From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753071Ab1FBPvH (ORCPT ); Thu, 2 Jun 2011 11:51:07 -0400 Received: from cantor2.suse.de ([195.135.220.15]:38493 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751781Ab1FBPvF (ORCPT ); Thu, 2 Jun 2011 11:51:05 -0400 Date: Thu, 2 Jun 2011 17:51:02 +0200 From: Jan Kara To: Mika Bostrom Cc: linux-kernel@vger.kernel.org, jack@suse.cz, axboe@kernel.dk Subject: Re: Reproducible OOPS with UDF on flash Message-ID: <20110602155102.GC5718@quack.suse.cz> References: <20110602072411.GA26739@bostik.iki.fi> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20110602072411.GA26739@bostik.iki.fi> User-Agent: Mutt/1.5.20 (2009-06-14) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu 02-06-11 10:24:11, Mika Bostrom wrote: > Hello hackers. I found a reliable way to oops the kernel - both > 2.6.38.6 and 2.6.39 are affected. > > The setup is this: > - debian unstable > - configured udisks + usbmount to automount thumb drives > - attached a thumbdrive with UDF filesystem on it > - checked that drive was mounted > - removed drive > ==> OOPS Thanks for report. > Jun 1 20:45:18 odin usbmount[12856]: executing command: mount -tudf -onoexec,nodev,noatime,nodiratime /dev/sdf1 /media/usb0 > Jun 1 20:45:18 odin kernel: UDF-fs: No anchor found > Jun 1 20:45:18 odin kernel: UDF-fs: Rescanning with blocksize 2048 > Jun 1 20:45:18 odin kernel: UDF-fs INFO UDF: Mounting volume 'LinuxUDF', timestamp 2009/04/30 07:14 (1000) > Jun 1 20:45:18 odin usbmount[12856]: executing command: run-parts /etc/usbmount/mount.d > Jun 1 20:45:56 odin kernel: usb 2-1.1: USB disconnect, address 12 > Jun 1 20:45:56 odin usbmount[12931]: executing command: umount -l /media/usb0 > Jun 1 20:45:56 odin kernel: *pdpt = 00000000062d3001 *pde = 0000000000000000 > Jun 1 20:45:56 odin kernel: Modules linked in: udf crc_itu_t vfat fat vboxnetadp vboxnetflt fuse ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 nf_conntrack nf_defrag_ipv4 iptable_filter ip_tables x_tables bridge ipv6 stp llc vboxdrv coretemp hwmon krng eseqiv rng aes_i586 aes_generic xts gf128mul cryptomgr aead dm_crypt crypto_hash crypto_blkcipher crypto_algapi dm_mod usb_storage raid1 md_mod hid_microsoft i915 fbcon font usbhid bitblit snd_hda_codec_idt snd_hda_intel snd_hda_codec softcursor snd_pcm_oss drm_kms_helper snd_mixer_oss drm fb fbdev snd_pcm snd_seq_dummy snd_seq_oss snd_seq_midi snd_rawmidi sr_mod cdrom i2c_algo_bit cfbcopyarea snd_seq_midi_event ata_generic video snd_seq intel_agp pata_marvell uhci_hcd ide_pci_generic snd_timer snd_seq_device e1000e backlight intel_gtt agpgart cfbimgblt cfbfillrect ehci_hcd snd evdev psmouse serio_raw i2c_i801 usbcore soundcore snd_page_alloc i2c_core processor button > Jun 1 20:45:56 odin kernel: > Jun 1 20:45:56 odin kernel: Pid: 12936, comm: umount Not tainted 2.6.38.6 #2 /DG965OT > Jun 1 20:45:56 odin kernel: EIP: 0060:[] EFLAGS: 00010002 CPU: 1 > Jun 1 20:45:56 odin kernel: EIP is at __percpu_counter_add+0x1f/0xe0 > Jun 1 20:45:56 odin kernel: EAX: 00000000 EBX: f526f390 ECX: 00000000 EDX: 00000001 > Jun 1 20:45:56 odin kernel: ESI: f57785c0 EDI: e6e70758 EBP: ec94be9c ESP: ec94be84 > Jun 1 20:45:56 odin kernel: DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 > Jun 1 20:45:56 odin kernel: ec94be94 e6e70748 f57785c0 f41166c0 f57785c0 e6e70758 ec94beb0 c1083323 > Jun 1 20:45:56 odin kernel: 00000010 f57785c0 e6e70748 ec94bec8 c10cd6d7 00000000 f2269000 c7dae858 > Jun 1 20:45:56 odin kernel: c7dae800 ec94bed4 c10cd7a5 eb9cfc80 ec94bef4 fb3f8a81 c7dae810 eb9cfce4 > Jun 1 20:45:56 odin kernel: [] account_page_dirtied+0x63/0x90 > Jun 1 20:45:56 odin kernel: [] __set_page_dirty+0x37/0xb0 > Jun 1 20:45:56 odin kernel: [] mark_buffer_dirty+0x55/0x80 > Jun 1 20:45:56 odin kernel: [] udf_close_lvid+0xb1/0xe0 [udf] > Jun 1 20:45:56 odin kernel: [] udf_put_super+0xa5/0xc0 [udf] > Jun 1 20:45:56 odin kernel: [] generic_shutdown_super+0x59/0xd0 > Jun 1 20:45:56 odin kernel: [] kill_block_super+0x24/0x70 > Jun 1 20:45:56 odin kernel: [] deactivate_locked_super+0x35/0x60 > Jun 1 20:45:56 odin kernel: [] deactivate_super+0x42/0x60 > Jun 1 20:45:56 odin kernel: [] mntput_no_expire+0x82/0xd0 > Jun 1 20:45:56 odin kernel: [] sys_umount+0x60/0x330 > Jun 1 20:45:56 odin kernel: [] sysenter_do_call+0x12/0x26 This looks like the same problem as bug https://bugzilla.kernel.org/show_bug.cgi?id=36262 And indeed in your case I'm not that surprised that BDI has been destroyed before the filesystem was unmounted. Jens, these BDI lifetime rules should really be sorted out... I remember you were looking into these issues already, weren't you? Honza -- Jan Kara SUSE Labs, CR