xfs-masters
[Top] [All Lists]

[Bug 816] New: xfs_qm_dqcheck oops in 2.6.28.7

To: xfs-masters@xxxxxxxxxxx
Subject: [Bug 816] New: xfs_qm_dqcheck oops in 2.6.28.7
From: bugzilla-daemon@xxxxxxxxxxx
Date: Sun, 1 Mar 2009 06:11:42 -0600
Auto-submitted: auto-generated
http://oss.sgi.com/bugzilla/show_bug.cgi?id=816

           Summary: xfs_qm_dqcheck oops in 2.6.28.7
           Product: XFS
           Version: unspecified
          Platform: All
        OS/Version: Linux
            Status: NEW
          Severity: major
          Priority: P5
         Component: XFS kernel code
        AssignedTo: xfs-masters@xxxxxxxxxxx
        ReportedBy: arekm@xxxxxxxx
   Estimated Hours: 0.0
    Classification: Unclassified


Quite often when I get into a trouble with my server (like hangs or something)
after a reboot xfs oopses and I quite often see xfs_qm_dqcheck as function
where it oopsed.

xfs_repair works but only if used with -L. Normal mount to recover log always
oops like this:

[  174.333651] Filesystem "dm-0": Disabling barriers, trial barrier write
failed
[  174.341055] XFS mounting filesystem dm-0
[  175.803855] Starting XFS recovery on filesystem: dm-0 (logdev: internal)
[  176.496821] BUG: unable to handle kernel paging request at fffffffffffffc00
[  176.500091] IP: [<ffffffffa0101e5a>] xfs_qm_dqcheck+0x96a/0x21d0 [xfs]
[  176.500091] PGD 547067 PUD 549067 PMD 0 
[  176.500091] Oops: 0002 [#1] SMP 
[  176.500091] last sysfs file:
/sys/devices/pci0000:00/0000:00:02.0/0000:01:00.0/0000:02:02.0/0000:05:00.1/irq
[  176.500091] CPU 4 
[  176.500091] Modules linked in: ipmi_watchdog netconsole configfs sit tunnel4
sch_sfq ext3 jbd mbcache raid456 async_xor async_memcpy async_tx xor raid1
dm_mod e1000 e1000e ipmi_devintf ipmi_si ipmi_msghandler 8021q garp stp xfs
scsi_wait_scan sd_mod crc_t10dif mptsas mptscsih mptbase scsi_transport_sas
scsi_mod raid10 md_mod
[  176.500091] Pid: 3112, comm: mount Not tainted 2.6.28.7-1 #1
[  176.500091] RIP: 0010:[<ffffffffa0101e5a>]  [<ffffffffa0101e5a>]
xfs_qm_dqcheck+0x96a/0x21d0 [xfs]
[  176.500091] RSP: 0018:ffff88015214fa58  EFLAGS: 00010256
[  176.500091] RAX: 0000000000000000 RBX: ffff8801520f7b00 RCX:
0000000000000000
[  176.500091] RDX: fffffffffffffc00 RSI: 0000000000000000 RDI:
fffffffffffffc00
[  176.500091] RBP: 0000000000000000 R08: 0000000000000000 R09:
fffffffffffffc00
[  176.500091] R10: ffff880154d64a00 R11: 0000000000000000 R12:
ffff8801520f7940
[  176.500091] R13: ffff8801520f78c0 R14: 0000000000001000 R15:
ffff880152036000
[  176.500091] FS:  00007ff0454647d0(0000) GS:ffff88015fa4c880(0000)
knlGS:0000000000000000
[  176.500091] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[  176.890405] CR2: fffffffffffffc00 CR3: 0000000155931000 CR4:
00000000000006e0
[  176.900403] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
0000000000000000
[  176.900403] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7:
0000000000000400
[  176.900403] Process mount (pid: 3112, threadinfo ffff88015214e000, task
ffff88015e1b86d0)
[  176.900403] Stack:
[  176.900403]  ffff8801520f78c0 000000005d9b6a28 ffff88015214fbd8
ffffc20011820fa4
[  176.900403]  ffffc20011820fb0 0000000000000004 ffffc20011823e00
ffffffffa01034dc
[  176.900403]  000000000002979a 0000000152d77000 ffff880152d77000
ffff88015214fb88
[  176.900403] Call Trace:
[  176.900403]  [<ffffffffa01034dc>] xfs_qm_dqcheck+0x1fec/0x21d0 [xfs]
[  176.900403]  [<ffffffffa0103e99>] xlog_get_bp+0x1e9/0x1760 [xfs]
[  176.900403]  [<ffffffffa0125590>] xfs_dir_file_operations+0x2210/0xe886
[xfs]
[  176.900403]  [<ffffffffa01044a7>] xlog_get_bp+0x7f7/0x1760 [xfs]
[  176.900403]  [<ffffffffa010450a>] xlog_get_bp+0x85a/0x1760 [xfs]
[  176.900403]  [<ffffffffa01058ca>] xlog_recover+0x7a/0x90 [xfs]
[  176.900403]  [<ffffffffa00ff776>] xfs_log_mount+0xa6/0xd30 [xfs]
[  176.900403]  [<ffffffffa010814b>] xfs_mountfs+0x33b/0x680 [xfs]
[  176.900403]  [<ffffffffa00ebb20>] xfs_filestream_lookup_ag+0x60/0x4e0 [xfs]
[  176.900403]  [<ffffffffa0114d2b>] kmem_zalloc+0x2b/0x40 [xfs]
[  176.900403]  [<ffffffffa0109197>] xfs_mru_cache_create+0x137/0x170 [xfs]
[  176.900403]  [<ffffffffa0121612>] xfs_blkdev_get+0x492/0x660 [xfs]
[  176.900403]  [<ffffffff802d7e64>] get_sb_bdev+0x174/0x1a0
[  176.900403]  [<ffffffffa01213b0>] xfs_blkdev_get+0x230/0x660 [xfs]
[  176.900403]  [<ffffffff802a6964>] kstrdup+0x54/0x70
[  176.900403]  [<ffffffff802d77f6>] vfs_kern_mount+0x86/0x250
[  176.900403]  [<ffffffff802d7a23>] do_kern_mount+0x53/0x120
[  176.900403]  [<ffffffff802f150d>] do_mount+0x2ed/0xa50
[  176.900403]  [<ffffffff802f1d69>] sys_mount+0xf9/0x110
[  176.900403]  [<ffffffff802031bb>] system_call_fastpath+0x16/0x1b
[  176.900403] Code: 49 8b 54 24 08 8b 42 18 85 c0 75 65 49 8b 45 28 48 8b 58
08 8b 6b 18 85 ed 0f 84 92 00 00 00 48 63 43 14 48 8b 53 20 48 c1 e0 04 <4c> 89
3c 02 48 63 43 14 48 8b 53 20 48 c1 e0 04 44 89 74 02 08 
[  176.900403] RIP  [<ffffffffa0101e5a>] xfs_qm_dqcheck+0x96a/0x21d0 [xfs]
[  176.900403]  RSP <ffff88015214fa58>
[  176.900403] CR2: fffffffffffffc00
[  176.900403] ---[ end trace 0f88ebfbe4e5aa3b ]---

-- 
Configure bugmail: http://oss.sgi.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.

<Prev in Thread] Current Thread [Next in Thread>