Kernel crash with target-pending/for-next

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello Nic,

This morning I started testing your for-next branch (commit b968ec8ff101
with no changes). After a few seconds a kernel crash was triggered (see below).
In the many tests I ran during the past two years of the ib_srpt driver I had
not encountered any crash triggered by ib_srpt so this must be a recently
introduced regression in the target core. This regression most likely has been
introduced by one of these patches:

b968ec8ff101 target/configfs: Kill se_lun->lun_link_magic
baacb554a73b target/configfs: Kill se_device->dev_link_magic
ba438d7c8d39 target: Avoid target_shutdown_sessions loop during queue_depth change

Bart.

ib_srpt Received CM TimeWait exit for ch 0x0000000000000000e41d2d03000a6d52-1118.
ib_srpt:srpt_qp_event: ib_srpt QP event 16 on cm_id=ffff88036ae864f8 sess_name=0x0000000000000000e41d2d03000a6d52 state=3
ib_srpt:srpt_qp_event: ib_srpt 0x0000000000000000e41d2d03000a6d52-1118, state draining: received Last WQE event.
ib_srpt:srpt_close_ch: ib_srpt 0x0000000000000000e41d2d03000a6d52-1118: queued zerolength write
ib_srpt:srpt_release_channel_work: ib_srpt srpt_release_channel_work: 0x0000000000000000e41d2d03000a6d52-1118; release_done =           (null)
TARGET_CORE[srpt]: Detected NON_EXISTENT_LUN Access for 0x00000001
TARGET_CORE[srpt]: Detected NON_EXISTENT_LUN Access for 0x00000001
TARGET_CORE[srpt]: Detected NON_EXISTENT_LUN Access for 0x00000001
TARGET_CORE[srpt]: Detected NON_EXISTENT_LUN Access for 0x00000001
TARGET_CORE[srpt]: Detected NON_EXISTENT_LUN Access for 0x00000001
TARGET_CORE[srpt]: Detected NON_EXISTENT_LUN Access for 0x00000001
TARGET_CORE[srpt]: Detected NON_EXISTENT_LUN Access for 0x00000001
TARGET_CORE[srpt]: Detected NON_EXISTENT_LUN Access for 0x00000001
TARGET_CORE[srpt]: Detected NON_EXISTENT_LUN Access for 0x00000001
TARGET_CORE[srpt]: Detected NON_EXISTENT_LUN Access for 0x00000001
TARGET_CORE[srpt]: Detected NON_EXISTENT_LUN Access for 0x00000001
TARGET_CORE[srpt]: Detected NON_EXISTENT_LUN Access for 0x00000001
TARGET_CORE[srpt]: Detected NON_EXISTENT_LUN Access for 0x00000001
TARGET_CORE[srpt]: Detected NON_EXISTENT_LUN Access for 0x00000001
TARGET_CORE[srpt]: Detected NON_EXISTENT_LUN Access for 0x00000001
TARGET_CORE[srpt]: Detected NON_EXISTENT_LUN Access for 0x00000001
NMI watchdog: Watchdog detected hard LOCKUP on cpu 5
Modules linked in: dm_service_time target_core_user uio target_core_pscsi target_core_file ib_srpt target_core_iblock target_core_mod brd netconsole xt_CHECKSUM iptable_mangle ipt_MASQUERADE
nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack libcrc32c ipt_REJECT nf_reject_ipv4 xt_tcpudp tun bridge stp llc ebtable_filter
ebtables ip6table_filter ip6_tables iptable_filter ip_tables x_tables ib_ipoib rdma_ucm ib_ucm ib_uverbs ib_umad rdma_cm configfs ib_cm iw_cm mlx4_ib af_packet ib_core sb_edac x86_pkg_temp_thermal
intel_powerclamp coretemp kvm_intel kvm irqbypass ipmi_ssif crct10dif_pclmul crc32_pclmul mlx4_core crc32c_intel ghash_clmulni_intel pcbc iTCO_wdt devlink iTCO_vendor_support aesni_intel dcdbas
aes_x86_64 tg3 crypto_simd
 ipmi_si ptp glue_helper ipmi_devintf pps_core cryptd pcspkr libphy ipmi_msghandler ioatdma tpm_tis lpc_ich mei_me tpm_tis_core mei mfd_core shpchp dca tpm acpi_pad wmi button hid_generic usbhid
mgag200 i2c_algo_bit drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm drm sr_mod cdrom xhci_pci ehci_pci xhci_hcd ehci_hcd usbcore usb_common sg dm_multipath dm_mod scsi_dh_rdac
scsi_dh_emc scsi_dh_alua autofs4 [last unloaded: scsi_transport_srp]
irq event stamp: 3326
hardirqs last  enabled at (3325): [<ffffffff810e1844>] current_kernel_time64+0x64/0xb0
hardirqs last disabled at (3326): [<ffffffff816a0428>] _raw_spin_lock_irqsave+0x18/0x50
softirqs last  enabled at (648): [<ffffffff816a5521>] __do_softirq+0x381/0x493
softirqs last disabled at (619): [<ffffffff8106ce13>] irq_exit+0xc3/0xd0
CPU: 5 PID: 16490 Comm: rmdir Tainted: G          I     4.12.0-rc1-dbg+ #4
Hardware name: Dell Inc. PowerEdge R430/03XKDV, BIOS 1.0.2 11/17/2014
task: ffff88036b510040 task.stack: ffffc90001bd0000
RIP: 0010:target_shutdown_sessions+0x6c/0x160 [target_core_mod]
RSP: 0018:ffffc90001bd3d88 EFLAGS: 00000046
RAX: 0000000000000001 RBX: ffff880459a95898 RCX: ffff8803783f0e80
RDX: ffffc90001bd3da0 RSI: ffffc90001bd3da0 RDI: ffff8803783f0e80
RBP: ffffc90001bd3dd8 R08: ffffc90001bd3da0 R09: ffffc90001bd3da0
R10: ffffc90001bd3cf0 R11: 0000000000000000 R12: ffffc90001bd3da0
R13: ffff880459a953d8 R14: ffff8803783f0e40 R15: ffff8803783f0e80
FS:  00007faaf177e700(0000) GS:ffff88046ef40000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007faaf12b7700 CR3: 000000037271a000 CR4: 00000000001406e0
Call Trace:
 core_tpg_del_initiator_node_acl+0x92/0x140 [target_core_mod]
 target_fabric_nacl_base_release+0x25/0x30 [target_core_mod]
 config_item_put+0x73/0xb0 [configfs]
 configfs_rmdir+0x1ab/0x300 [configfs]
 vfs_rmdir+0x73/0x130
 do_rmdir+0x1a8/0x1f0
 SyS_rmdir+0x16/0x20
 entry_SYSCALL_64_fastpath+0x18/0xad
RIP: 0033:0x7faaf12c2f67
RSP: 002b:00007fffb0dd0728 EFLAGS: 00000206 ORIG_RAX: 0000000000000054
RAX: ffffffffffffffda RBX: 0000000000000046 RCX: 00007faaf12c2f67
RDX: 00007faaf1583e80 RSI: 00007fffb0dd0858 RDI: 00007fffb0dd0fe8
RBP: 0000000000000011 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000374 R11: 0000000000000206 R12: 0000564e2ac15ca0
R13: 00007fffb0dd0850 R14: 0000000000000000 R15: 0000000000000000
Code: 8d c0 04 00 00 48 89 45 b0 4c 8d 71 c0 48 39 d9 49 89 cf 75 12 eb 6e 49 8b 4e 40 4c 8d 71 c0 48 39 d9 49 89 cf 74 5e 41 f6 06 01 <75> ea 4c 89 ff e8 aa 6e e7 e0 84 c0 74 0f 49 8b 56 40 49 8b 46 
Kernel panic - not syncing: Hard LOCKUP
CPU: 5 PID: 16490 Comm: rmdir Tainted: G          I     4.12.0-rc1-dbg+ #4
Hardware name: Dell Inc. PowerEdge R430/03XKDV, BIOS 1.0.2 11/17/2014
Call Trace:
 <NMI>
 dump_stack+0x68/0x9f
 panic+0xd4/0x21c
 nmi_panic+0x39/0x40
 watchdog_overflow_callback+0xc9/0xe0
 __perf_event_overflow+0x54/0xf0
 perf_event_overflow+0x14/0x20
 intel_pmu_handle_irq+0x224/0x4f0
 ? vunmap_page_range+0x1ef/0x330
 ? _raw_spin_unlock+0x27/0x40
 ? ghes_copy_tofrom_phys+0x115/0x1f0
 perf_event_nmi_handler+0x2c/0x50
 ? perf_event_nmi_handler+0x20/0x50
 ? perf_event_nmi_handler+0x2c/0x50
 nmi_handle+0xbb/0x2d0
 do_nmi+0x160/0x3b0
 end_repeat_nmi+0x1a/0x1e
RIP: 0010:target_shutdown_sessions+0x6c/0x160 [target_core_mod]
RSP: 0018:ffffc90001bd3d88 EFLAGS: 00000046
RAX: 0000000000000001 RBX: ffff880459a95898 RCX: ffff8803783f0e80
RDX: ffffc90001bd3da0 RSI: ffffc90001bd3da0 RDI: ffff8803783f0e80
RBP: ffffc90001bd3dd8 R08: ffffc90001bd3da0 R09: ffffc90001bd3da0
R10: ffffc90001bd3cf0 R11: 0000000000000000 R12: ffffc90001bd3da0
R13: ffff880459a953d8 R14: ffff8803783f0e40 R15: ffff8803783f0e80
 ? target_shutdown_sessions+0x6c/0x160 [target_core_mod]
 ? target_shutdown_sessions+0x6c/0x160 [target_core_mod]
 </NMI>
 core_tpg_del_initiator_node_acl+0x92/0x140 [target_core_mod]
 target_fabric_nacl_base_release+0x25/0x30 [target_core_mod]
 config_item_put+0x73/0xb0 [configfs]
 configfs_rmdir+0x1ab/0x300 [configfs]
 vfs_rmdir+0x73/0x130
 do_rmdir+0x1a8/0x1f0
 SyS_rmdir+0x16/0x20
 entry_SYSCALL_64_fastpath+0x18/0xad
RIP: 0033:0x7faaf12c2f67
RSP: 002b:00007fffb0dd0728 EFLAGS: 00000206 ORIG_RAX: 0000000000000054
RAX: ffffffffffffffda RBX: 0000000000000046 RCX: 00007faaf12c2f67
RDX: 00007faaf1583e80 RSI: 00007fffb0dd0858 RDI: 00007fffb0dd0fe8
RBP: 0000000000000011 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000374 R11: 0000000000000206 R12: 0000564e2ac15ca0
R13: 00007fffb0dd0850 R14: 0000000000000000 R15: 0000000000000000
Kernel Offset: disabled--
To unsubscribe from this list: send the line "unsubscribe target-devel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [Linux SCSI]     [Kernel Newbies]     [Linux SCSI Target Infrastructure]     [Share Photos]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Linux IIO]     [Device Mapper]

  Powered by Linux