https://bugzilla.kernel.org/show_bug.cgi?id=42052 Summary: kernel BUG at build/buildd/linux-2.6.38/kernel/timer.c:668 Product: File System Version: 2.5 Kernel Version: 2.6.38.8 Platform: All OS/Version: Linux Tree: Mainline Status: NEW Severity: normal Priority: P1 Component: ext4 AssignedTo: fs_ext4@xxxxxxxxxxxxxxxxxxxx ReportedBy: sanjeevmk4890@xxxxxxxxx Regression: No +++ This bug was initially created as a clone of Bug #12370 +++ Latest working kernel version: none Earliest failing kernel version: 2.6.28 Distribution: mint Hardware Environment: Processor - 6x AMD Phenom II X6 1055T RAM - 1GB Software Environment: Linux Mint 11 (Katya) Kernel - 2.6.38-8-generic(i686) Problem Description: On mounting the attached ext4 image the kernel prints a backtrace. The backtrace ends with: *ERROR* invalid framebuffer id. The backtrace pasted here: [ 447.967920] ------------[ cut here ]------------ [ 447.971889] kernel BUG at /build/buildd/linux-2.6.38/kernel/timer.c:668! [ 447.971889] invalid opcode: 0000 [#3] SMP [ 447.971889] last sysfs file: /sys/devices/virtual/block/loop2/removable [ 447.971889] Modules linked in: binfmt_misc pci_stub vboxpci vboxnetadp vboxnetflt vboxdrv dm_crypt sp5100_tco i2c_piix4 snd_hda_codec_hdmi asus_atk0110 snd_hda_codec_via snd_hda_intel k10temp snd_hda_codec ppdev snd_hwdep snd_pcm snd_seq_midi snd_rawmidi snd_seq_midi_event shpchp snd_seq snd_timer snd_seq_device snd soundcore snd_page_alloc parport_pc lp parport dm_raid45 xor btrfs zlib_deflate libcrc32c radeon ttm drm_kms_helper firewire_ohci drm firewire_core usbhid ahci hid libahci crc_itu_t r8169 i2c_algo_bit pata_atiixp [ 447.971889] [ 447.971889] Pid: 2414, comm: mount Tainted: G D 2.6.38-8-generic #42-Ubuntu System manufacturer System Product Name/M4A785TD-V EVO [ 447.971889] EIP: 0060:[<c105e392>] EFLAGS: 00010246 CPU: 4 [ 447.971889] EIP is at mod_timer+0x232/0x250 [ 447.971889] EAX: 00000000 EBX: 014a277f ECX: 00000000 EDX: 014a277f [ 447.971889] ESI: ef5cae20 EDI: 000001ac EBP: ee91dc80 ESP: ee91dc64 [ 447.971889] DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068 [ 448.072035] Process mount (pid: 2414, ti=ee91c000 task=ee92a5e0 task.ti=ee91c000) [ 448.072035] Stack: [ 448.072035] ee91dc74 c10b6882 014a277f 00000000 f45b1400 ef656b7c 000001ac ee91dc98 [ 448.072035] c11c144a c152dda2 ef656a00 00000000 00000000 ee91dca4 c11c5aa6 ef2d5f68 [ 448.072035] ee91dcd8 c11c7816 c15082d1 00000002 f6038310 f45b1400 00000000 ee92a5e0 [ 448.072035] Call Trace: [ 448.072035] [<c10b6882>] ? __delayacct_blkio_end+0x32/0x60 [ 448.072035] [<c11c144a>] __save_error_info.clone.59+0x7a/0xf0 [ 448.072035] [<c11c5aa6>] save_error_info+0x16/0x30 [ 448.072035] [<c11c7816>] ext4_error_inode+0x46/0xe0 [ 448.072035] [<c15082d1>] ? out_of_line_wait_on_bit+0x61/0x70 [ 448.072035] [<c106d3c0>] ? wake_bit_function+0x0/0x60 [ 448.072035] [<c11ce0a5>] __ext4_ext_check+0x1b5/0x210 [ 448.072035] [<c11cfdb0>] ext4_ext_check_inode+0x30/0x40 [ 448.072035] [<c11af86f>] ext4_iget+0x60f/0x730 [ 448.072035] [<c10fae58>] ? pcpu_next_pop+0x38/0x50 [ 448.072035] [<c10fba32>] ? pcpu_populate_chunk+0x92/0x360 [ 448.072035] [<c10fb399>] ? pcpu_alloc_area+0x109/0x250 [ 448.072035] [<c11c6c20>] ext4_get_journal+0x30/0x130 [ 448.072035] [<c10fc1ac>] ? pcpu_alloc+0x26c/0x360 [ 448.072035] [<c11c8292>] ext4_load_journal+0xa2/0x4c0 [ 448.072035] [<c11ca967>] ext4_fill_super+0x1347/0x1a70 [ 448.072035] [<c10fc1ac>] ? pcpu_alloc+0x26c/0x360 [ 448.072035] [<c1129a21>] mount_bdev+0x191/0x1d0 [ 448.072035] [<c11c9620>] ? ext4_fill_super+0x0/0x1a70 [ 448.072035] [<c11bfd0f>] ext4_mount+0x1f/0x30 [ 448.072035] [<c11c9620>] ? ext4_fill_super+0x0/0x1a70 [ 448.072035] [<c1129315>] vfs_kern_mount+0x75/0x250 [ 448.072035] [<c113fa63>] ? get_fs_type+0x33/0xb0 [ 448.072035] [<c11bfcf0>] ? ext4_mount+0x0/0x30 [ 448.072035] [<c112954e>] do_kern_mount+0x3e/0xe0 [ 448.072035] [<c1142993>] do_mount+0x1b3/0x1e0 [ 448.072035] [<c1142d2b>] sys_mount+0x6b/0xa0 [ 448.072035] [<c1509bf4>] syscall_call+0x7/0xb [ 448.072035] Code: ff 8b 5d ec 29 c3 c1 eb 08 e9 18 fe ff ff 8d 76 00 c7 45 e4 01 00 00 00 8b 45 e4 83 c4 10 5b 5e 5f 5d c3 8b 5d e8 e9 c3 fe ff ff <0f> 0b 8b 55 04 89 f0 e8 02 f9 ff ff e9 0a fe ff ff 8d b6 00 00 [ 448.072035] EIP: [<c105e392>] mod_timer+0x232/0x250 SS:ESP 0068:ee91dc64 [ 448.140440] ---[ end trace b3d414c7835387c1 ]--- [ 460.292249] [drm:drm_mode_getfb] *ERROR* invalid framebuffer id Was working on bug #12370. Followed the steps to reproduce the bug (given in #12370) on 2.6.38 (what i'm using) and the backtrace was printed, mount failed. Steps to reproduce: Mount the image provided with the following command: mount -t ext4 -o loop ext4.212.img /media/tmp -- Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching the assignee of the bug. -- To unsubscribe from this list: send the line "unsubscribe linux-ext4" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html