RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 816072 - extract file to btrfs filesystem with tar get call trace
Summary: extract file to btrfs filesystem with tar get call trace
Keywords:
Status: CLOSED DUPLICATE of bug 698324
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: btrfs-progs
Version: 6.3
Hardware: x86_64
OS: Linux
urgent
urgent
Target Milestone: rc
: ---
Assignee: Josef Bacik
QA Contact: Red Hat Kernel QE team
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2012-04-25 08:06 UTC by Mohua Li
Modified: 2012-06-07 14:09 UTC (History)
6 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2012-06-07 14:09:48 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description Mohua Li 2012-04-25 08:06:00 UTC
Description of problem:

try command "tar -C $btrfsmountpoint -xf *.tar" in kvm guest got the call trace as below,and didn't reproduce on the physical with the same kernel version,  and also no problem with directly write                                                                 
                                                                                                              
calltrace:                                                                                                   
                                                                                                             
[    2.828048]  [<ffffffffa01d6fef>] ? btrfs_free_path+0x2f/0x40 [btrfs]
[    2.828048]  [<ffffffffa01fd627>] ? btrfs_update_inode+0x77/0x100 [btrfs]
[    2.828048]  [<ffffffffa01ff9db>] btrfs_mkdir+0x19b/0x1f0 [btrfs]
[    2.828048]  [<ffffffff811863f7>] vfs_mkdir+0xa7/0x100
[    2.828048]  [<ffffffff8118951e>] sys_mkdirat+0xfe/0x120
[    2.828048]  [<ffffffff81196292>] ? alloc_fd+0x92/0x160
[    2.828048]  [<ffffffff81185e45>] ? putname+0x35/0x50
[    2.828048]  [<ffffffff81176841>] ? do_sys_open+0x101/0x140
[    2.828048]  [<ffffffff81189558>] sys_mkdir+0x18/0x20
[    2.828048]  [<ffffffff8100b0f2>] system_call_fastpath+0x16/0x1b
[    2.828048] Code: 4c 89 d2 44 89 f1 4c 89 ee 4c 89 1c 24 4c 89 55 a8 4c 89 5d a0 e8 f2 28 ff ff 4c 8b 5d a0 4c 8b 55 a8 85 c0 75 bc e9 36 ff ff ff <0f> 0b eb fe 48 8b b2 68 fe ff ff 48 8d 7d b0 b9 11 00 00 00 4d
[    2.828048] RIP  [<ffffffffa01ff14f>] btrfs_add_link+0x12f/0x190 [btrfs]
[    2.828048]  RSP <ffff88001cecbd68>
[    2.871890] ---[ end trace cf2aa1aad09a2a88 ]---
[    2.872607] Kernel panic - not syncing: Fatal exception
[    2.873496] Pid: 347, comm: tar Tainted: G      D    ---------------  T 2.6.32-251.el6.x86_64 #1
[    2.874916] Call Trace:
[    2.875314]  [<ffffffff814f7312>] ? panic+0xa0/0x168
[    2.876091]  [<ffffffff814fb4a4>] ? oops_end+0xe4/0x100
[    2.876888]  [<ffffffff8100f26b>] ? die+0x5b/0x90
[    2.877619]  [<ffffffff814fad74>] ? do_trap+0xc4/0x160
[    2.878410]  [<ffffffff8100ce35>] ? do_invalid_op+0x95/0xb0
[    2.879272]  [<ffffffffa01ff14f>] ? btrfs_add_link+0x12f/0x190 [btrfs]
[    2.880278]  [<ffffffffa021ab1e>] ? set_extent_buffer_dirty+0x4e/0xa0 [btrfs]
[    2.881364]  [<ffffffffa01d6fef>] ? btrfs_free_path+0x2f/0x40 [btrfs]
[    2.882348]  [<ffffffff8100bedb>] ? invalid_op+0x1b/0x20
[    2.883172]  [<ffffffffa01ff14f>] ? btrfs_add_link+0x12f/0x190 [btrfs]
[    2.884171]  [<ffffffffa01ff0bd>] ? btrfs_add_link+0x9d/0x190 [btrfs]
[    2.885159]  [<ffffffffa01d6fef>] ? btrfs_free_path+0x2f/0x40 [btrfs]
[    2.886150]  [<ffffffffa01fd627>] ? btrfs_update_inode+0x77/0x100 [btrfs]
[    2.887193]  [<ffffffffa01ff9db>] ? btrfs_mkdir+0x19b/0x1f0 [btrfs]
[    2.888155]  [<ffffffff811863f7>] ? vfs_mkdir+0xa7/0x100
[    2.888959]  [<ffffffff8118951e>] ? sys_mkdirat+0xfe/0x120
[    2.889814]  [<ffffffff81196292>] ? alloc_fd+0x92/0x160
[    2.890632]  [<ffffffff81185e45>] ? putname+0x35/0x50
[    2.891411]  [<ffffffff81176841>] ? do_sys_open+0x101/0x140
[    2.892276]  [<ffffffff81189558>] ? sys_mkdir+0x18/0x20
[    2.893085]  [<ffffffff8100b0f2>] ? system_call_fastpath+0x16/0x1b
                                   
                                                                                                              
                                                                                                              
qemu-kvmcmdline:                                                                                             
/usr/libexec/qemu-kvm -S -M rhel6.3.0 -enable-kvm -m 1024 -smp 1,sockets=1,cores=1,threads=1 -name rhel6.3 -uuid b0d761f5-8f00-d267-4906-bf4ab7e7597e -nodefconfig -nodefaults -chardev socket,id=charmonitor,path=/var/lib/libvirt/qemu/rhel6.3.monitor,server,nowait -mon chardev=charmonitor,id=monitor,mode=control -rtc base=utc -no-shutdown -device piix3-usb-uhci,id=usb,bus=pci.0,addr=0x1.0x2 -drive file=/var/lib/libvirt/images/rhel6.3.img,if=none,id=drive-virtio-disk0,format=raw,cache=none -device virtio-blk-pci,scsi=off,bus=pci.0,addr=0x5,drive=drive-virtio-disk0,id=virtio-disk0,bootindex=1 -netdev tap,fd=22,id=hostnet0,vhost=on,vhostfd=23 -device virtio-net-pci,netdev=hostnet0,id=net0,mac=52:54:00:7e:69:70,bus=pci.0,addr=0x3 -chardev pty,id=charserial0 -device isa-serial,chardev=charserial0,id=serial0 -device usb-tablet,id=input0 -vnc 127.0.0.1:0 -vga cirrus -device intel-hda,id=sound0,bus=pci.0,addr=0x4 -device hda-duplex,id=sound0-codec0,bus=sound0.0,cad=0 -device virtio-balloon-pci,id=balloon0,bus=pci.0,addr=0x6
root     16782  4797  0 15:27 pts/8    00:00:00 grep qemu-kvm
                                                               

Version-Release number of selected component (if applicable):
kernel-2.6.32-257.el6.x86_64
qemu-kvm-0.12.1.2-2.285.el6.x86_64




How reproducible:
always

Steps to Reproduce:
1.modprobe btrfs
2.dd if=/dev/zero of=test.disk bs=1 count=1 seek=2G
3.mkfs.btrfs test.disk
4.mount -o loop test.disk /mnt
5. tar -C /mnt -xf *.tar
  
Actual results:
get call trace

Expected results:
no call trace 

Additional info:

Comment 4 Richard W.M. Jones 2012-04-25 10:14:33 UTC
So I get a similar stack trace when using libguestfs to create
and write to a btrfs filesystem on RHEL 6.3.  (Note: it's all
RHEL 6.3, I'm not trying to mix filesytems created on Fedora this
time).

Here's how to reproduce this:

  export LIBGUESTFS_DEBUG=1
  virt-make-fs -F qcow2 -t btrfs --partition=mbr --size=1G \
    libguestfs-1.17.2.tar.gz disk2.qcow2

You can choose any small tarball you happen to have around.  The
one I used is ~ 6 MB in size.

This fails with several kernel panics:

[    4.515425] leaf free space ret -2361, leaf data size 3995, used 6356 nritems 56
[    4.517293] ------------[ cut here ]------------

[    4.518370] WARNING: at fs/btrfs/extent_io.c:3646 read_extent_buffer+0x194/0x1d0 [btrfs]() (Tainted: G           ---------------  T)
[    4.521126] Hardware name: KVM
[    4.521801] Modules linked in: btrfs(T) zlib_deflate lzo_decompress lzo_compress dm_mod i2c_piix4 i2c_core ext2 ext4 jbd2 virtio_balloon virtio_pci virtio_net virtio_scsi virtio_blk virtio_console virtio_rng virtio virtio_ring sd_mod sym53c8xx scsi_transport_spi ata_piix sr_mod cdrom mbcache crc7 crc_ccitt crc_t10dif crc_itu_t libcrc32c
[    4.529855] Pid: 341, comm: tar Tainted: G           ---------------  T 2.6.32-262.el6.x86_64 #1
[    4.531861] Call Trace:
[    4.532467]  [<ffffffff8106b607>] ? warn_slowpath_common+0x87/0xc0
[    4.533930]  [<ffffffff8106b65a>] ? warn_slowpath_null+0x1a/0x20
[    4.535224]  [<ffffffffa0219514>] ? read_extent_buffer+0x194/0x1d0 [btrfs]
[    4.537108]  [<ffffffffa02195eb>] ? copy_extent_buffer+0x9b/0x1c0 [btrfs]
[    4.538727]  [<ffffffffa01db2cb>] ? copy_for_split+0x1bb/0x430 [btrfs]
[    4.540276]  [<ffffffffa01dd842>] ? split_leaf+0x352/0x8a0 [btrfs]
[    4.541824]  [<ffffffffa01d5e8b>] ? generic_bin_search+0x19b/0x210 [btrfs]
[    4.543425]  [<ffffffffa01d87ba>] ? btrfs_leaf_free_space+0x8a/0xe0 [btrfs]
[    4.545047]  [<ffffffffa01de51f>] ? btrfs_search_slot+0x78f/0x8a0 [btrfs]
[    4.546562]  [<ffffffffa01df65d>] ? btrfs_insert_empty_items+0x8d/0xf0 [btrfs]
[    4.548049]  [<ffffffffa01ee7a3>] ? insert_with_overflow+0x43/0x130 [btrfs]
[    4.549742]  [<ffffffffa01eea16>] ? btrfs_insert_dir_item+0x186/0x270 [btrfs]
[    4.551604]  [<ffffffffa01fe0bd>] ? btrfs_add_link+0x9d/0x190 [btrfs]
[    4.553345]  [<ffffffff8121325f>] ? security_inode_init_security+0x1f/0x30
[    4.554872]  [<ffffffffa0231431>] ? btrfs_init_acl+0x51/0x1a0 [btrfs]
[    4.556669]  [<ffffffffa01fe1df>] ? btrfs_add_nondir+0x2f/0x70 [btrfs]
[    4.558247]  [<ffffffffa01fa0f9>] ? btrfs_init_inode_security+0x39/0x50 [btrfs]
[    4.560010]  [<ffffffffa01fe386>] ? btrfs_create+0x166/0x210 [btrfs]
[    4.561588]  [<ffffffff81188284>] ? vfs_create+0xb4/0xe0
[    4.562810]  [<ffffffff8118bdef>] ? do_filp_open+0xb2f/0xd60
[    4.564406]  [<ffffffff81199bb0>] ? mntput_no_expire+0x30/0x110
[    4.565764]  [<ffffffff811875c5>] ? putname+0x35/0x50
[    4.567068]  [<ffffffff81197a02>] ? alloc_fd+0x92/0x160
[    4.568246]  [<ffffffff81177f19>] ? do_sys_open+0x69/0x140
[    4.569446]  [<ffffffff8117b351>] ? sys_write+0x51/0x90
[    4.570574]  [<ffffffff81178030>] ? sys_open+0x20/0x30
[    4.571050]  [<ffffffff8100b0f2>] ? system_call_fastpath+0x16/0x1b
[    4.573235] ---[ end trace bfe97017af3c3b78 ]---
[    4.574328] ------------[ cut here ]------------
[    4.575391] WARNING: at fs/btrfs/extent_io.c:3647 read_extent_buffer+0x1b9/0x1d0 [btrfs]() (Tainted: G        W  ---------------  T)
[    4.577842] Hardware name: KVM
[    4.578530] Modules linked in: btrfs(T) zlib_deflate lzo_decompress lzo_compress dm_mod i2c_piix4 i2c_core ext2 ext4 jbd2 virtio_balloon virtio_pci virtio_net virtio_scsi virtio_blk virtio_console virtio_rng virtio virtio_ring sd_mod sym53c8xx scsi_transport_spi ata_piix sr_mod cdrom mbcache crc7 crc_ccitt crc_t10dif crc_itu_t libcrc32c
[    4.585553] Pid: 341, comm: tar Tainted: G        W  ---------------  T 2.6.32-262.el6.x86_64 #1
[    4.587406] Call Trace:
[    4.587921]  [<ffffffff8106b607>] ? warn_slowpath_common+0x87/0xc0
[    4.589395]  [<ffffffff8106b65a>] ? warn_slowpath_null+0x1a/0x20
[    4.590636]  [<ffffffffa0219539>] ? read_extent_buffer+0x1b9/0x1d0 [btrfs]
[    4.592135]  [<ffffffffa02195eb>] ? copy_extent_buffer+0x9b/0x1c0 [btrfs]
[    4.593521]  [<ffffffffa01db2cb>] ? copy_for_split+0x1bb/0x430 [btrfs]
[    4.594945]  [<ffffffffa01dd842>] ? split_leaf+0x352/0x8a0 [btrfs]
[    4.596203]  [<ffffffffa01d5e8b>] ? generic_bin_search+0x19b/0x210 [btrfs]
[    4.597601]  [<ffffffffa01d87ba>] ? btrfs_leaf_free_space+0x8a/0xe0 [btrfs]
[    4.599101]  [<ffffffffa01de51f>] ? btrfs_search_slot+0x78f/0x8a0 [btrfs]
[    4.600488]  [<ffffffffa01df65d>] ? btrfs_insert_empty_items+0x8d/0xf0 [btrfs]
[    4.602150]  [<ffffffffa01ee7a3>] ? insert_with_overflow+0x43/0x130 [btrfs]
[    4.603625]  [<ffffffffa01eea16>] ? btrfs_insert_dir_item+0x186/0x270 [btrfs]
[    4.605166]  [<ffffffffa01fe0bd>] ? btrfs_add_link+0x9d/0x190 [btrfs]
[    4.606470]  [<ffffffff8121325f>] ? security_inode_init_security+0x1f/0x30
[    4.607958]  [<ffffffffa0231431>] ? btrfs_init_acl+0x51/0x1a0 [btrfs]
[    4.609272]  [<ffffffffa01fe1df>] ? btrfs_add_nondir+0x2f/0x70 [btrfs]
[    4.610605]  [<ffffffffa01fa0f9>] ? btrfs_init_inode_security+0x39/0x50 [btrfs]
[    4.612181]  [<ffffffffa01fe386>] ? btrfs_create+0x166/0x210 [btrfs]
[    4.613472]  [<ffffffff81188284>] ? vfs_create+0xb4/0xe0
[    4.614707]  [<ffffffff8118bdef>] ? do_filp_open+0xb2f/0xd60
[    4.615909]  [<ffffffff81199bb0>] ? mntput_no_expire+0x30/0x110
[    4.617114]  [<ffffffff811875c5>] ? putname+0x35/0x50
[    4.618232]  [<ffffffff81197a02>] ? alloc_fd+0x92/0x160
[    4.619300]  [<ffffffff81177f19>] ? do_sys_open+0x69/0x140
[    4.620416]  [<ffffffff8117b351>] ? sys_write+0x51/0x90
[    4.621562]  [<ffffffff81178030>] ? sys_open+0x20/0x30
[    4.622621]  [<ffffffff8100b0f2>] ? system_call_fastpath+0x16/0x1b
[    4.623882] ---[ end trace bfe97017af3c3b79 ]---
[    4.624920] BUG: scheduling while atomic: tar/341/0x10000002
[    4.625901] Modules linked in: btrfs(T) zlib_deflate lzo_decompress lzo_compress dm_mod i2c_piix4 i2c_core ext2 ext4 jbd2 virtio_balloon virtio_pci virtio_net virtio_scsi virtio_blk virtio_console virtio_rng virtio virtio_ring sd_mod sym53c8xx scsi_transport_spi ata_piix sr_mod cdrom mbcache crc7 crc_ccitt crc_t10dif crc_itu_t libcrc32c
[    4.625901] Pid: 341, comm: tar Tainted: G        W  ---------------  T 2.6.32-262.el6.x86_64 #1
[    4.625901] Call Trace:
[    4.625901]  [<ffffffff81057d66>] ? __schedule_bug+0x66/0x70
[    4.625901]  [<ffffffff814faea8>] ? thread_return+0x646/0x76e
[    4.625901]  [<ffffffff8100bc0e>] ? apic_timer_interrupt+0xe/0x20
[    4.625901]  [<ffffffff814ffd76>] ? kprobe_exceptions_notify+0x16/0x430
[    4.625901]  [<ffffffff8127ce54>] ? memcpy+0x54/0x120
[    4.625901]  [<ffffffff8106234a>] ? __cond_resched+0x2a/0x40
[    4.625901]  [<ffffffff8127ce54>] ? memcpy+0x54/0x120
[    4.625901]  [<ffffffff814fb270>] ? _cond_resched+0x30/0x40
[    4.625901]  [<ffffffff8100df76>] ? is_valid_bugaddr+0x16/0x40
[    4.625901]  [<ffffffff8127026f>] ? report_bug+0x1f/0xc0
[    4.625901]  [<ffffffff8100f28f>] ? die+0x7f/0x90
[    4.625901]  [<ffffffff814fdea2>] ? do_general_protection+0x152/0x160
[    4.625901]  [<ffffffff814fd675>] ? general_protection+0x25/0x30
[    4.625901]  [<ffffffff8127ce54>] ? memcpy+0x54/0x120
[    4.625901]  [<ffffffffa0219458>] ? read_extent_buffer+0xd8/0x1d0 [btrfs]
[    4.625901]  [<ffffffffa02195eb>] ? copy_extent_buffer+0x9b/0x1c0 [btrfs]
[    4.625901]  [<ffffffffa01db2cb>] ? copy_for_split+0x1bb/0x430 [btrfs]
[    4.625901]  [<ffffffffa01dd842>] ? split_leaf+0x352/0x8a0 [btrfs]
[    4.625901]  [<ffffffffa01d5e8b>] ? generic_bin_search+0x19b/0x210 [btrfs]
[    4.625901]  [<ffffffffa01d87ba>] ? btrfs_leaf_free_space+0x8a/0xe0 [btrfs]
[    4.625901]  [<ffffffffa01de51f>] ? btrfs_search_slot+0x78f/0x8a0 [btrfs]
[    4.625901]  [<ffffffffa01df65d>] ? btrfs_insert_empty_items+0x8d/0xf0 [btrfs]
[    4.625901]  [<ffffffffa01ee7a3>] ? insert_with_overflow+0x43/0x130 [btrfs]
[    4.625901]  [<ffffffffa01eea16>] ? btrfs_insert_dir_item+0x186/0x270 [btrfs]
[    4.625901]  [<ffffffffa01fe0bd>] ? btrfs_add_link+0x9d/0x190 [btrfs]
[    4.625901]  [<ffffffff8121325f>] ? security_inode_init_security+0x1f/0x30
[    4.625901]  [<ffffffffa0231431>] ? btrfs_init_acl+0x51/0x1a0 [btrfs]
[    4.625901]  [<ffffffffa01fe1df>] ? btrfs_add_nondir+0x2f/0x70 [btrfs]
[    4.625901]  [<ffffffffa01fa0f9>] ? btrfs_init_inode_security+0x39/0x50 [btrfs]
[    4.625901]  [<ffffffffa01fe386>] ? btrfs_create+0x166/0x210 [btrfs]
[    4.625901]  [<ffffffff81188284>] ? vfs_create+0xb4/0xe0
[    4.625901]  [<ffffffff8118bdef>] ? do_filp_open+0xb2f/0xd60
[    4.625901]  [<ffffffff81199bb0>] ? mntput_no_expire+0x30/0x110
[    4.625901]  [<ffffffff811875c5>] ? putname+0x35/0x50
[    4.625901]  [<ffffffff81197a02>] ? alloc_fd+0x92/0x160
[    4.625901]  [<ffffffff81177f19>] ? do_sys_open+0x69/0x140
[    4.625901]  [<ffffffff8117b351>] ? sys_write+0x51/0x90
[    4.625901]  [<ffffffff81178030>] ? sys_open+0x20/0x30
[    4.625901]  [<ffffffff8100b0f2>] ? system_call_fastpath+0x16/0x1b
guestfsd: receive_file: reading length word
guestfsd: receive_file: got chunk: cancel = 0x0, len = 8192, buf = 0x6094710
guestfsd: receive_file: reading length word
guestfsd: receive_file: got chunk: cancel = 0x0, len = 8192, buf = 0x6094710
guestfsd: receive_file: reading length word
guestfsd: receive_file: got chunk: cancel = 0x0, len = 8192, buf = 0x6094710
guestfsd: receive_file: reading length word
guestfsd: receive_file: got chunk: cancel = 0x0, len = 8192, buf = 0x6094710
guestfsd: receive_file: reading length word
guestfsd: receive_file: got chunk: cancel = 0x0, len = 8192, buf = 0x6094710
guestfsd: receive_file: reading length word
guestfsd: receive_file: got chunk: cancel = 0x0, len = 8192, buf = 0x6094710
guestfsd: receive_file: reading length word
guestfsd: receive_file: got chunk: cancel = 0x0, len = 8192, buf = 0x6094710
guestfsd: receive_file: reading length word
guestfsd: receive_file: got chunk: cancel = 0x0, len = 8192, buf = 0x6094710
[    4.698842] general protection fault: 0000 [#1] SMP 
[    4.699935] last sysfs file: /sys/module/libcrc32c/initstate
[    4.701095] CPU 0 
[    4.701477] Modules linked in: btrfs(T) zlib_deflate lzo_decompress lzo_compress dm_mod i2c_piix4 i2c_core ext2 ext4 jbd2 virtio_balloon virtio_pci virtio_net virtio_scsi virtio_blk virtio_console virtio_rng virtio virtio_ring sd_mod sym53c8xx scsi_transport_spi ata_piix sr_mod cdrom mbcache crc7 crc_ccitt crc_t10dif crc_itu_t libcrc32c
[    4.708695] 
[    4.709057] Pid: 341, comm: tar Tainted: G        W  ---------------  T 2.6.32-262.el6.x86_64 #1 Red Hat KVM
[    4.711151] RIP: 0010:[<ffffffff8127ce54>]  [<ffffffff8127ce54>] memcpy+0x54/0x120
[    4.712739] RSP: 0018:ffff88001d4897b0  EFLAGS: 00010202
[    4.713855] RAX: ffff88001d77c652 RBX: ffff88001d119238 RCX: ffff88001d77c652
[    4.715320] RDX: 000000000000031c RSI: db73880000001000 RDI: ffff88001d77c9ae
[    4.716797] RBP: ffff88001d4897f8 R08: 0000000000001c0a R09: 0000000000000000
[    4.718250] R10: 0000000000000005 R11: 000000000000008c R12: 000000000000035c
[    4.719713] R13: 00000000000009ae R14: ffff88001d488000 R15: 00000000000fffff
[    4.721222] FS:  00007ff38012c7a0(0000) GS:ffff880002200000(0000) knlGS:0000000000000000
[    4.722896] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[    4.724091] CR2: 0000003d7d75859c CR3: 000000001d795000 CR4: 00000000000006f0
[    4.725583] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[    4.727073] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[    4.728545] Process tar (pid: 341, threadinfo ffff88001d488000, task ffff88001d727540)
[    4.730161] Stack:
[    4.730585]  ffffffffa0219458 0000000000000ca4 ffff88001d77c652 00000000000005d5
[    4.732196] <d> 00000000fffffca4 00000000000009ae ffff88001d488000 0000000000000000
[    4.733926] <d> ffff88001d1191b0 ffff88001d489858 ffffffffa02195eb ffff880000000000
[    4.735740] Call Trace:
[    4.736320]  [<ffffffffa0219458>] ? read_extent_buffer+0xd8/0x1d0 [btrfs]
[    4.737739]  [<ffffffffa02195eb>] copy_extent_buffer+0x9b/0x1c0 [btrfs]
[    4.739127]  [<ffffffffa01db2cb>] copy_for_split+0x1bb/0x430 [btrfs]
[    4.740434]  [<ffffffffa01dd842>] split_leaf+0x352/0x8a0 [btrfs]
[    4.741671]  [<ffffffffa01d5e8b>] ? generic_bin_search+0x19b/0x210 [btrfs]
[    4.743136]  [<ffffffffa01d87ba>] ? btrfs_leaf_free_space+0x8a/0xe0 [btrfs]
[    4.744607]  [<ffffffffa01de51f>] btrfs_search_slot+0x78f/0x8a0 [btrfs]
[    4.745966]  [<ffffffffa01df65d>] btrfs_insert_empty_items+0x8d/0xf0 [btrfs]
[    4.747429]  [<ffffffffa01ee7a3>] insert_with_overflow+0x43/0x130 [btrfs]
[    4.748839]  [<ffffffffa01eea16>] btrfs_insert_dir_item+0x186/0x270 [btrfs]
[    4.750256]  [<ffffffffa01fe0bd>] btrfs_add_link+0x9d/0x190 [btrfs]
[    4.751547]  [<ffffffff8121325f>] ? security_inode_init_security+0x1f/0x30
[    4.752988]  [<ffffffffa0231431>] ? btrfs_init_acl+0x51/0x1a0 [btrfs]
[    4.754302]  [<ffffffffa01fe1df>] btrfs_add_nondir+0x2f/0x70 [btrfs]
[    4.755607]  [<ffffffffa01fa0f9>] ? btrfs_init_inode_security+0x39/0x50 [btrfs]
[    4.757122]  [<ffffffffa01fe386>] btrfs_create+0x166/0x210 [btrfs]
[    4.758378]  [<ffffffff81188284>] vfs_create+0xb4/0xe0
[    4.759449]  [<ffffffff8118bdef>] do_filp_open+0xb2f/0xd60
[    4.760568]  [<ffffffff81199bb0>] ? mntput_no_expire+0x30/0x110
[    4.761821]  [<ffffffff811875c5>] ? putname+0x35/0x50
[    4.762885]  [<ffffffff81197a02>] ? alloc_fd+0x92/0x160
[    4.763961]  [<ffffffff81177f19>] do_sys_open+0x69/0x140
[    4.765080]  [<ffffffff8117b351>] ? sys_write+0x51/0x90
[    4.766170]  [<ffffffff81178030>] sys_open+0x20/0x30
[    4.767212]  [<ffffffff8100b0f2>] system_call_fastpath+0x16/0x1b
[    4.768433] Code: 76 20 4c 89 07 4c 89 4f 08 4c 89 57 10 4c 89 5f 18 48 8d 7f 20 73 d4 48 83 c2 20 eb 42 48 01 d6 48 01 d7 48 83 ea 20 48 83 ea 20 <4c> 8b 46 f8 4c 8b 4e f0 4c 8b 56 e8 4c 8b 5e e0 48 8d 76 e0 4c 
[    4.774252] RIP  [<ffffffff8127ce54>] memcpy+0x54/0x120
[    4.775356]  RSP <ffff88001d4897b0>
[    4.776107] ---[ end trace bfe97017af3c3b7a ]---
[    4.777062] Kernel panic - not syncing: Fatal exception
[    4.778155] Pid: 341, comm: tar Tainted: G      D W  ---------------  T 2.6.32-262.el6.x86_64 #1
[    4.779942] Call Trace:
[    4.780476]  [<ffffffff814fa1a0>] ? panic+0xa0/0x168
[    4.781501]  [<ffffffff814fe334>] ? oops_end+0xe4/0x100
[    4.782608]  [<ffffffff8100f26b>] ? die+0x5b/0x90
[    4.783586]  [<ffffffff814fdea2>] ? do_general_protection+0x152/0x160
[    4.784900]  [<ffffffff814fd675>] ? general_protection+0x25/0x30
[    4.786134]  [<ffffffff8127ce54>] ? memcpy+0x54/0x120
[    4.787179]  [<ffffffffa0219458>] ? read_extent_buffer+0xd8/0x1d0 [btrfs]
[    4.788556]  [<ffffffffa02195eb>] ? copy_extent_buffer+0x9b/0x1c0 [btrfs]
[    4.789938]  [<ffffffffa01db2cb>] ? copy_for_split+0x1bb/0x430 [btrfs]
[    4.791265]  [<ffffffffa01dd842>] ? split_leaf+0x352/0x8a0 [btrfs]
[    4.792592]  [<ffffffffa01d5e8b>] ? generic_bin_search+0x19b/0x210 [btrfs]
[    4.794012]  [<ffffffffa01d87ba>] ? btrfs_leaf_free_space+0x8a/0xe0 [btrfs]
[    4.795429]  [<ffffffffa01de51f>] ? btrfs_search_slot+0x78f/0x8a0 [btrfs]
[    4.796823]  [<ffffffffa01df65d>] ? btrfs_insert_empty_items+0x8d/0xf0 [btrfs]
[    4.798299]  [<ffffffffa01ee7a3>] ? insert_with_overflow+0x43/0x130 [btrfs]
[    4.799724]  [<ffffffffa01eea16>] ? btrfs_insert_dir_item+0x186/0x270 [btrfs]
[    4.801186]  [<ffffffffa01fe0bd>] ? btrfs_add_link+0x9d/0x190 [btrfs]
[    4.802500]  [<ffffffff8121325f>] ? security_inode_init_security+0x1f/0x30
[    4.803910]  [<ffffffffa0231431>] ? btrfs_init_acl+0x51/0x1a0 [btrfs]
[    4.805236]  [<ffffffffa01fe1df>] ? btrfs_add_nondir+0x2f/0x70 [btrfs]
[    4.806571]  [<ffffffffa01fa0f9>] ? btrfs_init_inode_security+0x39/0x50 [btrfs]
[    4.808064]  [<ffffffffa01fe386>] ? btrfs_create+0x166/0x210 [btrfs]
[    4.809350]  [<ffffffff81188284>] ? vfs_create+0xb4/0xe0
[    4.810440]  [<ffffffff8118bdef>] ? do_filp_open+0xb2f/0xd60
[    4.811591]  [<ffffffff81199bb0>] ? mntput_no_expire+0x30/0x110
[    4.812807]  [<ffffffff811875c5>] ? putname+0x35/0x50
[    4.813847]  [<ffffffff81197a02>] ? alloc_fd+0x92/0x160
[    4.814921]  [<ffffffff81177f19>] ? do_sys_open+0x69/0x140
[    4.816044]  [<ffffffff8117b351>] ? sys_write+0x51/0x90
[    4.817109]  [<ffffffff81178030>] ? sys_open+0x20/0x30
[    4.818164]  [<ffffffff8100b0f2>] ? system_call_fastpath+0x16/0x1b

Comment 10 Josef Bacik 2012-06-07 14:09:48 UTC

*** This bug has been marked as a duplicate of bug 698324 ***


Note You need to log in before you can comment on or make changes to this bug.