From: bugzilla-daemon@bugzilla.kernel.org Subject: [Bug 45621] New: Kernel ooops: BUG: unable to handle kernel paging request at 000000080000001c Date: Sat, 4 Aug 2012 23:33:18 +0000 (UTC) Message-ID: Mime-Version: 1.0 Content-Type: text/plain; charset="UTF-8" To: linux-ext4@vger.kernel.org Return-path: Received: from mail.kernel.org ([198.145.19.201]:50026 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754151Ab2HDXdW (ORCPT ); Sat, 4 Aug 2012 19:33:22 -0400 Received: from mail.kernel.org (localhost [127.0.0.1]) by mail.kernel.org (Postfix) with ESMTP id BB7FE201FD for ; Sat, 4 Aug 2012 23:33:20 +0000 (UTC) Received: from bugzilla.kernel.org (unknown [198.145.19.217]) by mail.kernel.org (Postfix) with ESMTP id B58DF201FE for ; Sat, 4 Aug 2012 23:33:18 +0000 (UTC) Sender: linux-ext4-owner@vger.kernel.org List-ID: https://bugzilla.kernel.org/show_bug.cgi?id=45621 Summary: Kernel ooops: BUG: unable to handle kernel paging request at 000000080000001c Product: File System Version: 2.5 Kernel Version: 3.4.7 Platform: All OS/Version: Linux Tree: Mainline Status: NEW Severity: normal Priority: P1 Component: ext4 AssignedTo: fs_ext4@kernel-bugs.osdl.org ReportedBy: markus.doits@googlemail.com Regression: No During heavy io on my ext4 filesystems, I sometimes get this oops: [10645.902287] BUG: unable to handle kernel paging request at 000000080000001c [10645.902881] IP: [] find_get_page+0x41/0xa0 [10645.903359] PGD 1e21cb067 PUD 0 [10645.903638] Oops: 0000 [#1] PREEMPT SMP [10645.903986] CPU 1 [10645.904147] Modules linked in: md5 aes_x86_64 aes_generic xts gf128mul dm_crypt dm_mod usb_storage uas nfsd exportfs tun w83627ehf hwmon_vid iptable_filter ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_conntrack ip_tables x_tables rc_dib0700_rc5 dvb_usb_dib0700 dib3000mc dib8000 dib0070 dib7000m dib7000p dibx000_common dib0090 dvb_usb dvb_core microcode i915 iTCO_wdt i2c_algo_bit drm_kms_helper intel_agp iTCO_vendor_support drm psmouse ghash_clmulni_intel mei(C) evdev atl1c rc_core intel_gtt pcspkr serio_raw i2c_i801 i2c_core acpi_cpufreq mperf processor cryptd coretemp crc32c_intel video button loop fuse nfs nfs_acl lockd auth_rpcgss sunrpc fscache ext4 crc16 jbd2 mbcache sd_mod ahci libahci ehci_hcd xhci_hcd libata scsi_mod usbcore usb_common [10645.910482] [10645.910602] Pid: 2958, comm: rsync Tainted: G C 3.4.7-1-ARCH #1 To Be Filled By O.E.M. To Be Filled By O.E.M./H61M/U3S3 [10645.911595] RIP: 0010:[] [] find_get_page+0x41/0xa0 [10645.912276] RSP: 0018:ffff8801fe1eba28 EFLAGS: 00010246 [10645.912713] RAX: ffff880100ad1198 RBX: 0000000800000000 RCX: 00000000fffffffa [10645.913303] RDX: 0000000000000001 RSI: ffff880100ad1198 RDI: 0000000000000000 [10645.913893] RBP: ffff8801fe1eba48 R08: 0000000800000000 R09: ffff880100ad0f88 [10645.914481] R10: ffffffffa0188e00 R11: 0000000000000000 R12: ffff88008a307058 [10645.915071] R13: 00000000000084bf R14: 000000000102005a R15: 0000000000000050 [10645.915663] FS: 00007f8c4d7f4700(0000) GS:ffff88021f280000(0000) knlGS:0000000000000000 [10645.916333] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [10645.916807] CR2: 000000080000001c CR3: 00000001d296a000 CR4: 00000000000407e0 [10645.917393] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [10645.917985] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 [10645.918574] Process rsync (pid: 2958, threadinfo ffff8801fe1ea000, task ffff880211fcafa0) [10645.919250] Stack: [10645.919413] ffff8801fe1eba48 ffff88008a307050 00000000000084bf 00000000000084bf [10645.920059] ffff8801fe1eba78 ffffffff8110c6d6 ffff8801fe1eba68 ffffffffa00558d3 [10645.920702] 0000000000000004 ffff88008a307050 ffff8801fe1ebac8 ffffffff8110cdf2 [10645.921344] Call Trace: [10645.942181] [] find_lock_page+0x26/0x80 [10645.963412] [] ? jbd2_journal_start+0x13/0x20 [jbd2] [10645.984833] [] grab_cache_page_write_begin+0x72/0x100 [10645.984853] [] ext4_da_write_begin+0xa0/0x230 [ext4] [10645.984858] [] ? ext4_da_write_end+0xad/0x390 [ext4] [10645.984861] [] generic_file_buffered_write+0x124/0x2b0 [10645.984864] [] __generic_file_aio_write+0x22a/0x440 [10645.984868] [] ? __mutex_lock_slowpath+0x24e/0x340 [10645.984871] [] generic_file_aio_write+0x71/0xe0 [10645.984876] [] ext4_file_write+0xaf/0x260 [ext4] [10645.984879] [] do_sync_write+0xe6/0x120 [10645.984883] [] ? security_file_permission+0x2c/0xb0 [10645.984885] [] ? rw_verify_area+0x61/0xf0 [10645.984887] [] vfs_write+0xa8/0x180 [10645.984888] [] sys_write+0x4a/0xa0 [10645.984891] [] system_call_fastpath+0x16/0x1b [10645.984892] Code: 89 f5 4c 8d 63 08 e8 3f 8e fc ff 4c 89 ee 4c 89 e7 e8 f4 77 13 00 48 85 c0 48 89 c6 74 44 48 8b 18 48 85 db 74 22 f6 c3 03 75 3f <8b> 53 1c 85 d2 74 d9 8d 7a 01 89 d0 f0 0f b1 7b 1c 39 c2 75 26 [10645.984908] RIP [] find_get_page+0x41/0xa0 [10645.984910] RSP [10645.984911] CR2: 000000080000001c [10646.075497] ---[ end trace 9841da8b9a0cb390 ]--- Using archlinux stable. Anything else I can do to hunt this bug down? -- Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching the assignee of the bug.