[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#649606: marked as done (Kernel bug while umounting partition.)



Your message dated Fri, 31 May 2013 18:04:35 +0200
with message-id <20130531160435.GA5794@pisco.westfalen.local>
and subject line Closing
has caused the Debian Bug report #649606,
regarding Kernel bug while umounting partition.
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
649606: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649606
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: linux-image-2.6-xen-amd64
Version: 2.6.32+29

After taring image of the partition umount hangs. I've used following
commands:

on #1 terminal:

$ mount -r -o loop /root/image.img /mnt/work
$ cd /mnt/work
$ nice -n 15 ionice -n 7 tar -pczf /root/image.tar.gz ./

on #2 terminal:

$ cpulimit -e gzip -z -l 50

after finnish, on #1 termina:
umount /mnt/work

Umount command hangs (system is still running). Here is dmesg output:


[1297561.793377] EXT4-fs error (device loop0): ext4_ext_find_extent: bad
header/extent in inode #4436213: invalid magic - magic 3951, entries
13611, max 25957(0), depth 22612(0)
[1297561.793511] ------------[ cut here ]------------
[1297561.793541] kernel BUG at
/build/buildd-linux-2.6_2.6.32-35squeeze2-amd64-OT816k/linux-2.6-2.6.32/debian/build/source_amd64_xen/fs/ext4/extents.c:1873!
[1297561.793612] invalid opcode: 0000 [#1] SMP
[1297561.793649] last sysfs file:
/sys/devices/vbd-22-51714/statistics/wr_sect
[1297561.793681] CPU 1
[1297561.793707] Modules linked in: virtio_balloon virtio usb_storage
nf_conntrack_netlink nfnetlink xt_tcpudp nf_conntrack_ipv4
nf_defrag_ipv4 xt_state nf_conntrack xt_physdev iptable_filter ip_tables
x_tables bridge stp xen_evtchn xenfs ext3 jbd dm_snapshot coretemp
ipmi_si ipmi_msghandler loop radeon snd_pcm ttm snd_timer drm_kms_helper
i5000_edac processor snd drm edac_core soundcore snd_page_alloc
i2c_algo_bit acpi_processor i2c_core i5k_amb rng_core dcdbas psmouse
evdev serio_raw pcspkr joydev button shpchp pci_hotplug ext4 mbcache
jbd2 crc16 dm_mod usbhid hid sg sr_mod ses cdrom sd_mod crc_t10dif
enclosure ata_generic uhci_hcd ata_piix ehci_hcd libata megaraid_sas
bnx2 usbcore nls_base scsi_mod thermal thermal_sys [last unloaded:
scsi_wait_scan]
[1297561.794228] Pid: 13884, comm: tar Not tainted 2.6.32-5-xen-amd64 #1
PowerEdge 1950
[1297561.794275] RIP: e030:[<ffffffffa018ceb2>]  [<ffffffffa018ceb2>]
ext4_ext_get_blocks+0x277/0x19a5 [ext4]
[1297561.794344] RSP: e02b:ffff880120cfb768  EFLAGS: 00010246
[1297561.794373] RAX: 0000000000000000 RBX: 00000000704e4a4a RCX:
0000000000000000
[1297561.794420] RDX: ffff8801c928ddb0 RSI: ffff8801988c0000 RDI:
00000000704e4a4a
[1297561.794467] RBP: ffff8801988cbff8 R08: aaaaaaaaaaaaaa00 R09:
ffff8801988cbff8
[1297561.794514] R10: 0000000000000000 R11: ffffffffa01a0340 R12:
0000000000000000
[1297561.794561] R13: 0000000000000000 R14: ffff8800772fcc48 R15:
0000000000000000
[1297561.794611] FS:  00007f016e2e9700(0000) GS:ffff88000ae62000(0000)
knlGS:0000000000000000
[1297561.794659] CS:  e033 DS: 0000 ES: 0000 CR0: 000000008005003b
[1297561.794689] CR2: 00007f2f2565e1d0 CR3: 0000000139615000 CR4:
0000000000002660
[1297561.794736] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
0000000000000000
[1297561.794784] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7:
0000000000000400
[1297561.794831] Process tar (pid: 13884, threadinfo ffff880120cfa000,
task ffff8801c92a3170)
[1297561.794879] Stack:
[1297561.794902]  000000000002277a 02000000000002c0 000000000ae740b0
ffff88013879d770
[1297561.794943] <0> 00000001a018bdcc 0000000000000000 ffff8801c928dd80
ffff8801988b8000
[1297561.795004] <0> 00000000704e4a4a 0000000000000001 0000000000000000
ffff8800772fcb88
[1297561.795083] Call Trace:
[1297561.795114]  [<ffffffffa018cdb6>] ?
ext4_ext_get_blocks+0x17b/0x19a5 [ext4]
[1297561.795151]  [<ffffffffa018cca1>] ? ext4_ext_get_blocks+0x66/0x19a5
[ext4]
[1297561.795188]  [<ffffffff8100e629>] ? xen_force_evtchn_callback+0x9/0xa
[1297561.795220]  [<ffffffff8100e629>] ? xen_force_evtchn_callback+0x9/0xa
[1297561.795252]  [<ffffffff8100ece2>] ? check_events+0x12/0x20
[1297561.795287]  [<ffffffffa0171047>] ? ext4_get_blocks+0x82/0x253 [ext4]
[1297561.795319]  [<ffffffff8100eccf>] ? xen_restore_fl_direct_end+0x0/0x1
[1297561.795352]  [<ffffffff810e8191>] ? kmem_cache_alloc+0x8c/0xf0
[1297561.795387]  [<ffffffffa017266e>] ? ext4_get_block+0xa5/0xe2 [ext4]
[1297561.795420]  [<ffffffff81110bb3>] ? block_read_full_page+0xf4/0x1ea
[1297561.795456]  [<ffffffffa01725c9>] ? ext4_get_block+0x0/0xe2 [ext4]
[1297561.795491]  [<ffffffffa017266e>] ? ext4_get_block+0xa5/0xe2 [ext4]
[1297561.795523]  [<ffffffff81115bc6>] ? do_mpage_readpage+0x41f/0x421
[1297561.795568]  [<ffffffffa01725c9>] ? ext4_get_block+0x0/0xe2 [ext4]
[1297561.795603]  [<ffffffffa01725c9>] ? ext4_get_block+0x0/0xe2 [ext4]
[1297561.795636]  [<ffffffff810b5491>] ? add_to_page_cache_locked+0x98/0xc1
[1297561.795671]  [<ffffffffa01725c9>] ? ext4_get_block+0x0/0xe2 [ext4]
[1297561.795703]  [<ffffffff81115d06>] ? mpage_readpages+0xcc/0x112
[1297561.795737]  [<ffffffffa01725c9>] ? ext4_get_block+0x0/0xe2 [ext4]
[1297561.795773]  [<ffffffffa018a944>] ? __ext4_ext_check+0x136/0x1ba [ext4]
[1297561.795807]  [<ffffffff81065e17>] ? bit_waitqueue+0x10/0xa0
[1297561.795837]  [<ffffffff81065ee5>] ? wake_up_bit+0x11/0x22
[1297561.795869]  [<ffffffff810bcb31>] ?
__do_page_cache_readahead+0x11b/0x1b4
[1297561.795901]  [<ffffffff810bcbe6>] ? ra_submit+0x1c/0x20
[1297561.795931]  [<ffffffff810b65bf>] ? generic_file_aio_read+0x1ff/0x536
[1297561.795966]  [<ffffffffa016b7ea>] ? ext4_file_open+0x0/0xe8 [ext4]
[1297561.795999]  [<ffffffff810efb25>] ? do_sync_read+0xce/0x113
[1297561.796030]  [<ffffffff810f2e77>] ? cp_new_stat+0xe9/0xfc
[1297561.796060]  [<ffffffff81065ef6>] ? autoremove_wake_function+0x0/0x2e
[1297561.796092]  [<ffffffff8100e629>] ? xen_force_evtchn_callback+0x9/0xa
[1297561.796126]  [<ffffffff811542e1>] ? cap_dentry_open+0x0/0x3
[1297561.796156]  [<ffffffff810ee262>] ? do_sys_open+0xec/0xfc
[1297561.796186]  [<ffffffff8100e629>] ? xen_force_evtchn_callback+0x9/0xa
[1297561.796218]  [<ffffffff8100ece2>] ? check_events+0x12/0x20
[1297561.796249]  [<ffffffff811542e1>] ? cap_dentry_open+0x0/0x3
[1297561.796279]  [<ffffffff810f0548>] ? vfs_read+0xa6/0xff
[1297561.796309]  [<ffffffff8100eccf>] ? xen_restore_fl_direct_end+0x0/0x1
[1297561.796341]  [<ffffffff810f065d>] ? sys_read+0x45/0x6e
[1297561.796371]  [<ffffffff81011b42>] ? system_call_fastpath+0x16/0x1b
[1297561.796401] Code: 20 48 09 c3 44 89 f8 44 29 e8 48 01 d8 48 89 44
24 40 44 89 e8 44 29 f8 44 01 e0 66 81 f9 00 80 89 44 24 4c 77 48 45 85
e4 75 04 <0f> 0b eb fe 48 8b 7c 24 68 e8 a3 02 18 e1 48 8b 44 24 58 c7 80
[1297561.796707] RIP  [<ffffffffa018ceb2>]
ext4_ext_get_blocks+0x277/0x19a5 [ext4]
[1297561.796761]  RSP <ffff880120cfb768>
[1297561.796985] ---[ end trace 6b9b0a3ce202271a ]---


I used often these commands and this is the first time when it became
something like that.



--- End Message ---
--- Begin Message ---
Hi,
your bug has been filed against the "linux-2.6" source package and was filed for
a kernel older than the recently released Debian 7.0 / Wheezy with a severity
less than important.

We don't have the ressources to reproduce the complete backlog of all older kernel
bugs, so we're closing this bug for now. If you can reproduce the bug with Debian Wheezy
or a more recent kernel from testing or unstable, please reopen the bug by sending
a mail to control@bugs.debian.org with the following three commands included in the
mail:

reopen BUGNUMBER
reassign BUGNUMBER src:linux
thanks

Cheers,
        Moritz

--- End Message ---

Reply to: