Open mpe opened 2 years ago
[ 740.492561] run fstests generic/051 at 2021-11-01 12:40:42
[ 742.806962] XFS (sda3): Mounting V5 Filesystem
[ 742.925825] XFS (sda3): Ending clean mount
[ 742.955028] XFS (sda3): User initiated shutdown received.
[ 742.955201] XFS (sda3): Metadata I/O Error (0x4) detected at xfs_fs_goingdown+0x68/0x160 [xfs] (fs/xfs/xfs_fsops.c:497). Shutting down filesystem.
[ 742.955370] XFS (sda3): Please unmount the filesystem and rectify the problem(s)
[ 742.973098] XFS (sda3): Unmounting Filesystem
[ 744.352066] XFS (sda3): Mounting V5 Filesystem
[ 744.425758] XFS (sda3): Ending clean mount
[ 775.192100] XFS (sda3): Unmounting Filesystem
[ 776.116445] XFS (sda3): Mounting V5 Filesystem
[ 777.331381] XFS (sda3): Ending clean mount
[ 800.111560] restraintd[1327]: *** Current Time: Mon Nov 01 12:41:42 2021
Localwatchdog at: Wed Nov 03 12:31:42 2021
[ 813.403287] XFS (sda3): User initiated shutdown received.
[ 813.403380] XFS (sda3): Log I/O Error (0x6) detected at xfs_fs_goingdown+0xf8/0x160 [xfs] (fs/xfs/xfs_fsops.c:500). Shutting down filesystem.
[ 813.403514] XFS (sda3): Please unmount the filesystem and rectify the problem(s)
[ 813.418455] sda3: writeback error on inode 60042, offset 63640576, sector 2306320
[ 813.418484] sda3: writeback error on inode 81161, offset 13091840, sector 2306496
[ 813.428831] sda3: writeback error on inode 16878782, offset 30536704, sector 18080754
[ 813.429026] Kernel attempted to read user page (108) - exploit attempt? (uid: 0)
[ 813.429068] BUG: Kernel NULL pointer dereference on read at 0x00000108
[ 813.429085] Faulting instruction address: 0xc0000000000372e4
[ 813.429102] Oops: Kernel access of bad area, sig: 11 [#1]
[ 813.429117] LE PAGE_SIZE=64K MMU=Hash SMP NR_CPUS=2048 NUMA pSeries
[ 813.429133] Modules linked in: bonding rfkill tls sunrpc pseries_rng drm fuse drm_panel_orientation_quirks xfs libcrc32c sd_mod t10_pi sg ibmvscsi ibmveth scsi_transport_srp vmx_crypto
[ 813.429202] CPU: 3 PID: 94001 Comm: fsstress Kdump: loaded Tainted: G W 5.15.0 #1
[ 813.429216] NIP: c0000000000372e4 LR: c0000000006d9e48 CTR: c0000000000372d0
[ 813.429227] REGS: c000000064ba7440 TRAP: 0300 Tainted: G W (5.15.0)
[ 813.429238] MSR: 800000010280b033 <SF,VEC,VSX,EE,FP,ME,IR,DR,RI,LE,TM[E] CR: 88004280 XER: 00000000
[ 813.429272] CFAR: c00000000000cb1c DAR: 0000000000000108 DSISR: 40000000 IRQMASK: 0
[ 813.429272] GPR00: c0000000006d9e48 c000000064ba76e0 c000000002cdc400 0000000000000000
[ 813.429272] GPR04: c000000002c3ac50 0000000000000000 0000000000000000 c00000004d174000
[ 813.429272] GPR08: c0000000013d21d8 0000000000000000 0000000000000012 0000000000000000
[ 813.429272] GPR12: c0000000000372d0 c000000007fccb00 0000000000000000 0000000000000005
[ 813.429272] GPR16: 0000000000000000 c0000000d19fa900 c000000001365bb0 c000000003fc26b4
[ 813.429272] GPR20: c0000000d19fb338 0000000000040100 0000000000000001 0000000000000001
[ 813.429272] GPR24: c00000000135d2e0 00000000ffffffff c000000064ba7968 c000000001091ef8
[ 813.429272] GPR28: 0000000000000108 0000000000000004 c0000000cc456400 c000000002c3ac50
[ 813.429396] NIP [c0000000000372e4] tm_cgpr_active+0x14/0x40
[ 813.429420] LR [c0000000006d9e48] fill_thread_core_info+0x158/0x250
[ 813.429435] Call Trace:
[ 813.429443] [c000000064ba76e0] [c0000000006d9eb8] fill_thread_core_info+0x1c8/0x250 (unreliable)
[ 813.429465] [c000000064ba7760] [c0000000006dac70] fill_note_info.constprop.0+0x240/0x420
[ 813.429480] [c000000064ba77d0] [c0000000006daf3c] elf_core_dump+0xec/0x5e0
[ 813.429494] [c000000064ba79e0] [c0000000006e1edc] do_coredump+0x32c/0xc10
[ 813.429507] [c000000064ba7bb0] [c000000000187adc] get_signal+0x52c/0x910
[ 813.429519] [c000000064ba7ca0] [c000000000021b9c] do_signal+0x7c/0x330
[ 813.429533] [c000000064ba7d40] [c000000000022e00] do_notify_resume+0xb0/0x140
[ 813.429548] [c000000064ba7d70] [c000000000031330] interrupt_exit_user_prepare_main+0x220/0x280
[ 813.429562] [c000000064ba7de0] [c000000000031804] syscall_exit_prepare+0xe4/0x1e0
[ 813.429575] [c000000064ba7e10] [c00000000000c174] system_call_vectored_common+0xf4/0x278
[ 813.429589] --- interrupt: 3000 at 0x7fffa9c7667c
[ 813.429600] NIP: 00007fffa9c7667c LR: 0000000000000000 CTR: 0000000000000000
[ 813.429610] REGS: c000000064ba7e80 TRAP: 3000 Tainted: G W (5.15.0)
[ 813.429621] MSR: 800000000000d033 <SF,EE,PR,ME,IR,DR,RI,LE> CR: 44004402 XER: 00000000
[ 813.429647] IRQMASK: 0
[ 813.429647] GPR00: 00000000000000fa 00007fffefa13e10 00007fffa9e17100 0000000000000000
[ 813.429647] GPR04: 0000000000016f31 0000000000000006 0000000000000008 00000000ffffffff
[ 813.429647] GPR08: 0000000000000000 0000000000000000 0000000000000000 0000000000000000
[ 813.429647] GPR12: 0000000000000000 00007fffa9f2b040 0000000000000000 0000000000000000
[ 813.429647] GPR16: 0000000000000000 0000000000000000 0000000000000000 0000000010030de4
[ 813.429647] GPR20: 00000000100158c8 0000000000000000 0000000000000000 0000000010003d60
[ 813.429647] GPR24: 0000000000000001 0000000010012c60 00000000100137c8 0000000000000006
[ 813.429647] GPR28: 0000000000000005 ffffffffffffffff 00007fffa9f23840 0000000000016f31
[ 813.429776] NIP [00007fffa9c7667c] 0x7fffa9c7667c
[ 813.429789] LR [0000000000000000] 0x0
[ 813.429799] --- interrupt: 3000
[ 813.429808] Instruction dump:
[ 813.429816] 4bfe8345 60000000 e8010040 38210030 ebe1fff8 7c0803a6 4e800020 7c0802a6
[ 813.429839] 60000000 60000000 e92329c0 38600000 <e9290108> 7929e844 79291f43 4d820020
[ 813.429863] ---[ end trace 8a41ad95f224ad91 ]---
ld r9,10688(r3)
li r3,0
ld r9,264(r9) r9 = 0
Reporter on BZ says the bug has gone away in mainline.
Reported on kernel.org bugzilla 214913.