[Ocfs2-devel] kernel BUG at kernel-xen-3.7.9/linux-3.7/fs/buffer.c:2952

Eugene Istomin E.Istomin at edss.ee
Tue Feb 19 04:37:30 PST 2013


Hello,

we have a bug on any xen kernel > 3.4 like this:


 kernel BUG at /home/abuild/rpmbuild/BUILD/kernel-
xen-3.7.9/linux-3.7/fs/buffer.c:2952!
[  628.054552] invalid opcode: 0000 [#1] SMP 
[  628.054557] Modules linked in: bridge stp llc iptable_filter ip_tables 
x_tables nbd blktap2 pciback usbbk xen_scsibk openvswitch blkbk 
blkback_pagemap netbk xenbus_be gntdev evtchn ocfs2_dlmfs ocfs2_stack_o2cb 
ocfs2_dlm bonding af_packet edd ocfs2 ocfs2_nodemanager configfs 
ocfs2_stackglue quota_tree coretemp domctl crc32c_intel ghash_clmulni_intel 
joydev iTCO_wdt aesni_intel iTCO_vendor_support ablk_helper cryptd lrw 
aes_x86_64 hid_generic gpio_ich xts gf128mul 8250_core pcspkr serio_raw igb 
ixgbe lpc_ich mfd_core i2c_i801 serial_core usbhid sg i7core_edac ioatdma ptp 
pps_core edac_core hid mdio ses enclosure button uhci_hcd mgag200 ttm 
drm_kms_helper drm i2c_algo_bit sysimgblt sysfillrect i2c_core syscopyarea 
ehci_hcd usbcore usb_common processor thermal_sys hwmon scsi_dh_alua 
scsi_dh_hp_sw scsi_dh_emc scsi_dh_rdac scsi_dh xenblk cdrom xennet ata_generic 
ata_piix megaraid_sas
[  628.054664] CPU 2 
[  628.054669] Pid: 5601, comm: mc Not tainted 3.7.9-27-xen #1 Supermicro 
X8DTN+-F/X8DTN+-F
[  628.054674] RIP: e030:[<ffffffff801646da>]  [<ffffffff801646da>] 
submit_bh+0x14a/0x1d0
[  628.054686] RSP: e02b:ffff8800ed483c88  EFLAGS: 00010246
[  628.054690] RAX: 4000000001000004 RBX: ffff8800fd3d8260 RCX: 00000003ffffffff
[  628.054694] RDX: 0000000000000001 RSI: ffff8800fd3d8260 RDI: 0000000000000000
[  628.054698] RBP: ffff8800fd3d8260 R08: 0000000000000000 R09: ffffffffa04c3420
[  628.054702] R10: 00000000000009e7 R11: 0000000000000000 R12: 00000003ffffffff
[  628.054705] R13: 4000000000000001 R14: 4000000000000001 R15: ffff8800fd3d8260
[  628.054715] FS:  00007f1a9c764700(0000) GS:ffff8800fbd00000(0000) 
knlGS:0000000000000000
[  628.054719] CS:  e033 DS: 0000 ES: 0000 CR0: 0000000080050033
[  628.054722] CR2: 00007f1a9e199000 CR3: 00000000f340b000 CR4: 
0000000000002660
[  628.054727] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 
0000000000000000
[  628.054733] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[  628.054738] Process mc (pid: 5601, threadinfo ffff8800ed482000, task 
ffff8800f346a040)
[  628.054742] Stack:
[  628.054744]  0000000000000001 ffff8800fd3d8260 0000000000000001 00000003ffffffff
[  628.054751]  4000000000000001 ffffffffa04a5d62 ffff8800f346a040 ffffffff808e5a00
[  628.054758]  0000001000000000 0000000000000000 0000000000000000 
ffff8800d7e6bc90
[  628.054765] Call Trace:
[  628.054799]  [<ffffffffa04a5d62>] ocfs2_read_blocks+0x1a2/0x690 [ocfs2]
[  628.054847]  [<ffffffffa04c66d4>] ocfs2_read_inode_block_full+0x34/0x60 [ocfs2]
[  628.054909]  [<ffffffffa051382f>] ocfs2_fast_symlink_readpage+0x2f/0x170 
[ocfs2]
[  628.055006]  [<ffffffff800e6df6>] do_read_cache_page+0x86/0x180
[  628.055015]  [<ffffffff800e6f49>] read_cache_page+0x9/0x20
[  628.055023]  [<ffffffff8013d014>] page_getlink.isra.11+0x24/0x80
[  628.055030]  [<ffffffff8013d08f>] page_follow_link_light+0x1f/0x40
[  628.055037]  [<ffffffff8013cdb8>] generic_readlink+0x48/0xc0
[  628.055045]  [<ffffffff80138134>] sys_readlinkat+0xb4/0xd0
[  628.055055]  [<ffffffff8050b20b>] system_call_fastpath+0x1a/0x1f
[  628.055066]  [<00007f1a9d19c907>] 0x7f1a9d19c906
[  628.055070] Code: a1 89 e8 5d 41 5c 41 5d c3 0f 1f 84 00 00 00 00 00 40 f6 
c7 01 0f 84 1e ff ff ff f0 80 66 01 f7 e9 14 ff ff ff 0f 0b 0f 0b 0f 0b <0f> 0b 0f 
0b 48 8b 53 70 c1 e0 09 41 f6 c4 01 89 43 30 89 42 08 
[  628.055123] RIP  [<ffffffff801646da>] submit_bh+0x14a/0x1d0
[  628.055130]  RSP <ffff8800ed483c88>
[  628.191338] ---[ end trace 84ac243a6201452a ]---
[  643.145963] BUG: Bad page state in process sshd  pfn:36a55
[  643.145973] page:ffff8800fd3d8298 count:0 mapcount:0 mapping:          (null) 
index:0x2
[  643.145978] page flags: 0xffffffff80164b90(dirty|slab|owner_priv_1|arch_1|
private|head|mappedtodisk|reclaim|unevictable)
[  643.145993] Modules linked in: bridge stp llc iptable_filter ip_tables 
x_tables nbd blktap2 pciback usbbk xen_scsibk openvswitch blkbk 
blkback_pagemap netbk xenbus_be gntdev evtchn ocfs2_dlmfs ocfs2_stack_o2cb 
ocfs2_dlm bonding af_packet edd ocfs2 ocfs2_nodemanager configfs 
ocfs2_stackglue quota_tree coretemp domctl crc32c_intel ghash_clmulni_intel 
joydev iTCO_wdt aesni_intel iTCO_vendor_support ablk_helper cryptd lrw 
aes_x86_64 hid_generic gpio_ich xts gf128mul 8250_core pcspkr serio_raw igb 
ixgbe lpc_ich mfd_core i2c_i801 serial_core usbhid sg i7core_edac ioatdma ptp 
pps_core edac_core hid mdio ses enclosure button uhci_hcd mgag200 ttm 
drm_kms_helper drm i2c_algo_bit sysimgblt sysfillrect i2c_core syscopyarea 
ehci_hcd usbcore usb_common processor thermal_sys hwmon scsi_dh_alua 
scsi_dh_hp_sw scsi_dh_emc scsi_dh_rdac scsi_dh xenblk cdrom xennet ata_generic 
ata_piix megaraid_sas
[  643.146109] Pid: 5651, comm: sshd Tainted: G      D      3.7.9-27-xen #1
[  643.146114] Call Trace:
[  643.146129]  [<ffffffff80008ad5>] dump_trace+0x85/0x1c0
[  643.146138]  [<ffffffff804f8949>] dump_stack+0x69/0x6f
[  643.146146]  [<ffffffff804fac88>] bad_page+0xe7/0xfb
[  643.146155]  [<ffffffff800edf4a>] get_page_from_freelist+0x63a/0x750
[  643.146164]  [<ffffffff800ee1da>] __alloc_pages_nodemask+0x17a/0x950
[  643.146172]  [<ffffffff8010e17b>] handle_pte_fault+0x41b/0x7d0
[  643.146182]  [<ffffffff80506ece>] __do_page_fault+0x19e/0x540
[  643.146190]  [<ffffffff80503c98>] page_fault+0x28/0x30
[  643.146200]  [<00007fd2d8a9961b>] 0x7fd2d8a9961a


linux-3.7/fs/buffer.c:2952 ->   BUG_ON(!bh->b_end_io);

What is the nature of this bug?

-- 
Best regards,
Eugene Istomin
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://oss.oracle.com/pipermail/ocfs2-devel/attachments/20130219/9d30aa71/attachment.html 


More information about the Ocfs2-devel mailing list