[Bug 56241] running e4defrag provokes "kernel BUG at fs/buffer.c:1833!"

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



https://bugzilla.kernel.org/show_bug.cgi?id=56241


Dmitry Monakhov <dmonakhov@xxxxxxxxxx> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |dmonakhov@xxxxxxxxxx




--- Comment #1 from Dmitry Monakhov <dmonakhov@xxxxxxxxxx>  2013-04-08 16:07:39 ---
Ok I've able to reproduce this on 64k pages and 1k fsblock size
Probably this is my bug

10477.714752] EXT4-fs (dm-3): mounted filesystem with ordered data mode. Opts:
acl,user_xattr
[10480.693978] kernel BUG at fs/buffer.c:1833!
[10480.698233] fio[10780]: bugcheck! 0 [1]
[10480.702141] Modules linked in: ext4 jbd2 crc16 nls_iso8859_1 nls_cp437 vfat
fat dm_mod sg loop sr_mod cdrom hid_generic ehci_pci ext3 jbd mbcache
usb_storage usbhid hid hpsa cciss mptsas mptscsih mptbase scsi_transport_sas
tg3 libphy ptp scsi_mod ohci_hcd ehci_hcd usbcore pps_core usb_common
[10480.702223] 
[10480.702223] Pid: 10780, CPU 2, comm:                  fio
[10480.702223] psr : 00001010085a6018 ifs : 8000000000000ea1 ip  :
[<a00000010026f500>]    Not tainted (3.8.0)
[10480.702223] ip is at __block_write_begin+0xe0/0xa40
[10480.702223] unat: 0000000000000000 pfs : 0000000000000ea1 rsc :
0000000000000003
[10480.702223] rnat: 0009804c8a70033f bsps: 0000000000004000 pr  :
00000000a9a94955
[10480.702223] ldrs: 0000000000000000 ccv : 000000000d220691 fpsr:
0009804c8a70033f
[10480.702223] csd : 0000000000000000 ssd : 0000000000000000
[10480.702223] b0  : a00000010026f500 b6  : a00000010042f760 b7  :
a000000100554f30
[10480.702223] f6  : 1003e00000354df80f716 f7  : 1003e000000000000015e
[10480.702223] f8  : 1003e00000354df80f5b8 f9  : 1003e0000000000000001
[10480.702223] f10 : 1003e00000000052ba885 f11 : 1003e20c49ba5e353f7cf
[10480.702223] r1  : a000000100e50e20 r2  : 0000000000006760 r3  :
000000000000fffe
[10480.702223] r8  : 000000000000001f r9  : 00000000000005f5 r10 :
00000000000005f5
[10480.702223] r11 : 000000000000675e r12 : e00000022ecafd20 r13 :
e00000022eca0000
[10480.702223] r14 : 0000000000006760 r15 : 0000000000004000 r16 :
00000000000033af
[10480.702223] r17 : 0000000000000001 r18 : 000000000000675e r19 :
a000000100c5d138
[10480.702223] r20 : 000000000000675c r21 : 0000000000000000 r22 :
a000000100cf87a8
[10480.702223] r23 : a0000001009feb48 r24 : a000000100553a70 r25 :
0000000000000700
[10480.702223] r26 : a000000100cf88e0 r27 : a0000001009feb38 r28 :
0000000000000000
[10480.702223] r29 : a000000100cf87a0 r30 : 0000000000000c34 r31 :
a000000100cf878a
[10480.702223] 
[10480.702223] Call Trace:
[10480.702223]  [<a000000100014d10>] show_stack+0x50/0xa0
[10480.702223]                                 sp=e00000022ecaf8f0
bsp=e00000022eca14c0
[10480.702223]  [<a000000100015590>] show_regs+0x830/0x870
[10480.702223]                                 sp=e00000022ecafac0
bsp=e00000022eca1460
[10480.702223]  [<a00000010003a900>] die+0x1a0/0x2f0
[10480.702223]                                 sp=e00000022ecafad0
bsp=e00000022eca1420
[10480.702223]  [<a00000010003aaa0>] die_if_kernel+0x50/0x70
[10480.702223]                                 sp=e00000022ecafad0
bsp=e00000022eca13e8
[10480.702223]  [<a00000010082d7e0>] ia64_bad_break+0x240/0x420
[10480.702223]                                 sp=e00000022ecafad0
bsp=e00000022eca13c0
[10480.702223]  [<a00000010000bc40>] ia64_native_leave_kernel+0x0/0x270
[10480.702223]                                 sp=e00000022ecafb50
bsp=e00000022eca13c0
[10480.702223]  [<a00000010026f500>] __block_write_begin+0xe0/0xa40
[10480.702223]                                 sp=e00000022ecafd20
bsp=e00000022eca12b8
[10480.702223]  [<a000000203673df0>] ext4_move_extents+0x13b0/0x1c60 [ext4]
[10480.702223]                                 sp=e00000022ecafd40
bsp=e00000022eca10c8
[10480.702223]  [<a000000203623100>] ext4_ioctl+0x1200/0x1b30 [ext4]
[10480.702223]                                 sp=e00000022ecafd60
bsp=e00000022eca1058
[10480.702223]  [<a00000010022f690>] do_vfs_ioctl+0xf00/0x1010
[10480.702223]                                 sp=e00000022ecafdd0
bsp=e00000022eca1008
[10480.702223]  [<a00000010022f840>] sys_ioctl+0xa0/0x120
[10480.702223]                                 sp=e00000022ecafe10
bsp=e00000022eca0f80
[10480.702223]  [<a00000010000bac0>] ia64_ret_from_syscall+0x0/0x20
[10480.702223]                                 sp=e00000022ecafe30
bsp=e00000022eca0f80
[10480.702223]  [<a000000000040720>] ia64_ivt+0xffffffff00040720/0x400
[10480.702223]                                 sp=e00000022ecb0000
bsp=e00000022eca0f80
[10480.702223] Disabling lock debugging due to kernel taint

-- 
Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching the assignee of the bug.
--
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [Reiser Filesystem Development]     [Ceph FS]     [Kernel Newbies]     [Security]     [Netfilter]     [Bugtraq]     [Linux FS]     [Yosemite National Park]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Samba]     [Device Mapper]     [Linux Media]

  Powered by Linux