Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757430AbZDIAPo (ORCPT ); Wed, 8 Apr 2009 20:15:44 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1757057AbZDIAP3 (ORCPT ); Wed, 8 Apr 2009 20:15:29 -0400 Received: from rcsinet12.oracle.com ([148.87.113.124]:41038 "EHLO rgminet12.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1757209AbZDIAP2 (ORCPT ); Wed, 8 Apr 2009 20:15:28 -0400 Subject: Re: [2.6.30-rc1] gpf in btrfs during shutdown From: Chris Mason To: Ed Tomlinson Cc: linux-kernel In-Reply-To: <200904081948.02742.edt@aei.ca> References: <1238787179.24082.7.camel@think.oraclecorp.com> <200904081948.02742.edt@aei.ca> Content-Type: text/plain Date: Wed, 08 Apr 2009 20:14:54 -0400 Message-Id: <1239236094.7365.1.camel@think.oraclecorp.com> Mime-Version: 1.0 X-Mailer: Evolution 2.24.1 Content-Transfer-Encoding: 7bit X-Source-IP: acsmt704.oracle.com [141.146.40.82] X-Auth-Type: Internal IP X-CT-RefId: str=0001.0A010207.49DD3E18.00C5:SCFMA4539814,ss=1,fgs=0 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 5529 Lines: 90 On Wed, 2009-04-08 at 19:48 -0400, Ed Tomlinson wrote: > > Chris, > > Just go the following gpf during shutdown runing 2.6.30-rc1 on amd64 on a kernel built with gcc 4.3.3 > > * Unmounting filesystems ...[75813.573941] EXT4-fs: mballoc: 313285 blocks 3098 reqs (2001 success) > [75813.593628] EXT4-fs: mballoc: 1312 extents scanned, 438 goal hits, 1063 2^N hits, 0 breaks, 0 lost > [75813.621386] EXT4-fs: mballoc: 1551 generated and it took 21437865 > [75813.640246] EXT4-fs: mballoc: 364104 preallocated, 204441 discarded > [75813.685443] general protection fault: 0000 [#1] PREEMPT SMP > [75813.698277] last sysfs file: /sys/devices/pci0000:00/0000:00:01.0/0000:01:05.0/enable > [75813.698277] CPU 1 > [75813.698277] Modules linked in: btrfs/etc/init.d/halt zlib_deflate zlib_inflate crc32c libcrc32c radeon drm bridge stp llc bnep rf] > .sh: line 90: 6[75813.698277] Pid: 6768, comm: umount Not tainted 2.6.30-rc1-crc #1 System Product Name > 768 Segmentation[75813.698277] RIP: 0010:[] [] kmem_cache_alloc+0x77/0x210 > fault umou[75813.698277] RSP: 0018:ffff8801466514a8 EFLAGS: 00010046 > nt "${x}" >&/dev[75813.698277] RAX: 0000000000000000 RBX: ffff880028066b40 RCX: ffff88015f3444a0 > /null That's not supposed to happen. Do you have slab (or slub) debug enabled? -chris > [75813.698277] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff80847330 > [75813.698277] RBP: ffff8801466514e8 R08: 00000035c2309000 R09: 0000000000000002 > [75813.698277] R10: 0000000000001000 R11: 0000000000000001 R12: ff880153891480ff > [75813.698277] R13: 0000000000000246 R14: ffffffff8088ca58 R15: 0000000000000080 > [75813.698277] FS: 00007f6dd9cc0740(0000) GS:ffff880028059000(0000) knlGS:0000000000000000 > [75813.698277] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b > [75813.698277] CR2: 00007f6dd964e000 CR3: 00000001425fd000 CR4: 00000000000006e0 > [75813.698277] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 > [75813.698277] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 > [75813.698277] Process umount (pid: 6768, threadinfo ffff880146650000, task ffff88015f3444a0) > [75813.698277] Stack: > [75813.698277] 0000005000e7f0b0 0000000000e7f0b0 0000000000e7f0b0 0000000000000000 > [75813.698277] 0000000000000060 0000000000000051 ffff88013cd073c0 ffff88013cd078a0 > [75813.698277] ffff8801466515a8 ffffffffa04e1365 000000000000be2d 0000000000000000 > [75813.698277] Call Trace: > [75813.698277] [] btrfs_update_delayed_ref+0x245/0x490 [btrfs] > [75813.698277] [] ? sort+0x160/0x250 > [75813.698277] [] __btrfs_update_extent_ref+0x6c/0xb0 [btrfs] > [75813.698277] [] ? _cond_resched+0x44/0xa0 > [75813.698277] [] btrfs_inc_ref+0x6c3/0x7d0 [btrfs][75813.698277] [] ? btrfs_init_new_buffer+0x11c/0x180 [btrfs] > [75813.698277] [] ? write_extent_buffer+0x114/0x330 [btrfs] > [75813.698277] [] ? __btrfs_update_extent_ref+0x0/0xb0 [btrfs] > [75813.698277] [] ? sub_preempt_count+0x69/0x70 > [75813.698277] [] __btrfs_cow_block+0x58a/0xbc0 [btrfs] > [75813.698277] [] btrfs_cow_block+0x109/0x270 [btrfs] > [75813.698277] [] btrfs_search_slot+0x202/0x880 [btrfs] > [75813.698277] [] lookup_extent_backref+0x68/0x160 [btrfs] > [75813.698277] [] ? sub_preempt_count+0x69/0x70 > [75813.698277] [] __btrfs_free_extent+0x18d/0x950 [btrfs] > [75813.698277] [] ? sub_preempt_count+0x69/0x70 > [75813.698277] [] ? add_preempt_count+0x61/0x70 > [75813.698277] [] run_one_delayed_ref+0x27d/0x2c0 [btrfs] > [75813.698277] [] run_clustered_refs+0xd6/0x250 [btrfs] > [75813.698277] [] btrfs_run_delayed_refs+0xd6/0x2b0 [btrfs] > [75813.698277] [] btrfs_commit_tree_roots+0xb4/0x2f0 [btrfs] > [75813.698277] [] btrfs_commit_transaction+0x5cb/0xa00 [btrfs] > [75813.698277] [] ? autoremove_wake_function+0x0/0x70 > [75813.698277] [] ? start_transaction+0x125/0x170 [btrfs] > [75813.698277] [] btrfs_sync_fs+0x66/0xb0 [btrfs] > [75813.698277] [] __fsync_super+0x66/0xa0 > [75813.698277] [] fsync_super+0x25/0x50 > [75813.698277] [] generic_shutdown_super+0x3e/0x170 > [75813.698277] [] kill_anon_super+0x25/0x70 > [75813.698277] [] deactivate_super+0x69/0xa0 > [75813.698277] [] mntput_no_expire+0x1ac/0x1e0 > [75813.698277] [] sys_umount+0x76/0x3e0 > [75813.698277] [] system_call_fastpath+0x16/0x1b > [75813.698277] Code: 8b 9c c6 e8 00 00 00 48 83 3b 00 44 8b 7b 18 0f 84 77 01 00 00 31 d2 31 f6 48 c7 c7 30 73 84 80 e8 ff 2d fb ff > [75813.698277] RIP [] kmem_cache_alloc+0x77/0x210 > [75813.698277] RSP > [75813.698277] ---[ end trace a92f79fb0023c3c1 ]--- > > Followed by many more... > > Hope this helps, > Ed Tomlinson > > -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/