Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757299AbaAHUQ7 (ORCPT ); Wed, 8 Jan 2014 15:16:59 -0500 Received: from mx0b-00082601.pphosted.com ([67.231.153.30]:35675 "EHLO mx0a-00082601.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751273AbaAHUQz convert rfc822-to-8bit (ORCPT ); Wed, 8 Jan 2014 15:16:55 -0500 From: Chris Mason To: "muthu.lkml@gmail.com" CC: "kmo@daterainc.com" , "linux-btrfs@vger.kernel.org" , "fengguang.wu@intel.com" , "linux-kernel@vger.kernel.org" , "lkp@linux.intel.com" , "axboe@kernel.dk" , "linux-fsdevel@vger.kernel.org" Subject: Re: [block:for-3.14/core] kernel BUG at fs/bio.c:1748 Thread-Topic: [block:for-3.14/core] kernel BUG at fs/bio.c:1748 Thread-Index: AQHPCL03PcXQz/ImsUiAzg3MZ0ORWpp4zOEAgAAr4ACAAFVnAIAA8PCAgAAEF4CAAA6/AIABdgMAgAADfgCAAAZsgA== Date: Wed, 8 Jan 2014 20:16:43 +0000 Message-ID: <1389212231.23310.33.camel@ret.masoncoding.com> References: <20140102053101.GA29352@localhost> <20140106221036.GE9037@kmo> <20140107055318.GA19016@localhost> <1389126617.23310.19.camel@ret.masoncoding.com> <1389210102.23310.31.camel@ret.masoncoding.com> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [192.168.16.4] Content-Type: text/plain; charset="utf-7" Content-ID: <027F44E7846408448DABB2418E715E36@fb.com> Content-Transfer-Encoding: 8BIT MIME-Version: 1.0 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:5.11.87,1.0.14,0.0.0000 definitions=2014-01-08_08:2014-01-07,2014-01-08,1970-01-01 signatures=0 X-Proofpoint-Spam-Details: rule=fb_default_notspam policy=fb_default score=0 kscore.is_bulkscore=0 kscore.compositescore=0 circleOfTrustscore=184.135548313533 compositescore=0.324642340081358 urlsuspect_oldscore=0.324642340081358 suspectscore=0 recipient_domain_to_sender_totalscore=0 phishscore=0 bulkscore=0 kscore.is_spamscore=0 recipient_to_sender_totalscore=0 recipient_domain_to_sender_domain_totalscore=2524143 rbsscore=0.324642340081358 spamscore=0 recipient_to_sender_domain_totalscore=122 urlsuspectscore=0.9 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=7.0.1-1305240000 definitions=main-1401080119 X-FB-Internal: deliver Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 2014-01-08 at 11:54 -0800, Muthu Kumar wrote: +AD4- Chris, +AD4- +AD4- +AFs- 8.336061+AF0- WARNING: CPU: 0 PID: 0 at fs/bio.c:1778 bio+AF8-endio+-0xbe/0x100() +AD4- +AFs- 8.336062+AF0- bio+AF8-endio: bio for (unknown) without endio +AD4- +AD4- This is my recent change to avoid memory leak in bio+AF8-endio. But I +AD4- think the problem is higher up, most likely bio+AF8-endio is called twice +AD4- on the same bio (which was freed before). +AD4- I think these are just two separate problems. Lets ignore the WARN+AF8-ON for now. +AD4- Are you running the unmodified for-3.14/core or do you have local patches? +AD4- It's for-3.14/core with my btrfs branch. Basically rc7 instead of rc6 but no changes to the block layer. I hadn't mounted btrfs yet. -chris -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/