Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp719357ybl; Thu, 23 Jan 2020 06:35:13 -0800 (PST) X-Google-Smtp-Source: APXvYqz58ocUBMJc/hOpOvhhprx1xu/QSv0LxmCKtCGUrWkQOcIXip67SoDKsI3dB8kCio3d/z02 X-Received: by 2002:a9d:6f0d:: with SMTP id n13mr11794141otq.165.1579790112906; Thu, 23 Jan 2020 06:35:12 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579790112; cv=none; d=google.com; s=arc-20160816; b=L46Jsegf6mtIGH0E5PWsJJrIMRadrUfwGdIb+aa0QNSHj1Q8bF5A1WEaRiI0fteqcI 49cJD/X+Zn78mYqJ4Mt+JOB2xoj7EVKgt/4i6pg4jT9AHGOJRHUWiyk7zgfiuKSOftX7 4ARkCNSetDd1b/XcqxAku5egWTyt/c465w4bvTekvbvwoLpRxCckUCoJpleL48twWgnS ScsVVRuBNSEK6kanFShQ6FKKMs9tHTodrDy4dCA5JR8G0rk3vUwSHSadNnFp+0+FB1zG L5arXBN6rRLtcnyZXXbkIkjdpKQkM9OwlM+4njSysoyCdM+O3ru+mNmTJy3mHOyE3OtX pDvA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:from:subject:to:message-id:date; bh=xg8prLwHLseFc8+FcS4mEp4+ZtCjNvD87DOgExyrlbM=; b=fUwJpSnW5aOhGo3hsa9pgI09WYEUE8zqv1Oo+OP4nLOA9GQtiV3eR5AMpiRZv9YuSt /yt7S6bu/oBd+a+Z5rqvwpHyNUW9pGnaBOqequ7iJWHlHbPONHhCzs+UkFkdAGZbwsSJ YSnMv2Eg8J9Hhw7aHi0WD21YggwjP/HlwJP8vG0i42zCflDvGVauJFZIXK5tGLikxWjY 2eUPg5YtN4g6fSFdWMoJ2pPDZ21ogRW/lNYeLxaRz84/wWguwhUsahL7iXjiRDfPi9gN ydOFP6jh6mtwwaUTBBpTYC9cMdzz6zCb2Z8OPtIkVqIwRUEOYYEzzqVyGndmZjTJ06Np kt6Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=dti.ne.jp Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x3si954186oie.146.2020.01.23.06.35.01; Thu, 23 Jan 2020 06:35:12 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=dti.ne.jp Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728916AbgAWOeE (ORCPT + 99 others); Thu, 23 Jan 2020 09:34:04 -0500 Received: from gw.cm.dream.jp ([59.157.128.2]:47097 "EHLO vsmtp02.cm.dti.ne.jp" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728779AbgAWOeD (ORCPT ); Thu, 23 Jan 2020 09:34:03 -0500 Received: from localhost (KD124210025232.ppp-bb.dion.ne.jp [124.210.25.232]) by vsmtp02.cm.dti.ne.jp (3.11v) with ESMTP AUTH id 00NEUsX9006202;Thu, 23 Jan 2020 23:30:54 +0900 (JST) Date: Thu, 23 Jan 2020 23:30:54 +0900 (JST) Message-Id: <20200123.233054.1176220936128499438.hermes@ceres.dti.ne.jp> To: linux-nilfs@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: BUG: unable to handle kernel NULL pointer dereference at 00000000000000a8 in nilfs_segctor_do_construct From: ARAI Shun-ichi In-Reply-To: <20200123.225827.1155989593018204741.hermes@ceres.dti.ne.jp> References: <8736emquds.fsf@logand.com> <20200123.225827.1155989593018204741.hermes@ceres.dti.ne.jp> X-Mailer: Mew version 6.8 on Emacs 26.3 Mime-Version: 1.0 Content-Type: Text/Plain; charset=iso-2022-jp Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, Now I found that my /tmp is not tmpfs, it is in root partition (!!!???) And, I use LUKS for it. LUKS - VG - LV (root, usr, ...) I want to try "ii)" without LUKS/LVM, but cannot reboot now. In <20200123.225827.1155989593018204741.hermes@ceres.dti.ne.jp>; ARAI Shun-ichi wrote as Subject "Re: BUG: unable to handle kernel NULL pointer dereference at 00000000000000a8 in nilfs_segctor_do_construct": > Hi, > > It is reproducible in my environment. > Kernel version is 4.19.86 (Gentoo). > NILFS2 with kernel 4.19.82 works well. > > I did following for the test. > > i) mount corrupt partition with read-only option > (this partition causes "mounting fs with errors" at every rw mount) > i-1) wait a few minutes ... not crash > i-2) fs access (ls, du, ...) ... not crash > > ii) create small NILFS2 fs and read-write mount > dd if=/dev/zero of=/tmp/n bs=1M count=500 > mount -o loop /tmp/n /mnt/tmp > ii-1) wait a few minutes ... not crash > ii-2) touch file in the fs ... crash (in few seconds) > > > In ; > Ryusuke Konishi wrote > as Subject "Re: BUG: unable to handle kernel NULL pointer dereference at 00000000000000a8 in nilfs_segctor_do_construct": > >> Hi, >> >>> It was likely caused by improper shutdown and following nilfs2 partition >>> corruption. Now I can still read the data, but on the whole the >>> computer is not useable, because starting a process which uses the >>> corrupted file system simply crashes in kernel. >> >> Thank you for reporting the issue. >> Let me ask you a few questions: >> >> 1) Is the crash reproducible in the environment ? >> 2) Can you mount the corrupted(?) partition from a recent version of kernel ? >> 3) Does read-only mount option (-r) work to avoid the crash ? >> >> Thanks, >> Ryusuke Konishi >> >> 2019年11月18日(月) 2:34 Tomas Hlavaty : >>> >>> Hi Ryusuke, >>> >>> today I got this bug in kernel, which seems to be related to nilfs2. >>> >>> It was likely caused by improper shutdown and following nilfs2 partition >>> corruption. Now I can still read the data, but on the whole the >>> computer is not useable, because starting a process which uses the >>> corrupted file system simply crashes in kernel. I am actually not sure >>> if the filesystem is corrupted, as I don't know about any tool to check >>> that. The relevant parts of dmesg log are bellow. >>> >>> Please let me know if you are the right contact or if you need more info >>> about the problem. >>> >>> Thank you, >>> >>> Tomas >>> >>> [ 0.000000] Linux version 4.19.84 (nixbld@localhost) (gcc version 8.3.0 (GCC)) #1-NixOS SMP Tue Nov 12 18:21:46 UTC 2019 >>> [ 0.000000] Command line: initrd=\efi\nixos\4s51zw36kd1qb0ymk0charxjg8x6k5k3-initrd-linux-4.19.84-initrd.efi systemConfig=/nix/store/gdbxhzysr929abrymjqala0b5bh2fqmv-nixos-system-ushi-19.09.1258.07e66484e67 init=/nix/store/gdbxhzysr929abrymjqala0b5bh2fqmv-nixos-system-ushi-19.09.1258.07e66484e67/init loglevel=4 >>> >>> >>> >>> [ 37.741106] systemd-journald[470]: Received client request to flush runtime journal. >>> [ 37.749084] systemd-journald[470]: File /var/log/journal/55a4ea9159c14c0bb8767a43819c6927/system.journal corrupted or uncleanly shut down, renaming and replacing. >>> [ 37.810819] audit: type=1130 audit(1573985039.617:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj==unconfined msg='unit=systemd-udevd comm="systemd" exe="/nix/store/v8flm2h07zcfg5k5npz56m0ayj0qm1q8-systemd-243/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' >>> >>> [ 38.321561] NILFS version 2 loaded >>> [ 38.323236] NILFS (dm-1): mounting unchecked fs >>> >>> >>> [ 38.349185] NILFS (dm-1): recovery complete >>> [ 38.353228] NILFS (dm-1): segctord starting. Construction interval = 5 seconds, CP frequency < 30 seconds >>> >>> [ 63.543941] systemd-journald[470]: File >>> /var/log/journal/55a4ea9159c14c0bb8767a43819c6927/user-1000.journal >>> corrupted or uncleanly shut down, renaming and replacing. >>> >>> [12637.085548] BUG: unable to handle kernel NULL pointer dereference at 00000000000000a8 >>> [12637.085558] PGD 0 P4D 0 >>> [12637.085567] Oops: 0000 [#1] SMP PTI >>> [12637.085574] CPU: 0 PID: 657 Comm: segctord Not tainted 4.19.84 #1-NixOS >>> [12637.085577] Hardware name: ASUSTeK COMPUTER INC. VivoBook 15_ASUS Laptop X507MA_R507MA/X507MA, BIOS X507MA.301 09/14/2018 >>> [12637.085589] RIP: 0010:percpu_counter_add_batch+0x4/0x60 >>> [12637.085593] Code: 89 e6 89 c7 e8 dd 3b 28 00 3b 05 fb e0 b6 00 72 d8 4c 89 ee 48 89 ef e8 7a 63 2a 00 48 89 d8 5b 5d 41 5c 41 5d c3 41 54 55 53 <48> 8b 47 20 65 44 8b 20 49 63 ec 48 63 ca 48 01 f5 48 39 e9 7e 0a >>> [12637.085597] RSP: 0018:ffff9d1b00a0bd20 EFLAGS: 00010006 >>> [12637.085601] RAX: 0000000000000002 RBX: 0000000000000000 RCX: 0000000000000018 >>> [12637.085604] RDX: 0000000000000018 RSI: 0000000000000001 RDI: 0000000000000088 >>> [12637.085608] RBP: ffff8df67a2988d0 R08: 0000000000000000 R09: ffff8df66fe0cfe0 >>> [12637.085611] R10: 0000000000000230 R11: 0000000000000000 R12: 0000000000000000 >>> [12637.085614] R13: ffff8df67a298758 R14: ffff8df67a2988c8 R15: ffffccd684229a80 >>> [12637.085618] FS: 0000000000000000(0000) GS:ffff8df67ba00000(0000) knlGS:0000000000000000 >>> [12637.085621] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 >>> [12637.085624] CR2: 00000000000000a8 CR3: 000000011ac0a000 CR4: 0000000000340ef0 >>> [12637.085628] Call Trace: >>> [12637.085640] __test_set_page_writeback+0x37c/0x3f0 >>> [12637.085663] nilfs_segctor_do_construct+0x184e/0x2040 [nilfs2] >>> [12637.085680] nilfs_segctor_construct+0x1f5/0x2e0 [nilfs2] >>> [12637.085693] nilfs_segctor_thread+0x129/0x370 [nilfs2] >>> [12637.085706] ? nilfs_segctor_construct+0x2e0/0x2e0 [nilfs2] >>> [12637.085713] kthread+0x112/0x130 >>> [12637.085719] ? kthread_bind+0x30/0x30 >>> [12637.085728] ret_from_fork+0x1f/0x40 >>> [12637.085734] Modules linked in: ctr ccm af_packet msr 8021q snd_hda_codec_hdmi snd_hda_codec_realtek snd_hda_codec_generic hid_multitouch arc4 ath9k ath9k_common ath9k_hw ath mac80211 snd_soc_skl snd_soc_skl_ipc spi_pxa2xx_platform asus_nb_wmi snd_soc_sst_ipc snd_soc_sst_dsp asus_wmi 8250_dw i2c_designware_platform sparse_keymap i2c_designware_core wmi_bmof i915 snd_hda_ext_core nilfs2 snd_soc_acpi_intel_match snd_soc_acpi uvcvideo videobuf2_vmalloc nls_iso8859_1 videobuf2_memops videobuf2_v4l2 snd_soc_core nls_cp437 rtsx_usb_ms intel_telemetry_pltdrv vfat intel_punit_ipc intel_telemetry_core fat intel_pmc_ipc memstick videobuf2_common snd_compress kvmgt vfio_mdev mdev ath3k vfio_iommu_type1 vfio btusb ac97_bus snd_pcm_dmaengine btrtl x86_pkg_temp_thermal intel_powerclamp btbcm cec coretemp btintel >>> [12637.085819] crct10dif_pclmul crc32_pclmul videodev snd_hda_intel bluetooth drm_kms_helper ghash_clmulni_intel deflate media efi_pstore intel_cstate pstore intel_rapl_perf cfg80211 snd_hda_codec joydev mousedev evdev wdat_wdt serio_raw mac_hid efivars drm snd_hda_core snd_hwdep ecdh_generic snd_pcm snd_timer mei_me idma64 virt_dma snd intel_gtt agpgart i2c_i801 i2c_algo_bit mei fb_sys_fops syscopyarea soundcore rfkill processor_thermal_device sysfillrect sysimgblt intel_lpss_pci intel_soc_dts_iosf thermal wmi intel_lpss i2c_hid i2c_core battery tpm_crb button ac tpm_tis tpm_tis_core asus_wireless video pcc_cpufreq tpm rng_core pinctrl_geminilake int3400_thermal int3403_thermal pinctrl_intel int340x_thermal_zone acpi_thermal_rel iptable_nat nf_nat_ipv4 nf_nat xt_conntrack nf_conntrack nf_defrag_ipv6 >>> [12637.085912] nf_defrag_ipv4 libcrc32c ip6t_rpfilter ipt_rpfilter ip6table_raw iptable_raw xt_pkttype nf_log_ipv6 nf_log_ipv4 nf_log_common xt_LOG xt_tcpudp ip6table_filter ip6_tables iptable_filter sch_fq_codel loop cpufreq_powersave tun tap macvlan bridge stp llc kvm_intel kvm irqbypass efivarfs ip_tables x_tables ipv6 crc_ccitt autofs4 ext4 crc32c_generic crc16 mbcache jbd2 fscrypto dm_crypt algif_skcipher af_alg rtsx_usb_sdmmc mmc_core rtsx_usb hid_generic usbhid hid sd_mod input_leds led_class atkbd libps2 ahci libahci xhci_pci libata xhci_hcd aesni_intel usbcore aes_x86_64 crypto_simd scsi_mod cryptd glue_helper crc32c_intel usb_common rtc_cmos i8042 serio dm_mod >>> [12637.086000] CR2: 00000000000000a8 >>> [12637.086005] ---[ end trace ee0079180c990cd2 ]--- >>> [12637.120805] RIP: 0010:percpu_counter_add_batch+0x4/0x60 >>> [12637.120807] Code: 89 e6 89 c7 e8 dd 3b 28 00 3b 05 fb e0 b6 00 72 d8 4c 89 ee 48 89 ef e8 7a 63 2a 00 48 89 d8 5b 5d 41 5c 41 5d c3 41 54 55 53 <48> 8b 47 20 65 44 8b 20 49 63 ec 48 63 ca 48 01 f5 48 39 e9 7e 0a >>> [12637.120809] RSP: 0018:ffff9d1b00a0bd20 EFLAGS: 00010006 >>> [12637.120811] RAX: 0000000000000002 RBX: 0000000000000000 RCX: 0000000000000018 >>> [12637.120812] RDX: 0000000000000018 RSI: 0000000000000001 RDI: 0000000000000088 >>> [12637.120814] RBP: ffff8df67a2988d0 R08: 0000000000000000 R09: ffff8df66fe0cfe0 >>> [12637.120815] R10: 0000000000000230 R11: 0000000000000000 R12: 0000000000000000 >>> [12637.120816] R13: ffff8df67a298758 R14: ffff8df67a2988c8 R15: ffffccd684229a80 >>> [12637.120818] FS: 0000000000000000(0000) GS:ffff8df67ba00000(0000) knlGS:0000000000000000 >>> [12637.120820] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 >>> [12637.120821] CR2: 00000000000000a8 CR3: 0000000138e0a000 CR4: 0000000000340ef0