Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1758670AbYJ3Sel (ORCPT ); Thu, 30 Oct 2008 14:34:41 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1754609AbYJ3Sed (ORCPT ); Thu, 30 Oct 2008 14:34:33 -0400 Received: from 5-25-251-64.serverpronto.com ([64.251.25.5]:3644 "EHLO mail.kaylix.net" rhost-flags-OK-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S1753738AbYJ3Sec (ORCPT ); Thu, 30 Oct 2008 14:34:32 -0400 Cc: linux-kernel@vger.kernel.org, Mikulas Patocka Message-Id: From: Wesley Leggette To: Milan Broz In-Reply-To: <4909FD3E.8070104@redhat.com> Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes Content-Transfer-Encoding: 7bit Mime-Version: 1.0 (Apple Message framework v929.2) Subject: Re: Kernel panic in kcryptd Date: Thu, 30 Oct 2008 13:34:29 -0500 References: <4909FD3E.8070104@redhat.com> X-Mailer: Apple Mail (2.929.2) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 6913 Lines: 171 On Oct 30, 2008, at 13:30, Milan Broz wrote: > > Wesley Leggette wrote: >> When performing large IO, seemingly only when over the network, I >> receive a kernel panic that seems to be happening in the kcryptd >> module. >> >> Here's two scenarios I've encountered this: >> >> ietd -> kcryptd -> mdadm raid6 > > iscsi over dm crypt over mdadm? > And I see snapshots in the log too, isn't there snapshot under > the crypt mapping? Two setups (and sorry, forget LVM): iscsi over kcryptd over LVM over mdadm also using samba smbd over kcryptd over LVM over mdadm Snapshots involved in LVM > > > Is it reproducible without snapshots involved? Will try. I'm trying to reproduce right now without "bigmem", but will stop if that is likely not the case. Wesley > > > Maybe it is related to recently fixed problem there... > I think these patches solves the snapshot crashes (cc Mikulas) > > http://www.kernel.org/pub/linux/kernel/people/agk/patches/2.6/2.6.27/dm-snapshot-fix-primary_pe-race.patch > http://www.kernel.org/pub/linux/kernel/people/agk/patches/2.6/editing/dm-snapshot-wait-for-chunks-in-destructor.patch > > Milan > >> Linux version 2.6.26-bpo.1-686-bigmem (Debian 2.6.26-4~bpo40+1) (nobse@debian.org >> ) (gcc version 4.1.2 20061115 (prerelease) (Debian 4.1.1-21)) #1 SMP >> Tue Sep 2 18:42:50 UTC 2008 >> >> >> >> Oct 29 04:55:15 fargo kernel: [4285317.219492] ------------[ cut >> here ]------------ >> Oct 29 04:55:15 fargo kernel: [4285317.219492] kernel BUG at mm/ >> slab.c: >> 3008! >> Oct 29 04:55:15 fargo kernel: [4285317.219492] invalid opcode: 0000 >> [#1] SMP >> Oct 29 04:55:15 fargo kernel: [4285317.219492] Modules linked in: >> usb_storage iscsi_trgt crc32c libcrc32c ipv6 ib_iser >> rdma_cm ib_cm iw_cm ib_sa ib_mad ib_core ib_addr iscsi_tcp libiscsi >> scsi_transport_iscsi ac battery xt_tcpudp nf_conn >> track_ipv4 xt_state nf_conntrack iptable_filter ip_tables x_tables >> ext3 jbd mbcache loop snd_hda_intel i2c_i801 i2c_co >> re snd_pcm snd_timer snd soundcore iTCO_wdt intel_agp agpgart button >> snd_page_alloc parport_pc parport evdev pcspkr fl >> oppy reiserfs sha256_generic aes_i586 aes_generic cbc dm_crypt >> crypto_blkcipher dm_mirror dm_log dm_snapshot dm_mod ra >> id456 async_xor async_memcpy async_tx xor raid1 md_mod ide_generic >> jmicron ide_core sd_mod sata_promise ata_generic ah >> ci r8169 libata scsi_mod uhci_hcd dock ehci_hcd usbcore thermal >> processor fan thermal_sys [last unloaded: libcrc32c] >> Oct 29 04:55:15 fargo kernel: [4285317.219492] >> Oct 29 04:55:15 fargo kernel: [4285317.219492] Pid: 4191, comm: >> kcryptd Not tainted (2.6.26-bpo.1-686-bigmem #1) >> Oct 29 04:55:15 fargo kernel: [4285317.219492] EIP: 0060:[] >> EFLAGS: 00010046 CPU: 0 >> Oct 29 04:55:15 fargo kernel: [4285317.219492] EIP is at >> cache_alloc_refill+0xeb/0x48b >> Oct 29 04:55:15 fargo kernel: [4285317.219492] EAX: 0000003b EBX: >> 00000012 ECX: f6d4d1c0 EDX: df32c000 >> Oct 29 04:55:15 fargo kernel: [4285317.219492] ESI: c0878000 EDI: >> 00000012 EBP: f540cac0 ESP: e70b5d78 >> Oct 29 04:55:15 fargo kernel: [4285317.219492] DS: 007b ES: 007b FS: >> 00d8 GS: 0000 SS: 0068 >> Oct 29 04:55:15 fargo kernel: [4285317.219492] Process kcryptd (pid: >> 4191, ti=e70b4000 task=f696ba00 task.ti=e70b4000) >> Oct 29 04:55:15 fargo kernel: [4285317.219492] Stack: 00000000 >> 0000003b 00011200 f6d4d1c0 f5443e00 00000000 c0136139 f >> 51011ec >> Oct 29 04:55:15 fargo kernel: [4285317.219492] e70b5de8 >> 00000202 c0136194 00000000 f6d4d1c0 00000206 00011200 c >> 017b7b6 >> Oct 29 04:55:15 fargo kernel: [4285317.219492] 00000000 >> f540ca80 00000000 00011210 c015f909 f8935be2 df32c4c8 f >> 6430e40 >> Oct 29 04:55:15 fargo kernel: [4285317.219492] Call Trace: >> Oct 29 04:55:15 fargo kernel: [4285317.219492] [] >> __queue_work+0x1c/0x28 >> Oct 29 04:55:15 fargo kernel: [4285317.219492] [] >> queue_work >> +0x33/0x3c >> Oct 29 04:55:15 fargo kernel: [4285317.219492] [] >> kmem_cache_alloc+0x47/0x8e >> Oct 29 04:55:15 fargo kernel: [4285317.219492] [] >> mempool_alloc+0x1c/0xba >> Oct 29 04:55:15 fargo kernel: [4285317.219492] [] >> copy_callback+0x0/0x2c [dm_snapshot] >> Oct 29 04:55:15 fargo kernel: [4285317.219492] [] >> __find_pending_exception+0x62/0x122 [dm_snapshot] >> Oct 29 04:55:15 fargo kernel: [4285317.219492] [] >> origin_map >> +0x105/0x23f [dm_snapshot] >> Oct 29 04:55:15 fargo kernel: [4285317.219492] [] >> __map_bio >> +0x4d/0x12a [dm_mod] >> Oct 29 04:55:15 fargo kernel: [4285317.219492] [] >> clone_bio >> +0x3f/0x6f [dm_mod] >> Oct 29 04:55:15 fargo kernel: [4285317.219492] [] >> __split_bio+0x156/0x3f7 [dm_mod] >> Oct 29 04:55:15 fargo kernel: [4285317.219492] [] >> crypto_cbc_encrypt+0x12b/0x13f [cbc] >> Oct 29 04:55:15 fargo kernel: [4285317.219492] [] >> aes_encrypt+0x0/0xc [aes_i586] >> Oct 29 04:55:15 fargo kernel: [4285317.219492] [] >> dm_request >> +0xd3/0xf2 [dm_mod] >> Oct 29 04:55:15 fargo kernel: [4285317.219492] [] >> generic_make_request+0x34d/0x37b >> Oct 29 04:55:15 fargo kernel: [4285317.219492] [] >> crypt_convert+0x20f/0x240 [dm_crypt] >> Oct 29 04:55:15 fargo kernel: [4285317.219492] [] >> kcryptd_crypt+0x1be/0x267 [dm_crypt] >> Oct 29 04:55:15 fargo kernel: [4285317.219492] [] >> kcryptd_crypt+0x0/0x267 [dm_crypt] >> Oct 29 04:55:15 fargo kernel: [4285317.219492] [] >> run_workqueue+0x74/0xf2 >> Oct 29 04:55:15 fargo kernel: [4285317.219492] [] >> worker_thread+0x0/0xbd >> Oct 29 04:55:15 fargo kernel: [4285317.219492] [] >> worker_thread+0xb3/0xbd >> Oct 29 04:55:15 fargo kernel: [4285317.219492] [] >> autoremove_wake_function+0x0/0x2d >> Oct 29 04:55:15 fargo kernel: [4285317.219492] [] kthread >> +0x38/0x5d >> Oct 29 04:55:15 fargo kernel: [4285317.219492] [] kthread >> +0x0/0x5d >> Oct 29 04:55:15 fargo kernel: [4285317.219492] [] >> kernel_thread_helper+0x7/0x10 >> Oct 29 04:55:15 fargo kernel: [4285317.219492] >> ======================= >> Oct 29 04:55:15 fargo kernel: [4285317.219492] Code: 8b 75 00 39 ee >> 75 >> 15 8b 75 10 8d 45 10 c7 45 34 01 00 00 00 39 c6 >> 0f 84 a5 00 00 00 8b 4c 24 0c 8b 81 98 00 00 00 39 46 10 72 37 <0f> >> 0b eb fe 8b 44 24 10 8b 5e 14 8b 08 8b 44 24 0c 8 >> b 90 8c 00 >> Oct 29 04:55:15 fargo kernel: [4285317.219492] EIP: [] >> cache_alloc_refill+0xeb/0x48b SS:ESP 0068:e70b5d78 >> Oct 29 04:55:15 fargo kernel: [4285317.219492] ---[ end trace >> 0bb16d783d7c2616 ]--- -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/