http://oss.sgi.com/bugzilla/show_bug.cgi?id=309
Summary: xfs_iget_core: ambiguous vns: vp/0xc7e23380,
invp/0xc4a2fc80
Product: Linux XFS
Version: unspecified
Platform: All
OS/Version: Linux
Status: NEW
Severity: major
Priority: High
Component: XFS kernel code
AssignedTo: xfs-master@xxxxxxxxxxx
ReportedBy: sgi@xxxxxxxx
Don't know if this is a XFS bug or not. But here goes.
This happend on our NFS storage server.
OS:
Linux wwwfs-01 2.6.2 #2 SMP Tue Feb 10 22:29:17 EST 2004 i686 unknown
xfs_iget_core: ambiguous vns: vp/0xc7e23380, invp/0xc4a2fc80
------------[ cut here ]------------
kernel BUG at fs/xfs/support/debug.c:106!
invalid operand: 0000 [#1]
CPU: 0
EIP: 0060:[cmn_err+157/173] Not tainted
EFLAGS: 00010246
EIP is at cmn_err+0x9d/0xad
eax: 00000040 ebx: 00000000 ecx: f761a080 edx: c036e4dc
esi: c03483d7 edi: c043459e ebp: 00000293 esp: f6015a68
ds: 007b es: 007b ss: 0068
Process nfsd (pid: 2536, threadinfo=f6014000 task=f761a080)
Stack: c034869e c0337a8f c0434560 c04199c0 00c00678 00000000 d338fb70 c0219149
00000000 c0342500 c7e23380 c4a2fc80 f7edfa3c c0167286 c1baea00 c1b5b7a8
c04199c0 c1bc0124 f6014000 c1baea00 f7edfa3c c1b5b7a4 00000000 00000000
Call Trace:
[xfs_iget_core+1183/1449] xfs_iget_core+0x49f/0x5a9
[get_new_inode_fast+74/218] get_new_inode_fast+0x4a/0xda
[xfs_iget+343/393] xfs_iget+0x157/0x189
[xfs_vget+104/220] xfs_vget+0x68/0xdc
[vfs_vget+52/56] vfs_vget+0x34/0x38
[linvfs_get_dentry+83/138] linvfs_get_dentry+0x53/0x8a
[find_exported_dentry+68/1691] find_exported_dentry+0x44/0x69b
[xfs_iget+247/393] xfs_iget+0xf7/0x189
[iget_locked+105/186] iget_locked+0x69/0xba
[xfs_iunlock+55/113] xfs_iunlock+0x37/0x71
[xfs_vget+202/220] xfs_vget+0xca/0xdc
[iput+63/124] iput+0x3f/0x7c
[in_group_p+37/45] in_group_p+0x25/0x2d
[alloc_skb+71/224] alloc_skb+0x47/0xe0
[sock_alloc_send_pskb+197/481] sock_alloc_send_pskb+0xc5/0x1e1
[_end+944038524/1069274584] ip_fw_check+0x75a/0x8b2 [ipchains]
[dev_queue_xmit+430/564] dev_queue_xmit+0x1ae/0x234
[ip_finish_output2+166/420] ip_finish_output2+0xa6/0x1a4
[ip_finish_output2+0/420] ip_finish_output2+0x0/0x1a4
[nf_hook_slow+212/291] nf_hook_slow+0xd4/0x123
[exp_find_key+133/152] exp_find_key+0x85/0x98
[export_decode_fh+92/120] export_decode_fh+0x5c/0x78
[nfsd_acceptable+0/252] nfsd_acceptable+0x0/0xfc
[fh_verify+473/1338] fh_verify+0x1d9/0x53a
[nfsd_acceptable+0/252] nfsd_acceptable+0x0/0xfc
[udp_push_pending_frames+330/625] udp_push_pending_frames+0x14a/0x271
[nfsd_open+56/311] nfsd_open+0x38/0x137
[nfsd_read+82/941] nfsd_read+0x52/0x3ad
[__wake_up_common+56/87] __wake_up_common+0x38/0x57
[nfsd3_proc_read+222/359] nfsd3_proc_read+0xde/0x167
[nfsd_dispatch+232/485] nfsd_dispatch+0xe8/0x1e5
[svc_process+1184/1635] svc_process+0x4a0/0x663
[apic_timer_interrupt+26/32] apic_timer_interrupt+0x1a/0x20
[nfsd+490/910] nfsd+0x1ea/0x38e
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
|