Re: raid5/6: general protection fault in async_copy_data

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi all,

Does anyone have idea about this call trace in linux 3.19.8...???

2016-07-04 16:07 GMT+08:00 Joey Liao <joeyliao@xxxxxxxx>:
> Hi,
>
> We meet a general protection fault issue when doing the I/O stress
> test. (Please refer the following call trace.)
>
> The linux version what we use is 3.19.8.
>
> Besides, it will not only happen in raid5 but also raid6, and our raid
> is normal and clean (not in resync or rebuild or degraded state) in
> this case.
> The general protection fault logs just show-up suddenly during the I/O
> stress test, and no other logs else are before it.
>
> It seems that it is an old issue that someone has been meet in linux 3.8.13.
> http://comments.gmane.org/gmane.linux.raid/48737
>
> However, it did not come to an exact conclusion then.
> Does anyone have any idea about this situation?
>
>
> <4>[ 8415.258965] general protection fault: 0000 [#1] SMP
> <4>[ 8415.263946] Modules linked in: vfio_pci vfio_iommu_type1 vfio
> vringh virtio_scsi virtio_pci virtio_mmio virtio_console
> virtio_balloon virtio_rng virtio_blk virtio_net virtio_ring virtio
> vhost_net vhost tun macvtap macvlan kvm_intel kvm fbdisk(O) xt_mark
> ipt_MASQUERADE iptable_nat nf_nat_masquerade_ipv4 nf_nat_ipv4 nf_nat
> ppp_deflate bsd_comp ppp_mppe ppp_async ppp_generic slhc iscsi_tcp(O)
> libiscsi_tcp(O) libiscsi(O) scsi_transport_iscsi(O) btusb bluetooth
> bonding bridge stp ipv6 uvcvideo videobuf2_vmalloc videobuf2_memops
> videobuf2_core snd_usb_caiaq snd_usb_audio snd_usbmidi_lib
> snd_seq_midi snd_rawmidi fnotify(PO) udf isofs iTCO_wdt psnap llc
> ufsd(PO) jnl(O) pl2303 usbserial intel_ips drbd(O) flashcache(O)
> dm_thin_pool dm_bio_prison dm_persistent_data hal_netlink(O) coretemp
> r8152 usbnet mii igb e1000e(O) mpt3sas mpt2sas scsi_transport_sas
> raid_class uas usb_storage xhci_pci xhci_hcd usblp uhci_hcd ehci_pci
> ehci_hcd [last unloaded: fbdisk]
> <4>[ 8415.348888] CPU: 0 PID: 4611 Comm: md1_raid5 Tainted: P     U
>  O   3.19.8 #1
> <4>[ 8415.356137] Hardware name: Default string Default string/SKYBAY,
> BIOS QX80AR20 06/07/2016
> <4>[ 8415.364249] task: ffff880847616210 ti: ffff880831950000 task.ti:
> ffff880831950000
> <4>[ 8415.371667] RIP: 0010:[<ffffffff813c4446>]  [<ffffffff813c4446>]
> memcpy+0x6/0x110
> <4>[ 8415.379126] RSP: 0000:ffff880831953990  EFLAGS: 00210206
> <4>[ 8415.384398] RAX: ffff880832e87000 RBX: ffff880831953a18 RCX:
> 0000000000001000
> <4>[ 8415.391475] RDX: 0000000000001000 RSI: 0845080000067000 RDI:
> ffff880832e87000
> <4>[ 8415.398553] RBP: ffff8808319539c8 R08: 0000000000001000 R09:
> ffff880831953a18
> <4>[ 8415.405660] R10: 0000000000000001 R11: 0000000000000001 R12:
> ffffea0020cba1c0
> <4>[ 8415.412750] R13: 0000000000000000 R14: 002100000000000e R15:
> 0000000000067000
> <4>[ 8415.419829] FS:  0000000000000000(0000)
> GS:ffff88086dc00000(0000) knlGS:0000000000000000
> <4>[ 8415.427852] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> <4>[ 8415.433550] CR2: 0000000008120480 CR3: 0000000001c7d000 CR4:
> 00000000003407f0
> <4>[ 8415.440648] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
> 0000000000000000
> <4>[ 8415.447748] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:
> 0000000000000400
> <4>[ 8415.454823] Stack:
> <4>[ 8415.456849]  ffffffff8138408f 0000000000001000 0000000000080000
> 0000000000080000
> <4>[ 8415.464283]  0000000000000000 0000000000000000 0000000000001000
> ffff880831953a78
> <4>[ 8415.471720]  ffffffff8169911e ffff880831953a18 ffffffff8138a5b7
> ffff880831953a18
> <4>[ 8415.479144] Call Trace:
> <4>[ 8415.481578]  [<ffffffff8138408f>] ? async_memcpy+0x9f/0x100
> <4>[ 8415.487122]  [<ffffffff8169911e>] async_copy_data+0x12e/0x260
> <4>[ 8415.492824]  [<ffffffff8138a5b7>] ? bio_attempt_front_merge+0xb7/0xf0
> <4>[ 8415.499214]  [<ffffffff81699bb6>] raid_run_ops+0x876/0x1190
> <4>[ 8415.504741]  [<ffffffff8138c5b3>] ? generic_make_request+0xa3/0xf0
> <4>[ 8415.510872]  [<ffffffff8169f716>] ? ops_run_io+0x36/0x820
> <4>[ 8415.516233]  [<ffffffff81085763>] ? __wake_up+0x53/0x70
> <4>[ 8415.521417]  [<ffffffff816a0e7b>] handle_stripe+0xa8b/0x1b50
> <4>[ 8415.527031]  [<ffffffff81085206>] ? __wake_up_common+0x16/0x90
> <4>[ 8415.532816]  [<ffffffff816a22da>] handle_active_stripes+0x39a/0x450
> <4>[ 8415.539035]  [<ffffffff816a2849>] raid5d+0x399/0x630
> <4>[ 8415.543964]  [<ffffffff816ac4ed>] md_thread+0x7d/0x130
> <4>[ 8415.549064]  [<ffffffff81085370>] ? woken_wake_function+0x20/0x20
> <4>[ 8415.555107]  [<ffffffff816ac470>] ? errors_store+0x70/0x70
> <4>[ 8415.560552]  [<ffffffff8106a263>] kthread+0xe3/0xf0
> <4>[ 8415.565411]  [<ffffffff8106a180>] ? kthreadd+0x160/0x160
> <4>[ 8415.570682]  [<ffffffff8192d048>] ret_from_fork+0x58/0x90
> <4>[ 8415.576044]  [<ffffffff8106a180>] ? kthreadd+0x160/0x160
> <4>[ 8415.581315] Code: 24 4c 8b 64 24 08 c9 c3 e8 68 f9 ff ff 41 80
> 7c 24 05 00 75 d3 eb e4 90 90 90 90 90 90 90 90 90 90 90 90 90 90 48
> 89 f8 48 89 d1 <f3> a4 c3 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3 20 4c 8b
> 06 4c 8b
> <1>[ 8415.601660] RIP  [<ffffffff813c4446>] memcpy+0x6/0x110
> <4>[ 8415.606788]  RSP <ffff880831953990>
> <4>[ 8415.612291] ---[ end trace 962cfd98d43b82fa ]---
> <4>[ 8415.620528] ------------[ cut here ]------------
--
To unsubscribe from this list: send the line "unsubscribe linux-raid" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [Linux RAID Wiki]     [ATA RAID]     [Linux SCSI Target Infrastructure]     [Linux Block]     [Linux IDE]     [Linux SCSI]     [Linux Hams]     [Device Mapper]     [Device Mapper Cryptographics]     [Kernel]     [Linux Admin]     [Linux Net]     [GFS]     [RPM]     [git]     [Yosemite Forum]


  Powered by Linux