Ext4 FS corruption leads to system panic in jbd2_journal_dirty_metadata()
Issue
System crash with the kernel stack trace
BUG: unable to handle kernel NULL pointer dereference at 0000000000000010
IP: [<ffffffffa03d5868>] jbd2_journal_dirty_metadata+0x48/0x150 [jbd2]
PGD 9748577067 PUD 9a90da0067 PMD 0
Oops: 0000 [#1] SMP
last sysfs file: /sys/devices/pci0000:c0/0000:c0:03.0/0000:d5:00.1/host3/rport-3:0-7/target3:0:7/3:0:7:47/state
CPU 32
...
RIP: 0010:[<ffffffffa03d5868>] [<ffffffffa03d5868>] jbd2_journal_dirty_metadata+0x48/0x150 [jbd2]
RSP: 0018:ffff88975353bae8 EFLAGS: 00010246
RAX: ffff88feab11b5c0 RBX: ffff88950e50ddf8 RCX: ffff88991f280b58
RDX: 0000000000000000 RSI: ffff88991f280b58 RDI: ffff88950e50ddf8
RBP: ffff88975353bb08 R08: ffff8899ae5d2cf8 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000
R13: ffff88991f280b58 R14: ffff88fec0907800 R15: ffff88950e50ddf8
FS: 00002b34005f7340(0000) GS:ffff880409800000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000010 CR3: 00000097cc142000 CR4: 00000000001407e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Process K08_URLMonitor. (pid: 49704, threadinfo ffff889753538000, task ffff88feb5680040)
Stack:
ffff88950e50ddf8 ffffffffa0437074 ffff88991f280b58 ffff88991f2818d0
<d> ffff88975353bb48 ffffffffa0423d6b ffff889aa4b65880 0000003000000012
<d> ffff88991f2818d0 ffff88991c751264 ffff88991c751258 0000000000000010
Call Trace:
[<ffffffffa0423d6b>] __ext4_handle_dirty_metadata+0x7b/0x100 [ext4]
[<ffffffffa041e8e4>] ext4_ext_dirty+0x24/0x40 [ext4]
[<ffffffffa04231ab>] ext4_ext_remove_space+0x88b/0xdc0 [ext4]
[<ffffffffa0423c8d>] ext4_ext_truncate+0x18d/0x1f0 [ext4]
[<ffffffffa0402cc0>] ? ext4_delete_inode+0x0/0x2e0 [ext4]
[<ffffffffa0401cd8>] ext4_truncate+0x4c8/0x6a0 [ext4]
[<ffffffffa0423d6b>] ? __ext4_handle_dirty_metadata+0x7b/0x100 [ext4]
[<ffffffffa03fc1ed>] ? ext4_mark_iloc_dirty+0x2ed/0x610 [ext4]
[<ffffffffa03fdc93>] ? ext4_mark_inode_dirty+0x83/0x1d0 [ext4]
[<ffffffffa03d53d5>] ? jbd2_journal_start+0xb5/0x100 [jbd2]
[<ffffffffa0402cc0>] ? ext4_delete_inode+0x0/0x2e0 [ext4]
[<ffffffffa0402cc0>] ? ext4_delete_inode+0x0/0x2e0 [ext4]
[<ffffffffa0402dfb>] ext4_delete_inode+0x13b/0x2e0 [ext4]
[<ffffffff811b812e>] generic_delete_inode+0xde/0x1d0
[<ffffffff811b8285>] generic_drop_inode+0x65/0x80
[<ffffffff811b70d2>] iput+0x62/0x70
[<ffffffff811abaf9>] do_unlinkat+0x1a9/0x260
[<ffffffff8119f9d6>] ? sys_newlstat+0x36/0x50
[<ffffffff810ee467>] ? audit_syscall_entry+0x1d7/0x200
[<ffffffff811abbc6>] sys_unlink+0x16/0x20
[<ffffffff8100b0d2>] system_call_fastpath+0x16/0x1b
Environment
- Red Hat Enterprise Linux 6
- Kernel 2.6.32-642.13.1.el6.x86_64
- corrupted ext4 filesystem
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase of over 48,000 articles and solutions.
Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.
