← Back to team overview

kernel-packages team mailing list archive

[Bug 1384711] Re: btrfs oops on current 3.13

 

** Changed in: linux (Ubuntu)
       Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1384711

Title:
  btrfs oops on current 3.13

Status in linux package in Ubuntu:
  Fix Released

Bug description:
  I've recently been getting a few kernel panics which I've tracked down
  to having panic_on_oops set to 1 and which appear to be related to
  this oops:

  [ 2182.341680] general protection fault: 0000 [#1] SMP 
  [ 2182.341702] Modules linked in: xt_CHECKSUM esp6 xfrm6_mode_transport ipcomp6 xfrm6_tunnel tunnel6 authenc xfrm4_mode_transport xfrm6_mode_tunnel veth xfrm4_mode_tunnel
   deflate xfrm_user xfrm4_tunnel ipcomp xfrm_ipcomp esp4 ah4 af_key xfrm_algo zram(C) xt_TCPMSS ip6table_mangle iptable_mangle xt_LOG ip6t_REJECT ipt_REJECT xt_nat xt_tcpu
  dp xt_mark nf_conntrack_ipv6 nf_defrag_ipv6 ipt_MASQUERADE xt_conntrack iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack ip6table_filter ip6_t
  ables iptable_filter ip_tables x_tables bridge stp llc sit tunnel4 ip_tunnel dm_crypt lpc_ich mac_hid intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel 
  lp kvm parport serio_raw crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd btrfs xor raid6_pq libcrc32c
   ast syscopyarea sysfillrect sysimgblt i2c_algo_bit e1000e ttm drm_kms_helper mpt2sas ahci ptp psmouse drm raid_class libahci pps_core scsi_transport_sas video
  [ 2182.342026] CPU: 2 PID: 10845 Comm: java Tainted: G         C    3.13.0-37-generic #64-Ubuntu
  [ 2182.342053] Hardware name: To be filled by O.E.M. To be filled by O.E.M./P8B-M Series, BIOS 6702 07/23/2013
  [ 2182.342086] task: ffff88065fc4b000 ti: ffff880677f12000 task.ti: ffff880677f12000
  [ 2182.342111] RIP: 0010:[<ffffffff8136f826>]  [<ffffffff8136f826>] memcpy+0x6/0x110
  [ 2182.342141] RSP: 0018:ffff880677f139b0  EFLAGS: 00010207
  [ 2182.342160] RAX: ffff88008ba80156 RBX: 000000000000010b RCX: 000000000000010b
  [ 2182.342187] RDX: 000000000000010b RSI: 0005080000000000 RDI: ffff88008ba80156
  [ 2182.342223] RBP: ffff880677f139e8 R08: 0000000000001000 R09: ffff880677f139b8
  [ 2182.342248] R10: 0000000000000000 R11: 0000000000000003 R12: ffff8806daea9128
  [ 2182.342274] R13: 0000160000000000 R14: ffff88008ba80261 R15: 000000000000010b
  [ 2182.342300] FS:  00007fd89af79700(0000) GS:ffff88082fc80000(0000) knlGS:0000000000000000
  [ 2182.342329] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  [ 2182.342350] CR2: 00000001009a6400 CR3: 00000006d52b8000 CR4: 00000000001407e0
  [ 2182.342378] Stack:
  [ 2182.342387]  ffffffffa02124cc 0000000000001000 ffff88074f09d800 ffff8808020cfd80
  [ 2182.342419]  0000000000000000 ffff880677376df0 ffff880604eebab0 ffff880677f13aa8
  [ 2182.342452]  ffffffffa01f740c 0000000000003e30 0000000000000000 0000000000001000
  [ 2182.342484] Call Trace:
  [ 2182.342513]  [<ffffffffa02124cc>] ? read_extent_buffer+0xbc/0x110 [btrfs]
  [ 2182.342548]  [<ffffffffa01f740c>] btrfs_get_extent+0x91c/0x970 [btrfs]
  [ 2182.342582]  [<ffffffffa020e879>] __do_readpage+0x509/0x730 [btrfs]
  [ 2182.342614]  [<ffffffffa01f6af0>] ? btrfs_real_readdir+0x5b0/0x5b0 [btrfs]
  [ 2182.342644]  [<ffffffff811b1986>] ? __mem_cgroup_commit_charge+0x156/0x3d0
  [ 2182.342681]  [<ffffffffa0209e97>] ? btrfs_lookup_ordered_extent+0x27/0x1e0 [btrfs]
  [ 2182.342720]  [<ffffffffa020eb65>] __extent_read_full_page+0xc5/0xe0 [btrfs]
  [ 2182.342756]  [<ffffffffa01f6af0>] ? btrfs_real_readdir+0x5b0/0x5b0 [btrfs]
  [ 2182.342792]  [<ffffffffa0210807>] extent_read_full_page+0x37/0x60 [btrfs]
  [ 2182.342827]  [<ffffffffa01f4e25>] btrfs_readpage+0x25/0x30 [btrfs]
  [ 2182.342861]  [<ffffffffa02028b8>] prepare_uptodate_page+0x38/0x90 [btrfs]
  [ 2182.342895]  [<ffffffffa0202b20>] prepare_pages.isra.17+0x210/0x340 [btrfs]
  [ 2182.342929]  [<ffffffffa020380d>] __btrfs_buffered_write+0x28d/0x490 [btrfs]
  [ 2182.342963]  [<ffffffffa0203c25>] btrfs_file_aio_write+0x215/0x520 [btrfs]
  [ 2182.342991]  [<ffffffff810d7c08>] ? get_futex_key+0x1d8/0x2c0
  [ 2182.343016]  [<ffffffff810d8e41>] ? futex_wake+0x1b1/0x1d0
  [ 2182.343039]  [<ffffffff811bca6a>] do_sync_write+0x5a/0x90
  [ 2182.343061]  [<ffffffff811bd1f4>] vfs_write+0xb4/0x1f0
  [ 2182.344040]  [<ffffffff811bdc29>] SyS_write+0x49/0xa0
  [ 2182.345042]  [<ffffffff8172f82d>] system_call_fastpath+0x1a/0x1f
  [ 2182.346056] Code: 43 58 48 2b 43 50 88 43 4e 5b 5d c3 66 0f 1f 84 00 00 00 00 00 e8 fb fb ff ff eb e2 90 90 90 90 90 90 90 90 90 48 89 f8 48 89 d1 <f3> a4 c3 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3 20 4c 8b 06 4c 8b 
  [ 2182.348249] RIP  [<ffffffff8136f826>] memcpy+0x6/0x110
  [ 2182.349288]  RSP <ffff880677f139b0>
  [ 2182.363925] ---[ end trace c24f17a510504fdc ]---

  
  As far as I can tell, that's happening during a simple read access to a file from my zimbra server. It is however not something I can trivially reproduce.

  I also can't get a core because for whatever reason linux-crashdump
  isn't working on that hardware...

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384711/+subscriptions


References