From: bugzilla-daemon@bugzilla.kernel.org
Subject: [Bug 45621] New: Kernel ooops: BUG: unable to handle kernel paging
request at 000000080000001c
Date: Sat, 4 Aug 2012 23:33:18 +0000 (UTC)
Message-ID:
Mime-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
To: linux-ext4@vger.kernel.org
Return-path:
Received: from mail.kernel.org ([198.145.19.201]:50026 "EHLO mail.kernel.org"
rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP
id S1754151Ab2HDXdW (ORCPT );
Sat, 4 Aug 2012 19:33:22 -0400
Received: from mail.kernel.org (localhost [127.0.0.1])
by mail.kernel.org (Postfix) with ESMTP id BB7FE201FD
for ; Sat, 4 Aug 2012 23:33:20 +0000 (UTC)
Received: from bugzilla.kernel.org (unknown [198.145.19.217])
by mail.kernel.org (Postfix) with ESMTP id B58DF201FE
for ; Sat, 4 Aug 2012 23:33:18 +0000 (UTC)
Sender: linux-ext4-owner@vger.kernel.org
List-ID:
https://bugzilla.kernel.org/show_bug.cgi?id=45621
Summary: Kernel ooops: BUG: unable to handle kernel paging
request at 000000080000001c
Product: File System
Version: 2.5
Kernel Version: 3.4.7
Platform: All
OS/Version: Linux
Tree: Mainline
Status: NEW
Severity: normal
Priority: P1
Component: ext4
AssignedTo: fs_ext4@kernel-bugs.osdl.org
ReportedBy: markus.doits@googlemail.com
Regression: No
During heavy io on my ext4 filesystems, I sometimes get this oops:
[10645.902287] BUG: unable to handle kernel paging request at 000000080000001c
[10645.902881] IP: [] find_get_page+0x41/0xa0
[10645.903359] PGD 1e21cb067 PUD 0
[10645.903638] Oops: 0000 [#1] PREEMPT SMP
[10645.903986] CPU 1
[10645.904147] Modules linked in: md5 aes_x86_64 aes_generic xts gf128mul
dm_crypt dm_mod usb_storage uas nfsd exportfs tun w83627ehf hwmon_vid
iptable_filter ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4
nf_defrag_ipv4 nf_conntrack ip_tables x_tables rc_dib0700_rc5 dvb_usb_dib0700
dib3000mc dib8000 dib0070 dib7000m dib7000p dibx000_common dib0090 dvb_usb
dvb_core microcode i915 iTCO_wdt i2c_algo_bit drm_kms_helper intel_agp
iTCO_vendor_support drm psmouse ghash_clmulni_intel mei(C) evdev atl1c rc_core
intel_gtt pcspkr serio_raw i2c_i801 i2c_core acpi_cpufreq mperf processor
cryptd coretemp crc32c_intel video button loop fuse nfs nfs_acl lockd
auth_rpcgss sunrpc fscache ext4 crc16 jbd2 mbcache sd_mod ahci libahci ehci_hcd
xhci_hcd libata scsi_mod usbcore usb_common
[10645.910482]
[10645.910602] Pid: 2958, comm: rsync Tainted: G C 3.4.7-1-ARCH #1 To
Be Filled By O.E.M. To Be Filled By O.E.M./H61M/U3S3
[10645.911595] RIP: 0010:[] []
find_get_page+0x41/0xa0
[10645.912276] RSP: 0018:ffff8801fe1eba28 EFLAGS: 00010246
[10645.912713] RAX: ffff880100ad1198 RBX: 0000000800000000 RCX:
00000000fffffffa
[10645.913303] RDX: 0000000000000001 RSI: ffff880100ad1198 RDI:
0000000000000000
[10645.913893] RBP: ffff8801fe1eba48 R08: 0000000800000000 R09:
ffff880100ad0f88
[10645.914481] R10: ffffffffa0188e00 R11: 0000000000000000 R12:
ffff88008a307058
[10645.915071] R13: 00000000000084bf R14: 000000000102005a R15:
0000000000000050
[10645.915663] FS: 00007f8c4d7f4700(0000) GS:ffff88021f280000(0000)
knlGS:0000000000000000
[10645.916333] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[10645.916807] CR2: 000000080000001c CR3: 00000001d296a000 CR4:
00000000000407e0
[10645.917393] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
0000000000000000
[10645.917985] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7:
0000000000000400
[10645.918574] Process rsync (pid: 2958, threadinfo ffff8801fe1ea000, task
ffff880211fcafa0)
[10645.919250] Stack:
[10645.919413] ffff8801fe1eba48 ffff88008a307050 00000000000084bf
00000000000084bf
[10645.920059] ffff8801fe1eba78 ffffffff8110c6d6 ffff8801fe1eba68
ffffffffa00558d3
[10645.920702] 0000000000000004 ffff88008a307050 ffff8801fe1ebac8
ffffffff8110cdf2
[10645.921344] Call Trace:
[10645.942181] [] find_lock_page+0x26/0x80
[10645.963412] [] ? jbd2_journal_start+0x13/0x20 [jbd2]
[10645.984833] [] grab_cache_page_write_begin+0x72/0x100
[10645.984853] [] ext4_da_write_begin+0xa0/0x230 [ext4]
[10645.984858] [] ? ext4_da_write_end+0xad/0x390 [ext4]
[10645.984861] [] generic_file_buffered_write+0x124/0x2b0
[10645.984864] [] __generic_file_aio_write+0x22a/0x440
[10645.984868] [] ? __mutex_lock_slowpath+0x24e/0x340
[10645.984871] [] generic_file_aio_write+0x71/0xe0
[10645.984876] [] ext4_file_write+0xaf/0x260 [ext4]
[10645.984879] [] do_sync_write+0xe6/0x120
[10645.984883] [] ? security_file_permission+0x2c/0xb0
[10645.984885] [] ? rw_verify_area+0x61/0xf0
[10645.984887] [] vfs_write+0xa8/0x180
[10645.984888] [] sys_write+0x4a/0xa0
[10645.984891] [] system_call_fastpath+0x16/0x1b
[10645.984892] Code: 89 f5 4c 8d 63 08 e8 3f 8e fc ff 4c 89 ee 4c 89 e7 e8 f4
77 13 00 48 85 c0 48 89 c6 74 44 48 8b 18 48 85 db 74 22 f6 c3 03 75 3f <8b> 53
1c 85 d2 74 d9 8d 7a 01 89 d0 f0 0f b1 7b 1c 39 c2 75 26
[10645.984908] RIP [] find_get_page+0x41/0xa0
[10645.984910] RSP
[10645.984911] CR2: 000000080000001c
[10646.075497] ---[ end trace 9841da8b9a0cb390 ]---
Using archlinux stable.
Anything else I can do to hunt this bug down?
--
Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching the assignee of the bug.