Bug 64511 - GPF in read_extent_buffer
Summary: GPF in read_extent_buffer
Status: RESOLVED DUPLICATE of bug 63701
Alias: None
Product: File System
Classification: Unclassified
Component: btrfs (show other bugs)
Hardware: All Linux
: P1 normal
Assignee: Josef Bacik
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2013-11-06 17:46 UTC by Pär Lindfors
Modified: 2013-11-07 14:05 UTC (History)
1 user (show)

See Also:
Kernel Version: 3.11.0
Subsystem:
Regression: No
Bisected commit-id:


Attachments

Description Pär Lindfors 2013-11-06 17:46:29 UTC
I had a btrfs file system that had been in use on my laptop for a year or two.

I run Ubuntu 12.04 with my own kernels compiled from kernel.org sources. After upgrading to 3.11.0 everything worked fine for a bit over three weeks. Then one day I hit a GPF, and kept hitting it. The machine would only stay up for a few minutes. I only managed to save the kernel log from one of the crashes:

[  407.940718] general protection fault: 0000 [#1] SMP 
[  407.940752] Modules linked in: snd_hrtimer kvm_intel kvm arc4 snd_hda_codec_conexant iwldvm mac80211 snd_hda_intel snd_hda_codec snd_hwdep snd_pcm iwlwifi psmouse cfg80211 serio_raw lpc_ich snd_page_alloc thinkpad_acpi mei_me mei snd_seq_midi snd_rawmidi snd_seq_midi_event snd_seq snd_timer snd_seq_device snd soundcore nvram bnep rfcomm bluetooth parport_pc ppdev nfsd nfs_acl exportfs auth_rpcgss oid_registry binfmt_misc nfs fscache lockd sunrpc lp parport xts gf128mul dm_crypt nbd twofish_x86_64 twofish_common btrfs raid6_pq zlib_deflate xor libcrc32c ahci libahci i915 e1000e ptp pps_core drm_kms_helper drm i2c_algo_bit video
[  407.941147] CPU: 0 PID: 3253 Comm: http Not tainted 3.11.0 #25
[  407.941180] Hardware name: LENOVO 74695HG/74695HG, BIOS 6DET42WW (2.06 ) 03/17/2009
[  407.941217] task: ffff880136b18000 ti: ffff880089900000 task.ti: ffff880089900000
[  407.941253] RIP: 0010:[<ffffffff813110e5>]  [<ffffffff813110e5>] memcpy+0xf5/0x110
[  407.941296] RSP: 0018:ffff8800899018b0  EFLAGS: 00010246
[  407.941324] RAX: ffff880073b5c7dd RBX: 0000000000000001 RCX: 0000000000000000
[  407.941358] RDX: 0000000000000000 RSI: 0005080000000000 RDI: ffff880073b5c7dd
[  407.941392] RBP: ffff8800899018f8 R08: f528b23b1b5155d1 R09: 50748ad911ecb24b
[  407.941426] R10: 77f19fc50c50748a R11: ce1da00309855324 R12: 0000000000000001
[  407.941460] R13: ffff880073b5c7de R14: ffff88013611eae8 R15: 0000160000000000
[  407.941495] FS:  00007fcd98950740(0000) GS:ffff88013bc00000(0000) knlGS:0000000000000000
[  407.941537] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  407.941565] CR2: 00007fcbce3346db CR3: 00000000aa4f0000 CR4: 00000000000007f0
[  407.941600] Stack:
[  407.941612]  ffffffffa01e052a 0000000000001000 0000000000000000 ffff8800899018f8
[  407.941653]  ffff8800b92e3720 ffff88009e16c800 ffff88013180b800 ffff88012fea8ab0
[  407.941694]  0000000000000000 ffff8800899019c8 ffffffffa01c5697 0000000000001000
[  407.941734] Call Trace:
[  407.941772]  [<ffffffffa01e052a>] ? read_extent_buffer+0xba/0x120 [btrfs]
[  407.941820]  [<ffffffffa01c5697>] btrfs_get_extent+0xa37/0xa80 [btrfs]
[  407.941872]  [<ffffffffa01dda0f>] __extent_read_full_page+0x2df/0x640 [btrfs]
[  407.941909]  [<ffffffff8112d8f4>] ? __alloc_pages_nodemask+0x154/0x9a0
[  407.941960]  [<ffffffffa01c4c60>] ? record_one_backref+0x440/0x440 [btrfs]
[  407.942001]  [<ffffffff81141773>] ? __inc_zone_page_state+0x33/0x40
[  407.943735]  [<ffffffffa01c4c60>] ? record_one_backref+0x440/0x440 [btrfs]
[  407.945458]  [<ffffffffa01c4c60>] ? record_one_backref+0x440/0x440 [btrfs]
[  407.947145]  [<ffffffffa01decf7>] extent_readpages+0x197/0x200 [btrfs]
[  407.948828]  [<ffffffff811673ca>] ? alloc_pages_current+0xba/0x170
[  407.950012]  [<ffffffffa01c274f>] btrfs_readpages+0x1f/0x30 [btrfs]
[  407.950012]  [<ffffffff81130fef>] __do_page_cache_readahead+0x1af/0x260
[  407.950012]  [<ffffffff81131401>] ra_submit+0x21/0x30
[  407.950012]  [<ffffffff81131525>] ondemand_readahead+0x115/0x230
[  407.950012]  [<ffffffff811b935a>] ? send_to_group+0x13a/0x190
[  407.950012]  [<ffffffff81131721>] page_cache_sync_readahead+0x31/0x50
[  407.950012]  [<ffffffff81126d10>] generic_file_aio_read+0x4b0/0x720
[  407.950012]  [<ffffffff81179bca>] do_sync_read+0x7a/0xb0
[  407.950012]  [<ffffffff8117ab34>] vfs_read+0xb4/0x180
[  407.950012]  [<ffffffff8117adb2>] SyS_read+0x52/0xa0
[  407.950012]  [<ffffffff816386c6>] system_call_fastpath+0x1a/0x1f
[  407.950012] Code: 84 00 00 00 00 00 83 fa 04 72 1b 8b 0e 44 8b 44 16 fc 89 0f 44 89 44 17 fc c3 66 66 66 2e 0f 1f 84 00 00 00 00 00 83 ea 01 72 19 <0f> b6 0e 74 12 4c 0f b6 46 01 4c 0f b6 0c 16 44 88 47 01 44 88 
[  407.950012] RIP  [<ffffffff813110e5>] memcpy+0xf5/0x110
[  407.950012]  RSP <ffff8800899018b0>
[  407.993956] ---[ end trace 89664d0671e6fbee ]---


I was able to recover all my files using some Ubuntu live USB stick (don't remember what version). After running mkfs.btrfs I then copied all files back to a new btrfs file system, rebooted, and almost immediately hit the GPF again.

I then booted my previous kernel 3.10.10 and dit not hit the GPF. This was a bit over one month ago, and I have not had any GPF during this time.

My mount options is currently "ssd,compress=lzo,noatime". When the crashes started, before recreating the filesystem, the mount options were "ssd,compress,noatime".
Comment 1 David Sterba 2013-11-07 14:05:10 UTC
Same crash as bug 63701 comment 7.

The common factor is ondemand_readahead.

*** This bug has been marked as a duplicate of bug 63701 ***

Note You need to log in before you can comment on or make changes to this bug.