Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp5142701imm; Tue, 26 Jun 2018 06:38:34 -0700 (PDT) X-Google-Smtp-Source: AAOMgpe8X+bdaleh+B8nOdtqOP1VP0MdClut9jEYMiObqWb066A5pgd0r+zRtde9J+CVlbnkscD7 X-Received: by 2002:a62:47c4:: with SMTP id p65-v6mr1659603pfi.170.1530020314673; Tue, 26 Jun 2018 06:38:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530020314; cv=none; d=google.com; s=arc-20160816; b=j1wOpaWtFm4Y5kk0FgwnQxc+/MWl8CQbpnaNzdmMh+oyuS2MsIzldVsJe4k87pLhGE iTvVdW+HMrbxPZ3FiXAjtoyw1Ag121k5MnjLnEniQTPM7ko/t/z2/yBy5e4lrcQCj/I/ 6H153uFPD6jLqid1SURmw7BFHqk5peitzW7Ajx2hP2dmO18Rv17vk1MMAu9l2enQ77rq McAyQK38SEefP5qIwlK2Ks/Qjnj+B9siz62VxqMv1ri7idirVSRkL/HK+VxHUAzSKurg os8EwN4B0ycYgAGJvT8h2iR+wRvrkorFNBXjOWI4KxxuDKBr8VSDa1YZipidkpgvC3zg g6Ww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:references :in-reply-to:subject:cc:to:from:arc-authentication-results; bh=aYA+QPoJeMEIYbaFSUbK1S+f8kVjXzC1PhdA3ygaO3w=; b=OkP7sp/7C/0MXX/YkNn+90KBi9/BjxIooXCzPufubcyWeLvLNChwMBphlvaGuSKdo1 YFD4QN3zLhGx1EKV0G++ybRCe1c13LvQxQzeVwPVIysVIFzvNLhUccwX7NDmhKb4JZab LcF9KaqXAt6KaiOH/JwEipU/v2qBGYnmISNKceAGXh0lm9XvfqgcvNooNHuhnOvSxewo MUTUw57QNIH6H7cHXIYADpE3SRKZDoCBGtoRc1y0rJYnFvnUNms5aU47zHfKwXQ8JRm7 Ho1tt7ari6NcSC6aHq/02UBkOPVY8tf19cEHhavp6+VhetqZdTjtBahtHvMNJ63Cz4vy m9Mw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t19-v6si1484468pgb.196.2018.06.26.06.38.19; Tue, 26 Jun 2018 06:38:34 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S965386AbeFZNhE (ORCPT + 99 others); Tue, 26 Jun 2018 09:37:04 -0400 Received: from ozlabs.org ([203.11.71.1]:51539 "EHLO ozlabs.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S934583AbeFZNhC (ORCPT ); Tue, 26 Jun 2018 09:37:02 -0400 Received: from authenticated.ozlabs.org (localhost [127.0.0.1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPSA id 41FRsl6NtMz9ryk; Tue, 26 Jun 2018 23:36:59 +1000 (AEST) Authentication-Results: ozlabs.org; dmarc=none (p=none dis=none) header.from=ellerman.id.au From: Michael Ellerman To: Abdul Haleem , linuxppc-dev Cc: linux-fsdevel , linux-next , linux-kernel , linux-scsi , Stephen Rothwell , sachinp , sim , manvanth , Brian King Subject: Re: [next-20180601][nvme][ppc] Kernel Oops is triggered when creating lvm snapshots on nvme disks In-Reply-To: <1530003645.24245.7.camel@abdul.in.ibm.com> References: <1530003645.24245.7.camel@abdul.in.ibm.com> Date: Tue, 26 Jun 2018 23:36:58 +1000 Message-ID: <87d0wd7jph.fsf@concordia.ellerman.id.au> MIME-Version: 1.0 Content-Type: text/plain Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Abdul Haleem writes: > Greeting's > > Kernel Oops is seen on 4.17.0-rc7-next-20180601 kernel on a bare-metal > machine when running lvm snapshot tests on nvme disks. > > Machine Type: Power 8 bare-metal > kernel : 4.17.0-rc7-next-20180601 > test: > $ pvcreate -y /dev/nvme0n1 > $ vgcreate avocado_vg /dev/nvme0n1 > $ lvcreate --size 1.4T --name avocado_lv avocado_vg -y > $ mkfs.ext2 /dev/avocado_vg/avocado_lv > $ lvcreate --size 1G --snapshot --name avocado_sn /dev/avocado_vg/avocado_lv -y > $ lvconvert --merge /dev/avocado_vg/avocado_sn > the last command results in Oops: > > Unable to handle kernel paging request for data at address 0x000000d0 > Faulting instruction address: 0xc0000000002dced4 > Oops: Kernel access of bad area, sig: 11 [#1] > LE SMP NR_CPUS=2048 NUMA PowerNV > Dumping ftrace buffer: > (ftrace buffer empty) > Modules linked in: dm_snapshot dm_bufio nvme bnx2x iptable_mangle > ipt_MASQUERADE iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 > nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 > xt_tcpudp tun bridge stp llc iptable_filter dm_mirror dm_region_hash > dm_log dm_service_time vmx_crypto powernv_rng rng_core dm_multipath > kvm_hv binfmt_misc kvm nfsd ip_tables x_tables autofs4 xfs lpfc > crc_t10dif crct10dif_generic mdio nvme_fc libcrc32c nvme_fabrics > nvme_core crct10dif_common [last unloaded: nvme] > CPU: 70 PID: 157763 Comm: lvconvert Not tainted 4.17.0-rc7-next-20180601-autotest-autotest #1 > NIP: c0000000002dced4 LR: c000000000244d14 CTR: c000000000244cf0 > REGS: c000001f81d6b5a0 TRAP: 0300 Not tainted (4.17.0-rc7-next-20180601-autotest-autotest) > MSR: 900000010280b033 CR: 22442444 XER: 20000000 > CFAR: c000000000008934 DAR: 00000000000000d0 DSISR: 40000000 SOFTE: 0 > GPR00: c000000000244d14 c000001f81d6b820 c00000000109c400 c000003c9d080180 > GPR04: 0000000000000001 c000001fad510000 c000001fad510000 0000000000000001 > GPR08: 0000000000000000 f000000000000000 f000000000000008 0000000000000000 > GPR12: c000000000244cf0 c000001ffffc4f80 00007fffa0e31090 00007fffd9d9b470 > GPR16: 0000000000000000 000000000000005c 00007fffa0e3a5b0 00007fffa0e62040 > GPR20: 0000010014ad7d50 0000010014ad7d20 00007fffa0e64210 0000000000000001 > GPR24: 0000000000000000 c00000000081bae0 c000001ed2461b00 d00000000f859d08 > GPR28: c000003c9d080180 c000000000244d14 0000000000000001 0000000000000000 > NIP [c0000000002dced4] kmem_cache_free+0x1a4/0x2b0 > LR [c000000000244d14] mempool_free_slab+0x24/0x40 Are you running with slub debugging enabled? Try booting with slub_debug=FZP cheers