* [Bug 65701] New: oops: fs/ext4/ext4_jbd2.c @ 2013-11-24 23:44 bugzilla-daemon 2013-11-25 9:38 ` [Bug 65701] " bugzilla-daemon ` (4 more replies) 0 siblings, 5 replies; 6+ messages in thread From: bugzilla-daemon @ 2013-11-24 23:44 UTC (permalink / raw) To: linux-ext4 https://bugzilla.kernel.org/show_bug.cgi?id=65701 Bug ID: 65701 Summary: oops: fs/ext4/ext4_jbd2.c Product: File System Version: 2.5 Kernel Version: Linux 3.11.9-gentoo #1 SMP Sun Nov 24 16:53:58 CET 2013 x86_64 Intel(R) Xeon(R) CPU X5650 @ 2.67GHz GenuineIntel GNU/Linux Hardware: x86-64 OS: Linux Tree: Mainline Status: NEW Severity: normal Priority: P1 Component: ext4 Assignee: fs_ext4@kernel-bugs.osdl.org Reporter: loco@andrews.lv Regression: No The following oops happened shortly after kernel upgrade: [18592.166266] ------------[ cut here ]------------ [18592.166279] WARNING: CPU: 3 PID: 4273 at fs/ext4/ext4_jbd2.c:48 ext4_journal_check_start+0x24/0x67() [18592.166282] Modules linked in: xt_multiport vmwgfx cfbfillrect cfbimgblt cfbcopyarea fb fbdev ttm drm i2c_core agpgart shpchp evdev libcrc32c aes_x86_64 sha256_generic iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi tg3 ptp pps_core e1000 fuse nfs lockd sunrpc reiserfs linear raid10 raid456 async_raid6_recov async_memcpy async_pq raid6_pq async_xor xor async_tx raid1 raid0 dm_snapshot dm_crypt megaraid_sas megaraid_mbox megaraid_mm megaraid hpsa cciss [18592.166378] CPU: 3 PID: 4273 Comm: master Not tainted 3.11.9-gentoo-mrbyte #1 [18592.166382] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 06/22/2012 [18592.166385] 0000000000000000 ffffffff813718c8 0000000000000000 ffffffff81031607 [18592.166390] ffffffff8114b7ac ffff880428c4d000 0000000000000002 0000000000000000 [18592.166394] 0000000000000001 ffffffff8114b7ac ffff880428c4d000 ffffffff8114b82f [18592.166399] Call Trace: [18592.166407] [<ffffffff813718c8>] ? dump_stack+0x41/0x51 [18592.166415] [<ffffffff81031607>] ? warn_slowpath_common+0x6f/0x84 [18592.166420] [<ffffffff8114b7ac>] ? ext4_journal_check_start+0x24/0x67 [18592.166426] [<ffffffff8114b7ac>] ? ext4_journal_check_start+0x24/0x67 [18592.166431] [<ffffffff8114b82f>] ? __ext4_journal_start_sb+0x1b/0x65 [18592.166439] [<ffffffff81136bbf>] ? ext4_dirty_inode+0x20/0x4f [18592.166446] [<ffffffff810e36ec>] ? __mark_inode_dirty+0x27/0x189 [18592.166452] [<ffffffff810da24a>] ? update_time+0xa1/0xa8 [18592.166458] [<ffffffff810340ca>] ? current_fs_time+0x20/0x23 [18592.166463] [<ffffffff810daa2a>] ? file_update_time+0x92/0xb1 [18592.166469] [<ffffffff810ce9a8>] ? pipe_write+0x40e/0x450 [18592.166475] [<ffffffff810c7ea4>] ? do_sync_write+0x52/0x79 [18592.166481] [<ffffffff810c8462>] ? vfs_write+0xa7/0x10b [18592.166486] [<ffffffff810c8aa0>] ? SyS_write+0x41/0x75 [18592.166492] [<ffffffff8137723d>] ? tracesys+0xd4/0xd9 [18592.166495] ---[ end trace f01209520ef673d6 ]--- -- You are receiving this mail because: You are watching the assignee of the bug. ^ permalink raw reply [flat|nested] 6+ messages in thread
* [Bug 65701] oops: fs/ext4/ext4_jbd2.c 2013-11-24 23:44 [Bug 65701] New: oops: fs/ext4/ext4_jbd2.c bugzilla-daemon @ 2013-11-25 9:38 ` bugzilla-daemon 2013-11-25 9:39 ` bugzilla-daemon ` (3 subsequent siblings) 4 siblings, 0 replies; 6+ messages in thread From: bugzilla-daemon @ 2013-11-25 9:38 UTC (permalink / raw) To: linux-ext4 https://bugzilla.kernel.org/show_bug.cgi?id=65701 Dmitry Monakhov <dmonakhov@openvz.org> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |dmonakhov@openvz.org --- Comment #1 from Dmitry Monakhov <dmonakhov@openvz.org> --- In fact this is not ext4's issue, this is generic fs issue. pipe_write() do not accuire sb_start_write(), as far as I understand this is because pipe should not touch fs's data. But it is not completely correct because pipe want update file's time. Let's use same trick as we use in touch_time() pipe_write will call sb_start_write_try() and skip time update on frozen fs. See proposed patch. -- You are receiving this mail because: You are watching the assignee of the bug. ^ permalink raw reply [flat|nested] 6+ messages in thread
* [Bug 65701] oops: fs/ext4/ext4_jbd2.c 2013-11-24 23:44 [Bug 65701] New: oops: fs/ext4/ext4_jbd2.c bugzilla-daemon 2013-11-25 9:38 ` [Bug 65701] " bugzilla-daemon @ 2013-11-25 9:39 ` bugzilla-daemon 2013-11-25 22:15 ` bugzilla-daemon ` (2 subsequent siblings) 4 siblings, 0 replies; 6+ messages in thread From: bugzilla-daemon @ 2013-11-25 9:39 UTC (permalink / raw) To: linux-ext4 https://bugzilla.kernel.org/show_bug.cgi?id=65701 --- Comment #2 from Dmitry Monakhov <dmonakhov@openvz.org> --- Created attachment 115861 --> https://bugzilla.kernel.org/attachment.cgi?id=115861&action=edit this patch should fix an issue -- You are receiving this mail because: You are watching the assignee of the bug. ^ permalink raw reply [flat|nested] 6+ messages in thread
* [Bug 65701] oops: fs/ext4/ext4_jbd2.c 2013-11-24 23:44 [Bug 65701] New: oops: fs/ext4/ext4_jbd2.c bugzilla-daemon 2013-11-25 9:38 ` [Bug 65701] " bugzilla-daemon 2013-11-25 9:39 ` bugzilla-daemon @ 2013-11-25 22:15 ` bugzilla-daemon 2013-11-26 8:07 ` bugzilla-daemon 2013-11-26 21:30 ` bugzilla-daemon 4 siblings, 0 replies; 6+ messages in thread From: bugzilla-daemon @ 2013-11-25 22:15 UTC (permalink / raw) To: linux-ext4 https://bugzilla.kernel.org/show_bug.cgi?id=65701 Jan Kara <jack@suse.cz> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |jack@suse.cz --- Comment #3 from Jan Kara <jack@suse.cz> --- The patch looks good to me. Feel free to add Reviewed-by: Jan Kara <jack@suse.cz> Can you send it to Al Viro for inclusion? Thanks! -- You are receiving this mail because: You are watching the assignee of the bug. ^ permalink raw reply [flat|nested] 6+ messages in thread
* [Bug 65701] oops: fs/ext4/ext4_jbd2.c 2013-11-24 23:44 [Bug 65701] New: oops: fs/ext4/ext4_jbd2.c bugzilla-daemon ` (2 preceding siblings ...) 2013-11-25 22:15 ` bugzilla-daemon @ 2013-11-26 8:07 ` bugzilla-daemon 2013-11-26 21:30 ` bugzilla-daemon 4 siblings, 0 replies; 6+ messages in thread From: bugzilla-daemon @ 2013-11-26 8:07 UTC (permalink / raw) To: linux-ext4 https://bugzilla.kernel.org/show_bug.cgi?id=65701 --- Comment #4 from Dmitry Monakhov <dmonakhov@openvz.org> --- BTW initial discussion started here: http://marc.info/?t=134876094300003&r=1&w=2 # Original test case cat /mnt/test/fifo mkfifo /mnt/test/fifo echo foo > /mnt/test/fifo & fsfreeze -f /mnt/test cat /mnt/test/fifo -- You are receiving this mail because: You are watching the assignee of the bug. ^ permalink raw reply [flat|nested] 6+ messages in thread
* [Bug 65701] oops: fs/ext4/ext4_jbd2.c 2013-11-24 23:44 [Bug 65701] New: oops: fs/ext4/ext4_jbd2.c bugzilla-daemon ` (3 preceding siblings ...) 2013-11-26 8:07 ` bugzilla-daemon @ 2013-11-26 21:30 ` bugzilla-daemon 4 siblings, 0 replies; 6+ messages in thread From: bugzilla-daemon @ 2013-11-26 21:30 UTC (permalink / raw) To: linux-ext4 https://bugzilla.kernel.org/show_bug.cgi?id=65701 Alan <alan@lxorguk.ukuu.org.uk> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |alan@lxorguk.ukuu.org.uk Kernel Version|Linux 3.11.9-gentoo #1 SMP |3.11.9-gentoo |Sun Nov 24 16:53:58 CET | |2013 x86_64 Intel(R) | |Xeon(R) CPU X5650 @ 2.67GHz | |GenuineIntel GNU/Linux | -- You are receiving this mail because: You are watching the assignee of the bug. ^ permalink raw reply [flat|nested] 6+ messages in thread
end of thread, other threads:[~2013-11-26 21:30 UTC | newest] Thread overview: 6+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2013-11-24 23:44 [Bug 65701] New: oops: fs/ext4/ext4_jbd2.c bugzilla-daemon 2013-11-25 9:38 ` [Bug 65701] " bugzilla-daemon 2013-11-25 9:39 ` bugzilla-daemon 2013-11-25 22:15 ` bugzilla-daemon 2013-11-26 8:07 ` bugzilla-daemon 2013-11-26 21:30 ` bugzilla-daemon
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).