Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp763633ybx; Thu, 31 Oct 2019 00:08:55 -0700 (PDT) X-Google-Smtp-Source: APXvYqwnI4ODLmukjyKUnCFOQSsJGZur0Oslluq8f2vKN0D3ZSW0PY2IbQqmkC266L6/89q6jjwc X-Received: by 2002:a50:b795:: with SMTP id h21mr4068407ede.225.1572505735108; Thu, 31 Oct 2019 00:08:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572505735; cv=none; d=google.com; s=arc-20160816; b=wA9QnwtaJD6uMCCrxLrh2Pi+vfRhz5FVmFF/DjQmEbFMcP5uHgMr13FZXXJkKaO35e j3iG8U3yAb4LI09glQ5ctQ7yiJPc1GuU4xUvq8kOPp25cF7pKTc4fLc6SIEqqOKyDqCH Mi7qTdW6ZNdDpa6+xtw0Pw9BeskJfbxp75At4NASBMaEHGOrxCfUwKVUZL2ozgDlJt+9 fPPdk4xSapeSZuyG4ry6R3Ynx5FbP3Ddamdvl2nMLI+qFwrQlBRMb2aeE559D4JsjZ3x 6lWJqTOmTQs+mM+hOOY9IUK/kcO+ALZ/8rp+Y0/CIWXurvJapfbUByPFJ5/KdNvgoxlm lExA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:message-id:references :in-reply-to:subject:cc:to:from:date:content-transfer-encoding :mime-version; bh=8ClkWU/XtNmjp+tr+3A++Au3QtPMSE11r1IlTJDdB0I=; b=NTF6c/LOD9VtIB4P+0AAc0UtXL6Larv4hihuHwnjeitN7Oawg14KiIbTvpvp95UKp6 OKhCJgz8YJ/YUG5tfCyU+wvfV/0WhvWNakkATVoN7zVcc40PpyX28/mWC4ZVFEMBEThL O6RrglQHPW/uV7NoEgFOWRf+kmU85XL7YM9822uRCS+MNJI9SBD+sw7P6jPex1Sykp8x cRYH5cILyCGdjkuVhIg73kOkUST4o6jt14CROzAWJ+XmwGjoUKUoTPfgpVTaXqY6qreq ngXENLSj2ZbzvJDXk+vgCmgUiIOrb1Os+j4E56Ehv+eDv/vM5LMa05HiWf73mPbLCYwJ Xidw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id nt21si2617299ejb.119.2019.10.31.00.08.29; Thu, 31 Oct 2019 00:08:55 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726789AbfJaHGM (ORCPT + 99 others); Thu, 31 Oct 2019 03:06:12 -0400 Received: from mx2.suse.de ([195.135.220.15]:38324 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726575AbfJaHGM (ORCPT ); Thu, 31 Oct 2019 03:06:12 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 7D5F6AE04; Thu, 31 Oct 2019 07:06:10 +0000 (UTC) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII; format=flowed Content-Transfer-Encoding: 7bit Date: Thu, 31 Oct 2019 08:06:10 +0100 From: Johannes Thumshirn To: Chaitanya Kulkarni Cc: Daniel Wagner , linux-nvme@lists.infradead.org, Sagi Grimberg , linux-kernel@vger.kernel.org, Christoph Hellwig Subject: Re: [RFC] nvmet: Always remove processed AER elements from list In-Reply-To: References: <20191030152418.23753-1-dwagner@suse.de> Message-ID: <82e496f61183ebdf7924d660d3b8c90e@suse.de> X-Sender: jthumshirn@suse.de User-Agent: Roundcube Webmail Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2019-10-30 20:58, Chaitanya Kulkarni wrote: > On 10/30/2019 08:24 AM, Daniel Wagner wrote: >> Hi, >> >> I've got following oops: >> >> PID: 79413 TASK: ffff92f03a814ec0 CPU: 19 COMMAND: "kworker/19:2" >> #0 [ffffa5308b8c3c58] machine_kexec at ffffffff8e05dd02 >> #1 [ffffa5308b8c3ca8] __crash_kexec at ffffffff8e12102a >> #2 [ffffa5308b8c3d68] crash_kexec at ffffffff8e122019 >> #3 [ffffa5308b8c3d80] oops_end at ffffffff8e02e091 >> #4 [ffffa5308b8c3da0] general_protection at ffffffff8e8015c5 >> [exception RIP: nvmet_async_event_work+94] >> RIP: ffffffffc0d9a80e RSP: ffffa5308b8c3e58 RFLAGS: 00010202 >> RAX: dead000000000100 RBX: ffff92dcbc7464b0 RCX: >> 0000000000000002 >> RDX: 0000000000040002 RSI: 38ffff92dc9814cf RDI: >> ffff92f217722f20 >> RBP: ffff92dcbc746418 R8: 0000000000000000 R9: >> 0000000000000000 >> R10: 000000000000035b R11: ffff92efb8dd2091 R12: >> ffff92dcbc7464a0 >> R13: ffff92dbe03a5f29 R14: 0000000000000000 R15: >> 0ffff92f92f26864 >> ORIG_RAX: ffffffffffffffff CS: 0010 SS: 0018 >> #5 [ffffa5308b8c3e78] process_one_work at ffffffff8e0a3b0c >> #6 [ffffa5308b8c3eb8] worker_thread at ffffffff8e0a41e7 >> #7 [ffffa5308b8c3f10] kthread at ffffffff8e0a93af >> #8 [ffffa5308b8c3f50] ret_from_fork at ffffffff8e800235 >> >> this maps to nvmet_async_event_results. So it looks like this function >> access a stale aen pointer: >> >> static u32 nvmet_async_event_result(struct nvmet_async_event *aen) >> { >> return aen->event_type | (aen->event_info << 8) | >> (aen->log_page << 16); >> } > Can you please explain the test setup ? Is that coming from the tests > present in the blktests ? if so you can please provide test number ? No unfortunately this is coming from a customer bug report. We _think_ we're having a race between AEN processing and nvmet_sq_destroy(), but we're not 100% sure. Hence this RFC.