Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp2157023ybb; Thu, 2 Apr 2020 14:22:30 -0700 (PDT) X-Google-Smtp-Source: APiQypJzGzwO0f57zEWwuJFbR0dQynqztZu6ae+oy+VCOtyM625wxhUGpeHjDjzoIy4IDHC3aDkP X-Received: by 2002:a9d:7590:: with SMTP id s16mr3998783otk.250.1585862550567; Thu, 02 Apr 2020 14:22:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585862550; cv=none; d=google.com; s=arc-20160816; b=hjGifT2Jh7i8WuYxHNkogFOJQiGIZeZBQ4vao5wyyy0Q/7v2/tLbJWvJU6+qLzDaL+ jz+Xju6MsA0Fn8rbPNySbCTc39OZ76td7my+MHbvACPmVqIKggxUF9UIUXfF43WHJjht zIwKw8XqsoP7hT/QzFbm0YS7WTiCiTvzWHyvoLpjSowYG66vGJZAkKzLvXdZsWbCOI4b Q09VMqGvTHbBRruVxLkTGf3RpziiOm7HStG0jPf90Esxd+CZQtAfnSjWjjKnxrZNAtjp ndz4ARK54VVar8R1cq/R4AtuWapjai1XPhyR2KDj5BD2eEmnR9WliDbdnpEAcM4xu4AG tcvg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-disposition :content-transfer-encoding:in-reply-to:mime-version:references :message-id:subject:cc:to:from:date; bh=YttPBM4ZQtej75FkGvL2TcOxtp3QdhFB32yhcz5/Ojw=; b=UgYO/Ovv+xDn9lgAJKCkdxjqqV5lUO7JSG++GzSXubzaenEQtp3SjwknPUw7of0uRC yRKwbcGCUM8KlQHGzTrkYfF///Q2m/MQYPjBl9v49F5esRRuATWNDPwYoBpRxKmrHXwq eo9EeIumcEv3/19fuKcLvjuK+UhEhNMCs8jEXBsbJbAOYxJwfzyivmDKpf5Ek9lrVyRZ j58gBEO/D4o1n2AybhJB05pjxwre94/bmeXDjd0kNeIZ6fFR9H2Jc+WhCtMgm5psOc3Z ZM+u9WWoR9Dqx4bkv5rBzaqQp/NZPA5uJ+mWqllEDJUzyJGI5+wtJvBzGUH4KPtFDRXT RYfQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 79si2887819oty.232.2020.04.02.14.22.08; Thu, 02 Apr 2020 14:22:30 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732218AbgDBVSw convert rfc822-to-8bit (ORCPT + 99 others); Thu, 2 Apr 2020 17:18:52 -0400 Received: from us-smtp-delivery-1.mimecast.com ([207.211.31.120]:45324 "EHLO us-smtp-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1732970AbgDBVSv (ORCPT ); Thu, 2 Apr 2020 17:18:51 -0400 Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-323-IdjKcwg2NJ2v4REyH2YFjg-1; Thu, 02 Apr 2020 17:18:46 -0400 X-MC-Unique: IdjKcwg2NJ2v4REyH2YFjg-1 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.phx2.redhat.com [10.5.11.16]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 6A292801A0F; Thu, 2 Apr 2020 21:18:45 +0000 (UTC) Received: from aion.usersys.redhat.com (ovpn-113-45.rdu2.redhat.com [10.10.113.45]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 14A3D5C1D6; Thu, 2 Apr 2020 21:18:44 +0000 (UTC) Received: by aion.usersys.redhat.com (Postfix, from userid 1000) id 36EB01A02B4; Thu, 2 Apr 2020 17:18:44 -0400 (EDT) Date: Thu, 2 Apr 2020 17:18:44 -0400 From: Scott Mayhew To: Trond Myklebust Cc: "linux-nfs@vger.kernel.org" , "aglo@umich.edu" Subject: Re: oops in 5.6-rc Message-ID: <20200402211844.GA4386@aion.usersys.redhat.com> References: <2a088f5f4a25ce3ee548b0e32ae2c181ef90b98e.camel@hammerspace.com> MIME-Version: 1.0 In-Reply-To: <2a088f5f4a25ce3ee548b0e32ae2c181ef90b98e.camel@hammerspace.com> X-Scanned-By: MIMEDefang 2.79 on 10.5.11.16 X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: aion.usersys.redhat.com Content-Type: text/plain; charset=WINDOWS-1252 Content-Transfer-Encoding: 8BIT Content-Disposition: inline Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org On Thu, 02 Apr 2020, Trond Myklebust wrote: > On Thu, 2020-04-02 at 12:41 -0400, Olga Kornievskaia wrote: > > Is this known ops, reproducible 100% with garbage args to mount: > > mount -o vers=4.0,sec=shs :/ /mnt > > My kernel is commit: 0fecfcb9d4d2803079048df7946019463544414e > > I haven't bisets but seems to be a recent. My 5.5 kernel works. > > > > localhost login: [ 103.982099] BUG: unable to handle page fault for > > address: 0000000000020000 > > [ 103.987970] #PF: supervisor read access in kernel mode > > [ 103.990835] #PF: error_code(0x0000) - not-present page > > [ 103.993721] PGD 0 P4D 0 > > [ 103.995291] Oops: 0000 [#1] SMP PTI > > [ 103.997256] CPU: 0 PID: 3059 Comm: mount.nfs Not tainted 5.6.0- > > rc5+ #295 > > [ 104.000946] Hardware name: VMware, Inc. VMware Virtual > > Platform/440BX Desktop Reference Platform, BIOS 6.00 04/13/2018 > > [ 104.007360] RIP: 0010:strcmp+0xc/0x30 > > [ 104.009416] Code: 75 f7 48 83 c6 01 0f b6 4e ff 48 83 c2 01 84 c9 > > 88 4a ff 75 ed f3 c3 0f 1f 80 00 00 00 00 48 83 c7 01 0f b6 47 ff 48 > > 83 c6 01 <3a> 46 ff 75 07 84 c0 75 eb 31 c0 c3 19 c0 83 c8 01 0f 1f > > 00 > > c3 0f > > [ 104.019756] RSP: 0018:ffffc2a0c2207d50 EFLAGS: 00010202 > > [ 104.022659] RAX: 0000000000000073 RBX: ffffffffc0a4f1d0 RCX: > > 0000000000000000 > > [ 104.026742] RDX: 00000000ffffffff RSI: 0000000000020001 RDI: > > ffff9ffcabf71df9 > > [ 104.031161] RBP: ffff9ffcabf71df8 R08: 0000000000000000 R09: > > ffff9ffcabf71dfb > > [ 104.035410] R10: 000000000000003a R11: 657261687373666e R12: > > ffff9ffcabf71df8 > > [ 104.039755] R13: ffffc2a0c2207d80 R14: ffff9ffc22037834 R15: > > 0000000000000020 > > [ 104.044001] FS: 00007f8735790880(0000) GS:ffff9ffcb9e00000(0000) > > knlGS:0000000000000000 > > [ 104.048952] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > > [ 104.053260] CR: 0000000000020000 CR3: 0000000135210001 CR4: > > 00000000001606f0 > > [ 104.057233] Call Trace: > > [ 104.058646] __lookup_constant+0x2b/0x40 > > [ 104.060839] lookup_constant+0xd/0x20 > > [ 104.062928] nfs_fs_context_parse_param+0x1e9/0x920 [nfs] > > [ 104.065989] vfs_parse_fs_param+0xd3/0x190 > > [ 104.068303] vfs_parse_fs_string+0x75/0xb0 > > [ 104.070590] generic_parse_monolithic+0x8f/0xc0 > > [ 104.073155] nfs_fs_context_parse_monolithic+0x22b/0x670 [nfs] > > [ 104.076437] do_mount+0x626/0x970 > > [ 104.078655] __x64_sys_mount+0x86/0xd0 > > [ 104.081118] do_syscall_64+0x55/0x1f0 > > [ 104.083592] entry_SYSCALL_64_after_hwframe+0x44/0xa9 > > [ 104.086903] RIP: 0033:0x7f8734e57aaa > > [ 104.089072] Code: 48 8b 0d e1 33 2c 00 f7 d8 64 89 01 48 83 c8 ff > > c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 49 89 ca b8 a5 00 00 > > 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d ae 33 2c 00 f7 d8 64 > > 89 > > 01 48 > > [ 104.099612] RSP: 002b:00007ffe33f17ba8 EFLAGS: 00000246 ORIG_RAX: > > 00000000000000a5 > > [ 104.103917] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: > > 00007f8734e57aaa > > [ 104.107913] RDX: 000056270a7cb260 RSI: 000056270a7cb240 RDI: > > 000056270a7cb280 > > [ 104.111876] RBP: 00007ffe33f17d20 R08: 000056270a7cb7c0 R09: > > 000000000000003b > > [ 104.115864] R10: 0000000000000000 R11: 0000000000000246 R12: > > 00007ffe33f17d20 > > [ 104.119811] R13: 000056270a7cb520 R14: 0000000000000010 R15: > > 00007ffe33f17c30 > > [ 104.124019] Modules linked in: nfs rfcomm fuse bridge stp llc > > ip6t_rpfilter ipt_REJECT nf_reject_ipv4 ip6t_REJECT nf_reject_ipv6 > > xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ebtable_nat > > ebtable_broute ip6table_mangle ip6table_security ip6table_raw > > iptable_mangle iptable_security iptable_raw ebtable_filter ebtables > > ip6table_filter ip6_tables iptable_filter bnep snd_seq_midi > > snd_seq_midi_event crct10dif_pclmul crc32_pclmul ghash_clmulni_intel > > btusb btrtl btbcm btintel bluetooth snd_ens1371 uvcvideo > > snd_ac97_codec aesni_intel ac97_bus glue_helper snd_seq crypto_simd > > cryptd videobuf2_vmalloc videobuf2_memops snd_pcm videobuf2_v4l2 > > vmw_balloon videodev vmw_vmci snd_timer snd_rawmidi pcspkr > > snd_seq_device snd videobuf2_common rfkill ecdh_generic i2c_piix4 ecc > > soundcore nfsd nfs_acl lockd auth_rpcgss grace sunrpc ip_tables xfs > > libcrc32c vmwgfx sr_mod sd_mod cdrom t10_pi ata_generic pata_acpi > > drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm drm > > ahci libahci ata_piix > > [ 104.124052] libata e1000 mptspi scsi_transport_spi i2c_core > > mptscsih crc32c_intel mptbase serio_raw dm_mirror dm_region_hash > > dm_log dm_mod > > [ 104.190925] CR2: 0000000000020000 > > [ 104.192989] ---[ end trace 870843230151cfc0 ]--- > > That is the mount code rewrite that went into 5.6. Doh! Patch incoming. -Scott > > -- > Trond Myklebust > Linux NFS client maintainer, Hammerspace > trond.myklebust@hammerspace.com > >