i'm running 2.4.30 + linux-2.4.22-VFS-lock.patch and lvm 1.0.8... my
nightly backups use a snapshot. i don't do xfs_freeze before/after
because i'm using the VFS lock patch (and besides it freezes the system
solid if i do xfs_freeze -- i suspect the lvm userland tools want some
access to /var, which is the fs i'm snapshotting).
it's been working fine every night for about a month, but last night i
got this oops. let me know if there's any other info which would be
useful.
thanks
-dean
ksymoops 2.4.9 on i686 2.4.30. Options used
-V (default)
-k /proc/ksyms (default)
-l /proc/modules (default)
-o /lib/modules/2.4.30/ (default)
-m /boot/System.map (specified)
Access to block zero: fs: <lvm(58,0)> inode: 133 start_block : 1000000000000
start_off : 0 blkcnt : 0 extent-state : 190
kernel BUG at debug.c:106!
invalid operand: 0000
CPU: 2
EIP: 0010:[<c01f689e>] Not tainted
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00010246
eax: 0000007d ebx: 00000000 ecx: 00000002 edx: f6b51f84
esi: c0310e00 edi: c03d6300 ebp: 00000293 esp: d0b37b28
ds: 0018 es: 0018 ss: 0018
Process rdiff-backup (pid: 29874, stackpage=d0b37000)
Stack: c031dd5e c030b35f c03d6300 e976a950 c0310e00 00000000 d0b37c60 c019cf37
00000000 c0310e00 e07fc7c0 00000085 00000000 00000000 00010000 00000000
00000000 00000000 00000000 00000190 00000000 00000000 c5ac0c00 c019e399
Call Trace: [<c019cf37>] [<c019e399>] [<c010aca9>] [<c010d5b8>] [<c02bbc43>]
[<c02bd410>] [<c023e718>] [<c023e8d7>] [<c01c92fa>] [<c01eaff7>] [<c028c502>]
[<c023f484>] [<c0144fcd>] [<c01450db>] [<c01eb246>] [<c0145c3b>] [<c0138b7f>]
[<c0130c12>] [<c01eb210>] [<c013135d>] [<c01315f9>] [<c0131c00>] [<c0131c00>]
[<c0131db7>] [<c0131c00>] [<c01ef9bd>] [<c029db1e>] [<c01ebb0d>] [<c01426d9>]
[<c0108ebb>]
Code: 0f 0b 6a 00 7b b3 30 c0 83 c4 0c 5b 5e 5f 5d c3 89 f6 83 ec
>>EIP; c01f689e <cmn_err+9e/b0> <=====
>>edx; f6b51f84 <_end+36746984/385d5a60>
>>esi; c0310e00 <large_digits.1+12c60/39240>
>>edi; c03d6300 <message+0/100>
>>esp; d0b37b28 <_end+1072c528/385d5a60>
Trace; c019cf37 <xfs_bmap_search_extents+e7/110>
Trace; c019e399 <xfs_bmapi+269/15e0>
Trace; c010aca9 <handle_IRQ_event+79/b0>
Trace; c010d5b8 <call_do_IRQ+5/d>
Trace; c02bbc43 <ip_output+f3/1a0>
Trace; c02bd410 <ip_queue_xmit2+0/239>
Trace; c023e718 <locate_hd_struct+38/a0>
Trace; c023e8d7 <req_new_io+67/90>
Trace; c01c92fa <xfs_iomap+19a/540>
Trace; c01eaff7 <linvfs_get_block_core+87/2a0>
Trace; c028c502 <md_make_request+82/90>
Trace; c023f484 <generic_make_request+e4/140>
Trace; c0144fcd <get_unused_buffer_head+5d/c0>
Trace; c01450db <create_buffers+6b/100>
Trace; c01eb246 <linvfs_get_block+36/40>
Trace; c0145c3b <block_read_full_page+27b/2c0>
Trace; c0138b7f <lru_cache_add+6f/80>
Trace; c0130c12 <page_cache_read+c2/f0>
Trace; c01eb210 <linvfs_get_block+0/40>
Trace; c013135d <generic_file_readahead+ed/1a0>
Trace; c01315f9 <do_generic_file_read+1b9/490>
Trace; c0131c00 <file_read_actor+0/100>
Trace; c0131c00 <file_read_actor+0/100>
Trace; c0131db7 <generic_file_read+b7/1b0>
Trace; c0131c00 <file_read_actor+0/100>
Trace; c01ef9bd <xfs_read+cd/2f0>
Trace; c029db1e <__kfree_skb+fe/160>
Trace; c01ebb0d <linvfs_read+5d/e0>
Trace; c01426d9 <sys_read+99/110>
Trace; c0108ebb <system_call+33/38>
Code; c01f689e <cmn_err+9e/b0>
00000000 <_EIP>:
Code; c01f689e <cmn_err+9e/b0> <=====
0: 0f 0b ud2a <=====
Code; c01f68a0 <cmn_err+a0/b0>
2: 6a 00 push $0x0
Code; c01f68a2 <cmn_err+a2/b0>
4: 7b b3 jnp ffffffb9 <_EIP+0xffffffb9>
Code; c01f68a4 <cmn_err+a4/b0>
6: 30 c0 xor %al,%al
Code; c01f68a6 <cmn_err+a6/b0>
8: 83 c4 0c add $0xc,%esp
Code; c01f68a9 <cmn_err+a9/b0>
b: 5b pop %ebx
Code; c01f68aa <cmn_err+aa/b0>
c: 5e pop %esi
Code; c01f68ab <cmn_err+ab/b0>
d: 5f pop %edi
Code; c01f68ac <cmn_err+ac/b0>
e: 5d pop %ebp
Code; c01f68ad <cmn_err+ad/b0>
f: c3 ret
Code; c01f68ae <cmn_err+ae/b0>
10: 89 f6 mov %esi,%esi
Code; c01f68b0 <icmn_err+0/bd>
12: 83 ec 00 sub $0x0,%esp
|