-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 This is the full output from kdb when trying to create a snapshot on an XFS volume for me. What I was going to do next was follow Andreas Dilger's sugestion and try again. Entering kdb (current=0xc7228000, pid 1435) Oops: Oops due to oops @ 0xc015c446 eax = 0x748b5356 ebx = 0xc01a1550 ecx = 0xd7894040 edx = 0x00000000 esi = 0xc7228000 edi = 0xd7894040 esp = 0xc7229eac eip = 0xc015c446 ebp = 0xd7ed4800 xss = 0x00000018 xcs = 0x00000010 eflags = 0x00010286 xds = 0x00000018 xes = 0x00000018 origeax = 0xffffffff ®s = 0xc7229e78 kdb> bt EBP EIP Function(args) 0xd7ed4800 0xc015c446 journal_start+0x36 (0xd7ed4800, 0x1, 0x40018000, 0xc7229f5c, 0x2) kernel .text 0xc0100000 0xc015c410 0xc015c4f0 0xc01571a8 ext3_dirty_inode+0x58 (0xd7894040) kernel .text 0xc0100000 0xc0157150 0xc0157250 0xc0141b1e __mark_inode_dirty+0x2e (0xd7894040, 0x1) kernel .text 0xc0100000 0xc0141af0 0xc0141b70 0xc0143001 update_atime+0x51 (0xd7894040, 0x6d6, 0x1, 0x0, 0x6d6) kernel .text 0xc0100000 0xc0142fb0 0xc0143010 0xc01254ac do_generic_file_read+0x40c (0xd5fc7740, 0xd5fc7760, 0xc7229f5c, 0xc0125690, 0x6d6) kernel .text 0xc0100000 0xc01250a0 0xc01254c0 0xc012576a generic_file_read+0x7a (0xd5fc7740, 0x40018000, 0x1000, 0xd5fc7760, 0x0) kernel .text 0xc0100000 0xc01256f0 0xc0125810 0xc0130cf5 sys_read+0x95 (0x4, 0x40018000, 0x1000, 0x8086ab0, 0x40018000) kernel .text 0xc0100000 0xc0130c60 0xc0130d30 0xc0106d1b system_call+0x33 kernel .text 0xc0100000 0xc0106ce8 0xc0106d20 kdb> btp 1435 EBP EIP Function(args) 0xc01a1550 0xc015c446 journal_start+0x36 (0xd7ed4800, 0x1, 0x40018000, 0xc7229f5c, 0x2) kernel .text 0xc0100000 0xc015c410 0xc015c4f0 0xc01571a8 ext3_dirty_inode+0x58 (0xd7894040) kernel .text 0xc0100000 0xc0157150 0xc0157250 0xc0141b1e __mark_inode_dirty+0x2e (0xd7894040, 0x1) kernel .text 0xc0100000 0xc0141af0 0xc0141b70 0xc0143001 update_atime+0x51 (0xd7894040, 0x6d6, 0x1, 0x0, 0x6d6) kernel .text 0xc0100000 0xc0142fb0 0xc0143010 0xc01254ac do_generic_file_read+0x40c (0xd5fc7740, 0xd5fc7760, 0xc7229f5c, 0xc0125690, 0x6d6) kernel .text 0xc0100000 0xc01250a0 0xc01254c0 0xc012576a generic_file_read+0x7a (0xd5fc7740, 0x40018000, 0x1000, 0xd5fc7760, 0x0) kernel .text 0xc0100000 0xc01256f0 0xc0125810 0xc0130cf5 sys_read+0x95 (0x4, 0x40018000, 0x1000, 0x8086ab0, 0x40018000) kernel .text 0xc0100000 0xc0130c60 0xc0130d30 0xc0106d1b system_call+0x33 kernel .text 0xc0100000 0xc0106ce8 0xc0106d20 kdb> ps Task Addr Pid Parent [*] cpu State Thread Command 0xd7fe2000 00000001 00000000 1 000 stop 0xd7fe2270 init 0xc163c000 00000002 00000001 1 000 stop 0xc163c270 keventd 0xc1638000 00000003 00000000 1 000 stop 0xc1638270 ksoftirqd_CPU0 0xc1636000 00000004 00000000 1 000 stop 0xc1636270 kswapd 0xc1634000 00000005 00000000 1 000 stop 0xc1634270 bdflush 0xc1632000 00000006 00000000 1 000 stop 0xc1632270 kupdated 0xd7ec4000 00000007 00000001 1 000 stop 0xd7ec4270 mdrecoveryd 0xd7eae000 00000008 00000001 1 000 stop 0xd7eae270 raid5d 0xd7b32000 00000009 00000001 1 000 stop 0xd7b32270 kjournald 0xd72a6000 00000153 00000001 1 000 stop 0xd72a6270 kjournald 0xd729c000 00000154 00000001 1 000 stop 0xd729c270 kjournald 0xd7292000 00000155 00000001 1 000 stop 0xd7292270 kjournald 0xd7174000 00000157 00000001 1 000 stop 0xd7174270 kreiserfsd 0xd70ac000 00000158 00000001 1 000 stop 0xd70ac270 kjournald 0xd6f68000 00000160 00000001 1 000 stop 0xd6f68270 pagebuf_daemon 0xd6250000 00000525 00000001 1 000 stop 0xd6250270 dhcpcd 0xd6c56000 00000661 00000001 1 000 stop 0xd6c56270 syslogd 0xd623a000 00000666 00000001 1 000 stop 0xd623a270 klogd 0xd619e000 00000686 00000001 1 000 stop 0xd619e270 portmap 0xd60ac000 00000714 00000001 1 000 stop 0xd60ac270 rpc.statd 0xd62d6000 00000827 00000001 1 000 stop 0xd62d6270 crond more> 0xd5f3a000 00000863 00000001 1 000 stop 0xd5f3a270 atd 0xd6a80000 00000870 00000001 1 000 stop 0xd6a80270 login 0xd5f5a000 00000871 00000001 1 000 stop 0xd5f5a270 login 0xd5f56000 00000872 00000001 1 000 stop 0xd5f56270 mingetty 0xd6c9c000 00000873 00000001 1 000 stop 0xd6c9c270 mingetty 0xd5f6a000 00000874 00000001 1 000 stop 0xd5f6a270 mingetty 0xd6c9a000 00000875 00000001 1 000 stop 0xd6c9a270 mingetty 0xd6338000 00000876 00000001 1 000 stop 0xd6338270 login 0xd739c000 00000879 00000876 1 000 stop 0xd739c270 bash 0xd5d86000 00000925 00000870 1 000 stop 0xd5d86270 bash 0xd580c000 00000977 00000871 1 000 stop 0xd580c270 bash 0xc7228000 00001435 00000925 1 000 run 0xc7228270*lvcreate kdb> id %eip 0xc015c446 journal_start+0x36: cmp %ebp,(%eax) 0xc015c448 journal_start+0x38: je 0xc015c46d journal_start+0x5d: 0xc015c44a journal_start+0x3a: push $0xc02309e0 0xc015c44f journal_start+0x3f: push $0xe1 0xc015c454 journal_start+0x44: push $0xc022becf 0xc015c459 journal_start+0x49: push $0xc022b6a0 0xc015c45e journal_start+0x4e: push $0xc022e6a0 0xc015c463 journal_start+0x53: call 0xc0115380 printk: 0xc015c468 journal_start+0x58: ud2a 0xc015c46a journal_start+0x5a: add $0x14,%esp 0xc015c46d journal_start+0x5d: incl 0x8(%ebx) 0xc015c470 journal_start+0x60: jmp 0xc015c4e0 journal_start+0xd0: 0xc015c472 journal_start+0x62: push $0x1 0xc015c474 journal_start+0x64: push $0xf0 0xc015c479 journal_start+0x69: push $0x14 0xc015c47b journal_start+0x6b: push $0xc022b6a0 kdb> go Oops: 0000 CPU: 0 EIP: 0010:[<c015c446>] Not tainted EFLAGS: 00010286 eax: 748b5356 ebx: c01a1550 ecx: d7894040 edx: 00000000 esi: c7228000 edi: d7894040 ebp: d7ed4800 esp: c7229eac ds: 0018 es: 0018 ss: 0018 Process lvcreate (pid: 1435, stackpage=c7229000) Stack: c01a1550 c01a1550 ffffffe2 d7894040 00000000 c01571a8 d7ed4800 00000001 40018000 c7229f5c 00000002 00000018 d7894040 d7b41000 00000001 c0141b1e d7894040 3c36dd6f d5fc7760 d78940f0 c0143001 d7894040 00000001 00000000 Call Trace: [<c01a1550>] [<c01a1550>] [<c01571a8>] [<c0141b1e>] [<c0143001>] [<c01254ac>] [<c012576a>] [<c0125690>] [<c0130cf5>] [<c0106d1b>] Code: 39 28 74 23 68 e0 09 23 c0 68 e1 00 00 00 68 cf be 22 c0 68 On Sat, 5 Jan 2002 09:14, Eric Sandeen wrote: > On Fri, 2002-01-04 at 16:49, Adrian Head wrote: > > What does your backtrace look like? Its the ext3_dirt_inode in my > > backtrace thats got me. I have compiled a kernel without ext3 so will > > also give it a run later. > > No, ext3 functions do not show up for me when it oopses on snapshot > creation: > > kdb> bt > EBP EIP Function(args) > 0xc1c2bf78 0xc013649e path_init+0x36 (0xc1c2a000) > kernel .text 0xc0100000 0xc0136468 > 0xc013659c 0xc1c2bf90 0xc01366cf __user_walk+0x2f (0xc1c2a000, 0x804f1bc) > kernel .text 0xc0100000 0xc01366a0 > 0xc01366f8 0xc1c2bfbc 0xc013381e sys_stat64+0x1a (0x8052474, 0xbfffe980, > 0x40196154, 0x804f1bc, 0x3) kernel .text 0xc0100000 0xc0133804 0xc0133874 > 0xc0106c5b system_call+0x33 > kernel .text 0xc0100000 0xc0106c28 > 0xc0106c60 > > > It's trying to stat64 /dev/sda2, one of my lvm partitions. I dunno why > this blows up. :/ > > The code has some fastcalls & inlines around here, though, so this may > not be the most accurate. > > Still looking... > > -Eric - -- Adrian Head (Public Key available on request.) -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE8NmkN8ZJI8OvSkAcRAk6FAJ0SKQPujP4BQbjs0tZprVhAyDwehQCfcjxA lONpZIiIHSojcBPRkyNFfvA= =k23i -----END PGP SIGNATURE-----