[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20080706172147.GA19559@alice>
Date: Sun, 6 Jul 2008 19:21:47 +0200
From: Eric Sesterhenn <snakebyte@....de>
To: linux-ntfs-dev@...ts.sourceforge.net
Cc: linux-kernel@...r.kernel.org
Subject: Oops with corrupted NTFS image
Hi,
when mounting a corrupted ntfs image with errors=recover i get the following oops:
[ 129.615116] NTFS-fs error (device loop0): check_mft_mirror(): $MFT and $MFTMirr (record 0) do not match. Run ntfsfix or chkdsk.
[ 129.627531] NTFS-fs error (device loop0): load_system_files(): $MFTMirr does not match $MFT. Mounting read-only. Run ntfsfix and/or chkdsk.
[ 129.639941] NTFS-fs error (device loop0): map_mft_record_page(): Mft record 0xa is corrupt. Run chkdsk.
[ 129.640212] NTFS-fs error (device loop0): map_mft_record(): Failed with error code 5.
[ 129.640388] NTFS-fs error (device loop0): ntfs_read_locked_inode(): Failed with error code -5. Marking corrupt inode 0xa as bad. Run chkdsk.
[ 129.640623] NTFS-fs error (device loop0): load_and_init_upcase(): Failed to load $UpCase from the volume. Using default.
[ 129.656112] BUG: unable to handle kernel paging request at c982e558
[ 129.656372] IP: [<c030ad5c>] ntfs_read_locked_inode+0x16c/0x1520
[ 129.656656] Oops: 0000 [#1] PREEMPT DEBUG_PAGEALLOC
[ 129.656999] Modules linked in: [last unloaded: rcutorture]
[ 129.657014]
[ 129.657014] Pid: 4676, comm: mount Not tainted (2.6.26-rc8-00290-gb8a0b6c #3)
[ 129.657014] EIP: 0060:[<c030ad5c>] EFLAGS: 00010296 CPU: 0
[ 129.657014] EIP is at ntfs_read_locked_inode+0x16c/0x1520
[ 129.657014] EAX: c982e550 EBX: 00000000 ECX: c9821000 EDX: c9821038
[ 129.657014] ESI: 00000000 EDI: 00000000 EBP: c902ab50 ESP: c902aadc
[ 129.657014] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 0068
[ 129.657014] Process mount (pid: 4676, ti=c902a000 task=c9053f80 task.ti=c902a000)
[ 129.657014] Stack: 00000000 00000000 00000000 00000000 00000000 c9026000 c0cd58fc cbffad84
[ 129.657014] c902ab14 c0976870 c0976870 c0976860 cb6e3a40 c9821000 c982e550 c9026000
[ 129.657014] 00000000 c902ab2c c0755667 cbffac00 c902ab50 c01a22f8 c902ab60 00000001
[ 129.657014] Call Trace:
[ 129.657014] [<c0755667>] ? _spin_unlock+0x27/0x50
[ 129.657014] [<c01a22f8>] ? iget5_locked+0x138/0x160
[ 129.657014] [<c030cc80>] ? ntfs_test_inode+0x0/0x70
[ 129.657014] [<c030c165>] ? ntfs_iget+0x55/0x80
[ 129.657014] [<c030ccf0>] ? ntfs_init_locked_inode+0x0/0xf0
[ 129.657014] [<c031861b>] ? load_and_init_attrdef+0x1b/0x270
[ 129.657014] [<c014678f>] ? lockdep_init_map+0x2f/0x480
[ 129.657014] [<c03021ad>] ? __ntfs_error+0x8d/0xd0
[ 129.657014] [<c0318c16>] ? load_system_files+0x3a6/0x1c50
[ 129.657014] [<c031cd4d>] ? generate_default_upcase+0x2d/0x110
[ 129.657014] [<c031cd4d>] ? generate_default_upcase+0x2d/0x110
[ 129.657014] [<c031cd4d>] ? generate_default_upcase+0x2d/0x110
[ 129.657014] [<c031bf6f>] ? ntfs_fill_super+0xccf/0x1420
[ 129.657014] [<c0190b5f>] ? get_sb_bdev+0xef/0x120
[ 129.657014] [<c01a5afd>] copy_mount_options+0x38/0x140
[ 129.657014] [<c01973ae>] ? getname+0x9e/0xd0
[ 129.657014] [<c01a6f7f>] ? sys_mount+0x6f/0xb0
[ 129.657014] [<c0103d79>] ? sysenter_past_esp+0x6a/0xb1
[ 129.657014] =======================
[ 129.657014] Code: 0c 89 5c 24 04 c7 04 24 00 00 00 00 e8 ae 2b ff ff 85 c0 89 45 cc 0f 85 26 0c 00 00 8b 45 c8 8b 50 04 0f b7 42 14 01 d0 89 45 c4 <8b> 58 08 8b 70 0c 81 c3 00 80 c1 2a 81 d6 21 4e 62 fe 89 d8 89
[ 129.657014] EIP: [<c030ad5c>] ntfs_read_locked_inode+0x16c/0x1520 SS:ESP 0068:c902aadc
[ 129.657014] ---[ end trace 9b1c4369310afb44 ]---
which corresponds to:
(gdb) l *(ntfs_read_locked_inode+0x16c)
0xc030ad5c is in ntfs_read_locked_inode (fs/ntfs/time.h:95).
90 u64 t = (u64)(sle64_to_cpu(time) - NTFS_TIME_OFFSET);
91 /*
92 * Convert the time to 1-second intervals and the remainder to
93 * 1-nano-second intervals.
94 */
95 ts.tv_nsec = do_div(t, 10000000) * 100;
96 ts.tv_sec = t;
97 return ts;
98 }
99
The image is available at www.cccmz.de/~snakebyte/ntfs.33.img.bz2
I can also reproduce this with -rc9 and without having run rcutortue
before.
Greetings, Eric
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists