2.6.30-rc6: BUG at fs/xfs/support/debug.c:109!
Alexander Beregalov
a.beregalov at gmail.com
Tue Jun 2 03:21:47 CDT 2009
2009/6/1 Felix Blyakher <felixb at sgi.com>:
>
> On Jun 1, 2009, at 12:38 PM, Alexander Beregalov wrote:
>
>> It was Gentoo's `emerge --metadata`. It reads many small files (ebuilds).
>> I am sure it cannot be easily reproduced.
>
> Right. Otherwise many more people would've reported it.
>
>> It runs fine everyday. I do not have a testcase.
>> I can try to run it forever in loop if you need.
>
> Yes, that will be good.
> The problem is that the traces are confusing. From one
> side readdir stack makes sense based on your description
> of the load, but OTOH the panic is from xfs_bmapi(), which
> doesn't fit in that backtrace at all. It seems like
> backtrace is from the concurrently running different thread.
> Don't have good idea for this bug atm.
The host is still running, SysRq-W shows two precesses with the same
stacktraces.
SysRq : Show Blocked State
task PC stack pid father
emerge D 0000000000000000 3856 8399 8387
ffff880078da7b48 0000000000000046 ffff8800074b4b40 ffff880078da7af4
0000000000000001 000000000000d948 00000000001d2000 0000000000000001
ffff8800074b4b40 ffff88007f4725a0 ffff8800074b4eb8 0000000100000246
Call Trace:
[<ffffffff802e7328>] ? do_lookup+0xd8/0x270
[<ffffffff806d707d>] __mutex_lock_common+0x16d/0x4f0
[<ffffffff802e7328>] ? do_lookup+0xd8/0x270
[<ffffffff80280eb0>] ? trace_hardirqs_on+0x20/0x40
[<ffffffff802e7328>] ? do_lookup+0xd8/0x270
[<ffffffff806d7528>] mutex_lock_nested+0x48/0x70
[<ffffffff802e7328>] do_lookup+0xd8/0x270
[<ffffffff802e7776>] __link_path_walk+0x2b6/0xf00
[<ffffffff802e884c>] ? do_path_lookup+0xec/0x200
[<ffffffff802e884c>] ? do_path_lookup+0xec/0x200
[<ffffffff802e863e>] path_walk+0x7e/0x100
[<ffffffff802e8816>] do_path_lookup+0xb6/0x200
[<ffffffff802e9bd8>] do_filp_open+0xf8/0x9e0
[<ffffffff802f6199>] ? alloc_fd+0x49/0x170
[<ffffffff806d987f>] ? _spin_unlock+0x3f/0x80
[<ffffffff802f6289>] ? alloc_fd+0x139/0x170
[<ffffffff802d7f6b>] do_sys_open+0x9b/0x130
[<ffffffff802d806e>] sys_open+0x2e/0x50
[<ffffffff8020ba6b>] system_call_fastpath+0x16/0x1b
emerge D 0000000000000000 3280 1643 1901
ffff88000f43bb48 0000000000000046 ffff88002dc33870 ffff88000f43baf4
0000000000000001 000000000000d948 00000000001d2000 0000000000000003
ffff88002dc33870 ffff88007ea30000 ffff88002dc33be8 0000000300000246
Call Trace:
[<ffffffff802e7328>] ? do_lookup+0xd8/0x270
[<ffffffff802e7328>] ? do_lookup+0xd8/0x270
[<ffffffff806d707d>] __mutex_lock_common+0x16d/0x4f0
[<ffffffff802e7328>] ? do_lookup+0xd8/0x270
[<ffffffff80280eb0>] ? trace_hardirqs_on+0x20/0x40
[<ffffffff802e7328>] ? do_lookup+0xd8/0x270
[<ffffffff806d7528>] mutex_lock_nested+0x48/0x70
[<ffffffff802e7328>] do_lookup+0xd8/0x270
[<ffffffff802e7776>] __link_path_walk+0x2b6/0xf00
[<ffffffff802e884c>] ? do_path_lookup+0xec/0x200
[<ffffffff802e884c>] ? do_path_lookup+0xec/0x200
[<ffffffff802e863e>] path_walk+0x7e/0x100
[<ffffffff802e8816>] do_path_lookup+0xb6/0x200
[<ffffffff802e9bd8>] do_filp_open+0xf8/0x9e0
[<ffffffff802f6199>] ? alloc_fd+0x49/0x170
[<ffffffff806d987f>] ? _spin_unlock+0x3f/0x80
[<ffffffff802f6289>] ? alloc_fd+0x139/0x170
[<ffffffff802d7f6b>] do_sys_open+0x9b/0x130
[<ffffffff802d806e>] sys_open+0x2e/0x50
[<ffffffff8020ba6b>] system_call_fastpath+0x16/0x1b
I will try to reproduce it.
More information about the xfs
mailing list