https://bugzilla.kernel.org/show_bug.cgi?id=56241 Summary: running e4defrag provokes "kernel BUG at fs/buffer.c:1833!" Product: File System Version: 2.5 Kernel Version: 3.8.5 Platform: All OS/Version: Linux Tree: Mainline Status: NEW Severity: normal Priority: P1 Component: ext4 AssignedTo: fs_ext4@xxxxxxxxxxxxxxxxxxxx ReportedBy: j.fikar@xxxxxxxxx Regression: Yes I recently discovered, that "e4defrag /boot" produces an error and blocks the /boot even for umount. It was not the case some kernels before, not completely sure when, maybe around 3.5-3.6? [81924.524369] ------------[ cut here ]------------ [81924.524556] kernel BUG at fs/buffer.c:1833! [81924.524700] invalid opcode: 0000 [#1] PREEMPT SMP [81924.524883] Modules linked in: zram(C) iptable_filter ip_tables x_tables arc4 uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_core videodev microcode snd_hda_codec_idt radeon ath9k ath9k_common ath9k_hw ath mac80211 r8169 cfg80211 drm_kms_helper snd_hda_intel snd_hda_codec k10temp snd_hwdep ttm video ohci_hcd [81924.526007] CPU 1 [81924.526090] Pid: 10555, comm: e4defrag Tainted: G C 3.8.5 #2 Hewlett-Packard HP Pavilion dv7 Notebook PC/363A [81924.526435] RIP: 0010:[<ffffffff81126605>] [<ffffffff81126605>] __block_write_begin+0x455/0x460 [81924.526740] RSP: 0018:ffff880179ccdae8 EFLAGS: 00010206 [81924.526915] RAX: 8000000000000029 RBX: 0000000000000c00 RCX: ffffffff81186ed0 [81924.527143] RDX: 0000000000001c00 RSI: 0000000000000c00 RDI: ffffea0006294800 [81924.527370] RBP: ffff880179ccdc80 R08: 0000000000014780 R09: ffff88021fd14780 [81924.527597] R10: ffffea0005bbc4c0 R11: ffffffff811ac642 R12: ffff880179ccdc80 [81924.527824] R13: 0000000000000000 R14: 0000000000000400 R15: ffffea0006294800 [81924.528054] FS: 00007fe4a7b0e740(0000) GS:ffff88021fd00000(0000) knlGS:0000000000000000 [81924.528310] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b [81924.528495] CR2: 0000003de2d61728 CR3: 000000014c137000 CR4: 00000000000007e0 [81924.528722] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [81924.528949] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 [81924.529178] Process e4defrag (pid: 10555, threadinfo ffff880179ccc000, task ffff8802057b5820) [81924.529444] Stack: [81924.529514] ffff880179ccdb60 ffff880117361190 ffff88016ef130c0 ffff8801236d94f0 [81924.529781] ffff880117361190 00000c0000001c00 ffff880117361190 ffffffff81186ed0 [81924.530048] 0000000000000400 ffffffff815b4f9b ffff8801236d9458 0000000181123260 [81924.530314] Call Trace: [81924.530414] [<ffffffff81186ed0>] ? ext4_get_block_write+0x10/0x10 [81924.530621] [<ffffffff815b4f9b>] ? out_of_line_wait_on_bit+0x7b/0x90 [81924.530837] [<ffffffff811acb74>] ? move_extent_per_page.isra.17+0x424/0x8e0 [81924.531069] [<ffffffff8119d048>] ? ext4_ext_find_extent+0x2f8/0x370 [81924.531279] [<ffffffff811ad6bd>] ? ext4_move_extents+0x68d/0xa00 [81924.531483] [<ffffffff8118bab5>] ? ext4_ioctl+0xa55/0xaf0 [81924.531667] [<ffffffff810c5526>] ? tlb_finish_mmu+0x16/0x50 [81924.531857] [<ffffffff810cc2b1>] ? unmap_region+0xd1/0x130 [81924.532046] [<ffffffff811099bd>] ? do_vfs_ioctl+0x43d/0x510 [81924.532235] [<ffffffff810ce2f9>] ? do_munmap+0x329/0x420 [81924.532416] [<ffffffff81109adc>] ? sys_ioctl+0x4c/0xa0 [81924.532594] [<ffffffff815b7f56>] ? system_call_fastpath+0x1a/0x1f [81924.532790] Code: 24 10 e9 42 fd ff ff 8b 54 24 28 8b 74 24 2c 4c 89 ff 89 44 24 18 e8 8b f2 ff ff 8b 44 24 18 e9 bb fe ff ff 0f 0b e8 28 88 48 00 <0f> 0b 0f 0b 0f 1f 80 00 00 00 00 48 83 ec 28 4c 89 6c 24 20 48 [81924.533932] RIP [<ffffffff81126605>] __block_write_begin+0x455/0x460 [81924.534150] RSP <ffff880179ccdae8> [81924.590443] ---[ end trace c154515de3642cfd ]--- -- Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching the assignee of the bug. -- To unsubscribe from this list: send the line "unsubscribe linux-ext4" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html