Hi,
I run a system on XFS over a LUKS dm-crypt FS, over a large RAID6
volume, and under stress, I get a kernel oops. I can reproduce it quite
easily using hardcore settings say with bonnie++, though I noticed the
issue when hitting the fileserver at 1 Gbps for some while.
System is running on Debian stable, with a debian kernel: 2.6.18-6-amd64
Here are the versions of the packages used:
cryptsetup: 2:1.0.4+svn26-1
dmsetup: 2:1.02.08-1
The oops kernel message is enclosed.
If anybody experienced such an issue, I would be glad to hear of any
solution. Otherwise, well, this might be a new bug to debunk ;)
Regards,
Gilles
kernel: Unable to handle kernel NULL pointer dereference at 0000000000000000 RIP:
kernel: [<ffffffff802a6b2a>] page_to_pfn+0x0/0x33
kernel: Oops: 0000 [1] SMP
kernel: CPU 1
kernel: Pid: 14024, comm: bonnie++ Not tainted 2.6.18-6-amd64 #1
kernel: RIP: 0010:[<ffffffff802a6b2a>] [<ffffffff802a6b2a>] page_to_pfn+0x0/0x33
Using defaults from ksymoops -t elf32-i386 -a i386
kernel: RSP: 0000:ffff810030a832f0 EFLAGS: 00010293
kernel: RAX: 0000000000000000 RBX: ffff81007e8143c0 RCX: 0000000000000000
kernel: RDX: 000000000000001b RSI: ffff81007e8143c0 RDI: 0000000000000000
kernel: RBP: ffff81004044ec00 R08: ffff810030a82000 R09: ffff81007a5f5ea8
kernel: R10: 00000000ffffffff R11: ffff81007dc456c0 R12: ffff81007e8143c0
kernel: R13: 0000000000000000 R14: 0000000000000000 R15: ffff81007e9c9928
kernel: FS: 00002aea998f7b00(0000) GS:ffff81007e297ac0(0000) knlGS:0000000000000000
kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
kernel: CR2: 0000000000000000 CR3: 000000007e85a000 CR4: 00000000000006e0
kernel: Stack: ffffffff8022bfba ffff810037dc6040 0000000000000000 0000000000000000
kernel: ffff810000000001 0000000000000001 ffff81007e8143c0 ffff81007e9c9928
kernel: ffff81007f35dcc0 ffff810007ca5228 000000000000001b 0000000000005000
kernel: Call Trace:
kernel: [<ffffffff8022bfba>] blk_recount_segments+0x7e/0x21b
kernel: [<ffffffff802bb19d>] __bio_clone+0x71/0x8a
kernel: [<ffffffff802bb1eb>] bio_clone+0x35/0x3d
kernel: [<ffffffff8819876a>] :dm_crypt:crypt_map+0xcd/0x304
kernel: [<ffffffff881782bf>] :dm_mod:__map_bio+0x47/0x9b
kernel: [<ffffffff88178c1f>] :dm_mod:__split_bio+0x172/0x37d
kernel: [<ffffffff80220104>] __up_read+0x13/0x8a
kernel: [<ffffffff88179432>] :dm_mod:dm_request+0x101/0x110
kernel: [<ffffffff80219f74>] generic_make_request+0x13a/0x14d
kernel: [<ffffffff8023104a>] submit_bio+0xcb/0xd2
kernel: [<ffffffff8022aa95>] __bio_add_page+0x154/0x1ce
kernel: [<ffffffff88269e43>] :xfs:xfs_submit_ioend_bio+0x1e/0x27
kernel: [<ffffffff8826a87b>] :xfs:xfs_page_state_convert+0xa2f/0xb6e
kernel: [<ffffffff8826abe8>] :xfs:xfs_vm_writepage+0xa7/0xdd
kernel: [<ffffffff802a90a1>] shrink_inactive_list+0x3c6/0x7e1
kernel: [<ffffffff881782bf>] :dm_mod:__map_bio+0x47/0x9b
kernel: [<ffffffff88178e12>] :dm_mod:__split_bio+0x365/0x37d
kernel: [<ffffffff80220104>] __up_read+0x13/0x8a
kernel: [<ffffffff8817943a>] :dm_mod:dm_request+0x109/0x110
kernel: [<ffffffff80219f74>] generic_make_request+0x13a/0x14d
kernel: [<ffffffff8826981c>] :xfs:xfs_get_blocks+0x0/0xe
kernel: [<ffffffff80211063>] shrink_zone+0xe2/0x107
kernel: [<ffffffff802a9b9d>] try_to_free_pages+0x159/0x260
kernel: [<ffffffff8020dfa8>] __alloc_pages+0x1a8/0x2a9
kernel: [<ffffffff80210db1>] __do_page_cache_readahead+0x95/0x206
kernel: [<ffffffff8803cbfe>] :scsi_mod:scsi_request_fn+0x345/0x39a
kernel: [<ffffffff8023005e>] blockable_page_cache_readahead+0x53/0xb2
kernel: [<ffffffff8022ce18>] make_ahead_window+0x87/0xa3
kernel: [<ffffffff80211f16>] page_cache_readahead+0x17d/0x1ad
kernel: [<ffffffff8020b865>] do_generic_mapping_read+0x12a/0x3d9
kernel: [<ffffffff8020c64d>] file_read_actor+0x0/0xcf
kernel: [<ffffffff8020bc62>] __generic_file_aio_read+0x14e/0x19b
kernel: [<ffffffff88270c27>] :xfs:xfs_read+0x272/0x2e7
kernel: [<ffffffff8824b732>] :xfs:xfs_iunlock+0x57/0x79
kernel: [<ffffffff8826d912>] :xfs:xfs_file_aio_read+0x67/0x6c
kernel: [<ffffffff8020c3f0>] do_sync_read+0xc7/0x104
kernel: [<ffffffff8021c605>] __dentry_open+0x101/0x1dc
kernel: [<ffffffff8028f9e6>] autoremove_wake_function+0x0/0x2e
kernel: [<ffffffff80225321>] do_filp_open+0x2d/0x3d
kernel: [<ffffffff8020af98>] vfs_read+0xcb/0x171
kernel: [<ffffffff8020fbaf>] sys_read+0x45/0x6e
kernel: [<ffffffff80257c16>] system_call+0x7e/0x83
---------------------------------------------------------------------
dm-crypt mailing list - http://www.saout.de/misc/dm-crypt/
To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx
For additional commands, e-mail: dm-crypt-help@xxxxxxxx