Received: by 10.223.185.116 with SMTP id b49csp1137877wrg; Wed, 14 Feb 2018 12:12:24 -0800 (PST) X-Google-Smtp-Source: AH8x225+AirzZmBrx/By0Ui0AfW5MyIktxQ7gGnKjYWaSttXtrfQghN92l7lA85jyGd8YvwLJqUn X-Received: by 10.167.130.12 with SMTP id k12mr233235pfi.73.1518639144881; Wed, 14 Feb 2018 12:12:24 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518639144; cv=none; d=google.com; s=arc-20160816; b=WFnhi0Gd/9XNpKnbYQjwV/wCZpOK9JbxXvZ86fhx7C3Iy2H+GoZw+SyT3rdDXWdaon qm9fxDpAOfW4ftP9Dkz/SyXCe4ywhpUrQ4mEUeR2AT7UdWyJkwyyJqfWSTa/PDckokX3 ug4R+t+2BbxKEw+Wn8ng7aYOVEJkgmTloDsUaFF3uNErSwBbeN6YhMzeGNONS+fiNZXD GQBzQqeH7ieKsLVrlDHkTNe1wM+Jb5dtbipbmky5dDRxHPxFAF62iIqOLEERhLwh1iIK bGT/2UJcX9y7f3+u1i0r6Vi6Z2VgEDVuPFmSe21hyyXoefuxRQBFttu0jWT0tw7ft6a5 Q6tQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :arc-authentication-results; bh=thvCAFzTCoz2rSwXf1Wwyuv26op1V8klBo427uAtop4=; b=boMPBQ9OBriPdLdvElSuZ15083H6Bbk0ut0WcKp7zSOro/mwG3TEgrsqYX+wv0jkHt JrkHWMjbaIXuiqDu+7rvOpORuxuuJyt4UdosLgGhRCU5L4MxLxeJUKt0ndoAMeJolqHT EUAMqLLx3J0VPQzdtAAFgAyPA4AidUeJAYZ4Ckr8fqwSoRVceps/wWMorLLXPLd2t2rH sAaD4gGCUwS6+wYhTZ6gjUKLTTPMh7jGGRPhkgV01X8QtR+q+uV8JmkFIICEvXjd/fKx OwLVxSYVOcxYMf5wa/JUAMEhgS/I0XefM5U4soQwUj4S9w0aK1+RX+9CLDl8Hr24IGqB +8qQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x65si2170943pfa.74.2018.02.14.12.12.09; Wed, 14 Feb 2018 12:12:24 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1162226AbeBNSpo (ORCPT + 99 others); Wed, 14 Feb 2018 13:45:44 -0500 Received: from smtp-km-2.mail.tiscali.it ([213.205.35.82]:51774 "EHLO smtp-km-2.mail.tiscali.it" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1162120AbeBNSpn (ORCPT ); Wed, 14 Feb 2018 13:45:43 -0500 X-Greylist: delayed 498 seconds by postgrey-1.27 at vger.kernel.org; Wed, 14 Feb 2018 13:45:42 EST Received: from darkstar.example.org ([80.104.174.233]) by smtp-km-2.mail.tiscali.it with id AidM1x00E52WZhc01idNUs; Wed, 14 Feb 2018 18:37:23 +0000 x-auth-user: barra_cuda@katamail.com Date: Wed, 14 Feb 2018 19:37:21 +0100 From: Michele Ballabio To: csoren@cpinternet.com Cc: Linux Kernel Mailing List , linux-block Subject: Re: block: oopses on 4.13.*, 4.14.* and 4.15-rc2 Message-ID: <20180214193721.6a740f59@darkstar.example.org> In-Reply-To: References: X-Mailer: Claws Mail 3.15.1-dirty (GTK+ 2.24.32; i486-slackware-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 13 Feb 2018 21:20:47 -0600 csoren@cpinternet.com wrote: > Greetings Ming, > > Do you have the patches that fix this? I'm getting these crashes too > on Linux 4.13. > > The link to mark.info doesn't have the patches anymore, at least not > that I can tell. > > TIA! > You can cherry-pick them from git, commits: 14cb0dc6479dc5ebc63b3a459a5d89a2f1b39fed 0abc2a10389f0c9070f76ca906c7382788036b93 Also here: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=14cb0dc6479dc5ebc63b3a459a5d89a2f1b39fed https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=0abc2a10389f0c9070f76ca906c7382788036b93 If I remember correctly, these patches should apply cleanly on 4.13.x. You probably know this already, but if not: consider upgrading to 4.14.x or 4.15.x (both contain the patches you are interested in). Michele [Re-added ML on CC:] > On Sat, Dec 9, 2017 at 7:27 AM, Michele Ballabio > wrote: > > On Fri, 8 Dec 2017 13:08:37 -0700 > > Jens Axboe wrote: > > > >> On 12/08/2017 08:38 AM, Michele Ballabio wrote: > >> > Hi, > >> > kernels 4.13.*, 4.14.* 4.15-rc2 crash on occasion, > >> > especially on x86-32 systems. To trigger the problem, run as > >> > root: > >> > > >> > while true > >> > do > >> > /sbin/udevadm trigger --type=subsystems --action=change > >> > /sbin/udevadm trigger --type=devices --action=change > >> > /sbin/udevadm settle --timeout=120 > >> > done > >> > > >> > (Thanks to Patrick Volkerding for the reproducer). > >> > > >> > Sometimes the kernel oopses immediately, sometimes a bit later > >> > (less than five minutes). > >> > > >> > The bisection pointed to commit > >> > caa4b02476e31fc7933d2138062f7f355d3cd8f7 (blk-map: call > >> > blk_queue_bounce from blk_rq_append_bio). A revert fixes the > >> > problem (tested on 4.13 and master). > >> > >> Thanks for your report - can you try the below patch? Totally > >> untested... > > > > I applied the patch on master > > (968edbd93c0cbb40ab48aca972392d377713a0c3), I tried two times to > > boot the system but couldn't get to the shell. I found this in the > > log: > > Hi Michele, > > Please test the patches I sent out and see if it fixes your issue. In > my environment > the two just works fine. > > https://marc.info/?l=linux-block&m=151358285916762&w=2 [1] >