lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 27 Jun 2012 19:24:30 +0200
From:	Frederik Himpe <fhimpe@...enet.be>
To:	linux-btrfs@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: 3.5.0-rc4: kernel BUG at fs/btrfs/inode.c:3758!

After an unclean shutdown, Linux 3.5-rc4 fails to mount one of my btrfs 
file systems. This backtrace can be found in the logs:

[    7.765748] ------------[ cut here ]------------
[    7.768309] kernel BUG at fs/btrfs/inode.c:3758!
[    7.770865] invalid opcode: 0000 [#1] SMP
[    7.773432] CPU 1
[    7.776036] Modules linked in: ext4 crc16 jbd2 mbcache vhost_net tun 
macvtap macvlan netconsole configfs loop snd_hda_codec_hdmi 
snd_hda_codec_realtek coretemp kvm_intel kvm snd_usb_audio crc32c_intel 
snd_usbmidi_lib snd_seq_midi ghash_clmulni_intel snd_seq_midi_event 
snd_rawmidi aesni_intel joydev evdev aes_x86_64 aes_generic 
snd_hda_intel uvcvideo cryptd acpi_cpufreq usb_storage snd_hda_codec uas 
videobuf2_vmalloc snd_hwdep snd_pcm videobuf2_memops videobuf2_core 
snd_page_alloc videodev snd_seq snd_seq_device media snd_timer 
hid_generic mperf psmouse video microcode snd radeon ttm drm_kms_helper 
drm i2c_i801 pcspkr i2c_algo_bit button i2c_core serio_raw soundcore 
lpc_ich mei mfd_core processor thermal_sys btrfs crc32c libcrc32c 
zlib_deflate dm_mod usbhid hid sr_mod sd_mod cdrom crc_t10dif xhci_hcd 
r8169 ahci libahci mii ehci_hcd libata scsi_mod usbcore usb_common [last 
unloaded: scsi_wait_scan]
[    7.787771]
[    7.790804] Pid: 1864, comm: mount Not tainted 3.5.0-rc4-custom-1 #2 
To Be Filled By O.E.M. To Be Filled By O.E.M./H77 Pro4/MVP
[    7.793943] RIP: 0010:[<ffffffffa017c720>]  [<ffffffffa017c720>] 
btrfs_evict_inode+0xc0/0x266 [btrfs]
[    7.797105] RSP: 0018:ffff880417ca1a58  EFLAGS: 00010246
[    7.800249] RAX: 0000000000000000 RBX: ffff880417d92000 RCX: 
000000000000001a
[    7.803405] RDX: 000000000000001a RSI: ffffffffffffffff RDI: 
ffff8804151588f0
[    7.806545] RBP: ffff8804151589b0 R08: ffff880417ca1978 R09: 
0000000000000002
[    7.809681] R10: ffff880417ca1880 R11: 0000000000000001 R12: 
ffffffffa01bc230
[    7.812813] R13: 0000000000001000 R14: 0000000000001000 R15: 
ffff88041770a000
[    7.815915] FS:  00007fc41ab767e0(0000) GS:ffff88042f280000(0000) 
knlGS:0000000000000000
[    7.819037] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[    7.822155] CR2: 00007ff2902e8670 CR3: 0000000417cd9000 CR4: 
00000000001407e0
[    7.825274] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 
0000000000000000
[    7.828375] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 
0000000000000400
[    7.831427] Process mount (pid: 1864, threadinfo ffff880417ca0000, 
task ffff880417d1f510)
[    7.834526] Stack:
[    7.837591]  ffff8804153f4fa0 ffff880415158a38 ffff8804151589b0 
ffff8804151589b0
[    7.840733]  ffff880415158ab0 ffffffffa01bc230 ffff8804151589b0 
ffff880417d92400
[    7.843886]  ffff88041770a000 ffffffff811143d0 ffff8804152f0e20 
ffff880417d92000
[    7.847052] Call Trace:
[    7.850167]  [<ffffffff811143d0>] ? evict+0xa3/0x153
[    7.853311]  [<ffffffffa01a29f9>] ? fixup_inode_link_counts+0xd2/0xfb 
[btrfs]
[    7.856474]  [<ffffffffa0170b7d>] ? 
btrfs_read_fs_root_no_radix+0x170/0x1af [btrfs]
[    7.859647]  [<ffffffffa01a3b0b>] ? 
btrfs_recover_log_trees+0x207/0x2dd [btrfs]
[    7.862829]  [<ffffffffa01a253e>] ? replay_one_extent+0x439/0x439 [btrfs]
[    7.866009]  [<ffffffffa0172dd6>] ? open_ctree+0x137d/0x16cb [btrfs]
[    7.869162]  [<ffffffff811b458c>] ? ida_get_new_above+0x16c/0x17d
[    7.872298]  [<ffffffffa0156d83>] ? btrfs_mount+0x383/0x4b3 [btrfs]
[    7.875401]  [<ffffffff810d3f51>] ? pcpu_next_pop+0x36/0x43
[    7.878514]  [<ffffffff810f37bc>] ? __kmalloc_track_caller+0xd8/0xea
[    7.881632]  [<ffffffff811044d3>] ? mount_fs+0x61/0x146
[    7.884748]  [<ffffffff81116f7d>] ? vfs_kern_mount+0x62/0xe3
[    7.887868]  [<ffffffff81117484>] ? do_kern_mount+0x49/0xdd
[    7.890979]  [<ffffffff81118c69>] ? do_mount+0x68a/0x710
[    7.894091]  [<ffffffff810d0ffe>] ? memdup_user+0x36/0x5b
[    7.897208]  [<ffffffff81118e0f>] ? sys_mount+0x80/0xba
[    7.900330]  [<ffffffff813683fd>] ? system_call_fastpath+0x1a/0x1f
[    7.903498] Code: 00 48 83 ca ff 31 f6 48 89 ef e8 3d 05 01 00 48 8b 
83 20 01 00 00 83 b8 50 0e 00 00 00 74 0e 48 8b 45 98 a8 20 0f 85 7b 01 
00 00 <0f> 0b 83 7d 48 00 74 0f 83 bb f8 00 00 00 00 0f 84 66 01 00 00
[    7.906842] RIP  [<ffffffffa017c720>] btrfs_evict_inode+0xc0/0x266 
[btrfs]
[    7.910186]  RSP <ffff880417ca1a58>
[    7.913561] ---[ end trace 86ad814028ba0f01 ]---

Full dmesg attached.

-- 
Frederik Himpe

View attachment "dmesg" of type "text/plain" (78583 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ