Bug 42565 - ext4: kernel BUG at fs/buffer.c:2920! hit by xfstest 269
Summary: ext4: kernel BUG at fs/buffer.c:2920! hit by xfstest 269
Status: NEW
Alias: None
Product: File System
Classification: Unclassified
Component: ext4 (show other bugs)
Hardware: All Linux
: P1 normal
Assignee: fs_ext4@kernel-bugs.osdl.org
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2012-01-06 16:30 UTC by Lukas Czerner
Modified: 2022-08-29 12:00 UTC (History)
6 users (show)

See Also:
Kernel Version: 3.2.0
Subsystem:
Regression: No
Bisected commit-id:


Attachments

Description Lukas Czerner 2012-01-06 16:30:48 UTC
I have hit the BUG_ON while running xfstest 269 in the loop.

------------[ cut here ]------------
kernel BUG at fs/buffer.c:2920!
invalid opcode: 0000 [#1] SMP
CPU 13
Modules linked in: ext4 jbd2 autofs4 sunrpc ipt_REJECT nf_conntrack_ipv4 nf_defrag_ipv4 iptable_filter ip_tables ip6t_REJECT nf_conntrack_ipv6 nf_defrag_ipv6 xt_state nf_conntrack ip6table_filter ip6_tables ipv6 dm_mirror dm_region_hash dm_log dm_mod floppy microcode pcspkr virtio_balloon virtio_net i2c_piix4 i2c_core sg ext3 jbd mbcache virtio_blk sd_mod crc_t10dif virtio_pci virtio_ring virtio pata_acpi ata_generic ata_piix [last unloaded: speedstep_lib]

Pid: 7117, comm: fsstress Not tainted 3.2.0+ #3 Red Hat KVM
RIP: 0010:[<ffffffff81195ca4>]  [<ffffffff81195ca4>] submit_bh+0x114/0x140
RSP: 0018:ffff8801382ddc58  EFLAGS: 00010202
RAX: 000000000004c225 RBX: ffff880141ed6e30 RCX: 0000000000000282
RDX: 0000000000000000 RSI: ffff880141ed6e30 RDI: 0000000000000211
RBP: ffff8801382ddc78 R08: ffff880152a5d078 R09: 0000160000000000
R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000211
R13: ffff8801382ddd64 R14: ffff880154a35800 R15: ffff8801382ddca8
FS:  00007f3db5ac2700(0000) GS:ffff88015f3a0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: 00000034c9263760 CR3: 000000013c2b8000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process fsstress (pid: 7117, threadinfo ffff8801382dc000, task ffff880155bfeaf0)
Stack:
 ffff88013dfa6e98 ffff880141ed6e30 0000000000000211 ffff8801382ddd64
 ffff8801382ddc98 ffffffff81197c5e 0000000000000010 ffff880154a35880
 ffff8801382ddd08 ffffffffa01cfc91 0000000091827364 ffff880153b73d48
Call Trace:
 [<ffffffff81197c5e>] write_dirty_buffer+0x4e/0x80
 [<ffffffffa01cfc91>] __flush_batch+0x51/0xb0 [jbd2]
 [<ffffffffa01cfec3>] __process_buffer+0x1d3/0x230 [jbd2]
 [<ffffffffa01d04d5>] jbd2_log_do_checkpoint+0x115/0x3e0 [jbd2]
 [<ffffffffa01d397c>] jbd2_journal_flush+0x8c/0x190 [jbd2]
 [<ffffffffa025b077>] ext4_change_inode_journal_flag+0x67/0x120 [ext4]
 [<ffffffffa025f128>] ext4_ioctl+0x838/0x8c0 [ext4]
 [<ffffffff81178d05>] file_ioctl+0x45/0x120
 [<ffffffff8117911b>] do_vfs_ioctl+0x33b/0x340
 [<ffffffff811791c1>] sys_ioctl+0xa1/0xb0
 [<ffffffff814f9182>] system_call_fastpath+0x16/0x1b
Code: 09 00 49 8b 45 18 4c 89 ef 83 e0 80 3c 01 19 db f7 d3 83 e3 a1 e8 5d 47 00 00 48 83 c4 08 89 d8 5b 41 5c 41 5d c9 c3 0f 0b eb fe <0f> 0b eb fe 0f 0b 66 0f 1f 44 00 00 eb f8 0f 0b eb fe 0f 0b 0f
RIP  [<ffffffff81195ca4>] submit_bh+0x114/0x140
 RSP <ffff8801382ddc58>  
---[ end trace 6f5c36bf5674d595 ]---
------------[ cut here ]------------

Note You need to log in before you can comment on or make changes to this bug.