kernel-packages team mailing list archive
-
kernel-packages team
-
Mailing list archive
-
Message #86786
[Bug 1384711] Re: btrfs oops on current 3.13
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Colin Ian King (colin-king)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1384711
Title:
btrfs oops on current 3.13
Status in “linux” package in Ubuntu:
Confirmed
Bug description:
I've recently been getting a few kernel panics which I've tracked down
to having panic_on_oops set to 1 and which appear to be related to
this oops:
[ 2182.341680] general protection fault: 0000 [#1] SMP
[ 2182.341702] Modules linked in: xt_CHECKSUM esp6 xfrm6_mode_transport ipcomp6 xfrm6_tunnel tunnel6 authenc xfrm4_mode_transport xfrm6_mode_tunnel veth xfrm4_mode_tunnel
deflate xfrm_user xfrm4_tunnel ipcomp xfrm_ipcomp esp4 ah4 af_key xfrm_algo zram(C) xt_TCPMSS ip6table_mangle iptable_mangle xt_LOG ip6t_REJECT ipt_REJECT xt_nat xt_tcpu
dp xt_mark nf_conntrack_ipv6 nf_defrag_ipv6 ipt_MASQUERADE xt_conntrack iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack ip6table_filter ip6_t
ables iptable_filter ip_tables x_tables bridge stp llc sit tunnel4 ip_tunnel dm_crypt lpc_ich mac_hid intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel
lp kvm parport serio_raw crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd btrfs xor raid6_pq libcrc32c
ast syscopyarea sysfillrect sysimgblt i2c_algo_bit e1000e ttm drm_kms_helper mpt2sas ahci ptp psmouse drm raid_class libahci pps_core scsi_transport_sas video
[ 2182.342026] CPU: 2 PID: 10845 Comm: java Tainted: G C 3.13.0-37-generic #64-Ubuntu
[ 2182.342053] Hardware name: To be filled by O.E.M. To be filled by O.E.M./P8B-M Series, BIOS 6702 07/23/2013
[ 2182.342086] task: ffff88065fc4b000 ti: ffff880677f12000 task.ti: ffff880677f12000
[ 2182.342111] RIP: 0010:[<ffffffff8136f826>] [<ffffffff8136f826>] memcpy+0x6/0x110
[ 2182.342141] RSP: 0018:ffff880677f139b0 EFLAGS: 00010207
[ 2182.342160] RAX: ffff88008ba80156 RBX: 000000000000010b RCX: 000000000000010b
[ 2182.342187] RDX: 000000000000010b RSI: 0005080000000000 RDI: ffff88008ba80156
[ 2182.342223] RBP: ffff880677f139e8 R08: 0000000000001000 R09: ffff880677f139b8
[ 2182.342248] R10: 0000000000000000 R11: 0000000000000003 R12: ffff8806daea9128
[ 2182.342274] R13: 0000160000000000 R14: ffff88008ba80261 R15: 000000000000010b
[ 2182.342300] FS: 00007fd89af79700(0000) GS:ffff88082fc80000(0000) knlGS:0000000000000000
[ 2182.342329] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 2182.342350] CR2: 00000001009a6400 CR3: 00000006d52b8000 CR4: 00000000001407e0
[ 2182.342378] Stack:
[ 2182.342387] ffffffffa02124cc 0000000000001000 ffff88074f09d800 ffff8808020cfd80
[ 2182.342419] 0000000000000000 ffff880677376df0 ffff880604eebab0 ffff880677f13aa8
[ 2182.342452] ffffffffa01f740c 0000000000003e30 0000000000000000 0000000000001000
[ 2182.342484] Call Trace:
[ 2182.342513] [<ffffffffa02124cc>] ? read_extent_buffer+0xbc/0x110 [btrfs]
[ 2182.342548] [<ffffffffa01f740c>] btrfs_get_extent+0x91c/0x970 [btrfs]
[ 2182.342582] [<ffffffffa020e879>] __do_readpage+0x509/0x730 [btrfs]
[ 2182.342614] [<ffffffffa01f6af0>] ? btrfs_real_readdir+0x5b0/0x5b0 [btrfs]
[ 2182.342644] [<ffffffff811b1986>] ? __mem_cgroup_commit_charge+0x156/0x3d0
[ 2182.342681] [<ffffffffa0209e97>] ? btrfs_lookup_ordered_extent+0x27/0x1e0 [btrfs]
[ 2182.342720] [<ffffffffa020eb65>] __extent_read_full_page+0xc5/0xe0 [btrfs]
[ 2182.342756] [<ffffffffa01f6af0>] ? btrfs_real_readdir+0x5b0/0x5b0 [btrfs]
[ 2182.342792] [<ffffffffa0210807>] extent_read_full_page+0x37/0x60 [btrfs]
[ 2182.342827] [<ffffffffa01f4e25>] btrfs_readpage+0x25/0x30 [btrfs]
[ 2182.342861] [<ffffffffa02028b8>] prepare_uptodate_page+0x38/0x90 [btrfs]
[ 2182.342895] [<ffffffffa0202b20>] prepare_pages.isra.17+0x210/0x340 [btrfs]
[ 2182.342929] [<ffffffffa020380d>] __btrfs_buffered_write+0x28d/0x490 [btrfs]
[ 2182.342963] [<ffffffffa0203c25>] btrfs_file_aio_write+0x215/0x520 [btrfs]
[ 2182.342991] [<ffffffff810d7c08>] ? get_futex_key+0x1d8/0x2c0
[ 2182.343016] [<ffffffff810d8e41>] ? futex_wake+0x1b1/0x1d0
[ 2182.343039] [<ffffffff811bca6a>] do_sync_write+0x5a/0x90
[ 2182.343061] [<ffffffff811bd1f4>] vfs_write+0xb4/0x1f0
[ 2182.344040] [<ffffffff811bdc29>] SyS_write+0x49/0xa0
[ 2182.345042] [<ffffffff8172f82d>] system_call_fastpath+0x1a/0x1f
[ 2182.346056] Code: 43 58 48 2b 43 50 88 43 4e 5b 5d c3 66 0f 1f 84 00 00 00 00 00 e8 fb fb ff ff eb e2 90 90 90 90 90 90 90 90 90 48 89 f8 48 89 d1 <f3> a4 c3 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3 20 4c 8b 06 4c 8b
[ 2182.348249] RIP [<ffffffff8136f826>] memcpy+0x6/0x110
[ 2182.349288] RSP <ffff880677f139b0>
[ 2182.363925] ---[ end trace c24f17a510504fdc ]---
As far as I can tell, that's happening during a simple read access to a file from my zimbra server. It is however not something I can trivially reproduce.
I also can't get a core because for whatever reason linux-crashdump
isn't working on that hardware...
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1384711/+subscriptions
References