Re: raid6: general protection fault in async_copy_data

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Thanks, Neil.

On Wed, May 6, 2015 at 6:21 AM, NeilBrown <neilb@xxxxxxx> wrote:
> On Tue, 5 May 2015 10:14:18 +0200 Alexander Lyakas <alex.bolshoy@xxxxxxxxx>
> wrote:
>
>> Hi Neil,
>> we had the following crash:
>>
>> [86399.862150] general protection fault: 0000 [#1] SMP
>> [86399.881970] CPU 1
>> [86399.882264] Pid: 17989, comm: md4_raid6 Tainted: GF       W  O
>> 3.8.13-030813-generic #201305111843 Bochs Bochs
>> [86399.883681] RIP: 0010:[<ffffffff8135d446>]  [<ffffffff8135d446>]
>> memcpy+0x6/0x110
>> [86399.884886] RSP: 0018:ffff8800a78e5a80  EFLAGS: 00010286
>> [86399.885629] RAX: 4588966d912cea06 RBX: ffff8800a78e4000 RCX: 0000000000001000
>> [86399.886605] RDX: 0000000000001000 RSI: ffff8800a7ed2000 RDI: 4588966d912cea06
>> [86399.887586] RBP: ffff8800a78e5ae8 R08: 0000000000001000 R09: ffff8800a78e5b20
>> [86399.888603] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
>> [86399.889593] R13: ffff8800a78e5b20 R14: 0000000000001000 R15: 0000000000000000
>> [86399.890551] FS:  0000000000000000(0000) GS:ffff88011fd00000(0000)
>> knlGS:0000000000000000
>> [86399.891648] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
>> [86399.892504] CR2: 00007f10cb8ae966 CR3: 0000000113bfc000 CR4: 00000000001406e0
>> [86399.893493] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
>> [86399.894458] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
>> [86399.895426] Process md4_raid6 (pid: 17989, threadinfo
>> ffff8800a78e4000, task ffff8800a7dc0000)
>> [86399.896629] Stack:
>> [86399.896930]  ffffffffa05061c5 ffff88000ab6fa06 ffffffff816ed725
>> ffffea00029fb480
>> [86399.898005]  51160e39b619d7e4 0000000000000000 000000000ab6fa06
>> ffff8800c696b938
>> [86399.899082]  000000003eca7624 ffff880084dc1ac0 0000000000001000
>> 0000000000000002
>> [86399.900293] Call Trace:
>> [86399.900660]  [<ffffffffa05061c5>] ? async_memcpy+0x1c5/0x1000 [async_memcpy]
>> [86399.901653]  [<ffffffff816ed725>] ? _raw_spin_lock_irq+0x15/0x20
>> [86399.902655]  [<ffffffffa05a5090>] async_copy_data+0x100/0x140 [raid456]
>> [86399.903557]  [<ffffffffa05abe20>] handle_stripe+0x13e0/0x2380 [raid456]
>> [86399.904531]  [<ffffffff815739de>] ? dm_dispatch_request+0x3e/0x70
>> [86399.905388]  [<ffffffff81097c33>] ? update_curr+0x143/0x1f0
>> [86399.906151]  [<ffffffff816eb03d>] ? mutex_lock+0x1d/0x50
>> [86399.906888]  [<ffffffffa05adea5>] handle_active_stripes+0x165/0x200 [raid456]
>> [86399.907857]  [<ffffffff8156ab8e>] ? md_check_recovery.part.49+0x3e/0x530
>> [86399.908811]  [<ffffffffa05ae28a>] raid5d+0x34a/0x570 [raid456]
>> [86399.909614]  [<ffffffff8156344d>] md_thread+0x10d/0x140
>> [86399.910356]  [<ffffffff8107fc10>] ? add_wait_queue+0x60/0x60
>> [86399.911149]  [<ffffffff81563340>] ? md_rdev_init+0x140/0x140
>> [86399.911955]  [<ffffffff8107f050>] kthread+0xc0/0xd0
>> [86399.912668]  [<ffffffff8107ef90>] ? flush_kthread_worker+0xb0/0xb0
>> [86399.913528]  [<ffffffff816f61ec>] ret_from_fork+0x7c/0xb0
>> [86399.914267]  [<ffffffff8107ef90>] ? flush_kthread_worker+0xb0/0xb0
>> [86399.915109] Code: 74 13 48 8b 43 58 48 2b 43 50 88 43 4e 48 83 c4
>> 08 5b 5d c3 90 e8 fb fd ff ff eb e6 90 90 90 90 90 90 90 90 90 48 89
>> f8 48 89 d1 <f3> a4 c3 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3 20 4c 8b 06
>> 4c 8b
>> [86399.919028] RIP  [<ffffffff8135d446>] memcpy+0x6/0x110
>>
>> Can you maybe advise what is happening here? Our kernel is 3.8.13.
>>
>
> Not really.
> It appears that %RDI is the destination for the memcpy, and it contains a
> garbage address.
> I cannot easily tell if this is a read or a write, but I'd guess a read as it
> is hard to get the address of the page in the stripe_cache wrong.
>
> Maybe something has corrupted the bio??
>
> NeilBrown
--
To unsubscribe from this list: send the line "unsubscribe linux-raid" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [Linux RAID Wiki]     [ATA RAID]     [Linux SCSI Target Infrastructure]     [Linux Block]     [Linux IDE]     [Linux SCSI]     [Linux Hams]     [Device Mapper]     [Device Mapper Cryptographics]     [Kernel]     [Linux Admin]     [Linux Net]     [GFS]     [RPM]     [git]     [Yosemite Forum]


  Powered by Linux