[Bugme-new] [Bug 10685] New: ext3 (dirty?) fs mounting

bugme-daemon at bugzilla.kernel.org bugme-daemon at bugzilla.kernel.org
Mon May 12 07:50:52 PDT 2008


http://bugzilla.kernel.org/show_bug.cgi?id=10685

           Summary: ext3 (dirty?) fs mounting
           Product: Other
           Version: 2.5
     KernelVersion: 2.6.25
          Platform: All
        OS/Version: Linux
              Tree: Mainline
            Status: NEW
          Severity: normal
          Priority: P1
         Component: Modules
        AssignedTo: other_modules at kernel-bugs.osdl.org
        ReportedBy: stack.box at gmail.com


Distribution: Archlinux

Problem Description:

EXT3 FS on sda1, internal journal
EXT3-fs: mounted filesystem with ordered data mode.
------------[ cut here ]------------
kernel BUG at fs/jbd/transaction.c:275!
invalid opcode: 0000 [#1] PREEMPT SMP
Modules linked in: ext3 jbd mbcache hfsplus isofs zlib_inflate vboxdrv bridge
llc hci_usb bluetooth nls_cp437 vfat fat ipv6 nvidia(P) agpgart joydev
firewire_ohci snd_seq_oss snd_seq_midi_event b44 snd_seq snd_seq_device
firewire_core crc_itu_t arc4 ssb usbhid snd_pcm_oss ecb pcmcia psmouse i2c_i801
ricoh_mmc ohci1394 snd_mixer_oss pcmcia_core video iwl3945 mac80211 sdhci
output mii ieee1394 mmc_core snd_hda_intel snd_pcm wmi hid cfg80211 serio_raw
i2c_core ff_memless snd_timer snd_page_alloc snd_hwdep snd pcspkr soundcore sg
dcdbas thermal processor fan button battery ac uinput evdev i8k reiserfs
sha256_generic aes_i586 aes_generic dm_crypt dm_mod usb_storage sr_mod cdrom
sd_mod pata_acpi ehci_hcd uhci_hcd usbcore ata_piix ahci ata_generic libata
scsi_mod dock [last unloaded: tun]

Pid: 27137, comm: ls Tainted: P         (2.6.25-ARCH #1)
EIP: 0060:[<f9a1c227>] EFLAGS: 00210283 CPU: 1
EIP is at journal_start+0xb7/0xc0 [jbd]
EAX: b7fe1710 EBX: b7fe1710 ECX: f42b1200 EDX: f3e94800
ESI: b7fe1710 EDI: f6b5d0a4 EBP: 00000002 ESP: f7377f1c
 DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068
Process ls (pid: 27137, ti=f7376000 task=c0d28590 task.ti=f7376000)
Stack: f3e94800 f6b5d0a4 b7fe1710 f6b5d0a4 c0190380 f9a4fb1d 00000000 480a5c4a
       f6b5d0a4 00000001 f42b1200 c01a2270 f6b5d124 22222222 22222222 f42b1200
       f42b1200 c012df63 00000000 ea2a5b40 f6b5d0a4 c0190380 c01906fc f7377f94
Call Trace:
 [<c0190380>] filldir64+0x0/0x100
 [<f9a4fb1d>] ext3_dirty_inode+0x2d/0x90 [ext3]
 [<c01a2270>] __mark_inode_dirty+0x30/0x1a0
 [<c012df63>] current_fs_time+0x13/0x20
 [<c0190380>] filldir64+0x0/0x100
 [<c01906fc>] vfs_readdir+0xac/0xb0
 [<c0190772>] sys_getdents64+0x72/0xc0
 [<c01050d8>] sysenter_past_esp+0x6d/0xa5
 [<c0300000>] init_transmeta+0x1f7/0x377
 =======================
Code: 79 ad a1 08 4c a2 f9 89 da 89 f3 e8 a4 39 76 c6 64 a1 00 b0 3f c0 c7 80
54 05 00 00 00 00 00 00 eb 8d 66 90 bb f4 ff ff ff eb 84 <0f> 0b eb fe 90 8d 74
26 00 ba 01 00 00 00 e8 36 ff ff ff 3d 00
EIP: [<f9a1c227>] journal_start+0xb7/0xc0 [jbd] SS:ESP 0068:f7377f1c
---[ end trace 7d62f8a660b23228 ]---


Steps to reproduce:

Mounting a (dirty?) ext3 partition raise the exception
mount /dev/sda1 /mnt/temp


-- 
Configure bugmail: http://bugzilla.kernel.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.


More information about the Bugme-new mailing list