Public bug reported:
Here is the stack trace which got generated when I was running glusterfs
in docker with in devicemapper mode.
May 12 15:52:57 rastarpad kernel: [27412.569225] ------------[ cut here
]------------
May 12 15:52:57 rastarpad kernel: [27412.569232] WARNING: CPU: 0 PID: 9519 at
/build/buildd/linux-3.13.0/fs/ext4/ext4_jbd2.c:259
__ext4_handle_dirty_metadata+0x1a2/0x1c0()
May 12 15:52:57 rastarpad kernel: [27412.569234] Modules linked in:
dm_thin_pool dm_persistent_data dm_bufio dm_bio_prison xfs libcrc32c
rpcsec_gss_krb5 nfsv4 nls_utf8 hfsplus hfs isofs veth ctr ccm nls_iso8859_1
ipt_REJECT xt_CHECKSUM iptable_mangle xt_tcpudp ip6table_filter ip6_tables
ebtable_nat ebtables xt_addrtype xt_conntrack iptable_filter ipt_MASQUERADE
iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack
ip_tables x_tables bridge stp llc aufs rfcomm bnep nfsd auth_rpcgss nfs_acl nfs
lockd sunrpc fscache snd_hda_codec_hdmi snd_hda_codec_conexant uvcvideo
videobuf2_vmalloc videobuf2_memops videobuf2_core videodev joydev arc4 iwldvm
mac80211 intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel
kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64
lrw gf128mul glue_helper ablk_helper cryptd psmouse serio_raw iwlwifi
thinkpad_acpi snd_hda_intel lpc_ich snd_hda_codec cfg80211 snd_hwdep snd_pcm
nvram snd_seq_midi snd_seq
_midi_event snd_page_alloc snd_rawmidi btusb bluetooth i915 drm_kms_helper
snd_seq drm mei_me mei i2c_algo_bit snd_seq_device wmi snd_timer snd soundcore
parport_pc video mac_hid ppdev lp parport hid_generic usbhid hid mmc_block ahci
libahci e1000e sdhci_pci sdhci ptp pps_core
May 12 15:52:57 rastarpad kernel: [27412.569304] CPU: 0 PID: 9519 Comm:
glusterfsd Not tainted 3.13.0-24-generic #47-Ubuntu
May 12 15:52:57 rastarpad kernel: [27412.569306] Hardware name: LENOVO
4291G46/4291G46, BIOS 8DET58WW (1.28 ) 02/14/2012
May 12 15:52:57 rastarpad kernel: [27412.569307] 0000000000000009
ffff88009c545a58 ffffffff81715ac4 0000000000000000
May 12 15:52:57 rastarpad kernel: [27412.569310] ffff88009c545a90
ffffffff810676bd ffff88007af2d618 ffff88009d41a720
May 12 15:52:57 rastarpad kernel: [27412.569312] ffff880036ddf9f0
ffffffff81835770 00000000000000a7 ffff88009c545aa0
May 12 15:52:57 rastarpad kernel: [27412.569314] Call Trace:
May 12 15:52:57 rastarpad kernel: [27412.569319] [<ffffffff81715ac4>]
dump_stack+0x45/0x56
May 12 15:52:57 rastarpad kernel: [27412.569322] [<ffffffff810676bd>]
warn_slowpath_common+0x7d/0xa0
May 12 15:52:57 rastarpad kernel: [27412.569324] [<ffffffff8106779a>]
warn_slowpath_null+0x1a/0x20
May 12 15:52:57 rastarpad kernel: [27412.569326] [<ffffffff81268eb2>]
__ext4_handle_dirty_metadata+0x1a2/0x1c0
May 12 15:52:57 rastarpad kernel: [27412.569328] [<ffffffff81279ecc>]
ext4_xattr_release_block+0xfc/0x1c0
May 12 15:52:57 rastarpad kernel: [27412.569331] [<ffffffff8127a59d>]
ext4_xattr_block_set+0x45d/0x900
May 12 15:52:57 rastarpad kernel: [27412.569333] [<ffffffff812798c4>] ?
ext4_xattr_set_entry+0x34/0x360
May 12 15:52:57 rastarpad kernel: [27412.569334] [<ffffffff8127b515>]
ext4_xattr_set_handle+0x315/0x450
May 12 15:52:57 rastarpad kernel: [27412.569336] [<ffffffff8127b733>]
ext4_xattr_set+0xe3/0x130
May 12 15:52:57 rastarpad kernel: [27412.569338] [<ffffffff8127c19d>]
ext4_xattr_trusted_set+0x2d/0x30
May 12 15:52:57 rastarpad kernel: [27412.569340] [<ffffffff811ddaf2>]
generic_setxattr+0x62/0x80
May 12 15:52:57 rastarpad kernel: [27412.569342] [<ffffffff811de353>]
__vfs_setxattr_noperm+0x63/0x1b0
May 12 15:52:57 rastarpad kernel: [27412.569345] [<ffffffff8131c20e>] ?
evm_inode_setxattr+0xe/0x10
May 12 15:52:57 rastarpad kernel: [27412.569348] [<ffffffff811de555>]
vfs_setxattr+0xb5/0xc0
May 12 15:52:57 rastarpad kernel: [27412.569350] [<ffffffff811de68e>]
setxattr+0x12e/0x1c0
May 12 15:52:57 rastarpad kernel: [27412.569354] [<ffffffff811c9302>] ?
final_putname+0x22/0x50
May 12 15:52:57 rastarpad kernel: [27412.569356] [<ffffffff811c9509>] ?
putname+0x29/0x40
May 12 15:52:57 rastarpad kernel: [27412.569357] [<ffffffff811ca04f>] ?
user_path_at_empty+0x5f/0x90
May 12 15:52:57 rastarpad kernel: [27412.569360] [<ffffffff811bbb19>] ?
__sb_start_write+0x49/0xe0
May 12 15:52:57 rastarpad kernel: [27412.569362] [<ffffffff8109d76b>] ?
account_user_time+0x8b/0xa0
May 12 15:52:57 rastarpad kernel: [27412.569365] [<ffffffff811de9ff>]
SyS_lsetxattr+0x8f/0xd0
May 12 15:52:57 rastarpad kernel: [27412.569368] [<ffffffff817266bf>]
tracesys+0xe1/0xe6
May 12 15:52:57 rastarpad kernel: [27412.569370] ---[ end trace
e2065139c897454b ]---
** Affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1318607
Title:
ext4 stack trace
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1318607/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs