[Bug 12568] New: BUG: filefrag errors on non-journal ext4 filesystem

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



http://bugzilla.kernel.org/show_bug.cgi?id=12568

           Summary: BUG: filefrag errors on non-journal ext4 filesystem
           Product: File System
           Version: 2.5
     KernelVersion: 2.6.29-rc1
          Platform: All
        OS/Version: Linux
              Tree: Mainline
            Status: NEW
          Severity: normal
          Priority: P1
         Component: ext4
        AssignedTo: fs_ext4@xxxxxxxxxxxxxxxxxxxx
        ReportedBy: k-mio@xxxxxxxxxxxxx


Latest working kernel version: unknown
Earliest failing kernel version: 2.6.29-rc1
Distribution: CentOS 5.2 (x86_64)
Hardware Environment: MY20R/B-4(CPU: Intel(R) Core(TM) 2 Duo E4400, MEM: 2560MB
Software Environment: e2fsprogs-1.41.3

Problem Description:
2.6.29-rc1 + the most recent ext4 patch queue

When mounting ext4 filesystem without a journal, BUG_ON panic occurs by
executing filefrag command.
The following error messages show in the system logs:

Jan 27 15:56:53 bsdB08126 kernel: kernel BUG at fs/ext4/inode.c:2825!
Jan 27 15:56:53 bsdB08126 kernel: invalid opcode: 0000 [0000001] SMP
Jan 27 15:56:53 bsdB08126 kernel: last sysfs file: /sys/class/drm/card0/dev
Jan 27 15:56:53 bsdB08126 kernel: CPU 0
Jan 27 15:56:53 bsdB08126 kernel: Modules linked in: i915 drm i2c_algo_bit
autofs4 hidp rfcomm l2cap bluetooth sunrpc iptable_filter ip_tables ip6t_REJECT
xt_tcpudp ip6table_filter ip6_tables x_tables dm_mirror dm_region_hash dm_log
dm_multipath dm_mod sbs sbshc battery acpi_memhotplug ac ipv6 lp
snd_hda_codec_realtek snd_hda_intel sg snd_hda_codec snd_seq_dummy snd_seq_oss
snd_seq_midi_event snd_seq snd_seq_device snd_pcm_oss snd_mixer_oss snd_pcm
serio_raw sr_mod rtc_cmos cdrom parport_pc snd_timer rtc_core parport rtc_lib
snd button i2c_i801 e1000e soundcore pcspkr snd_page_alloc i2c_core ata_piix
libata sd_mod scsi_mod uhci_hcd ohci_hcd ehci_hcd [last unloaded: microcode]
Jan 27 15:56:53 bsdB08126 kernel: Pid: 3902, comm: filefrag Not tainted
2.6.29-rc1 0000012
Jan 27 15:56:53 bsdB08126 kernel: RIP: 0010:[<ffffffff803043a9>]
[<ffffffff803043a9>] ext4_bmap+0x5a/0xc8
Jan 27 15:56:53 bsdB08126 kernel: RSP: 0018:ffff880064857ea8 EFLAGS: 00010202
Jan 27 15:56:53 bsdB08126 kernel: RAX: 0000000000000000 RBX: ffff88006380d490
RCX: 0000000000000015
Jan 27 15:56:53 bsdB08126 kernel: RDX: 0000000000000000 RSI: 0000000000000000
RDI: ffff88006380d5a8
Jan 27 15:56:53 bsdB08126 kernel: RBP: ffff88006380d5a0 R08: ffff880064857e68
R09: 0000000000000000
Jan 27 15:56:53 bsdB08126 kernel: R10: 74616d726f662073 R11: ffff8800905d6380
R12: 00000000000063ff
Jan 27 15:56:53 bsdB08126 kernel: R13: 00000000000063ff R14: 0000000000000003
R15: 0000000000000000
Jan 27 15:56:53 bsdB08126 kernel: FS: 00007f4b8eb586e0(0000)
GS:ffffffff8086c080(0000) knlGS:0000000000000000
Jan 27 15:56:53 bsdB08126 kernel: CS: 0010 DS: 0000 ES: 0000 CR0:
000000008005003b
Jan 27 15:56:53 bsdB08126 kernel: CR2: 00000031b8e62b80 CR3: 0000000062015000
CR4: 00000000000006e0
Jan 27 15:56:53 bsdB08126 kernel: DR0: 0000000000000000 DR1: 0000000000000000
DR2: 0000000000000000
Jan 27 15:56:54 bsdB08126 kernel: DR3: 0000000000000000 DR6: 00000000ffff0ff0
DR7: 0000000000000400
Jan 27 15:56:54 bsdB08126 kernel: Process filefrag (pid: 3902, threadinfo
ffff880064856000, task ffff88007386e970)
Jan 27 15:56:54 bsdB08126 kernel: Stack:
Jan 27 15:56:54 bsdB08126 kernel: 0000000000000001 ffff88006380d5a0
00007fff96b70fb4 00000000000063ff
Jan 27 15:56:55 bsdB08126 kernel: 0000000000000000 ffffffff802aa43f
0000000000000000 0000000000000000
Jan 27 15:56:55 bsdB08126 kernel: 0000000000000000 0000000000000000
0000000000000000 ffffffff804e9068
Jan 27 15:56:56 bsdB08126 kernel: Call Trace:
Jan 27 15:56:56 bsdB08126 kernel: [<ffffffff802aa43f>] ?
do_vfs_ioctl+0x2bf/0x4a3
Jan 27 15:56:56 bsdB08126 kernel: [<ffffffff804e9068>] ?
do_page_fault+0x3a8/0x72f
Jan 27 15:56:57 bsdB08126 kernel: [<ffffffff802aa674>] ? sys_ioctl+0x51/0x70
Jan 27 15:56:58 bsdB08126 kernel: [<ffffffff8020bedb>] ?
system_call_fastpath+0x16/0x1b
Jan 27 15:56:58 bsdB08126 kernel: Code: 08 74 08 48 89 ef e8 28 fe f6 ff 48 8b
83 f8 00 00 00 48 8b 80 90 02 00 00 48 8b 80 90 41 00 00 48 85 c0 75 0f f6 43
a0 01 74 04 <0f> 0b eb fe 48 85 c0 74 42 8b 43 a0 a8 01 74 3b 83 e0 fe 89 43
Jan 27 15:56:58 bsdB08126 kernel: RIP [<ffffffff803043a9>] ext4_bmap+0x5a/0xc8
Jan 27 15:56:58 bsdB08126 kernel: RSP <ffff880064857ea8>
Jan 27 15:56:58 bsdB08126 kernel: ---[ end trace 60cf7e0d66d2b1ce ]---

Whenever __ext4_journalled_writepage() or ext4_journalled_write_end() is
called, EXT4_STATE_JDATA is set in i_state in spite of non-journal ext4.
That's weird.

Steps to reproduce:
1. mke2fs -O extents /dev/sdaX
2. mount -t ext4 /dev/sdaX /mnt/mpX
3. dd if=/dev/urandom of=/mnt/mpX/file bs=1K count=102400
4. filefrag /mnt/mpX/file


-- 
Configure bugmail: http://bugzilla.kernel.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
--
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Reiser Filesystem Development]     [Ceph FS]     [Kernel Newbies]     [Security]     [Netfilter]     [Bugtraq]     [Linux FS]     [Yosemite National Park]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Samba]     [Device Mapper]     [Linux Media]

  Powered by Linux