[Bugme-janitors] [Bug 10685] New: ext3 (dirty?) fs mounting
bugme-daemon at bugzilla.kernel.org
bugme-daemon at bugzilla.kernel.org
Mon May 12 07:50:52 PDT 2008
http://bugzilla.kernel.org/show_bug.cgi?id=10685
Summary: ext3 (dirty?) fs mounting
Product: Other
Version: 2.5
KernelVersion: 2.6.25
Platform: All
OS/Version: Linux
Tree: Mainline
Status: NEW
Severity: normal
Priority: P1
Component: Modules
AssignedTo: other_modules at kernel-bugs.osdl.org
ReportedBy: stack.box at gmail.com
Distribution: Archlinux
Problem Description:
EXT3 FS on sda1, internal journal
EXT3-fs: mounted filesystem with ordered data mode.
------------[ cut here ]------------
kernel BUG at fs/jbd/transaction.c:275!
invalid opcode: 0000 [#1] PREEMPT SMP
Modules linked in: ext3 jbd mbcache hfsplus isofs zlib_inflate vboxdrv bridge
llc hci_usb bluetooth nls_cp437 vfat fat ipv6 nvidia(P) agpgart joydev
firewire_ohci snd_seq_oss snd_seq_midi_event b44 snd_seq snd_seq_device
firewire_core crc_itu_t arc4 ssb usbhid snd_pcm_oss ecb pcmcia psmouse i2c_i801
ricoh_mmc ohci1394 snd_mixer_oss pcmcia_core video iwl3945 mac80211 sdhci
output mii ieee1394 mmc_core snd_hda_intel snd_pcm wmi hid cfg80211 serio_raw
i2c_core ff_memless snd_timer snd_page_alloc snd_hwdep snd pcspkr soundcore sg
dcdbas thermal processor fan button battery ac uinput evdev i8k reiserfs
sha256_generic aes_i586 aes_generic dm_crypt dm_mod usb_storage sr_mod cdrom
sd_mod pata_acpi ehci_hcd uhci_hcd usbcore ata_piix ahci ata_generic libata
scsi_mod dock [last unloaded: tun]
Pid: 27137, comm: ls Tainted: P (2.6.25-ARCH #1)
EIP: 0060:[<f9a1c227>] EFLAGS: 00210283 CPU: 1
EIP is at journal_start+0xb7/0xc0 [jbd]
EAX: b7fe1710 EBX: b7fe1710 ECX: f42b1200 EDX: f3e94800
ESI: b7fe1710 EDI: f6b5d0a4 EBP: 00000002 ESP: f7377f1c
DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068
Process ls (pid: 27137, ti=f7376000 task=c0d28590 task.ti=f7376000)
Stack: f3e94800 f6b5d0a4 b7fe1710 f6b5d0a4 c0190380 f9a4fb1d 00000000 480a5c4a
f6b5d0a4 00000001 f42b1200 c01a2270 f6b5d124 22222222 22222222 f42b1200
f42b1200 c012df63 00000000 ea2a5b40 f6b5d0a4 c0190380 c01906fc f7377f94
Call Trace:
[<c0190380>] filldir64+0x0/0x100
[<f9a4fb1d>] ext3_dirty_inode+0x2d/0x90 [ext3]
[<c01a2270>] __mark_inode_dirty+0x30/0x1a0
[<c012df63>] current_fs_time+0x13/0x20
[<c0190380>] filldir64+0x0/0x100
[<c01906fc>] vfs_readdir+0xac/0xb0
[<c0190772>] sys_getdents64+0x72/0xc0
[<c01050d8>] sysenter_past_esp+0x6d/0xa5
[<c0300000>] init_transmeta+0x1f7/0x377
=======================
Code: 79 ad a1 08 4c a2 f9 89 da 89 f3 e8 a4 39 76 c6 64 a1 00 b0 3f c0 c7 80
54 05 00 00 00 00 00 00 eb 8d 66 90 bb f4 ff ff ff eb 84 <0f> 0b eb fe 90 8d 74
26 00 ba 01 00 00 00 e8 36 ff ff ff 3d 00
EIP: [<f9a1c227>] journal_start+0xb7/0xc0 [jbd] SS:ESP 0068:f7377f1c
---[ end trace 7d62f8a660b23228 ]---
Steps to reproduce:
Mounting a (dirty?) ext3 partition raise the exception
mount /dev/sda1 /mnt/temp
--
Configure bugmail: http://bugzilla.kernel.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
More information about the Bugme-janitors
mailing list