Hi, I am testing vanilla 3.3 kernel under kvm using xfstests and kernel usually oopses when I run it overnight, e.g.: [36928.586097] ------------[ cut here ]------------ [36928.586198] kernel BUG at fs/buffer.c:2871! [36928.586280] invalid opcode: 0000 [#1] SMP [36928.586374] CPU 1 [36928.586414] Modules linked in: [last unloaded: scsi_wait_scan] [36928.586615] [36928.586650] Pid: 11400, comm: fsstress Not tainted 3.3.0+ #43 Bochs Bochs [36928.586792] RIP: 0010:[<ffffffff811a9add>] [<ffffffff811a9add>] submit_bh+0x10d/0x120 [36928.586985] RSP: 0018:ffff880121713758 EFLAGS: 00010202 [36928.587045] RAX: 000000000004d025 RBX: ffff8802256a4a90 RCX: 0000000000000005 [36928.587045] RDX: ffff880121713fd8 RSI: ffff8802256a4a90 RDI: 0000000000000211 [36928.587045] RBP: ffff880121713778 R08: ffff8804075c0770 R09: 0000160000000000 [36928.587045] R10: 0000000000000001 R11: ffff880406fdd480 R12: 0000000000000211 [36928.587045] R13: ffff880121713834 R14: ffff88012a9c2000 R15: ffff880121713fd8 [36928.587045] FS: 00007f5470a81700(0000) GS:ffff88041fc20000(0000) knlGS:0000000000000000 [36928.587045] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b [36928.587045] CR2: 00007f546c02c698 CR3: 000000012e4e9000 CR4: 00000000000006e0 [36928.587045] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [36928.587045] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 [36928.587045] Process fsstress (pid: 11400, threadinfo ffff880121712000, task ffff8802cbba5c40) [36928.587045] Stack: [36928.587045] ffff88012a9c2000 ffff8802256a4a90 0000000000000211 ffff880121713834 [36928.587045] ffff880121713798 ffffffff811ab59d 000000000000000a ffff88012a9c2168 [36928.587045] ffff8801217137f8 ffffffff8123be2d 0000000091827364 ffff8801217137b0 [36928.587045] Call Trace: [36928.587045] [<ffffffff811ab59d>] write_dirty_buffer+0x4d/0x80 [36928.587045] [<ffffffff8123be2d>] __flush_batch+0x4d/0xa0 [36928.587045] [<ffffffff8123c615>] jbd2_log_do_checkpoint+0xf5/0x4f0 [36928.587045] [<ffffffff8123ca99>] __jbd2_log_wait_for_space+0x89/0x190 [36928.587045] [<ffffffff81237aa8>] start_this_handle+0x3a8/0x4e0 [36928.587045] [<ffffffff810799e0>] ? remove_wait_queue+0x50/0x50 [36928.587045] [<ffffffff81237ca3>] jbd2__journal_start+0xc3/0x100 [36928.587045] [<ffffffff81237cf3>] jbd2_journal_start+0x13/0x20 [36928.587045] [<ffffffff8121740f>] ext4_journal_start_sb+0x7f/0x1d0 [36928.587045] [<ffffffff811f9322>] ? ext4_write_begin+0x112/0x310 [36928.587045] [<ffffffff812404ab>] ? jbd2_journal_force_commit_nested+0x5b/0xa0 [36928.587045] [<ffffffff811f9322>] ext4_write_begin+0x112/0x310 [36928.587045] [<ffffffff811f96d4>] ext4_da_write_begin+0x1b4/0x210 [36928.587045] [<ffffffff812383e7>] ? jbd2_journal_stop+0x1b7/0x2b0 [36928.587045] [<ffffffff8111af42>] generic_file_buffered_write+0x112/0x290 [36928.587045] [<ffffffff8111c7b9>] __generic_file_aio_write+0x229/0x440 [36928.587045] [<ffffffff8111ca42>] generic_file_aio_write+0x72/0xe0 [36928.587045] [<ffffffff811f319f>] ext4_file_write+0xbf/0x260 [36928.587045] [<ffffffff81165d5f>] ? kmem_cache_free+0x2f/0x130 [36928.587045] [<ffffffff81186af3>] ? putname+0x33/0x50 [36928.587045] [<ffffffff8117ada2>] do_sync_write+0xd2/0x110 [36928.587045] [<ffffffff812633bc>] ? security_file_permission+0x2c/0xb0 [36928.587045] [<ffffffff8117b321>] ? rw_verify_area+0x61/0xf0 [36928.587045] [<ffffffff8117b683>] vfs_write+0xb3/0x180 [36928.587045] [<ffffffff8117b9aa>] sys_write+0x4a/0x90 [36928.587045] [<ffffffff815e6d69>] system_call_fastpath+0x16/0x1b [36928.587045] Code: ee 44 89 e7 e8 45 1f 0f 00 49 8b 5d 18 4c 89 ef e8 19 4e 00 00 48 83 c4 08 c1 e3 18 c1 fb 1f 83 e3 a1 89 d8 5b 41 5c 41 5d 5d c3 <0f> 0b 0f 0b 0f 0b 0f 0b 0f 0b 66 0f 1f 84 00 00 00 00 00 55 48 [36928.587045] RIP [<ffffffff811a9add>] submit_bh+0x10d/0x120 [36928.587045] RSP <ffff880121713758> [36928.603933] ---[ end trace 8b118138c2b68b02 ]--- [36928.604272] ------------[ cut here ]------------ [36928.604587] WARNING: at kernel/exit.c:897 do_exit+0x55/0x870() [36928.604933] Hardware name: Bochs [36928.605235] Modules linked in: [last unloaded: scsi_wait_scan] [36928.605726] Pid: 11400, comm: fsstress Tainted: G D 3.3.0+ #43 [36928.606154] Call Trace: [36928.606420] [<ffffffff810572bf>] warn_slowpath_common+0x7f/0xc0 [36928.606852] [<ffffffff8105731a>] warn_slowpath_null+0x1a/0x20 [36928.607251] [<ffffffff8105b1c5>] do_exit+0x55/0x870 [36928.607581] [<ffffffff81058f6c>] ? kmsg_dump+0x5c/0xf0 [36928.607935] [<ffffffff815dfeac>] oops_end+0xac/0xf0 [36928.608273] [<ffffffff81017928>] die+0x58/0x90 [36928.608645] [<ffffffff815df7a4>] do_trap+0xc4/0x170 [36928.608953] [<ffffffff81014fa5>] do_invalid_op+0x95/0xb0 [36928.609361] [<ffffffff811a9add>] ? submit_bh+0x10d/0x120 [36928.609685] [<ffffffff8129eefc>] ? blk_queue_bio+0x3bc/0x400 [36928.610028] [<ffffffff815e7f9b>] invalid_op+0x1b/0x20 [36928.610464] [<ffffffff811a9add>] ? submit_bh+0x10d/0x120 [36928.610827] [<ffffffff811a9ac7>] ? submit_bh+0xf7/0x120 [36928.611187] [<ffffffff811ab59d>] write_dirty_buffer+0x4d/0x80 [36928.611586] [<ffffffff8123be2d>] __flush_batch+0x4d/0xa0 [36928.611900] [<ffffffff8123c615>] jbd2_log_do_checkpoint+0xf5/0x4f0 [36928.612324] [<ffffffff8123ca99>] __jbd2_log_wait_for_space+0x89/0x190 [36928.612689] [<ffffffff81237aa8>] start_this_handle+0x3a8/0x4e0 [36928.613095] [<ffffffff810799e0>] ? remove_wait_queue+0x50/0x50 [36928.613424] [<ffffffff81237ca3>] jbd2__journal_start+0xc3/0x100 [36928.613752] [<ffffffff81237cf3>] jbd2_journal_start+0x13/0x20 [36928.614097] [<ffffffff8121740f>] ext4_journal_start_sb+0x7f/0x1d0 [36928.614428] [<ffffffff811f9322>] ? ext4_write_begin+0x112/0x310 [36928.614824] [<ffffffff812404ab>] ? jbd2_journal_force_commit_nested+0x5b/0xa0 [36928.615437] [<ffffffff811f9322>] ext4_write_begin+0x112/0x310 [36928.615762] [<ffffffff811f96d4>] ext4_da_write_begin+0x1b4/0x210 [36928.616108] [<ffffffff812383e7>] ? jbd2_journal_stop+0x1b7/0x2b0 [36928.616438] [<ffffffff8111af42>] generic_file_buffered_write+0x112/0x290 [36928.616776] [<ffffffff8111c7b9>] __generic_file_aio_write+0x229/0x440 [36928.617133] [<ffffffff8111ca42>] generic_file_aio_write+0x72/0xe0 [36928.617465] [<ffffffff811f319f>] ext4_file_write+0xbf/0x260 [36928.617783] [<ffffffff81165d5f>] ? kmem_cache_free+0x2f/0x130 [36928.618133] [<ffffffff81186af3>] ? putname+0x33/0x50 [36928.618643] [<ffffffff8117ada2>] do_sync_write+0xd2/0x110 [36928.619166] [<ffffffff812633bc>] ? security_file_permission+0x2c/0xb0 [36928.619609] [<ffffffff8117b321>] ? rw_verify_area+0x61/0xf0 [36928.619929] [<ffffffff8117b683>] vfs_write+0xb3/0x180 [36928.620344] [<ffffffff8117b9aa>] sys_write+0x4a/0x90 [36928.620690] [<ffffffff815e6d69>] system_call_fastpath+0x16/0x1b [36928.621100] ---[ end trace 8b118138c2b68b03 ]--- Here is how I run kvm: #!/bin/sh -efu IMAGE="np_ubifs.img" DEVEL_DISK1="devel-disk-1.img" DEVEL_DISK2="devel-disk-2.img" kvm -m 16384 -spice port=7837,disable-ticketing \ -cpu core2duo -smp 12,sockets=1,cores=6,threads=2 \ -enable-kvm -name np_ubifs \ -drive file=$IMAGE,if=virtio,cache=none,boot=on \ -drive file=$DEVEL_DISK1,if=virtio,cache=none \ -drive file=$DEVEL_DISK2,if=virtio,cache=none \ -rtc base=utc \ -net nic,model=virtio -net user \ -device virtio-balloon-pci \ -redir tcp:7838::22 xfstests setup: TEST_DIR=/mnt/xfstests-disk-1 TEST_DEV=/dev/vdb SCRATCH_MNT=/mnt/xfstests-disk-2 SCRATCH_DEV=/dev/vdc FSTYP=ext4 /dev/vdb is 4GiB /dev/vdc is 12GiB Then I just run something like this in a forever loop: #!/bin/sh -euf sudo umount $TEST_DEV ||: sudo umount $SCRATCH_DEV ||: mkfs.ext4 $TEST_DEV mkfs.ext4 $SCRATCH_DEV mount $TEST_DEV $TEST_DIR mount $SCRATCH_DEV $SCRATCH_MNT ./check -g auto where "check" is the xfstests' script. -- Best Regards, Artem Bityutskiy
Attachment:
signature.asc
Description: This is a digitally signed message part