xfs-masters
[Top] [All Lists]

[Bug 27002] New: kernel bug when mounting xfs partition

To: xfs-masters@xxxxxxxxxxx
Subject: [Bug 27002] New: kernel bug when mounting xfs partition
From: bugzilla-daemon@xxxxxxxxxxxxxxxxxxx
Date: Tue, 18 Jan 2011 07:02:08 GMT
Auto-submitted: auto-generated
https://bugzilla.kernel.org/show_bug.cgi?id=27002

           Summary: kernel bug when mounting xfs partition
           Product: File System
           Version: 2.5
    Kernel Version: 2.6.35
          Platform: All
        OS/Version: Linux
              Tree: Mainline
            Status: NEW
          Severity: high
          Priority: P1
         Component: XFS
        AssignedTo: xfs-masters@xxxxxxxxxxx
        ReportedBy: amuro_msg@xxxxxxxxx
        Regression: Yes


Created an attachment (id=43952)
 --> (https://bugzilla.kernel.org/attachment.cgi?id=43952)
Reverting

Bug while mounting an xfs partition.

kernel BUG at mm/vmalloc.c:927!
invalid opcode: 0000 [#1] PREEMPT SMP 
last sysfs file:
/sys/devices/pci0000:00/0000:00:12.2/usb1/1-3/1-3.2/1-3.2:1.0/host7/target7:0:0/7:0:0:0/vendor
Modules linked in: xfs exportfs

That happens while i was trying to reproduce it on usb flash disk. I've
formatted it with reiserfs and ext3. No problem. But that happen with xfs.
It's reproducible on vanilla kernel. But i lost the dmesg file and too lazy to
reproduce it again. Sorry :(.

Attachment for the patch. Basically it only revert it back.

------------[ cut here ]------------
kernel BUG at mm/vmalloc.c:927!
invalid opcode: 0000 [#1] PREEMPT SMP 
last sysfs file:
/sys/devices/pci0000:00/0000:00:12.2/usb1/1-3/1-3.2/1-3.2:1.0/host7/target7:0:0/7:0:0:0/vendor
Modules linked in: xfs exportfs

Pid: 1023, comm: umount Not tainted 2.6.35.8-ck #1 M4A88TD-V EVO/USB3/System
Product Name
EIP: 0060:[<c1086cd8>] EFLAGS: 00010286 CPU: 0
EIP is at vm_unmap_ram+0x108/0x140
EAX: fffffff0 EBX: 00000003 ECX: f694a40c EDX: 00000000
ESI: f694a3c0 EDI: f9649000 EBP: f76520c0 ESP: f6bb3ec4
 DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068
Process umount (pid: 1023, ti=f6bb2000 task=f69191e0 task.ti=f6bb2000)
Stack:
 d0eb9c00 00000001 f69191e0 f95a51c9 f694a0c0 00000001 f958bd1b f698cc00
<0> f681d600 f69191e0 f75d09d8 f9596a18 f6bb3ef0 f698cc00 00000000 00000000
<0> f698cc00 f95ac5e7 c10a51bd f681d66c 00000001 00000001 f6bb3f1c f6bb3f1c
Call Trace:
 [<f95a51c9>] ? xfs_buf_free+0x69/0x70 [xfs]
 [<f958bd1b>] ? xlog_dealloc_log+0x2b/0x60 [xfs]
 [<f9596a18>] ? xfs_unmountfs+0xd8/0x110 [xfs]
 [<f95ac5e7>] ? xfs_fs_put_super+0xe7/0x140 [xfs]
 [<c10a51bd>] ? invalidate_inodes+0xfd/0x120
 [<c1094373>] ? generic_shutdown_super+0x43/0xc0
 [<c1094412>] ? kill_block_super+0x22/0x40
 [<c1093675>] ? deactivate_locked_super+0x35/0x50
 [<c10a84aa>] ? sys_umount+0x6a/0x370
 [<c10a87c7>] ? sys_oldumount+0x17/0x20
 [<c13a10e1>] ? syscall_call+0x7/0xb
Code: 46 10 74 0f 89 f0 5b 5e 5f e9 75 a0 31 00 90 8d 74 26 00 8b 4e 0c 85 c9
75 3e 89 f0 e8 62 a0 31 00 89 f0 5b 5e 5f e9 28 e8 ff ff <0f> 0b eb fe 0f 0b eb
fe 0f 0b eb fe e8 67 ea ff ff 85 c0 74 1c 
EIP: [<c1086cd8>] vm_unmap_ram+0x108/0x140 SS:ESP 0068:f6bb3ec4
---[ end trace 3c5c6c34fd7bd232 ]---
------------[ cut here ]------------
WARNING: at kernel/exit.c:896 do_exit+0x6a9/0x6d0()
Hardware name: System Product Name
Modules linked in: xfs exportfs
Pid: 1023, comm: umount Tainted: G      D     2.6.35.8-ck #1
Call Trace:
 [<c102bdb8>] ? warn_slowpath_common+0x78/0xb0
 [<c102f5a9>] ? do_exit+0x6a9/0x6d0
 [<c102f5a9>] ? do_exit+0x6a9/0x6d0
 [<c1003580>] ? do_invalid_op+0x0/0x90
 [<c102be0b>] ? warn_slowpath_null+0x1b/0x20
 [<c102f5a9>] ? do_exit+0x6a9/0x6d0
 [<c13a14ce>] ? apic_timer_interrupt+0x2a/0x30
 [<c102cbd7>] ? kmsg_dump+0x67/0x110
 [<c1003580>] ? do_invalid_op+0x0/0x90
 [<c139e307>] ? printk+0x17/0x1a
 [<c1003580>] ? do_invalid_op+0x0/0x90
 [<c1005d06>] ? oops_end+0x66/0x90
 [<c10035ff>] ? do_invalid_op+0x7f/0x90
 [<c1086cd8>] ? vm_unmap_ram+0x108/0x140
 [<c139f3d5>] ? schedule_timeout+0x145/0x190
 [<c1026388>] ? try_preempt+0x1a8/0x1c0
 [<c13a16ca>] ? error_code+0x66/0x6c
 [<c1003580>] ? do_invalid_op+0x0/0x90
 [<c1086cd8>] ? vm_unmap_ram+0x108/0x140
 [<f95a51c9>] ? xfs_buf_free+0x69/0x70 [xfs]
 [<f958bd1b>] ? xlog_dealloc_log+0x2b/0x60 [xfs]
 [<f9596a18>] ? xfs_unmountfs+0xd8/0x110 [xfs]
 [<f95ac5e7>] ? xfs_fs_put_super+0xe7/0x140 [xfs]
 [<c10a51bd>] ? invalidate_inodes+0xfd/0x120
 [<c1094373>] ? generic_shutdown_super+0x43/0xc0
 [<c1094412>] ? kill_block_super+0x22/0x40
 [<c1093675>] ? deactivate_locked_super+0x35/0x50
 [<c10a84aa>] ? sys_umount+0x6a/0x370
 [<c10a87c7>] ? sys_oldumount+0x17/0x20
 [<c13a10e1>] ? syscall_call+0x7/0xb
---[ end trace 3c5c6c34fd7bd233 ]---
note: umount[1023] exited with preempt_count 1
BUG: scheduling while atomic: umount/1023/0x10000002
Modules linked in: xfs exportfs
Pid: 1023, comm: umount Tainted: G      D W   2.6.35.8-ck #1
Call Trace:
 [<c139ef4f>] ? schedule+0x88f/0xa10
 [<c118a638>] ? format_decode+0x2d8/0x370
 [<c10230a9>] ? flush_tlb_others_ipi+0xc9/0xe0
 [<c1028e8f>] ? __cond_resched+0x1f/0x30
 [<c139f195>] ? _cond_resched+0x25/0x30
 [<c107e0df>] ? unmap_vmas+0x6df/0x850
 [<c118b552>] ? vsnprintf+0x2e2/0x420
 [<c1080275>] ? exit_mmap+0xb5/0x160
 [<c1029dfe>] ? mmput+0x1e/0xa0
 [<c102d942>] ? exit_mm+0xd2/0x100
 [<c1044812>] ? hrtimer_try_to_cancel+0x32/0x70
 [<c1057652>] ? acct_collect+0x82/0x160
 [<c102f55c>] ? do_exit+0x65c/0x6d0
 [<c1003580>] ? do_invalid_op+0x0/0x90
 [<c1003580>] ? do_invalid_op+0x0/0x90
 [<c1005d06>] ? oops_end+0x66/0x90
 [<c10035ff>] ? do_invalid_op+0x7f/0x90
 [<c1086cd8>] ? vm_unmap_ram+0x108/0x140
 [<c139f3d5>] ? schedule_timeout+0x145/0x190
 [<c1026388>] ? try_preempt+0x1a8/0x1c0
 [<c13a16ca>] ? error_code+0x66/0x6c
 [<c1003580>] ? do_invalid_op+0x0/0x90
 [<c1086cd8>] ? vm_unmap_ram+0x108/0x140
 [<f95a51c9>] ? xfs_buf_free+0x69/0x70 [xfs]
 [<f958bd1b>] ? xlog_dealloc_log+0x2b/0x60 [xfs]
 [<f9596a18>] ? xfs_unmountfs+0xd8/0x110 [xfs]
 [<f95ac5e7>] ? xfs_fs_put_super+0xe7/0x140 [xfs]
 [<c10a51bd>] ? invalidate_inodes+0xfd/0x120
 [<c1094373>] ? generic_shutdown_super+0x43/0xc0
 [<c1094412>] ? kill_block_super+0x22/0x40
 [<c1093675>] ? deactivate_locked_super+0x35/0x50
 [<c10a84aa>] ? sys_umount+0x6a/0x370
 [<c10a87c7>] ? sys_oldumount+0x17/0x20
 [<c13a10e1>] ? syscall_call+0x7/0xb

-- 
Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.

<Prev in Thread] Current Thread [Next in Thread>