Hello all, 
   I ran a modified version of the file system fuzzer 
(https://github.com/sughodke/fsfuzzer) for one of the projects I am working, 
and at one point I got a possible crash.
   I got the following trace on a device with a 32bit kernel 3.14. I have 
searched the Bugzilla for this issue, but I was unable to find it.

   I am unsure of the impact/severity of the issue, and since I do not have 
experience with BTRFS I was hoping someone from here can take a look at it.

Some information:

# uname -a 
Linux *** 3.14.0-*** SMP PREEMPT Mon May 12 09:06:16 PDT 2014 i686 GNU/Linux
# btrfs --version 
Btrfs v3.12

   Call trace below. If you need additional info, please let me know, and I 
will be glad to provide it to you, if possible.

Regards, 
   Alexandru Cornea

[  227.576593] Call Trace:
[  227.581217]  [<c20ffbf3>] ? mempool_alloc_slab+0x13/0x20
[  227.585840]  [<c21730cd>] ? bvec_alloc+0x4d/0xe0
[  227.590355]  [<c21732cc>] ? bio_alloc_bioset+0x16c/0x230
[  227.594787]  [<c228a9ac>] ? submit_extent_page.isra.36+0xec/0x1e0
[  227.599242]  [<c22980f2>] btrfs_map_bio+0x82/0x510
[  227.603701]  [<c228ae1b>] ? __do_readpage+0x37b/0x870
[  227.608082]  [<c228c3c0>] ? repair_eb_io_failure+0x110/0x110
[  227.612393]  [<c2260f80>] ? free_root_pointers+0x50/0x50
[  227.616708]  [<c22627f5>] ? btrfs_bio_wq_end_io+0x25/0x60
[  227.620950]  [<c22629ea>] btree_submit_bio_hook+0x5a/0x100
[  227.625119]  [<c2262990>] ? btrfs_wq_submit_bio+0x140/0x140
[  227.629272]  [<c2286970>] submit_one_bio+0x80/0xb0
[  227.633391]  [<c2262990>] ? btrfs_wq_submit_bio+0x140/0x140
[  227.637527]  [<c228efd8>] read_extent_buffer_pages+0x218/0x2e0
[  227.641609]  [<c2262008>] 
btree_read_extent_buffer_pages.constprop.49+0xc8/0x140
[  227.645683]  [<c2260f80>] ? free_root_pointers+0x50/0x50
[  227.649761]  [<c2262d0c>] read_tree_block+0x3c/0x60
[  227.653732]  [<c2266c0c>] open_ctree+0x11bc/0x1e00
[  227.657599]  [<c2337043>] ? strlcpy+0x33/0x50
[  227.661461]  [<c223e3b8>] btrfs_mount+0x678/0x840
[  227.665240]  [<c23314b6>] ? ida_get_new_above+0x1a6/0x200
[  227.668954]  [<c23314b6>] ? ida_get_new_above+0x1a6/0x200
[  227.672622]  [<c215d1b9>] ? alloc_vfsmnt+0x99/0x160
[  227.676292]  [<c2145b01>] mount_fs+0x31/0x170
[  227.679890]  [<c211950f>] ? __alloc_percpu+0xf/0x20
[  227.683432]  [<c215d1d3>] ? alloc_vfsmnt+0xb3/0x160
[  227.686950]  [<c215d309>] vfs_kern_mount+0x49/0xd0
[  227.690427]  [<c215f480>] do_mount+0x1e0/0x8e0
[  227.693884]  [<c2114699>] ? strndup_user+0x39/0xd0
[  227.697282]  [<c215fe1c>] SyS_mount+0x7c/0xb0
[  227.700612]  [<c27e4860>] syscall_call+0x7/0xb
[  227.703910] Code: e8 07 83 e0 02 29 c3 0f af 5d c8 8b 45 e0 8b 55 e4 85 d2 
89 45 a4 c7 45 ac 00 00 00 00 74 5
[  227.711334] EIP: [<c22929c3>] __btrfs_map_block+0x1b3/0x13d0 SS:ESP 
0068:c4a49b1c
[  227.714805] ---[ end trace 878405379da34309 ]---

---
Regards,

Alexandru Cornea
QA Security Engineer
SSG OTC Romania
Desk: +40 31 845 1150
iNET: 88451150


---
Regards,

Alexandru Cornea
QA Security Engineer
SSG OTC Romania
Desk: +40 31 845 1150
iNET: 88451150

--
To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to