I can confirm that the bug is present in both previous kernel versions 
(2.6.38-11) and the most recent upstream kernel I was able to find 
(3.4.0-030400rc6) in the mainline builds ppa.

Failure is 100% reliable and happens the same way under all kernels.

Here is the relevant dmesg:

[  188.712133] btrfs csum failed ino 339714 off 103366656 csum 2566472073 
private 3685698411
[  200.646518] btrfs csum failed ino 339714 off 103366656 csum 2566472073 
private 3685698411
[  200.646633] btrfs csum failed ino 339714 off 103366656 csum 2566472073 
private 3685698411
[  200.678699] btrfs csum failed ino 339714 off 103366656 csum 2566472073 
private 3685698411
[  200.678841] btrfs csum failed ino 339714 off 103366656 csum 2566472073 
private 3685698411
[  200.678987] btrfs csum failed ino 339714 off 103366656 csum 2566472073 
private 3685698411
[  200.679137] btrfs csum failed ino 339714 off 103366656 csum 2566472073 
private 3685698411
[  200.679189] ------------[ cut here ]------------
[  200.679237] kernel BUG at /home/apw/COD/linux/mm/page-writeback.c:2117!
[  200.679293] invalid opcode: 0000 [#1] SMP 
[  200.679311] CPU 2 
[  200.679320] Modules linked in: rfcomm bnep bluetooth parport_pc ppdev 
binfmt_misc xfs dm_crypt rc_dib0700_rc5 ir_lirc_codec lirc_dev 
ir_mce_kbd_decoder ds3000 ir_sanyo_decoder ir_sony_decoder ir_jvc_decoder 
ir_rc6_decoder cx88_dvb ir_rc5_decoder cx88_vp3054_i2c videobuf_dvb 
ir_nec_decoder snd_hda_codec_hdmi rc_tevii_nec snd_hda_codec_realtek 
snd_hda_intel snd_hda_codec ext2 snd_hwdep tuner snd_pcm dvb_usb_dib0700 
snd_seq_midi dib0090 snd_rawmidi cx8802 dib7000p snd_seq_midi_event cx8800 
snd_seq dib7000m cx88xx dib0070 dvb_usb dib8000 dvb_core tveeprom v4l2_common 
videodev snd_timer snd_seq_device dib3000mc snd rc_core dibx000_common 
videobuf_dma_sg videobuf_core microcode btcx_risc soundcore joydev 
snd_page_alloc serio_raw mei(C) mac_hid lm75 it87 hwmon_vid coretemp lp parport 
btrfs zlib_deflate libcrc32c usbhid hid r8169 i915 drm_kms_helper drm 
i2c_algo_bit video
[  200.679710] 
[  200.679718] Pid: 3561, comm: mysqld Tainted: G         C   
3.4.0-030400rc6-generic #201205061835 Gigabyte Technology Co., Ltd. 
H55M-D2H/H55M-S2H
[  200.679762] RIP: 0010:[<ffffffff8112a37e>]  [<ffffffff8112a37e>] 
clear_page_dirty_for_io+0xee/0x100
[  200.679798] RSP: 0018:ffff8800cabb9b88  EFLAGS: 00010246
[  200.679816] RAX: 0100000000000822 RBX: ffffea0001c90040 RCX: 00000000000fe1d5
[  200.679841] RDX: 00000000000fe1d4 RSI: ffff88009812ce70 RDI: ffffea0001c90040
[  200.679864] RBP: ffff8800cabb9b98 R08: 0000000000019770 R09: ffffffffa01ac030
[  200.679889] R10: 0000000000000001 R11: 0000000000000010 R12: ffff8800c56349e0
[  200.679912] R13: 0000000000000000 R14: ffff880036782b00 R15: 0000000000000001
[  200.679936] FS:  00007f37964ec700(0000) GS:ffff880117c80000(0000) 
knlGS:0000000000000000
[  200.679963] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  200.679982] CR2: 00007fe85003b000 CR3: 0000000110947000 CR4: 00000000000007e0
[  200.680005] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  200.680030] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[  200.680053] Process mysqld (pid: 3561, threadinfo ffff8800cabb8000, task 
ffff880104fe96e0)
[  200.680081] Stack:
[  200.680088]  ffff880036782b00 0000000000000001 ffff8800cabb9c68 
ffffffffa0198656
[  200.680115]  ffff8800cabb9c30 ffffffff00000050 ffff8800c56348a0 
ffff8800c56348a0
[  200.680143]  ffff880000000000 0000000006295000 00000000cabb9c38 
0000000006294c00
[  200.680169] Call Trace:
[  200.680199]  [<ffffffffa0198656>] prepare_pages+0x306/0x3b0 [btrfs]
[  200.680232]  [<ffffffffa0198899>] __btrfs_buffered_write+0x199/0x340 [btrfs]
[  200.680267]  [<ffffffffa0198dfc>] btrfs_file_aio_write+0x25c/0x370 [btrfs]
[  200.680291]  [<ffffffff8116e916>] ? kmem_cache_free+0xe6/0xf0
[  200.680312]  [<ffffffff810e7467>] ? call_rcu_sched+0x17/0x20
[  200.680332]  [<ffffffff811839c2>] do_sync_write+0xe2/0x120
[  200.680352]  [<ffffffff8119dc0c>] ? destroy_inode+0x3c/0x70
[  200.680371]  [<ffffffff8116e850>] ? kmem_cache_free+0x20/0xf0
[  200.680392]  [<ffffffff812e34b8>] ? apparmor_file_permission+0x18/0x20
[  200.680415]  [<ffffffff812a9cb3>] ? security_file_permission+0x23/0x90
[  200.680437]  [<ffffffff81183f58>] vfs_write+0xc8/0x190
[  200.680455]  [<ffffffff811840b2>] sys_pwrite64+0x92/0xa0
[  200.680476]  [<ffffffff81674ea9>] system_call_fastpath+0x16/0x1b
[  200.680496] Code: 57 9d 66 66 90 66 90 b8 01 00 00 00 eb 80 0f 1f 80 00 00 
00 00 48 89 df e8 20 fd ff ff eb 8a 49 c7 c4 a0 16 c4 81 e9 3e ff ff ff <0f> 0b 
eb fe 66 66 66 66 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 
[  200.680626] RIP  [<ffffffff8112a37e>] clear_page_dirty_for_io+0xee/0x100
[  200.680650]  RSP <ffff8800cabb9b88>
[  200.743880] ---[ end trace a3826077a2e72a9d ]---


** Tags removed: needs-upstream-testing
** Tags added: kernel-bug-exists-upstream

** Changed in: linux (Ubuntu)
       Status: Incomplete => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/999909

Title:
  Btrfs crashes after checksum failure

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/999909/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to