Bug 816072 - extract file to btrfs filesystem with tar get call trace
extract file to btrfs filesystem with tar get call trace
Status: CLOSED DUPLICATE of bug 698324
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: btrfs-progs (Show other bugs)
6.3
x86_64 Linux
urgent Severity urgent
: rc
: ---
Assigned To: Josef Bacik
Red Hat Kernel QE team
:
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2012-04-25 04:06 EDT by Mohua Li
Modified: 2012-06-07 10:09 EDT (History)
6 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2012-06-07 10:09:48 EDT
Type: Bug
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Mohua Li 2012-04-25 04:06:00 EDT
Description of problem:

try command "tar -C $btrfsmountpoint -xf *.tar" in kvm guest got the call trace as below,and didn't reproduce on the physical with the same kernel version,  and also no problem with directly write                                                                 
                                                                                                              
calltrace:                                                                                                   
                                                                                                             
[    2.828048]  [<ffffffffa01d6fef>] ? btrfs_free_path+0x2f/0x40 [btrfs]
[    2.828048]  [<ffffffffa01fd627>] ? btrfs_update_inode+0x77/0x100 [btrfs]
[    2.828048]  [<ffffffffa01ff9db>] btrfs_mkdir+0x19b/0x1f0 [btrfs]
[    2.828048]  [<ffffffff811863f7>] vfs_mkdir+0xa7/0x100
[    2.828048]  [<ffffffff8118951e>] sys_mkdirat+0xfe/0x120
[    2.828048]  [<ffffffff81196292>] ? alloc_fd+0x92/0x160
[    2.828048]  [<ffffffff81185e45>] ? putname+0x35/0x50
[    2.828048]  [<ffffffff81176841>] ? do_sys_open+0x101/0x140
[    2.828048]  [<ffffffff81189558>] sys_mkdir+0x18/0x20
[    2.828048]  [<ffffffff8100b0f2>] system_call_fastpath+0x16/0x1b
[    2.828048] Code: 4c 89 d2 44 89 f1 4c 89 ee 4c 89 1c 24 4c 89 55 a8 4c 89 5d a0 e8 f2 28 ff ff 4c 8b 5d a0 4c 8b 55 a8 85 c0 75 bc e9 36 ff ff ff <0f> 0b eb fe 48 8b b2 68 fe ff ff 48 8d 7d b0 b9 11 00 00 00 4d
[    2.828048] RIP  [<ffffffffa01ff14f>] btrfs_add_link+0x12f/0x190 [btrfs]
[    2.828048]  RSP <ffff88001cecbd68>
[    2.871890] ---[ end trace cf2aa1aad09a2a88 ]---
[    2.872607] Kernel panic - not syncing: Fatal exception
[    2.873496] Pid: 347, comm: tar Tainted: G      D    ---------------  T 2.6.32-251.el6.x86_64 #1
[    2.874916] Call Trace:
[    2.875314]  [<ffffffff814f7312>] ? panic+0xa0/0x168
[    2.876091]  [<ffffffff814fb4a4>] ? oops_end+0xe4/0x100
[    2.876888]  [<ffffffff8100f26b>] ? die+0x5b/0x90
[    2.877619]  [<ffffffff814fad74>] ? do_trap+0xc4/0x160
[    2.878410]  [<ffffffff8100ce35>] ? do_invalid_op+0x95/0xb0
[    2.879272]  [<ffffffffa01ff14f>] ? btrfs_add_link+0x12f/0x190 [btrfs]
[    2.880278]  [<ffffffffa021ab1e>] ? set_extent_buffer_dirty+0x4e/0xa0 [btrfs]
[    2.881364]  [<ffffffffa01d6fef>] ? btrfs_free_path+0x2f/0x40 [btrfs]
[    2.882348]  [<ffffffff8100bedb>] ? invalid_op+0x1b/0x20
[    2.883172]  [<ffffffffa01ff14f>] ? btrfs_add_link+0x12f/0x190 [btrfs]
[    2.884171]  [<ffffffffa01ff0bd>] ? btrfs_add_link+0x9d/0x190 [btrfs]
[    2.885159]  [<ffffffffa01d6fef>] ? btrfs_free_path+0x2f/0x40 [btrfs]
[    2.886150]  [<ffffffffa01fd627>] ? btrfs_update_inode+0x77/0x100 [btrfs]
[    2.887193]  [<ffffffffa01ff9db>] ? btrfs_mkdir+0x19b/0x1f0 [btrfs]
[    2.888155]  [<ffffffff811863f7>] ? vfs_mkdir+0xa7/0x100
[    2.888959]  [<ffffffff8118951e>] ? sys_mkdirat+0xfe/0x120
[    2.889814]  [<ffffffff81196292>] ? alloc_fd+0x92/0x160
[    2.890632]  [<ffffffff81185e45>] ? putname+0x35/0x50
[    2.891411]  [<ffffffff81176841>] ? do_sys_open+0x101/0x140
[    2.892276]  [<ffffffff81189558>] ? sys_mkdir+0x18/0x20
[    2.893085]  [<ffffffff8100b0f2>] ? system_call_fastpath+0x16/0x1b
                                   
                                                                                                              
                                                                                                              
qemu-kvmcmdline:                                                                                             
/usr/libexec/qemu-kvm -S -M rhel6.3.0 -enable-kvm -m 1024 -smp 1,sockets=1,cores=1,threads=1 -name rhel6.3 -uuid b0d761f5-8f00-d267-4906-bf4ab7e7597e -nodefconfig -nodefaults -chardev socket,id=charmonitor,path=/var/lib/libvirt/qemu/rhel6.3.monitor,server,nowait -mon chardev=charmonitor,id=monitor,mode=control -rtc base=utc -no-shutdown -device piix3-usb-uhci,id=usb,bus=pci.0,addr=0x1.0x2 -drive file=/var/lib/libvirt/images/rhel6.3.img,if=none,id=drive-virtio-disk0,format=raw,cache=none -device virtio-blk-pci,scsi=off,bus=pci.0,addr=0x5,drive=drive-virtio-disk0,id=virtio-disk0,bootindex=1 -netdev tap,fd=22,id=hostnet0,vhost=on,vhostfd=23 -device virtio-net-pci,netdev=hostnet0,id=net0,mac=52:54:00:7e:69:70,bus=pci.0,addr=0x3 -chardev pty,id=charserial0 -device isa-serial,chardev=charserial0,id=serial0 -device usb-tablet,id=input0 -vnc 127.0.0.1:0 -vga cirrus -device intel-hda,id=sound0,bus=pci.0,addr=0x4 -device hda-duplex,id=sound0-codec0,bus=sound0.0,cad=0 -device virtio-balloon-pci,id=balloon0,bus=pci.0,addr=0x6
root     16782  4797  0 15:27 pts/8    00:00:00 grep qemu-kvm
                                                               

Version-Release number of selected component (if applicable):
kernel-2.6.32-257.el6.x86_64
qemu-kvm-0.12.1.2-2.285.el6.x86_64




How reproducible:
always

Steps to Reproduce:
1.modprobe btrfs
2.dd if=/dev/zero of=test.disk bs=1 count=1 seek=2G
3.mkfs.btrfs test.disk
4.mount -o loop test.disk /mnt
5. tar -C /mnt -xf *.tar
  
Actual results:
get call trace

Expected results:
no call trace 

Additional info:
Comment 4 Richard W.M. Jones 2012-04-25 06:14:33 EDT
So I get a similar stack trace when using libguestfs to create
and write to a btrfs filesystem on RHEL 6.3.  (Note: it's all
RHEL 6.3, I'm not trying to mix filesytems created on Fedora this
time).

Here's how to reproduce this:

  export LIBGUESTFS_DEBUG=1
  virt-make-fs -F qcow2 -t btrfs --partition=mbr --size=1G \
    libguestfs-1.17.2.tar.gz disk2.qcow2

You can choose any small tarball you happen to have around.  The
one I used is ~ 6 MB in size.

This fails with several kernel panics:

[    4.515425] leaf free space ret -2361, leaf data size 3995, used 6356 nritems 56
[    4.517293] ------------[ cut here ]------------

[    4.518370] WARNING: at fs/btrfs/extent_io.c:3646 read_extent_buffer+0x194/0x1d0 [btrfs]() (Tainted: G           ---------------  T)
[    4.521126] Hardware name: KVM
[    4.521801] Modules linked in: btrfs(T) zlib_deflate lzo_decompress lzo_compress dm_mod i2c_piix4 i2c_core ext2 ext4 jbd2 virtio_balloon virtio_pci virtio_net virtio_scsi virtio_blk virtio_console virtio_rng virtio virtio_ring sd_mod sym53c8xx scsi_transport_spi ata_piix sr_mod cdrom mbcache crc7 crc_ccitt crc_t10dif crc_itu_t libcrc32c
[    4.529855] Pid: 341, comm: tar Tainted: G           ---------------  T 2.6.32-262.el6.x86_64 #1
[    4.531861] Call Trace:
[    4.532467]  [<ffffffff8106b607>] ? warn_slowpath_common+0x87/0xc0
[    4.533930]  [<ffffffff8106b65a>] ? warn_slowpath_null+0x1a/0x20
[    4.535224]  [<ffffffffa0219514>] ? read_extent_buffer+0x194/0x1d0 [btrfs]
[    4.537108]  [<ffffffffa02195eb>] ? copy_extent_buffer+0x9b/0x1c0 [btrfs]
[    4.538727]  [<ffffffffa01db2cb>] ? copy_for_split+0x1bb/0x430 [btrfs]
[    4.540276]  [<ffffffffa01dd842>] ? split_leaf+0x352/0x8a0 [btrfs]
[    4.541824]  [<ffffffffa01d5e8b>] ? generic_bin_search+0x19b/0x210 [btrfs]
[    4.543425]  [<ffffffffa01d87ba>] ? btrfs_leaf_free_space+0x8a/0xe0 [btrfs]
[    4.545047]  [<ffffffffa01de51f>] ? btrfs_search_slot+0x78f/0x8a0 [btrfs]
[    4.546562]  [<ffffffffa01df65d>] ? btrfs_insert_empty_items+0x8d/0xf0 [btrfs]
[    4.548049]  [<ffffffffa01ee7a3>] ? insert_with_overflow+0x43/0x130 [btrfs]
[    4.549742]  [<ffffffffa01eea16>] ? btrfs_insert_dir_item+0x186/0x270 [btrfs]
[    4.551604]  [<ffffffffa01fe0bd>] ? btrfs_add_link+0x9d/0x190 [btrfs]
[    4.553345]  [<ffffffff8121325f>] ? security_inode_init_security+0x1f/0x30
[    4.554872]  [<ffffffffa0231431>] ? btrfs_init_acl+0x51/0x1a0 [btrfs]
[    4.556669]  [<ffffffffa01fe1df>] ? btrfs_add_nondir+0x2f/0x70 [btrfs]
[    4.558247]  [<ffffffffa01fa0f9>] ? btrfs_init_inode_security+0x39/0x50 [btrfs]
[    4.560010]  [<ffffffffa01fe386>] ? btrfs_create+0x166/0x210 [btrfs]
[    4.561588]  [<ffffffff81188284>] ? vfs_create+0xb4/0xe0
[    4.562810]  [<ffffffff8118bdef>] ? do_filp_open+0xb2f/0xd60
[    4.564406]  [<ffffffff81199bb0>] ? mntput_no_expire+0x30/0x110
[    4.565764]  [<ffffffff811875c5>] ? putname+0x35/0x50
[    4.567068]  [<ffffffff81197a02>] ? alloc_fd+0x92/0x160
[    4.568246]  [<ffffffff81177f19>] ? do_sys_open+0x69/0x140
[    4.569446]  [<ffffffff8117b351>] ? sys_write+0x51/0x90
[    4.570574]  [<ffffffff81178030>] ? sys_open+0x20/0x30
[    4.571050]  [<ffffffff8100b0f2>] ? system_call_fastpath+0x16/0x1b
[    4.573235] ---[ end trace bfe97017af3c3b78 ]---
[    4.574328] ------------[ cut here ]------------
[    4.575391] WARNING: at fs/btrfs/extent_io.c:3647 read_extent_buffer+0x1b9/0x1d0 [btrfs]() (Tainted: G        W  ---------------  T)
[    4.577842] Hardware name: KVM
[    4.578530] Modules linked in: btrfs(T) zlib_deflate lzo_decompress lzo_compress dm_mod i2c_piix4 i2c_core ext2 ext4 jbd2 virtio_balloon virtio_pci virtio_net virtio_scsi virtio_blk virtio_console virtio_rng virtio virtio_ring sd_mod sym53c8xx scsi_transport_spi ata_piix sr_mod cdrom mbcache crc7 crc_ccitt crc_t10dif crc_itu_t libcrc32c
[    4.585553] Pid: 341, comm: tar Tainted: G        W  ---------------  T 2.6.32-262.el6.x86_64 #1
[    4.587406] Call Trace:
[    4.587921]  [<ffffffff8106b607>] ? warn_slowpath_common+0x87/0xc0
[    4.589395]  [<ffffffff8106b65a>] ? warn_slowpath_null+0x1a/0x20
[    4.590636]  [<ffffffffa0219539>] ? read_extent_buffer+0x1b9/0x1d0 [btrfs]
[    4.592135]  [<ffffffffa02195eb>] ? copy_extent_buffer+0x9b/0x1c0 [btrfs]
[    4.593521]  [<ffffffffa01db2cb>] ? copy_for_split+0x1bb/0x430 [btrfs]
[    4.594945]  [<ffffffffa01dd842>] ? split_leaf+0x352/0x8a0 [btrfs]
[    4.596203]  [<ffffffffa01d5e8b>] ? generic_bin_search+0x19b/0x210 [btrfs]
[    4.597601]  [<ffffffffa01d87ba>] ? btrfs_leaf_free_space+0x8a/0xe0 [btrfs]
[    4.599101]  [<ffffffffa01de51f>] ? btrfs_search_slot+0x78f/0x8a0 [btrfs]
[    4.600488]  [<ffffffffa01df65d>] ? btrfs_insert_empty_items+0x8d/0xf0 [btrfs]
[    4.602150]  [<ffffffffa01ee7a3>] ? insert_with_overflow+0x43/0x130 [btrfs]
[    4.603625]  [<ffffffffa01eea16>] ? btrfs_insert_dir_item+0x186/0x270 [btrfs]
[    4.605166]  [<ffffffffa01fe0bd>] ? btrfs_add_link+0x9d/0x190 [btrfs]
[    4.606470]  [<ffffffff8121325f>] ? security_inode_init_security+0x1f/0x30
[    4.607958]  [<ffffffffa0231431>] ? btrfs_init_acl+0x51/0x1a0 [btrfs]
[    4.609272]  [<ffffffffa01fe1df>] ? btrfs_add_nondir+0x2f/0x70 [btrfs]
[    4.610605]  [<ffffffffa01fa0f9>] ? btrfs_init_inode_security+0x39/0x50 [btrfs]
[    4.612181]  [<ffffffffa01fe386>] ? btrfs_create+0x166/0x210 [btrfs]
[    4.613472]  [<ffffffff81188284>] ? vfs_create+0xb4/0xe0
[    4.614707]  [<ffffffff8118bdef>] ? do_filp_open+0xb2f/0xd60
[    4.615909]  [<ffffffff81199bb0>] ? mntput_no_expire+0x30/0x110
[    4.617114]  [<ffffffff811875c5>] ? putname+0x35/0x50
[    4.618232]  [<ffffffff81197a02>] ? alloc_fd+0x92/0x160
[    4.619300]  [<ffffffff81177f19>] ? do_sys_open+0x69/0x140
[    4.620416]  [<ffffffff8117b351>] ? sys_write+0x51/0x90
[    4.621562]  [<ffffffff81178030>] ? sys_open+0x20/0x30
[    4.622621]  [<ffffffff8100b0f2>] ? system_call_fastpath+0x16/0x1b
[    4.623882] ---[ end trace bfe97017af3c3b79 ]---
[    4.624920] BUG: scheduling while atomic: tar/341/0x10000002
[    4.625901] Modules linked in: btrfs(T) zlib_deflate lzo_decompress lzo_compress dm_mod i2c_piix4 i2c_core ext2 ext4 jbd2 virtio_balloon virtio_pci virtio_net virtio_scsi virtio_blk virtio_console virtio_rng virtio virtio_ring sd_mod sym53c8xx scsi_transport_spi ata_piix sr_mod cdrom mbcache crc7 crc_ccitt crc_t10dif crc_itu_t libcrc32c
[    4.625901] Pid: 341, comm: tar Tainted: G        W  ---------------  T 2.6.32-262.el6.x86_64 #1
[    4.625901] Call Trace:
[    4.625901]  [<ffffffff81057d66>] ? __schedule_bug+0x66/0x70
[    4.625901]  [<ffffffff814faea8>] ? thread_return+0x646/0x76e
[    4.625901]  [<ffffffff8100bc0e>] ? apic_timer_interrupt+0xe/0x20
[    4.625901]  [<ffffffff814ffd76>] ? kprobe_exceptions_notify+0x16/0x430
[    4.625901]  [<ffffffff8127ce54>] ? memcpy+0x54/0x120
[    4.625901]  [<ffffffff8106234a>] ? __cond_resched+0x2a/0x40
[    4.625901]  [<ffffffff8127ce54>] ? memcpy+0x54/0x120
[    4.625901]  [<ffffffff814fb270>] ? _cond_resched+0x30/0x40
[    4.625901]  [<ffffffff8100df76>] ? is_valid_bugaddr+0x16/0x40
[    4.625901]  [<ffffffff8127026f>] ? report_bug+0x1f/0xc0
[    4.625901]  [<ffffffff8100f28f>] ? die+0x7f/0x90
[    4.625901]  [<ffffffff814fdea2>] ? do_general_protection+0x152/0x160
[    4.625901]  [<ffffffff814fd675>] ? general_protection+0x25/0x30
[    4.625901]  [<ffffffff8127ce54>] ? memcpy+0x54/0x120
[    4.625901]  [<ffffffffa0219458>] ? read_extent_buffer+0xd8/0x1d0 [btrfs]
[    4.625901]  [<ffffffffa02195eb>] ? copy_extent_buffer+0x9b/0x1c0 [btrfs]
[    4.625901]  [<ffffffffa01db2cb>] ? copy_for_split+0x1bb/0x430 [btrfs]
[    4.625901]  [<ffffffffa01dd842>] ? split_leaf+0x352/0x8a0 [btrfs]
[    4.625901]  [<ffffffffa01d5e8b>] ? generic_bin_search+0x19b/0x210 [btrfs]
[    4.625901]  [<ffffffffa01d87ba>] ? btrfs_leaf_free_space+0x8a/0xe0 [btrfs]
[    4.625901]  [<ffffffffa01de51f>] ? btrfs_search_slot+0x78f/0x8a0 [btrfs]
[    4.625901]  [<ffffffffa01df65d>] ? btrfs_insert_empty_items+0x8d/0xf0 [btrfs]
[    4.625901]  [<ffffffffa01ee7a3>] ? insert_with_overflow+0x43/0x130 [btrfs]
[    4.625901]  [<ffffffffa01eea16>] ? btrfs_insert_dir_item+0x186/0x270 [btrfs]
[    4.625901]  [<ffffffffa01fe0bd>] ? btrfs_add_link+0x9d/0x190 [btrfs]
[    4.625901]  [<ffffffff8121325f>] ? security_inode_init_security+0x1f/0x30
[    4.625901]  [<ffffffffa0231431>] ? btrfs_init_acl+0x51/0x1a0 [btrfs]
[    4.625901]  [<ffffffffa01fe1df>] ? btrfs_add_nondir+0x2f/0x70 [btrfs]
[    4.625901]  [<ffffffffa01fa0f9>] ? btrfs_init_inode_security+0x39/0x50 [btrfs]
[    4.625901]  [<ffffffffa01fe386>] ? btrfs_create+0x166/0x210 [btrfs]
[    4.625901]  [<ffffffff81188284>] ? vfs_create+0xb4/0xe0
[    4.625901]  [<ffffffff8118bdef>] ? do_filp_open+0xb2f/0xd60
[    4.625901]  [<ffffffff81199bb0>] ? mntput_no_expire+0x30/0x110
[    4.625901]  [<ffffffff811875c5>] ? putname+0x35/0x50
[    4.625901]  [<ffffffff81197a02>] ? alloc_fd+0x92/0x160
[    4.625901]  [<ffffffff81177f19>] ? do_sys_open+0x69/0x140
[    4.625901]  [<ffffffff8117b351>] ? sys_write+0x51/0x90
[    4.625901]  [<ffffffff81178030>] ? sys_open+0x20/0x30
[    4.625901]  [<ffffffff8100b0f2>] ? system_call_fastpath+0x16/0x1b
guestfsd: receive_file: reading length word
guestfsd: receive_file: got chunk: cancel = 0x0, len = 8192, buf = 0x6094710
guestfsd: receive_file: reading length word
guestfsd: receive_file: got chunk: cancel = 0x0, len = 8192, buf = 0x6094710
guestfsd: receive_file: reading length word
guestfsd: receive_file: got chunk: cancel = 0x0, len = 8192, buf = 0x6094710
guestfsd: receive_file: reading length word
guestfsd: receive_file: got chunk: cancel = 0x0, len = 8192, buf = 0x6094710
guestfsd: receive_file: reading length word
guestfsd: receive_file: got chunk: cancel = 0x0, len = 8192, buf = 0x6094710
guestfsd: receive_file: reading length word
guestfsd: receive_file: got chunk: cancel = 0x0, len = 8192, buf = 0x6094710
guestfsd: receive_file: reading length word
guestfsd: receive_file: got chunk: cancel = 0x0, len = 8192, buf = 0x6094710
guestfsd: receive_file: reading length word
guestfsd: receive_file: got chunk: cancel = 0x0, len = 8192, buf = 0x6094710
[    4.698842] general protection fault: 0000 [#1] SMP 
[    4.699935] last sysfs file: /sys/module/libcrc32c/initstate
[    4.701095] CPU 0 
[    4.701477] Modules linked in: btrfs(T) zlib_deflate lzo_decompress lzo_compress dm_mod i2c_piix4 i2c_core ext2 ext4 jbd2 virtio_balloon virtio_pci virtio_net virtio_scsi virtio_blk virtio_console virtio_rng virtio virtio_ring sd_mod sym53c8xx scsi_transport_spi ata_piix sr_mod cdrom mbcache crc7 crc_ccitt crc_t10dif crc_itu_t libcrc32c
[    4.708695] 
[    4.709057] Pid: 341, comm: tar Tainted: G        W  ---------------  T 2.6.32-262.el6.x86_64 #1 Red Hat KVM
[    4.711151] RIP: 0010:[<ffffffff8127ce54>]  [<ffffffff8127ce54>] memcpy+0x54/0x120
[    4.712739] RSP: 0018:ffff88001d4897b0  EFLAGS: 00010202
[    4.713855] RAX: ffff88001d77c652 RBX: ffff88001d119238 RCX: ffff88001d77c652
[    4.715320] RDX: 000000000000031c RSI: db73880000001000 RDI: ffff88001d77c9ae
[    4.716797] RBP: ffff88001d4897f8 R08: 0000000000001c0a R09: 0000000000000000
[    4.718250] R10: 0000000000000005 R11: 000000000000008c R12: 000000000000035c
[    4.719713] R13: 00000000000009ae R14: ffff88001d488000 R15: 00000000000fffff
[    4.721222] FS:  00007ff38012c7a0(0000) GS:ffff880002200000(0000) knlGS:0000000000000000
[    4.722896] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[    4.724091] CR2: 0000003d7d75859c CR3: 000000001d795000 CR4: 00000000000006f0
[    4.725583] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[    4.727073] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[    4.728545] Process tar (pid: 341, threadinfo ffff88001d488000, task ffff88001d727540)
[    4.730161] Stack:
[    4.730585]  ffffffffa0219458 0000000000000ca4 ffff88001d77c652 00000000000005d5
[    4.732196] <d> 00000000fffffca4 00000000000009ae ffff88001d488000 0000000000000000
[    4.733926] <d> ffff88001d1191b0 ffff88001d489858 ffffffffa02195eb ffff880000000000
[    4.735740] Call Trace:
[    4.736320]  [<ffffffffa0219458>] ? read_extent_buffer+0xd8/0x1d0 [btrfs]
[    4.737739]  [<ffffffffa02195eb>] copy_extent_buffer+0x9b/0x1c0 [btrfs]
[    4.739127]  [<ffffffffa01db2cb>] copy_for_split+0x1bb/0x430 [btrfs]
[    4.740434]  [<ffffffffa01dd842>] split_leaf+0x352/0x8a0 [btrfs]
[    4.741671]  [<ffffffffa01d5e8b>] ? generic_bin_search+0x19b/0x210 [btrfs]
[    4.743136]  [<ffffffffa01d87ba>] ? btrfs_leaf_free_space+0x8a/0xe0 [btrfs]
[    4.744607]  [<ffffffffa01de51f>] btrfs_search_slot+0x78f/0x8a0 [btrfs]
[    4.745966]  [<ffffffffa01df65d>] btrfs_insert_empty_items+0x8d/0xf0 [btrfs]
[    4.747429]  [<ffffffffa01ee7a3>] insert_with_overflow+0x43/0x130 [btrfs]
[    4.748839]  [<ffffffffa01eea16>] btrfs_insert_dir_item+0x186/0x270 [btrfs]
[    4.750256]  [<ffffffffa01fe0bd>] btrfs_add_link+0x9d/0x190 [btrfs]
[    4.751547]  [<ffffffff8121325f>] ? security_inode_init_security+0x1f/0x30
[    4.752988]  [<ffffffffa0231431>] ? btrfs_init_acl+0x51/0x1a0 [btrfs]
[    4.754302]  [<ffffffffa01fe1df>] btrfs_add_nondir+0x2f/0x70 [btrfs]
[    4.755607]  [<ffffffffa01fa0f9>] ? btrfs_init_inode_security+0x39/0x50 [btrfs]
[    4.757122]  [<ffffffffa01fe386>] btrfs_create+0x166/0x210 [btrfs]
[    4.758378]  [<ffffffff81188284>] vfs_create+0xb4/0xe0
[    4.759449]  [<ffffffff8118bdef>] do_filp_open+0xb2f/0xd60
[    4.760568]  [<ffffffff81199bb0>] ? mntput_no_expire+0x30/0x110
[    4.761821]  [<ffffffff811875c5>] ? putname+0x35/0x50
[    4.762885]  [<ffffffff81197a02>] ? alloc_fd+0x92/0x160
[    4.763961]  [<ffffffff81177f19>] do_sys_open+0x69/0x140
[    4.765080]  [<ffffffff8117b351>] ? sys_write+0x51/0x90
[    4.766170]  [<ffffffff81178030>] sys_open+0x20/0x30
[    4.767212]  [<ffffffff8100b0f2>] system_call_fastpath+0x16/0x1b
[    4.768433] Code: 76 20 4c 89 07 4c 89 4f 08 4c 89 57 10 4c 89 5f 18 48 8d 7f 20 73 d4 48 83 c2 20 eb 42 48 01 d6 48 01 d7 48 83 ea 20 48 83 ea 20 <4c> 8b 46 f8 4c 8b 4e f0 4c 8b 56 e8 4c 8b 5e e0 48 8d 76 e0 4c 
[    4.774252] RIP  [<ffffffff8127ce54>] memcpy+0x54/0x120
[    4.775356]  RSP <ffff88001d4897b0>
[    4.776107] ---[ end trace bfe97017af3c3b7a ]---
[    4.777062] Kernel panic - not syncing: Fatal exception
[    4.778155] Pid: 341, comm: tar Tainted: G      D W  ---------------  T 2.6.32-262.el6.x86_64 #1
[    4.779942] Call Trace:
[    4.780476]  [<ffffffff814fa1a0>] ? panic+0xa0/0x168
[    4.781501]  [<ffffffff814fe334>] ? oops_end+0xe4/0x100
[    4.782608]  [<ffffffff8100f26b>] ? die+0x5b/0x90
[    4.783586]  [<ffffffff814fdea2>] ? do_general_protection+0x152/0x160
[    4.784900]  [<ffffffff814fd675>] ? general_protection+0x25/0x30
[    4.786134]  [<ffffffff8127ce54>] ? memcpy+0x54/0x120
[    4.787179]  [<ffffffffa0219458>] ? read_extent_buffer+0xd8/0x1d0 [btrfs]
[    4.788556]  [<ffffffffa02195eb>] ? copy_extent_buffer+0x9b/0x1c0 [btrfs]
[    4.789938]  [<ffffffffa01db2cb>] ? copy_for_split+0x1bb/0x430 [btrfs]
[    4.791265]  [<ffffffffa01dd842>] ? split_leaf+0x352/0x8a0 [btrfs]
[    4.792592]  [<ffffffffa01d5e8b>] ? generic_bin_search+0x19b/0x210 [btrfs]
[    4.794012]  [<ffffffffa01d87ba>] ? btrfs_leaf_free_space+0x8a/0xe0 [btrfs]
[    4.795429]  [<ffffffffa01de51f>] ? btrfs_search_slot+0x78f/0x8a0 [btrfs]
[    4.796823]  [<ffffffffa01df65d>] ? btrfs_insert_empty_items+0x8d/0xf0 [btrfs]
[    4.798299]  [<ffffffffa01ee7a3>] ? insert_with_overflow+0x43/0x130 [btrfs]
[    4.799724]  [<ffffffffa01eea16>] ? btrfs_insert_dir_item+0x186/0x270 [btrfs]
[    4.801186]  [<ffffffffa01fe0bd>] ? btrfs_add_link+0x9d/0x190 [btrfs]
[    4.802500]  [<ffffffff8121325f>] ? security_inode_init_security+0x1f/0x30
[    4.803910]  [<ffffffffa0231431>] ? btrfs_init_acl+0x51/0x1a0 [btrfs]
[    4.805236]  [<ffffffffa01fe1df>] ? btrfs_add_nondir+0x2f/0x70 [btrfs]
[    4.806571]  [<ffffffffa01fa0f9>] ? btrfs_init_inode_security+0x39/0x50 [btrfs]
[    4.808064]  [<ffffffffa01fe386>] ? btrfs_create+0x166/0x210 [btrfs]
[    4.809350]  [<ffffffff81188284>] ? vfs_create+0xb4/0xe0
[    4.810440]  [<ffffffff8118bdef>] ? do_filp_open+0xb2f/0xd60
[    4.811591]  [<ffffffff81199bb0>] ? mntput_no_expire+0x30/0x110
[    4.812807]  [<ffffffff811875c5>] ? putname+0x35/0x50
[    4.813847]  [<ffffffff81197a02>] ? alloc_fd+0x92/0x160
[    4.814921]  [<ffffffff81177f19>] ? do_sys_open+0x69/0x140
[    4.816044]  [<ffffffff8117b351>] ? sys_write+0x51/0x90
[    4.817109]  [<ffffffff81178030>] ? sys_open+0x20/0x30
[    4.818164]  [<ffffffff8100b0f2>] ? system_call_fastpath+0x16/0x1b
Comment 10 Josef Bacik 2012-06-07 10:09:48 EDT

*** This bug has been marked as a duplicate of bug 698324 ***

Note You need to log in before you can comment on or make changes to this bug.