Hi,
[ I tried to submit this as a bug on
http://www-124.ibm.com/developerworks/bugs/?func=addbug&group_id=35,
but the system gave me an error (URL or URI too long)??? ]
I am running SuSE Linux 7.1 on a Dual PPro 200. /=/dev/sda2 is now
EXT3, /users=/dev/sda3 and /users2=/dev/hda1 are JFS. I have
upgraded to linux-2.4.18-rc4 (I named it 2.4.18 for me before
compiling) and jfs-1.0.15 including jfsutils-1.0.15 from
linux-2.4.17 and jfs-1.0.12 just yesterday. I was just trying to
copy a file in IRAF (which uses processes called cl.e and
x_images.e) when my disk "roared", and I found three kernel asserts
in the logs:
------------------------------
Mar 1 19:46:30 leo kernel: diRead: di_nlink is zero. ino=103095
Mar 1 21:06:32 leo kernel: assert(!test_cflag(COMMIT_Nolink, ip))
Mar 1 21:06:32 leo kernel: invalid operand: 0000
Mar 1 21:06:32 leo kernel: CPU: 1
Mar 1 21:06:32 leo kernel: EIP: 0010:[<d0824e47>] Not tainted
Mar 1 21:06:32 leo kernel: EFLAGS: 00010286
Mar 1 21:06:32 leo kernel: eax: 00000027 ebx: cb06bf58 ecx: 00000097 edx:
00000001
Mar 1 21:06:32 leo kernel: esi: 00000000 edi: 000000c2 ebp: cb06bf68 esp:
cb06bf34
Mar 1 21:06:32 leo kernel: ds: 0018 es: 0018 ss: 0018
Mar 1 21:06:32 leo kernel: Process cl.e (pid: 16048, stackpage=cb06b000)
Mar 1 21:06:32 leo kernel: Stack: d084322e d0843240 cb06a000 ffffffff caa53bc0
c0f9b9c0 00000000 00000000
Mar 1 21:06:32 leo kernel: 0001159d caa53bc0 c0f9b9c0 0000000d c210fde0
c261b860 c013f0b8 caa53bc0
Mar 1 21:06:32 leo kernel: c261b860 c261b860 c261b860 cd164000 cb06bfa4
c013f1bd caa53bc0 c261b860
Mar 1 21:06:32 leo kernel: Call Trace: [<d084322e>] [<d0843240>] [<c013f0b8>]
[<c013f1bd>] [<c0106e6f>]
Mar 1 21:06:32 leo kernel:
Mar 1 21:06:32 leo kernel: Code: 0f 0b 83 c4 08 8b 55 e0 52 57 e8 de 01 00 00 89 45
e4 89 55
Mar 1 21:07:28 leo kernel: assert(list_empty(&JFS_IP(ip)->anon_inode_list))
Mar 1 21:07:28 leo kernel: invalid operand: 0000
Mar 1 21:07:28 leo kernel: CPU: 0
Mar 1 21:07:28 leo kernel: EIP: 0010:[<d0830813>] Not tainted
Mar 1 21:07:28 leo kernel: EFLAGS: 00210286
Mar 1 21:07:28 leo kernel: eax: 00000031 ebx: c21040e0 ecx: ffffffff edx:
00000001
Mar 1 21:07:28 leo kernel: esi: c14d1f5c edi: c0234ca8 ebp: c14d1f64 esp:
c14d1f1c
Mar 1 21:07:28 leo kernel: ds: 0018 es: 0018 ss: 0018
Mar 1 21:07:28 leo kernel: Process kswapd (pid: 5, stackpage=c14d1000)
Mar 1 21:07:28 leo kernel: Stack: d0843fb3 d08445e0 c21040e0 c014783a c21040e0
c21040e0 c01478b7 c21040e0
Mar 1 21:07:28 leo kernel: ce8ee868 ce8ee860 c0147b0a c14d1f5c 0000000d
000001d0 00000020 00000046
Mar 1 21:07:28 leo kernel: c2104868 cf945828 00000006 c0147b47 00000053
c012db7d 00000006 000001d0
Mar 1 21:07:28 leo kernel: Call Trace: [<d0843fb3>] [<d08445e0>] [<c014783a>]
[<c01478b7>] [<c0147b0a>]
Mar 1 21:07:28 leo kernel: [<c0147b47>] [<c012db7d>] [<c012dbcf>] [<c012dc63>]
[<c012dcbe>] [<c012ddcd>]
Mar 1 21:07:28 leo kernel: [<c01055a4>]
Mar 1 21:07:29 leo kernel:
Mar 1 21:07:29 leo kernel: Code: 0f 0b 83 c4 08 8b 83 20 01 00 00 83 78 54 00 74 1c
83 3d b4
Mar 1 21:07:29 leo kernel: assert(list_empty(&JFS_IP(ip)->anon_inode_list))
Mar 1 21:07:29 leo kernel: invalid operand: 0000
Mar 1 21:07:30 leo kernel: CPU: 1
Mar 1 21:07:30 leo kernel: EIP: 0010:[<d0830813>] Not tainted
Mar 1 21:07:30 leo kernel: EFLAGS: 00210286
Mar 1 21:07:31 leo kernel: eax: 00000031 ebx: cc800440 ecx: 00000001 edx:
00000001
Mar 1 21:07:31 leo kernel: esi: cc3dfe58 edi: c0234ca8 ebp: cc3dfe60 esp:
cc3dfe18
Mar 1 21:07:31 leo kernel: ds: 0018 es: 0018 ss: 0018
Mar 1 21:07:31 leo kernel: Process x_images.e (pid: 16231, stackpage=cc3df000)
Mar 1 21:07:32 leo kernel: Stack: d0843fb3 d08445e0 cc800440 c014783a cc800440
cc800440 c01478b7 cc800440
Mar 1 21:07:32 leo kernel: c643d428 c643d420 c0147b0a cc3dfe58 00000020
000001d2 00000020 00000036
Mar 1 21:07:32 leo kernel: cc800268 ce8ee0e8 00000006 c0147b47 00000060
c012db7d 00000006 000001d2
Mar 1 21:07:32 leo kernel: Call Trace: [<d0843fb3>] [<d08445e0>] [<c014783a>]
[<c01478b7>] [<c0147b0a>]
Mar 1 21:07:33 leo kernel: [<c0147b47>] [<c012db7d>] [<c012dbcf>] [<c012e4d0>]
[<c012e6f2>] [<d0824024>]
Mar 1 21:07:33 leo kernel: [<c012e472>] [<c0126a6d>] [<c0127095>] [<c01272ed>]
[<c0127815>] [<c012773c>]
Mar 1 21:07:33 leo kernel: [<c01335fb>] [<c0106e6f>]
Mar 1 21:07:33 leo kernel:
Mar 1 21:07:34 leo kernel: Code: 0f 0b 83 c4 08 8b 83 20 01 00 00 83 78 54 00 74 1c
83 3d b4
------------------------------
Feeding this into ksymoops I get:
------------------------------
Mar 1 21:06:32 leo kernel: invalid operand: 0000
Mar 1 21:06:32 leo kernel: CPU: 1
Mar 1 21:06:32 leo kernel: EIP: 0010:[<d0824e47>] Not tainted
Using defaults from ksymoops -t elf32-i386 -a i386
Mar 1 21:06:32 leo kernel: EFLAGS: 00010286
Mar 1 21:06:32 leo kernel: eax: 00000027 ebx: cb06bf58 ecx: 00000097 edx:
00000001
Mar 1 21:06:32 leo kernel: esi: 00000000 edi: 000000c2 ebp: cb06bf68 esp:
cb06bf34
Mar 1 21:06:32 leo kernel: ds: 0018 es: 0018 ss: 0018
Mar 1 21:06:32 leo kernel: Process cl.e (pid: 16048, stackpage=cb06b000)
Mar 1 21:06:32 leo kernel: Stack: d084322e d0843240 cb06a000 ffffffff caa53bc0
c0f9b9c0 00000000 00000000
Mar 1 21:06:32 leo kernel: 0001159d caa53bc0 c0f9b9c0 0000000d c210fde0
c261b860 c013f0b8 caa53bc0
Mar 1 21:06:32 leo kernel: c261b860 c261b860 c261b860 cd164000 cb06bfa4
c013f1bd caa53bc0 c261b860
Mar 1 21:06:32 leo kernel: Call Trace: [<d084322e>] [<d0843240>] [<c013f0b8>]
[<c013f1bd>] [<c0106e6f>]
Mar 1 21:06:32 leo kernel: Code: 0f 0b 83 c4 08 8b 55 e0 52 57 e8 de 01 00 00 89 45
e4 89 55
>>EIP; d0824e47 <[jfs]jfs_unlink+1cf/3bc> <=====
Trace; d084322e <[jfs].rodata.start+6ee/3c5e>
Trace; d0843240 <[jfs].rodata.start+700/3c5e>
Trace; c013f0b8 <vfs_unlink+194/1f0>
Trace; c013f1bd <sys_unlink+a9/124>
Trace; c0106e6f <system_call+33/38>
Code; d0824e47 <[jfs]jfs_unlink+1cf/3bc>
00000000 <_EIP>:
Code; d0824e47 <[jfs]jfs_unlink+1cf/3bc> <=====
0: 0f 0b ud2a <=====
Code; d0824e49 <[jfs]jfs_unlink+1d1/3bc>
2: 83 c4 08 add $0x8,%esp
Code; d0824e4c <[jfs]jfs_unlink+1d4/3bc>
5: 8b 55 e0 mov 0xffffffe0(%ebp),%edx
Code; d0824e4f <[jfs]jfs_unlink+1d7/3bc>
8: 52 push %edx
Code; d0824e50 <[jfs]jfs_unlink+1d8/3bc>
9: 57 push %edi
Code; d0824e51 <[jfs]jfs_unlink+1d9/3bc>
a: e8 de 01 00 00 call 1ed <_EIP+0x1ed> d0825034
<[jfs]commitZeroLink+0/f4>
Code; d0824e56 <[jfs]jfs_unlink+1de/3bc>
f: 89 45 e4 mov %eax,0xffffffe4(%ebp)
Code; d0824e59 <[jfs]jfs_unlink+1e1/3bc>
12: 89 55 00 mov %edx,0x0(%ebp)
Mar 1 21:07:28 leo kernel: invalid operand: 0000
Mar 1 21:07:28 leo kernel: CPU: 0
Mar 1 21:07:28 leo kernel: EIP: 0010:[<d0830813>] Not tainted
Mar 1 21:07:28 leo kernel: EFLAGS: 00210286
Mar 1 21:07:28 leo kernel: eax: 00000031 ebx: c21040e0 ecx: ffffffff edx:
00000001
Mar 1 21:07:28 leo kernel: esi: c14d1f5c edi: c0234ca8 ebp: c14d1f64 esp:
c14d1f1c
Mar 1 21:07:28 leo kernel: ds: 0018 es: 0018 ss: 0018
Mar 1 21:07:28 leo kernel: Process kswapd (pid: 5, stackpage=c14d1000)
Mar 1 21:07:28 leo kernel: Stack: d0843fb3 d08445e0 c21040e0 c014783a c21040e0
c21040e0 c01478b7 c21040e0
Mar 1 21:07:28 leo kernel: ce8ee868 ce8ee860 c0147b0a c14d1f5c 0000000d
000001d0 00000020 00000046
Mar 1 21:07:28 leo kernel: c2104868 cf945828 00000006 c0147b47 00000053
c012db7d 00000006 000001d0
Mar 1 21:07:28 leo kernel: Call Trace: [<d0843fb3>] [<d08445e0>] [<c014783a>]
[<c01478b7>] [<c0147b0a>]
Mar 1 21:07:28 leo kernel: [<c0147b47>] [<c012db7d>] [<c012dbcf>] [<c012dc63>]
[<c012dcbe>] [<c012ddcd>]
Mar 1 21:07:28 leo kernel: [<c01055a4>]
Mar 1 21:07:29 leo kernel: Code: 0f 0b 83 c4 08 8b 83 20 01 00 00 83 78 54 00 74 1c
83 3d b4
>>EIP; d0830813 <[jfs]diClearExtension+5b/a9> <=====
Trace; d0843fb3 <[jfs].rodata.start+1473/3c5e>
Trace; d08445e0 <[jfs].rodata.start+1aa0/3c5e>
Trace; c014783a <clear_inode+ba/fc>
Trace; c01478b7 <dispose_list+3b/54>
Trace; c0147b0a <prune_icache+be/e0>
Trace; c0147b47 <shrink_icache_memory+1b/30>
Trace; c012db7d <shrink_caches+6d/88>
Trace; c012dbcf <try_to_free_pages+37/58>
Trace; c012dc63 <kswapd_balance_pgdat+43/8c>
Trace; c012dcbe <kswapd_balance+12/28>
Trace; c012ddcd <kswapd+99/b4>
Trace; c01055a4 <kernel_thread+28/38>
Code; d0830813 <[jfs]diClearExtension+5b/a9>
00000000 <_EIP>:
Code; d0830813 <[jfs]diClearExtension+5b/a9> <=====
0: 0f 0b ud2a <=====
Code; d0830815 <[jfs]diClearExtension+5d/a9>
2: 83 c4 08 add $0x8,%esp
Code; d0830818 <[jfs]diClearExtension+60/a9>
5: 8b 83 20 01 00 00 mov 0x120(%ebx),%eax
Code; d083081e <[jfs]diClearExtension+66/a9>
b: 83 78 54 00 cmpl $0x0,0x54(%eax)
Code; d0830822 <[jfs]diClearExtension+6a/a9>
f: 74 1c je 2d <_EIP+0x2d> d0830840
<[jfs]diClearExtension+88/a9>
Code; d0830824 <[jfs]diClearExtension+6c/a9>
11: 83 3d b4 00 00 00 00 cmpl $0x0,0xb4
Mar 1 21:07:29 leo kernel: invalid operand: 0000
Mar 1 21:07:30 leo kernel: CPU: 1
Mar 1 21:07:30 leo kernel: EIP: 0010:[<d0830813>] Not tainted
Mar 1 21:07:30 leo kernel: EFLAGS: 00210286
Mar 1 21:07:31 leo kernel: eax: 00000031 ebx: cc800440 ecx: 00000001 edx:
00000001
Mar 1 21:07:31 leo kernel: esi: cc3dfe58 edi: c0234ca8 ebp: cc3dfe60 esp:
cc3dfe18
Mar 1 21:07:31 leo kernel: ds: 0018 es: 0018 ss: 0018
Mar 1 21:07:31 leo kernel: Process x_images.e (pid: 16231, stackpage=cc3df000)
Mar 1 21:07:32 leo kernel: Stack: d0843fb3 d08445e0 cc800440 c014783a cc800440
cc800440 c01478b7 cc800440
Mar 1 21:07:32 leo kernel: c643d428 c643d420 c0147b0a cc3dfe58 00000020
000001d2 00000020 00000036
Mar 1 21:07:32 leo kernel: cc800268 ce8ee0e8 00000006 c0147b47 00000060
c012db7d 00000006 000001d2
Mar 1 21:07:32 leo kernel: Call Trace: [<d0843fb3>] [<d08445e0>] [<c014783a>]
[<c01478b7>] [<c0147b0a>]
Mar 1 21:07:33 leo kernel: [<c0147b47>] [<c012db7d>] [<c012dbcf>] [<c012e4d0>]
[<c012e6f2>] [<d0824024>]
Mar 1 21:07:33 leo kernel: [<c012e472>] [<c0126a6d>] [<c0127095>] [<c01272ed>]
[<c0127815>] [<c012773c>]
Mar 1 21:07:33 leo kernel: [<c01335fb>] [<c0106e6f>]
Mar 1 21:07:34 leo kernel: Code: 0f 0b 83 c4 08 8b 83 20 01 00 00 83 78 54 00 74 1c
83 3d b4
>>EIP; d0830813 <[jfs]diClearExtension+5b/a9> <=====
Trace; d0843fb3 <[jfs].rodata.start+1473/3c5e>
Trace; d08445e0 <[jfs].rodata.start+1aa0/3c5e>
Trace; c014783a <clear_inode+ba/fc>
Trace; c01478b7 <dispose_list+3b/54>
Trace; c0147b0a <prune_icache+be/e0>
Trace; c0147b47 <shrink_icache_memory+1b/30>
Trace; c012db7d <shrink_caches+6d/88>
Trace; c012dbcf <try_to_free_pages+37/58>
Trace; c012e4d0 <balance_classzone+5c/178>
Trace; c012e6f2 <__alloc_pages+106/164>
Trace; d0824024 <[jfs]jfs_get_block+0/274>
Trace; c012e472 <_alloc_pages+16/18>
Trace; c0126a6d <page_cache_read+81/d8>
Trace; c0127095 <generic_file_readahead+101/138>
Trace; c01272ed <do_generic_file_read+1f1/464>
Trace; c0127815 <generic_file_read+81/134>
Trace; c012773c <file_read_actor+0/58>
Trace; c01335fb <sys_read+8f/fc>
Trace; c0106e6f <system_call+33/38>
Code; d0830813 <[jfs]diClearExtension+5b/a9>
00000000 <_EIP>:
Code; d0830813 <[jfs]diClearExtension+5b/a9> <=====
0: 0f 0b ud2a <=====
Code; d0830815 <[jfs]diClearExtension+5d/a9>
2: 83 c4 08 add $0x8,%esp
Code; d0830818 <[jfs]diClearExtension+60/a9>
5: 8b 83 20 01 00 00 mov 0x120(%ebx),%eax
Code; d083081e <[jfs]diClearExtension+66/a9>
b: 83 78 54 00 cmpl $0x0,0x54(%eax)
Code; d0830822 <[jfs]diClearExtension+6a/a9>
f: 74 1c je 2d <_EIP+0x2d> d0830840
<[jfs]diClearExtension+88/a9>
Code; d0830824 <[jfs]diClearExtension+6c/a9>
11: 83 3d b4 00 00 00 00 cmpl $0x0,0xb4
------------------------------
>From before the kernel+jfs update I find these lines:
------------------------------
Feb 27 17:33:11 leo kernel: diRead: di_nlink is zero. ino=106568
Feb 27 19:48:20 leo kernel: diClearExtension: inode 0xc0f2d820 has anonymous tlocks
------------------------------
Maybe they are related somehow.
After reboot I am still having problems with the filesystem on
/dev/hda1, I will send a mail to the mailinglist for help about
that. See the next mail, I do not want to make this any longer...
Greetings,
Peter Weilbacher.
_______________________________________________
Jfs-discussion mailing list
[EMAIL PROTECTED]
http://www-124.ibm.com/developerworks/oss/mailman/listinfo/jfs-discussion