Re: Oops in 4.0.0-rc6: __destroy_inode

From: Andreas Schwab
Date: Fri Apr 10 2015 - 04:16:33 EST


Probably the same problem:

[ 569.568129] Unable to handle kernel paging request at virtual address 1000608907d6324
[ 569.575972] pgd = fffffe03c3fd0000
[ 569.579364] [1000608907d6324] *pgd=0000000000000000, *pud=0000000000000000, *pmd=0000000000000000
[ 569.586094] Internal error: Oops: 96000004 [#1] SMP
[ 569.586098] Modules linked in: loop af_packet btrfs nls_iso8859_1 nls_cp437 xor vfat fat aes_ce_blk amd_xgbe_phy_a0 raid6_pq amd_xgbe_a0 ptp ablk_helper cryptd pps_core i2c_designware_platform libphy aes_ce_cipher i2c_designware_core dm_mod ghash_ce spi_pl022 i2c_core sha2_ce sha1_ce uio_pdrv_genirq uio efivarfs sr_mod cdrom ahci_platform libahci_platform libahci libata sg
[ 569.586146] CPU: 3 PID: 8755 Comm: bsdtar Tainted: G W 4.0.0-rc6-3.g2121347-default #1
[ 569.586147] Hardware name: /Default string, BIOS ROD0074D 01/29/2015
[ 569.586150] task: fffffe03c2cc2700 ti: fffffe03c3c08000 task.ti: fffffe03c3c08000
[ 569.586161] PC is at __d_lookup+0x8c/0x198
[ 569.586163] LR is at d_lookup+0x40/0x68
[ 569.586166] pc : [<fffffe000022b790>] lr : [<fffffe000022b8dc>] pstate: 60000145
[ 569.586167] sp : fffffe03c3c0bb20
[ 569.586171] x29: fffffe03c3c0bb20 x28: fffffe000f721d70
[ 569.586174] x27: ffffffffffffffff x26: fffffe03c0c8a048
[ 569.586177] x25: 0000000000000013 x24: fffffe03c3c0bd90
[ 569.586180] x23: fffffe000f67c668 x22: fffffe000f67c668
[ 569.586182] x21: 00000000d3fa6e8f x20: 01000608907d6304
[ 569.586185] x19: 01000608907d630c x18: 0000000000008000
[ 569.586188] x17: 000003ff7c6ec120 x16: fffffe0000210c00
[ 569.586190] x15: 000003ff7c78f538 x14: 0000006300000069
[ 569.586193] x13: 0000006d0000006f x12: 0000000000000018
[ 569.586195] x11: 0101010101010101 x10: 7f7f7f7f7f7f7f7f
[ 569.586198] x9 : 0000000000000000 x8 : 6c657665642d6769
[ 569.586200] x7 : 6c657665642d6769 x6 : fffffe000f67c6b0
[ 569.586203] x5 : fffffe03c0c8a000 x4 : fffffe03c3c0bd2c
[ 569.586205] x3 : 0000000000000020 x2 : 000000000000000b
[ 569.586208] x1 : 0000000000735008 x0 : fffffe03fc190000
[ 569.586209]
[ 569.586211] Process bsdtar (pid: 8755, stack limit = 0xfffffe03c3c08028)
[ 569.586214] Stack: (0xfffffe03c3c0bb20 to 0xfffffe03c3c0c000)
[ 569.586218] bb20: c3c0bb80 fffffe03 0022b8dc fffffe00 000006e8 00000000 00b80400 fffffe00
[ 569.586222] bb40: c3c0bd90 fffffe03 0f67c668 fffffe00 c3c0be78 fffffe03 000200c1 00000000
[ 569.586225] bb60: 0f67c668 fffffe00 c3c0bd80 fffffe03 c679ad00 fffffe03 0f721d70 fffffe00
[ 569.586228] bb80: c3c0bbb0 fffffe03 0021c728 fffffe00 c3c0bd30 fffffe03 c3c0bd90 fffffe03
[ 569.586231] bba0: 0f67c668 fffffe00 c3c0bca7 fffffe03 c3c0bc00 fffffe03 0021eed8 fffffe00
[ 569.586234] bbc0: c3c0bd30 fffffe03 0f67c668 fffffe00 00000000 00000000 c3c0bd2c fffffe03
[ 569.586237] bbe0: c3c0be78 fffffe03 0021eeb0 fffffe00 c3c0bd30 fffffe03 00000701 00000000
[ 569.586240] bc00: c3c0bcb0 fffffe03 002213d8 fffffe00 c3c0bd80 fffffe03 c3c0be78 fffffe03
[ 569.586242] bc20: c0c8a000 fffffe03 00000041 00000000 ffffff9c 00000000 00000015 00000000
[ 569.586245] bc40: 00000000 00000000 00000038 00000000 c679ad00 fffffe03 c3c08000 fffffe03
[ 569.586248] bc60: c679ad00 fffffe03 00000015 00000000 c3c0bcb0 fffffe03 002213b4 fffffe00
[ 569.586251] bc80: 00000001 00000000 00000000 00000022 c0c8a000 fffffe03 c679ad00 fffffe03
[ 569.586253] bca0: ffffff9c 00000000 0021abc4 fffffe00 c3c0bd50 fffffe03 00222bc4 fffffe00
[ 569.586256] bcc0: c3c0be78 fffffe03 c0c8a000 fffffe03 ffffff9c 00000000 00000001 00000000
[ 569.586259] bce0: 20000000 00000000 00000015 00000000 0000011a 00000000 00000038 00000000
[ 569.586262] bd00: 00662000 fffffe00 c3c08000 fffffe03 c3c0bd60 fffffe03 00252cf4 fffffe00
[ 569.586264] bd20: 00000002 00000000 00000002 00000000 00662000 fffffe00 c3c08000 fffffe03
[ 569.586267] bd40: c3c0be10 fffffe03 00213a34 fffffe00 c3c0be20 fffffe03 00210adc fffffe00
[ 569.586270] bd60: 00000004 00000000 ffffff9c 00000000 c0c8a000 fffffe03 7c6ec190 000003ff
[ 569.586272] bd80: c33c51a0 fffffe03 0f67c668 fffffe00 d3fa6e8f 00000013 c0c8a048 fffffe03
[ 569.586275] bda0: 00000000 00000000 00000015 00000000 0f721d70 fffffe00 00000701 00000004
[ 569.586278] bdc0: 00000720 00000000 00000000 00000000 00000000 00000000 7c6ec190 000003ff
[ 569.586280] bde0: 20000000 00000000 00000015 00000000 0000011a 00000000 00000038 00000000
[ 569.586283] be00: c3c0be20 fffffe03 00210ac4 fffffe00 000a00c1 00000000 000a00c1 00000000
[ 569.586286] be20: c3c0be90 fffffe03 00210c3c fffffe00 ffffff9c ffffffff 000001a4 00000000
[ 569.586289] be40: ffffffff ffffffff 7c6ec190 000003ff 20000000 00000000 00000015 00000000
[ 569.586291] be60: c3c0bea0 fffffe03 1bba2750 00000000 c3c0bed0 fffffe03 000200c1 000081a4
[ 569.586294] be80: 00000022 00000700 00000001 00000000 f1fb0130 000003ff 00093c4c fffffe00
[ 569.586297] bea0: 00000200 00000000 00093c1c fffffe00 00000200 00000000 000001a4 00000000
[ 569.586299] bec0: 000800c1 00000000 1bba2750 00000000 ffffff9c ffffffff 1bba2750 00000000
[ 569.586302] bee0: 000800c1 00000000 000001a4 00000000 f1fb0240 000003ff 00000000 00000000
[ 569.586305] bf00: 00000080 00000080 6e6b6d74 672d6a62 00000038 00000000 ff6b6c73 ff6b6c72
[ 569.586308] bf20: 7f7f7f7f 7f7f7f7f 01010101 01010101 00000018 00000000 0000006f 0000006d
[ 569.586310] bf40: 00000069 00000063 7c78f538 000003ff 7c84dfa0 000003ff 7c6ec120 000003ff
[ 569.586313] bf60: 00008000 00000000 1bb60810 00000000 000001a4 00000000 000001a4 00000000
[ 569.586316] bf80: 00000078 00000000 0040a670 00000000 1bb61570 00000000 7c78df50 000003ff
[ 569.586319] bfa0: 00000000 00000000 0041e550 00000000 0040b948 00000000 f1fb0130 000003ff
[ 569.586321] bfc0: 7c7f343c 000003ff f1fb0130 000003ff 7c6ec190 000003ff 20000000 00000000
[ 569.586324] bfe0: ffffff9c ffffffff 00000038 00000000 58b99570 000003ff 58b99588 000003ff
[ 569.586325] Call trace:
[ 569.586330] [<fffffe000022b790>] __d_lookup+0x8c/0x198
[ 569.586332] [<fffffe000022b8d8>] d_lookup+0x3c/0x68
[ 569.586337] [<fffffe000021c724>] lookup_dcache+0x38/0xc8
[ 569.586340] [<fffffe000021eed4>] do_last+0x3b8/0xd34
[ 569.586343] [<fffffe00002213d4>] path_openat+0x8c/0x63c
[ 569.586346] [<fffffe0000222bc0>] do_filp_open+0x3c/0x98
[ 569.586350] [<fffffe0000210ad8>] do_sys_open+0x148/0x228
[ 569.586352] [<fffffe0000210c38>] SyS_openat+0x38/0x48
[ 569.586355] Code: 14000003 f9400273 b4000213 d1002274 (b9402282)
[ 569.586358] ---[ end trace e677706c79797ba0 ]---

Andreas.

--
Andreas Schwab, schwab@xxxxxxxxxxxxxx
GPG Key fingerprint = 58CA 54C7 6D53 942B 1756 01D3 44D5 214B 8276 4ED5
"And now for something completely different."
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/