[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-bugs] [Bug 1489] New: Kernel BUG at fs/ext3/namei.c:732



http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1489

           Summary: Kernel BUG at fs/ext3/namei.c:732
           Product: Xen
           Version: 3.0 (general)
          Platform: x86-64
        OS/Version: Linux-2.6
            Status: NEW
          Severity: normal
          Priority: P2
         Component: Guest-OS
        AssignedTo: xen-bugs@xxxxxxxxxxxxxxxxxxx
        ReportedBy: simon@xxxxxxxxxxxxxx


XEN 3.3.1 on Gentoo with both domU and dom0 running linux-2.6.21-xen ((gcc
version 4.1.1 (Gentoo 4.1.1-r3)) #1 SMP)

while performing an 'emerge --rsync' the domU locked and had had a complete
file system failure. The following was in the console logs on the domU.

-----

Assertion failure in dx_insert_block() at
/usr/src/linux-2.6.21-xen/fs/ext3/namei.c:732: "count < dx_get_limit(entries)"
------------[ cut here ]------------
kernel BUG at /usr/src/linux-2.6.21-xen/fs/ext3/namei.c:732!
invalid opcode: 0000 [1] SMP
CPU 0
Pid: 10576, comm: rsync Not tainted 2.6.21-xen #2
RIP: e030:[<ffffffff802afa4e>]  [<ffffffff802afa4e>] dx_insert_block+0x54/0xc1
RSP: e02b:ffff88002d67db28  EFLAGS: 00010292
RAX: 000000000000007c RBX: 000000000000006c RCX: ffff88002d67d8c8
RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffffffff80488ae0
RBP: ffff880125b35020 R08: ffffffff80488ae8 R09: 0000000000000000
R10: 00000000001644a1 R11: ffffffff80212f67 R12: ffff880125b35020
R13: 0000000000003172 R14: 00000000af4c4fbe R15: 0000000000000002
FS:  00002b608e3516d0(0000) GS:ffffffff804d2000(0000) knlGS:0000000000000000
CS:  e033 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: 0000000000000000 CR3: 0000000014d44000 CR4: 0000000000002620
Process rsync (pid: 10576, threadinfo ffff88002d67c000, task ffff8800006b28d0)
Stack:  e5665e36ae1b4aa1 000000000000006c ffff880125b3506c ffff88004c72400c
 ffff880125b3bfb6 ffff880125b35000 ffff880125b2acf8 ffffffff802b0304
 0000000000001000 0000000000000149 ffff88002d67dcd8 ffff88002d67dca8
Call Trace:
 [<ffffffff802b0304>] do_split+0x390/0x3f5
 [<ffffffff802b0e2c>] ext3_add_entry+0x742/0x7ee
 [<ffffffff80275814>] __link_path_walk+0x14f/0xd0a
 [<ffffffff802ba6ba>] start_this_handle+0x2f6/0x365
 [<ffffffff802b2785>] ext3_rename+0x19a/0x43e
 [<ffffffff80274535>] generic_permission+0xa2/0xe1
 [<ffffffff80274d2a>] vfs_rename+0x1f6/0x347
 [<ffffffff8027694d>] sys_renameat+0x183/0x1fc
 [<ffffffff8026ccdd>] sys_fchmodat+0xb4/0xc5
 [<ffffffff80209b16>] system_call+0x86/0x8b
 [<ffffffff80209a90>] system_call+0x0/0x8b


Code: 0f 0b eb fe 49 63 c5 49 8d 14 c4 48 39 d5 72 2c 49 c7 c0 b1
RIP  [<ffffffff802afa4e>] dx_insert_block+0x54/0xc1
 RSP <ffff88002d67db28>

-----


-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.