Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-1.1 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_PASS,UNPARSEABLE_RELAY autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id DAAB9C43381 for ; Tue, 12 Mar 2019 14:47:23 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 9EA582087C for ; Tue, 12 Mar 2019 14:47:23 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=oracle.com header.i=@oracle.com header.b="cjCUcbVI" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726255AbfCLOrW (ORCPT ); Tue, 12 Mar 2019 10:47:22 -0400 Received: from aserp2130.oracle.com ([141.146.126.79]:41126 "EHLO aserp2130.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726639AbfCLOrW (ORCPT ); Tue, 12 Mar 2019 10:47:22 -0400 Received: from pps.filterd (aserp2130.oracle.com [127.0.0.1]) by aserp2130.oracle.com (8.16.0.27/8.16.0.27) with SMTP id x2CEhWvF010967; Tue, 12 Mar 2019 14:47:15 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=content-type : mime-version : subject : from : in-reply-to : date : cc : content-transfer-encoding : message-id : references : to; s=corp-2018-07-02; bh=GzxWUL0M9RIvez3OYBYpdGeH7SF0DI85QhZZ7SiFX50=; b=cjCUcbVIFY7jpOmNEkrB0JiCASDhFwN18xcxrqVZ0mT7DGvw8BPufbNl/yHFamcKVQ+v JWWolB9ELX4MlKShLgUJBABxbhib8T1sdbjvdRkUdjKlkyjFyWUD8LZPlNbskwvEe/Fh 9Z36esBmC2cHUCEexuBV15xuECkrg0Ie7NG6UzI3UB7nR7ZM9lWu0uRk/in0q8tCDjje ObGjj6Lwft3Nqq5PTewj+U9wyku1rYVNcRxkwqgIwjllZlSSwT4QQAZJJVUGdW8AmlUm djLKgLJJgOoljLorXMgPSub1Polm+onkLqphKHoOML+2ZsbYkpdpgeldYvUR1Q/ajiAA LQ== Received: from aserv0022.oracle.com (aserv0022.oracle.com [141.146.126.234]) by aserp2130.oracle.com with ESMTP id 2r430enkg3-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 12 Mar 2019 14:47:14 +0000 Received: from userv0122.oracle.com (userv0122.oracle.com [156.151.31.75]) by aserv0022.oracle.com (8.14.4/8.14.4) with ESMTP id x2CEl9UG018237 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 12 Mar 2019 14:47:09 GMT Received: from abhmp0016.oracle.com (abhmp0016.oracle.com [141.146.116.22]) by userv0122.oracle.com (8.14.4/8.14.4) with ESMTP id x2CEl6we024808; Tue, 12 Mar 2019 14:47:08 GMT Received: from anon-dhcp-171.1015granger.net (/68.61.232.219) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Tue, 12 Mar 2019 07:47:06 -0700 Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 12.2 \(3445.102.3\)) Subject: Re: oops on a sunrpc tracepoint From: Chuck Lever In-Reply-To: Date: Tue, 12 Mar 2019 10:47:05 -0400 Cc: Linux NFS Mailing List Content-Transfer-Encoding: quoted-printable Message-Id: <959FF86E-32E0-45CA-A05A-0AEAF8F802B4@oracle.com> References: <69C7D007-BA4A-4711-8024-57B26F5BAE5E@oracle.com> To: Olga Kornievskaia , Trond Myklebust X-Mailer: Apple Mail (2.3445.102.3) X-Proofpoint-Virus-Version: vendor=nai engine=5900 definitions=9192 signatures=668685 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1903120104 Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org > On Mar 12, 2019, at 10:36 AM, Olga Kornievskaia = wrote: >=20 > On Tue, Mar 12, 2019 at 10:33 AM Chuck Lever = wrote: >>=20 >>=20 >>=20 >>> On Mar 12, 2019, at 10:29 AM, Olga Kornievskaia = wrote: >>>=20 >>> Hi Chuck, >>>=20 >>> Is this a known issue? >>=20 >> Nope. >=20 > Ok. > Looks like anything to do with callback channeling trying to use the > trace_event_raw_event_xprt_transmit.... Callback rqst's are missing either an rq_task or rq_task->tk_client (I can't remember at the moment). It would be nicer for the forward channel infrastructure if such rqst's were complete... Otherwise, trace_xprt_transmit and trace_xprt_enq_xmit need to check if task and task->tk_client are present before dereferencing them. > Here's another one: >=20 > localhost login: [ 467.462259] BUG: unable to handle kernel NULL > pointer dereference at 0000000000000004 > [ 467.464411] #PF error: [normal kernel read fault] > [ 467.465445] PGD 80000000728c1067 P4D 80000000728c1067 PUD 728c0067 = PMD 0 > [ 467.466980] Oops: 0000 [#1] SMP PTI > [ 467.467759] CPU: 0 PID: 3517 Comm: NFSv4 callback Not tainted = 5.0.0-rc7+ #1 > [ 467.469393] Hardware name: VMware, Inc. VMware Virtual > Platform/440BX Desktop Reference Platform, BIOS 6.00 07/02/2015 > [ 467.471840] RIP: 0010:trace_event_raw_event_xprt_transmit+0x7c/0xf0 = [sunrpc] > [ 467.473392] Code: f6 48 85 c0 74 4b 49 8b 94 24 98 00 00 00 48 89 > e7 0f b7 92 e0 00 00 00 89 50 08 49 8b 94 24 98 00 00 00 48 8b 92 a8 > 00 00 00 <8b> 52 04 89 50 0c 41 8b 94 24 a8 00 00 00 0f ca 89 50 10 41 > 8b 94 > [ 467.477605] RSP: 0018:ffffabe7434fbcd0 EFLAGS: 00010282 > [ 467.478793] RAX: ffff99720fc3bce0 RBX: 0000000000000003 RCX: = 0000000000000000 > [ 467.480409] RDX: 0000000000000000 RSI: 0000000000000000 RDI: = ffffabe7434fbcd0 > [ 467.482011] RBP: ffff99726f631948 R08: 0000000000000246 R09: = 0000000000000000 > [ 467.483591] R10: 0000000070000000 R11: 0000000000000000 R12: = ffff997277dfcc00 > [ 467.485226] R13: 0000000000000000 R14: 0000000000000000 R15: = ffff99722fecdca8 > [ 467.486830] FS: 0000000000000000(0000) GS:ffff99727bc00000(0000) > knlGS:0000000000000000 > [ 467.488596] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > [ 467.489931] CR2: 0000000000000004 CR3: 00000000270e6006 CR4: = 00000000001606f0 > [ 467.491559] Call Trace: > [ 467.492128] xprt_transmit+0x303/0x3f0 [sunrpc] > [ 467.493143] ? rpc_task_need_encode+0x40/0x40 [sunrpc] > [ 467.494328] call_bc_transmit+0x49/0x170 [sunrpc] > [ 467.495379] __rpc_execute+0x7e/0x3f0 [sunrpc] > [ 467.496451] rpc_run_bc_task+0x78/0xd0 [sunrpc] > [ 467.497467] bc_svc_process+0x281/0x340 [sunrpc] > [ 467.498507] nfs41_callback_svc+0x130/0x1c0 [nfsv4] > [ 467.499751] ? remove_wait_queue+0x60/0x60 > [ 467.500686] kthread+0xf5/0x130 > [ 467.501438] ? nfs_callback_authenticate+0x50/0x50 [nfsv4] > [ 467.502640] ? kthread_bind+0x10/0x10 > [ 467.503454] ret_from_fork+0x1f/0x30 >=20 >=20 >>=20 >>=20 >>> [ 5087.845704] BUG: unable to handle kernel NULL pointer dereference >>> at 0000000000000004 >>> [ 5087.848463] #PF error: [normal kernel read fault] >>> [ 5087.849852] PGD 0 P4D 0 >>> [ 5087.850618] Oops: 0000 [#1] SMP PTI >>> [ 5087.851577] CPU: 0 PID: 5964 Comm: NFSv4 callback Not tainted = 5.0.0-rc7+ #1 >>> [ 5087.853388] Hardware name: VMware, Inc. VMware Virtual >>> Platform/440BX Desktop Reference Platform, BIOS 6.00 07/02/2015 >>> [ 5087.860280] RIP: = 0010:trace_event_raw_event_xprt_enq_xmit+0x6f/0xf0 [sunrpc] >>> [ 5087.862149] Code: 00 00 00 48 89 ee 48 89 e7 e8 7d 69 65 ef 48 85 >>> c0 74 4a 41 0f b7 94 24 e0 00 00 00 48 89 e7 89 50 08 49 8b 94 24 a8 >>> 00 00 00 <8b> 52 04 89 50 0c 49 8b 94 24 c0 00 00 00 8b 92 a8 00 00 = 00 >>> 0f ca >>> [ 5087.866380] RSP: 0018:ffffc03c43297cf8 EFLAGS: 00010286 >>> [ 5087.867797] RAX: ffff9ef936d134a0 RBX: 0000000000000003 RCX: = 0000000000000000 >>> [ 5087.869456] RDX: 0000000000000000 RSI: 0000000000000000 RDI: = ffffc03c43297cf8 >>> [ 5087.871092] RBP: ffff9ef92f5b28f0 R08: 0000000000000246 R09: = 0000000000000000 >>> [ 5087.872767] R10: fffff11380b706c0 R11: 0000000000000000 R12: = ffff9ef9338bda00 >>> [ 5087.874659] R13: 0000000000000004 R14: ffff9ef932e813f0 R15: = ffff9ef932e81000 >>> [ 5087.876538] FS: 0000000000000000(0000) GS:ffff9ef93bc00000(0000) >>> knlGS:0000000000000000 >>> [ 5087.879404] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 >>> [ 5087.881202] CR2: 0000000000000004 CR3: 000000000f0f2002 CR4: = 00000000001606f0 >>> [ 5087.883331] Call Trace: >>> [ 5087.885770] xprt_request_enqueue_transmit+0x2b6/0x4a0 [sunrpc] >>> [ 5087.887341] ? rpc_task_need_encode+0x40/0x40 [sunrpc] >>> [ 5087.888710] call_bc_transmit+0xd5/0x170 [sunrpc] >>> [ 5087.889880] __rpc_execute+0x7e/0x3f0 [sunrpc] >>> [ 5087.891022] rpc_run_bc_task+0x78/0xd0 [sunrpc] >>> [ 5087.892097] bc_svc_process+0x281/0x340 [sunrpc] >>> [ 5087.895456] nfs41_callback_svc+0x130/0x1c0 [nfsv4] >>> [ 5087.897018] ? remove_wait_queue+0x60/0x60 >>> [ 5087.898038] kthread+0xf5/0x130 >>> [ 5087.899531] ? nfs_callback_authenticate+0x50/0x50 [nfsv4] >>> [ 5087.900912] ? kthread_bind+0x10/0x10 >>> [ 5087.902438] ret_from_fork+0x1f/0x30 >>=20 >> -- >> Chuck Lever >>=20 >>=20 >>=20 -- Chuck Lever