Received: by 2002:a05:7412:b10a:b0:f3:1519:9f41 with SMTP id az10csp759858rdb; Thu, 30 Nov 2023 18:59:25 -0800 (PST) X-Google-Smtp-Source: AGHT+IFeq89wg0jYnmr6YN34b7ds5n10Rpzhi30RX78qkCe1JiqK353es3TazmdYqGfzj5IO+QQg X-Received: by 2002:a05:6808:140c:b0:3b8:927f:6a3f with SMTP id w12-20020a056808140c00b003b8927f6a3fmr2028144oiv.7.1701399565202; Thu, 30 Nov 2023 18:59:25 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701399565; cv=none; d=google.com; s=arc-20160816; b=fIKf87vBGkhW52eGPwHH7g7vGyrWS+1tdrPMYRTxO7Go7g2BzTl3bGpDz6HcFyX2Td sGueXLW8q7tcl6sTIE8u+3CS4tOKNhJlmddoMKqvQc20Cc0AlSJQ9BLro9UQkw+e676X m6EaKG+pBCmeuC7LmU58CIegMJ2+GUhqcM7d8hRzlqDdXMn3EDQrsCtwf+KM2zE4Ui7f X6WXxvkkj4x5iqafj8Ve7e8GJVyJxYdZIXfA6Z6IXdQOMEXyTn6p2b9meZRjSY7OjTUX DjfUZEElEA9GhyNwxV9N5zPmW6u9GZ6GjWrNXsQLVscOLX7Ism6QvoOV0mo3QhhTQTfP xSQg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=GKRqMkMuSnteVCR9/jJT3xFVtsM844NAUYbg1NFX8Fg=; fh=RQtLXvbqOlWmJXXCUKihcPi3R1v9zxzJk1zK0uSRuYQ=; b=wRkEZa7mEQCjzCy+Fe18xVmdlOk2fkAweIxz87vq9hJgRxdouPxqDGoiVtNIU9X0lU IRkgof3OvtjfioXvrHy1cC2w2LsnsZf/twpR+J8T3syIu22h3RHVCkiB3SC+hPwCN1J3 bf1iebsir2U+biQFEd/KzqNx9Ero+IZrAgSnAUtEHKkYR1d0YMY6wduxlZfOA7X1I9s2 yJNYOoN7semelHwTbtcC/4xYbbR/EHhBYXN/bMXNjxbOLuDcU/5l7JO/I4kyEp6t0gFo GOiJl/dxWmv7A+9+Hnh+K96Su5pksgYhKzCaULz4dcjsMz23AAeUeGmLSgVWL7nq6GMo K3Bg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@quora.org header.s=google header.b=MzRsQKWo; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from agentk.vger.email (agentk.vger.email. [2620:137:e000::3:2]) by mx.google.com with ESMTPS id v7-20020a056a00148700b006c3482c4e4dsi2503278pfu.289.2023.11.30.18.59.24 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 30 Nov 2023 18:59:25 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) client-ip=2620:137:e000::3:2; Authentication-Results: mx.google.com; dkim=pass header.i=@quora.org header.s=google header.b=MzRsQKWo; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id 98AFB801CFCF; Thu, 30 Nov 2023 18:59:22 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1376884AbjLAC6x (ORCPT + 99 others); Thu, 30 Nov 2023 21:58:53 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53564 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229523AbjLAC6u (ORCPT ); Thu, 30 Nov 2023 21:58:50 -0500 Received: from mail-ed1-x533.google.com (mail-ed1-x533.google.com [IPv6:2a00:1450:4864:20::533]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 656B81711 for ; Thu, 30 Nov 2023 18:58:55 -0800 (PST) Received: by mail-ed1-x533.google.com with SMTP id 4fb4d7f45d1cf-54b7ef7f4d5so1861799a12.1 for ; Thu, 30 Nov 2023 18:58:55 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=quora.org; s=google; t=1701399534; x=1702004334; darn=vger.kernel.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=GKRqMkMuSnteVCR9/jJT3xFVtsM844NAUYbg1NFX8Fg=; b=MzRsQKWoCrhLaIyniY0ihpSk2sYqCUOLwlOhYYAGeW2BqB6PSCBbdDwkEqO/FjiF/6 Y6KwhSlASaEzBsXAmFCZBzqUUQoKgWxsKzc5JwjtvlNl4jM1HYR0KhDDx5qXVRhrMsPI FEatlklCNfRor5qkKQKexMr+0EFmvAGRlkU4k= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1701399534; x=1702004334; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=GKRqMkMuSnteVCR9/jJT3xFVtsM844NAUYbg1NFX8Fg=; b=mjQadQ15Wndo3xygmWsYS/AziJfiS4Mdj3f+3yZI7yzO1CAW8VFDImhx/fQzkEQk0v LlEwbTu2/8TY6KSgIC7kPv0I3p9X6IkCoQAOVpNiZClu6kNmXpgY7BS+A04ZmIYYxs2y SWbS6bqvruj1LhVIuW2XqVflSKW2QXnwvQy0h9D4xEkFtfbk7QilKj6rmeVkIXK3CsWV wzITnDdVWAOazLV91b3NuBATdX0+g0WIYVC8UR53xWBgkebVVmHmJnAbjGDWjGrI40O3 dLaSWv+E5jdOGS8Nrf/jp3G3QVIFyXKzRyfk2GRk8wuguCY/Kr9LCYuQkzOqULbhW24A XFdQ== X-Gm-Message-State: AOJu0YzuPadRUNlOSKm6SEVYfN+pUQ7TLTLJmBde7B6Hn8QuuN3wcc9Z HJESNMCp84dwEkqMe0Ju8iDzdTufIUP60YBnU5g+eQ== X-Received: by 2002:a17:906:21a:b0:a12:5dd2:4649 with SMTP id 26-20020a170906021a00b00a125dd24649mr349956ejd.43.1701399533780; Thu, 30 Nov 2023 18:58:53 -0800 (PST) MIME-Version: 1.0 References: <20231201015055.pn5qqbsk42jlfsoc@moria.home.lan> In-Reply-To: <20231201015055.pn5qqbsk42jlfsoc@moria.home.lan> From: Daniel J Blueman Date: Thu, 30 Nov 2023 21:58:42 -0500 Message-ID: Subject: Re: bcachefs page fault oops after device evacuate/remove and unmount To: Kent Overstreet Cc: Linux Kernel , linux-bcachefs@vger.kernel.org Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Thu, 30 Nov 2023 18:59:22 -0800 (PST) On Thu, 30 Nov 2023 at 20:50, Kent Overstreet wrote: > > On Thu, Nov 30, 2023 at 08:47:33PM -0500, Daniel J Blueman wrote: > > Hi Kent et al, > > > > On upstream bcachefs (master @ evilpiepirate.org/git/bcachefs.git) SHA > > f8a1ba26, I was able to develop a minimal reproducer [1] for a page > > not present oops I can provoke [2]. It appears we need further > > synchronisation during unmount. > > > > Let me know when there is a patch I can test, or for debug. > > There was a device removal that was just fixed, I've already sent the > pull request to Linus but in the meantime try this branch: > > https://evilpiepirate.org/git/bcachefs.git/log/?h=bcachefs-for-upstream > > If you still hit it, I'll turn your reproducer into a ktest test and > hunt it down. This did reproduce on the second cycle on bcachefs-for-upstream SHA 415e5107b0dc; let me know if you can't trigger it and I'll make some adjustments. Thanks, Dan -- Daniel J Blueman