Hi,

I just got this oops on a computer running 3.4.2.

A few minutes before I had started "btrfs device scrub /" and had a
watcher process running "btrfs scrub status /" every 5 seconds. After
a few gigabytes of scrubbing, I got this crash.

The oops is transcribed from photos, so it may contain some errors. I
tried to be careful, and double checked the backtrace.

        Sami

------------------------------------------------------------
general protection fault: 0000 [#1] SMP
CPU 4
Modules linked in: tcp_diag inet_diag nfnetlink_log nfnetlink ufs qnx4 hfsplus 
hfs minix ntfs vfat msdos fat jfs reiserfs ext3 jbd ext2 ip6_tables ebtable_nat 
ebtables cn rfcomm bnep
parport_pc ppdev lp parport tun cpufreq_userspace cpufreq_stats 
cpufreq_powersave cpufreq_conservative binfmt_misc fuse nfsd nfs nfs_acl 
auth_rpcgss fscache lockd sunrpc iptable_filter ipt_MASQUERADE
ipt_REDIRECT iptable_nat nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_conntrack 
ip_tables x_tables xfs ext4 jbd2 mbcache radeon drm_kms_helper ttm drm 
i2c_algo_bit loop kvm_intel kvm snd_hda_codec_hdmi
snd_hda_codec_realtek snd_hda_intel snd_hda_codec snd_usb_audio snd_usbmidi_lib 
snd_hwdep snd_pcm_oss snd_mixer_oss joydev snd_pcm acpi_cpufreq snd_page_alloc 
snd_seq_midi snd_seq_midi_event snd_rawmi
di ath3k snd_seq snd_seq_device snd_timer iTCO_wdt bluetooth eeepci_wmi 
asus_wmi sparse_keymap crc16 rfkill pcspkr psmouse coretemp serio_raw evdev 
mperf pci_hotplug i2c_i801 i2c_core processor button
intel_agp snd mxm_wmi video wmi intel_gtt microcode soundcore sha256_generic 
dm_crypt dm_mod raid456 async_raid6_recov async_memcpy async_pq async_xor xor 
async_tx raid6_pq md_mod nbd btrfs libcrc32c
zlib_deflate sd_mod crc_t10dif crc32c_intel ghash_cmulni_intel firewire_ohci 
r8196 firewire_core ahci aesni_intel libahci mii crc_itu_t aes_x86_64 libata 
aes_generic cryptd scsi_mod e1000e thermal fa
n thermal_sys [last unloaded: scsi_wait_scan]

Pid: 30863, comm: btrfs-endio-met Tainted: G        W    3.4.2 #1 System 
manufacturer System Product Name/P8P67 EVO
RIP: 0010:[<ffffffff811e83bd>]  [<ffffffff811e83bd>] memcpy+0xd/0x110
RSP: 0000:ffff88003174dba8  EFLAGS: 00010202
RAX: ffff88003174dc8f RBX: 0000000000000011 RCX: 0000000000000002
RDX: 0000000000000001 RSI: 0005080000000003 RDI: ffff88003174dc8f
RBP: ffff88003174dbf0 R08: 000000000000000a R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: ffff88003174dca0
R13: ffff8800659f42b0 R14: 0000000000000048 R15: 0000000000000011
FS:  0000000000000000(0000) GS:ffff88021ed00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: 000000000973c000 CR3: 0000000167ef3000 CR4: 00000000000407e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process btrfs-endio-met (pid: 30863, threadinfo ffff88003174c000, task 
ffff88006f818000)
Stack:
 ffffffffa026bd6b ffff8801960f5000 0000000000008003 0000000000001000
 ffff88003174dc58 00000000000003dd ffff88000ac13c60 ffff88003174dc58
 696f70203a61685f ffff88003174dc00 ffffffffa026904d ffff88003174dcd0
Call Trace:
 [<ffffffffa026bd6b>] ? read_extent_buffer+0xbb/0x110 [btrfs]
 [<ffffffffa026304d>] btrfs_node_key+0x1d/0x20 [btrfs]
 [<ffffffffa02994e0>] __readahead_hook.isra.5+0x3c0/0x420 [btrfs]
 [<ffffffffa029986f>] btree_readahead_hook+0x1f/0x40 [btrfs]
 [<ffffffffa023f841>] btree_readpage_end_io_hook+0x111/0x260 [btrfs]
 [<ffffffffa0267452>] ? find_first_extent_bit_state+0x22/0x80 [btrfs]
 [<ffffffffa026809b>] end_bio_extent_readpage+0xcb/0xa30 [btrfs]
 [<ffffffffa023ee61>] ? end_workqueue_fn+0x31/0x50 [btrfs]
 [<ffffffff81158958>] bio_endio+0x18/0x30
 [<ffffffffa023ee6c>] end_workqueue_fn+0x3c/0x50 [btrfs]
 [<ffffffffa0275857>] worker_loop+0x157/0x560 [btrfs]
 [<ffffffffa0275700>] ? btrfs_queue_worker+0x310/0x310 [btrfs]
 [<ffffffff81058e5e>] kthread+0x8e/0xa0
 [<ffffffff81418fe4>] kernel_thread_helper+0x4/0x10
 [<ffffffff81058dd0>] ? flush_kthread_worker+0x70/0x70
 [<ffffffff81418fe0>] ? gs_change+0x13/0x13
Code: 4e 48 83 c4 08 5b 5d c3 66 0f 1f 44 00 00 e8 eb fb ff ff eb e1 90 90 90 
90 90 90 90...
8 4c 8b 56 10 4c
RIP  [<ffffffff811e83bd>] memcpy+0xd/0x110
 RSP <ffff88003174dba8>

Attachment: signature.asc
Description: Digital signature

Reply via email to