Bug 56241
Summary: | running e4defrag provokes "kernel BUG at fs/buffer.c:1833!" | ||
---|---|---|---|
Product: | File System | Reporter: | j.fikar |
Component: | ext4 | Assignee: | fs_ext4 (fs_ext4) |
Status: | RESOLVED OBSOLETE | ||
Severity: | normal | CC: | dmonakhov |
Priority: | P1 | ||
Hardware: | All | ||
OS: | Linux | ||
Kernel Version: | 3.8.5 | Subsystem: | |
Regression: | Yes | Bisected commit-id: |
Description
j.fikar
2013-04-05 11:29:27 UTC
Ok I've able to reproduce this on 64k pages and 1k fsblock size Probably this is my bug 10477.714752] EXT4-fs (dm-3): mounted filesystem with ordered data mode. Opts: acl,user_xattr [10480.693978] kernel BUG at fs/buffer.c:1833! [10480.698233] fio[10780]: bugcheck! 0 [1] [10480.702141] Modules linked in: ext4 jbd2 crc16 nls_iso8859_1 nls_cp437 vfat fat dm_mod sg loop sr_mod cdrom hid_generic ehci_pci ext3 jbd mbcache usb_storage usbhid hid hpsa cciss mptsas mptscsih mptbase scsi_transport_sas tg3 libphy ptp scsi_mod ohci_hcd ehci_hcd usbcore pps_core usb_common [10480.702223] [10480.702223] Pid: 10780, CPU 2, comm: fio [10480.702223] psr : 00001010085a6018 ifs : 8000000000000ea1 ip : [<a00000010026f500>] Not tainted (3.8.0) [10480.702223] ip is at __block_write_begin+0xe0/0xa40 [10480.702223] unat: 0000000000000000 pfs : 0000000000000ea1 rsc : 0000000000000003 [10480.702223] rnat: 0009804c8a70033f bsps: 0000000000004000 pr : 00000000a9a94955 [10480.702223] ldrs: 0000000000000000 ccv : 000000000d220691 fpsr: 0009804c8a70033f [10480.702223] csd : 0000000000000000 ssd : 0000000000000000 [10480.702223] b0 : a00000010026f500 b6 : a00000010042f760 b7 : a000000100554f30 [10480.702223] f6 : 1003e00000354df80f716 f7 : 1003e000000000000015e [10480.702223] f8 : 1003e00000354df80f5b8 f9 : 1003e0000000000000001 [10480.702223] f10 : 1003e00000000052ba885 f11 : 1003e20c49ba5e353f7cf [10480.702223] r1 : a000000100e50e20 r2 : 0000000000006760 r3 : 000000000000fffe [10480.702223] r8 : 000000000000001f r9 : 00000000000005f5 r10 : 00000000000005f5 [10480.702223] r11 : 000000000000675e r12 : e00000022ecafd20 r13 : e00000022eca0000 [10480.702223] r14 : 0000000000006760 r15 : 0000000000004000 r16 : 00000000000033af [10480.702223] r17 : 0000000000000001 r18 : 000000000000675e r19 : a000000100c5d138 [10480.702223] r20 : 000000000000675c r21 : 0000000000000000 r22 : a000000100cf87a8 [10480.702223] r23 : a0000001009feb48 r24 : a000000100553a70 r25 : 0000000000000700 [10480.702223] r26 : a000000100cf88e0 r27 : a0000001009feb38 r28 : 0000000000000000 [10480.702223] r29 : a000000100cf87a0 r30 : 0000000000000c34 r31 : a000000100cf878a [10480.702223] [10480.702223] Call Trace: [10480.702223] [<a000000100014d10>] show_stack+0x50/0xa0 [10480.702223] sp=e00000022ecaf8f0 bsp=e00000022eca14c0 [10480.702223] [<a000000100015590>] show_regs+0x830/0x870 [10480.702223] sp=e00000022ecafac0 bsp=e00000022eca1460 [10480.702223] [<a00000010003a900>] die+0x1a0/0x2f0 [10480.702223] sp=e00000022ecafad0 bsp=e00000022eca1420 [10480.702223] [<a00000010003aaa0>] die_if_kernel+0x50/0x70 [10480.702223] sp=e00000022ecafad0 bsp=e00000022eca13e8 [10480.702223] [<a00000010082d7e0>] ia64_bad_break+0x240/0x420 [10480.702223] sp=e00000022ecafad0 bsp=e00000022eca13c0 [10480.702223] [<a00000010000bc40>] ia64_native_leave_kernel+0x0/0x270 [10480.702223] sp=e00000022ecafb50 bsp=e00000022eca13c0 [10480.702223] [<a00000010026f500>] __block_write_begin+0xe0/0xa40 [10480.702223] sp=e00000022ecafd20 bsp=e00000022eca12b8 [10480.702223] [<a000000203673df0>] ext4_move_extents+0x13b0/0x1c60 [ext4] [10480.702223] sp=e00000022ecafd40 bsp=e00000022eca10c8 [10480.702223] [<a000000203623100>] ext4_ioctl+0x1200/0x1b30 [ext4] [10480.702223] sp=e00000022ecafd60 bsp=e00000022eca1058 [10480.702223] [<a00000010022f690>] do_vfs_ioctl+0xf00/0x1010 [10480.702223] sp=e00000022ecafdd0 bsp=e00000022eca1008 [10480.702223] [<a00000010022f840>] sys_ioctl+0xa0/0x120 [10480.702223] sp=e00000022ecafe10 bsp=e00000022eca0f80 [10480.702223] [<a00000010000bac0>] ia64_ret_from_syscall+0x0/0x20 [10480.702223] sp=e00000022ecafe30 bsp=e00000022eca0f80 [10480.702223] [<a000000000040720>] ia64_ivt+0xffffffff00040720/0x400 [10480.702223] sp=e00000022ecb0000 bsp=e00000022eca0f80 [10480.702223] Disabling lock debugging due to kernel taint I haven't seen that error for long time now, I suppose it is resolved. Now I have 3.16.0. |