Quantcast
Channel: CentOS Bug Tracker - Issues
Viewing all articles
Browse latest Browse all 19115

0007006: Kernel panic every couple of days due to fs read

$
0
0
I am running a CentOS 6.5 server (kernel 2.6.32-431.5.1.el6.x86_64), and I have a regular kernel panic every couple of days.<br /> <br /> Going over the core dump, it seems that ext4 tries to read a page with incorrect address, but that is as far as I can understand.<br /> <br /> This is a recurring issue in my setup (also happened in 6.3) for the past months.<br /> <br /> I am using a raid5 array with 5 * 2TB disks, formatted to ext4 for data, <br /> and the system is running from a separate 500GB disk, also formatted to ext4.<br /> <br /> Here is the crash log:<br /> R10: 0000000000000000 R11: 0000000000000293 R12: ffff8801a187fdc8<br /> R13: 000000000001d5ab R14: ffff88020ad3a500 R15: 0000000000000002<br /> FS: 00007fe1553ea700(0000) GS:ffff880028380000(0000) knlGS:0000000000000000<br /> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> CR2: 0000000000000002 CR3: 0000000208aa0000 CR4: 00000000000407e0<br /> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000<br /> DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400<br /> Process transmission-da (pid: 2396, threadinfo ffff880209fa0000, task ffff880209a1eaa0)<br /> Stack:<br /> ffff880209fa1ce8 ffffffff8105a924 ffff880209fa1cc0 0000000109fa1bf8<br /> <d> ffff880209fa1cb8 0000000200007c3f 0000000100000003 ffff880028390660<br /> <d> ffffea00051b6090 0000000000000008 0000000000016840 0000000000016840<br /> Call Trace:<br /> [<ffffffff8105a924>] ? find_busiest_group+0x244/0x9f0<br /> [<ffffffff811c9a1f>] mpage_readpage+0x4f/0x70<br /> [<ffffffffa00c0360>] ? ext4_get_block+0x0/0x120 [ext4]<br /> [<ffffffff810792c7>] ? current_fs_time+0x27/0x30<br /> [<ffffffff810129de>] ? copy_user_generic+0xe/0x20<br /> [<ffffffff8111efe3>] ? file_read_actor+0x163/0x180<br /> [<ffffffff811a50e1>] ? touch_atime+0x71/0x1a0<br /> [<ffffffffa00bcd68>] ext4_readpage+0x18/0x20 [ext4]<br /> [<ffffffff811212fc>] generic_file_aio_read+0x1fc/0x700<br /> [<ffffffff81188daa>] do_sync_read+0xfa/0x140<br /> [<ffffffff8109b290>] ? autoremove_wake_function+0x0/0x40<br /> [<ffffffff8118e7a4>] ? cp_new_stat+0xe4/0x100<br /> [<ffffffff812263b6>] ? security_file_permission+0x16/0x20<br /> [<ffffffff81189695>] vfs_read+0xb5/0x1a0<br /> [<ffffffff811899c2>] sys_pread64+0x82/0xa0<br /> [<ffffffff8100b072>] system_call_fastpath+0x16/0x1b<br /> Code: 98 00 00 00 0f 1f 44 00 00 48 89 75 80 89 95 5c ff ff ff 49 89 fa 48 89 8d 50 ff ff ff 4c 89 8d 60 ff ff ff 4c 89 c3 48 8b 46 18 <48> 8b 00 48 89 85 68 ff ff ff 8b 80 a8 00 00 00 89 45 8c 48 8b <br /> RIP [<ffffffff811c941b>] do_mpage_readpage+0x3b/0x5f0<br /> RSP <ffff880209fa1b68><br /> CR2: 0000000000000002

Viewing all articles
Browse latest Browse all 19115

Latest Images

Trending Articles



Latest Images

<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>