8135d446>]
> memcpy+0x6/0x110
> [86399.884886] RSP: 0018:ffff8800a78e5a80  EFLAGS: 00010286
> [86399.885629] RAX: 4588966d912cea06 RBX: ffff8800a78e4000 RCX: 0000000000001000
> [86399.886605] RDX: 0000000000001000 RSI: ffff8800a7ed2000 RDI: 4588966d912cea06
> [86399.887586] RBP: ffff8800a78e5ae8 R08: 0000000000001000 R09: ffff8800a78e5b20
> [86399.888603] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
> [86399.889593] R13: ffff8800a78e5b20 R14: 0000000000001000 R15: 0000000000000000
> [86399.890551] FS:  0000000000000000(0000) GS:ffff88011fd00000(0000)
> knlGS:0000000000000000
> [86399.891648] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [86399.892504] CR2: 00007f10cb8ae966 CR3: 0000000113bfc000 CR4: 00000000001406e0
> [86399.893493] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
> [86399.894458] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
> [86399.895426] Process md4_raid6 (pid: 17989, threadinfo
> ffff8800a78e4000, task ffff8800a7dc0000)
> [86399.896629] Stack:
> [86399.896930]  ffffffffa05061c5 ffff88000ab6fa06 ffffffff816ed725
> ffffea00029fb480
> [86399.898005]  51160e39b619d7e4 0000000000000000 000000000ab6fa06
> ffff8800c696b938
> [86399.899082]  000000003eca7624 ffff880084dc1ac0 0000000000001000
> 0000000000000002
> [86399.900293] Call Trace:
> [86399.900660]  [<ffffffffa05061c5>] ? async_memcpy+0x1c5/0x1000 [async_memcpy]
> [86399.901653]  [<ffffffff816ed725>] ? _raw_spin_lock_irq+0x15/0x20
> [86399.902655]  [<ffffffffa05a5090>] async_copy_data+0x100/0x140 [raid456]
> [86399.903557]  [<ffffffffa05abe20>] handle_stripe+0x13e0/0x2380 [raid456]
> [86399.904531]  [<ffffffff815739de>] ? dm_dispatch_request+0x3e/0x70
> [86399.905388]  [<ffffffff81097c33>] ? update_curr+0x143/0x1f0
> [86399.906151]  [<ffffffff816eb03d>] ? mutex_lock+0x1d/0x50
> [86399.906888]  [<ffffffffa05adea5>] handle_active_stripes+0x165/0x200 [raid456]
> [86399.907857]  [<ffffffff8156ab8e>] ? md_check_recovery.part.49+0x3e/0x530
> [86399.908811]  [<ffffffffa05ae28a>] raid5d+0x34a/0x570 [raid456]
> [86399.909614]  [<ffffffff8156344d>] md_thread+0x10d/0x140
> [86399.910356]  [<ffffffff8107fc10>] ? add_wait_queue+0x60/0x60
> [86399.911149]  [<ffffffff81563340>] ? md_rdev_init+0x140/0x140
> [86399.911955]  [<ffffffff8107f050>] kthread+0xc0/0xd0
> [86399.912668]  [<ffffffff8107ef90>] ? flush_kthread_worker+0xb0/0xb0
> [86399.913528]  [<ffffffff816f61ec>] ret_from_fork+0x7c/0xb0
> [86399.914267]  [<ffffffff8107ef90>] ? flush_kthread_worker+0xb0/0xb0
> [86399.915109] Code: 74 13 48 8b 43 58 48 2b 43 50 88 43 4e 48 83 c4
> 08 5b 5d c3 90 e8 fb fd ff ff eb e6 90 90 90 90 90 90 90 90 90 48 89
> f8 48 89 d1 <f3> a4 c3 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3 20 4c 8b 06
> 4c 8b
> [86399.919028] RIP  [<ffffffff8135d446>] memcpy+0x6/0x110
> 
> Can you maybe advise what is happening here? Our kernel is 3.8.13.
> 

Not really.
It appears that %RDI is the destination for the memcpy, and it contains a
garbage address.
I cannot easily tell if this is a read or a write, but I'd guess a read as it
is hard to get the address of the page in the stripe_cache wrong.

Maybe something has corrupted the bio??

NeilBrown

[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 811 bytes --]

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: raid6: general protection fault in async_copy_data
  2015-05-06  4:21 ` NeilBrown
@ 2015-05-10  8:05   ` Alexander Lyakas
  0 siblings, 0 replies; 3+ messages in thread
From: Alexander Lyakas @ 2015-05-10  8:05 UTC (permalink / raw)
  To: NeilBrown; +Cc: linux-raid

Thanks, Neil.

On Wed, May 6, 2015 at 6:21 AM, NeilBrown <neilb@suse.de> wrote:
> On Tue, 5 May 2015 10:14:18 +0200 Alexander Lyakas <alex.bolshoy@gmail.com>
> wrote:
>
>> Hi Neil,
>> we had the following crash:
>>
>> [86399.862150] general protection fault: 0000 [#1] SMP
>> [86399.881970] CPU 1
>> [86399.882264] Pid: 17989, comm: md4_raid6 Tainted: GF       W  O
>> 3.8.13-030813-generic #201305111843 Bochs Bochs
>> [86399.883681] RIP: 0010:[<ffffffff8135d446>]  [<ffffffff8135d446>]
>> memcpy+0x6/0x110
>> [86399.884886] RSP: 0018:ffff8800a78e5a80  EFLAGS: 00010286
>> [86399.885629] RAX: 4588966d912cea06 RBX: ffff8800a78e4000 RCX: 0000000000001000
>> [86399.886605] RDX: 0000000000001000 RSI: ffff8800a7ed2000 RDI: 4588966d912cea06
>> [86399.887586] RBP: ffff8800a78e5ae8 R08: 0000000000001000 R09: ffff8800a78e5b20
>> [86399.888603] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
>> [86399.889593] R13: ffff8800a78e5b20 R14: 0000000000001000 R15: 0000000000000000
>> [86399.890551] FS:  0000000000000000(0000) GS:ffff88011fd00000(0000)
>> knlGS:0000000000000000
>> [86399.891648] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
>> [86399.892504] CR2: 00007f10cb8ae966 CR3: 0000000113bfc000 CR4: 00000000001406e0
>> [86399.893493] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
>> [86399.894458] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
>> [86399.895426] Process md4_raid6 (pid: 17989, threadinfo
>> ffff8800a78e4000, task ffff8800a7dc0000)
>> [86399.896629] Stack:
>> [86399.896930]  ffffffffa05061c5 ffff88000ab6fa06 ffffffff816ed725
>> ffffea00029fb480
>> [86399.898005]  51160e39b619d7e4 0000000000000000 000000000ab6fa06
>> ffff8800c696b938
>> [86399.899082]  000000003eca7624 ffff880084dc1ac0 0000000000001000
>> 0000000000000002
>> [86399.900293] Call Trace:
>> [86399.900660]  [<ffffffffa05061c5>] ? async_memcpy+0x1c5/0x1000 [async_memcpy]
>> [86399.901653]  [<ffffffff816ed725>] ? _raw_spin_lock_irq+0x15/0x20
>> [86399.902655]  [<ffffffffa05a5090>] async_copy_data+0x100/0x140 [raid456]
>> [86399.903557]  [<ffffffffa05abe20>] handle_stripe+0x13e0/0x2380 [raid456]
>> [86399.904531]  [<ffffffff815739de>] ? dm_dispatch_request+0x3e/0x70
>> [86399.905388]  [<ffffffff81097c33>] ? update_curr+0x143/0x1f0
>> [86399.906151]  [<ffffffff816eb03d>] ? mutex_lock+0x1d/0x50
>> [86399.906888]  [<ffffffffa05adea5>] handle_active_stripes+0x165/0x200 [raid456]
>> [86399.907857]  [<ffffffff8156ab8e>] ? md_check_recovery.part.49+0x3e/0x530
>> [86399.908811]  [<ffffffffa05ae28a>] raid5d+0x34a/0x570 [raid456]
>> [86399.909614]  [<ffffffff8156344d>] md_thread+0x10d/0x140
>> [86399.910356]  [<ffffffff8107fc10>] ? add_wait_queue+0x60/0x60
>> [86399.911149]  [<ffffffff81563340>] ? md_rdev_init+0x140/0x140
>> [86399.911955]  [<ffffffff8107f050>] kthread+0xc0/0xd0
>> [86399.912668]  [<ffffffff8107ef90>] ? flush_kthread_worker+0xb0/0xb0
>> [86399.913528]  [<ffffffff816f61ec>] ret_from_fork+0x7c/0xb0
>> [86399.914267]  [<ffffffff8107ef90>] ? flush_kthread_worker+0xb0/0xb0
>> [86399.915109] Code: 74 13 48 8b 43 58 48 2b 43 50 88 43 4e 48 83 c4
>> 08 5b 5d c3 90 e8 fb fd ff ff eb e6 90 90 90 90 90 90 90 90 90 48 89
>> f8 48 89 d1 <f3> a4 c3 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3 20 4c 8b 06
>> 4c 8b
>> [86399.919028] RIP  [<ffffffff8135d446>] memcpy+0x6/0x110
>>
>> Can you maybe advise what is happening here? Our kernel is 3.8.13.
>>
>
> Not really.
> It appears that %RDI is the destination for the memcpy, and it contains a
> garbage address.
> I cannot easily tell if this is a read or a write, but I'd guess a read as it
> is hard to get the address of the page in the stripe_cache wrong.
>
> Maybe something has corrupted the bio??
>
> NeilBrown

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2015-05-10  8:05 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2015-05-05  8:14 raid6: general protection fault in async_copy_data Alexander Lyakas
2015-05-06  4:21 ` NeilBrown
2015-05-10  8:05   ` Alexander Lyakas

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.