[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#587763: marked as done (linux-image-2.6.32-5-amd64: scary messages from JBD when manipulating quotas on ext4)



Your message dated Mon, 26 Aug 2013 17:01:28 +0200
with message-id <20130826150128.GC25030@inutil.org>
and subject line Re: linux-image-2.6.32-5-amd64: scary messages from JBD when manipulating quotas on ext4
has caused the Debian Bug report #587763,
regarding linux-image-2.6.32-5-amd64: scary messages from JBD when manipulating quotas on ext4
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
587763: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=587763
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: linux-2.6
Version: 2.6.32-15
Severity: important


Hi,

here is how to reproduce this bug:

1. set up quotas on an ext4 filesystem
2. use edquota to change the quotas of some user

Actual result: the kernel outputs this scary message:

[  399.792052] JBD: Spotted dirty metadata buffer (dev = sdb1, blocknr =
34816). There's a risk of filesystem corruption in case of system crash.

Expected result: 
 - no scary message
 - no filesystem corruption
 - changed quotas

A patch has been proposed here:

  http://www.spinics.net/lists/linux-ext4/msg19302.html

This bug has also been reported here:

https://bugzilla.redhat.com/show_bug.cgi?id=578674


-- Package-specific info:
** Version:
Linux version 2.6.32-5-amd64 (Debian 2.6.32-15) (ben@decadent.org.uk)
(gcc version 4.3.5 (Debian 4.3.5-1) ) #1 SMP Tue Jun 1 04:34:03 UTC 2010

-- System Information:
Debian Release: squeeze/sid
  APT prefers testing-proposed-updates
  APT policy: (500, 'testing-proposed-updates'), (500, 'testing')
Architecture: amd64 (x86_64)


-- 
Laurent Bonnaud.
http://www.lis.inpg.fr/pages_perso/bonnaud/





--- End Message ---
--- Begin Message ---
On Sat, Nov 26, 2011 at 10:29:35PM -0600, Jonathan Nieder wrote:
> 
> Laurent Bonnaud wrote:
> 
> > 1. set up quotas on an ext4 filesystem
> > 2. use edquota to change the quotas of some user
> >
> > Actual result: the kernel outputs this scary message:
> [...]
> > Expected result: 
> >  - no scary message
> >  - no filesystem corruption
> >  - changed quotas
> 
> Robert L Mathews wrote:
> 
> > This bug still exists in squeeze kernel 2.6.32-35squeeze2 (I'm using
> > "linux-image-2.6.32-5-amd64 2.6.32-35squeeze2").
> >
> > The patch wasn't committed to the upstream kernel until 2.6.35 on July 27,
> > 2010:
> >
> > http://git.strongswan.org/?p=linux-dumm.git;a=commitdiff;h=62d2b5f2dcd3707b070efb16bbfdf6947c38c194
> 
> Thanks.
> 
> Robert, Laurent, please confirm that this fix works against a squeeze
> kernel.  Instructions for building and testing a patched kernel are
> at [1].  If it works well, we can consider applying it and propose it
> for inclusion in the next upstream 2.6.32.y kernel.

Closing. This is fixed in Wheezy and we won't backport it to oldstable any more.

Cheers,
        Moritz

--- End Message ---

Reply to: