[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#649606: marked as done (Kernel bug while umounting partition.)



Your message dated Sat, 24 Apr 2021 06:00:59 -0700 (PDT)
with message-id <6084168b.1c69fb81.735d1.82fb@mx.google.com>
and subject line Closing this bug (BTS maintenance for src:linux bugs)
has caused the Debian Bug report #649606,
regarding Kernel bug while umounting partition.
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
649606: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649606
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: linux-image-2.6-xen-amd64
Version: 2.6.32+29

After taring image of the partition umount hangs. I've used following
commands:

on #1 terminal:

$ mount -r -o loop /root/image.img /mnt/work
$ cd /mnt/work
$ nice -n 15 ionice -n 7 tar -pczf /root/image.tar.gz ./

on #2 terminal:

$ cpulimit -e gzip -z -l 50

after finnish, on #1 termina:
umount /mnt/work

Umount command hangs (system is still running). Here is dmesg output:


[1297561.793377] EXT4-fs error (device loop0): ext4_ext_find_extent: bad
header/extent in inode #4436213: invalid magic - magic 3951, entries
13611, max 25957(0), depth 22612(0)
[1297561.793511] ------------[ cut here ]------------
[1297561.793541] kernel BUG at
/build/buildd-linux-2.6_2.6.32-35squeeze2-amd64-OT816k/linux-2.6-2.6.32/debian/build/source_amd64_xen/fs/ext4/extents.c:1873!
[1297561.793612] invalid opcode: 0000 [#1] SMP
[1297561.793649] last sysfs file:
/sys/devices/vbd-22-51714/statistics/wr_sect
[1297561.793681] CPU 1
[1297561.793707] Modules linked in: virtio_balloon virtio usb_storage
nf_conntrack_netlink nfnetlink xt_tcpudp nf_conntrack_ipv4
nf_defrag_ipv4 xt_state nf_conntrack xt_physdev iptable_filter ip_tables
x_tables bridge stp xen_evtchn xenfs ext3 jbd dm_snapshot coretemp
ipmi_si ipmi_msghandler loop radeon snd_pcm ttm snd_timer drm_kms_helper
i5000_edac processor snd drm edac_core soundcore snd_page_alloc
i2c_algo_bit acpi_processor i2c_core i5k_amb rng_core dcdbas psmouse
evdev serio_raw pcspkr joydev button shpchp pci_hotplug ext4 mbcache
jbd2 crc16 dm_mod usbhid hid sg sr_mod ses cdrom sd_mod crc_t10dif
enclosure ata_generic uhci_hcd ata_piix ehci_hcd libata megaraid_sas
bnx2 usbcore nls_base scsi_mod thermal thermal_sys [last unloaded:
scsi_wait_scan]
[1297561.794228] Pid: 13884, comm: tar Not tainted 2.6.32-5-xen-amd64 #1
PowerEdge 1950
[1297561.794275] RIP: e030:[<ffffffffa018ceb2>]  [<ffffffffa018ceb2>]
ext4_ext_get_blocks+0x277/0x19a5 [ext4]
[1297561.794344] RSP: e02b:ffff880120cfb768  EFLAGS: 00010246
[1297561.794373] RAX: 0000000000000000 RBX: 00000000704e4a4a RCX:
0000000000000000
[1297561.794420] RDX: ffff8801c928ddb0 RSI: ffff8801988c0000 RDI:
00000000704e4a4a
[1297561.794467] RBP: ffff8801988cbff8 R08: aaaaaaaaaaaaaa00 R09:
ffff8801988cbff8
[1297561.794514] R10: 0000000000000000 R11: ffffffffa01a0340 R12:
0000000000000000
[1297561.794561] R13: 0000000000000000 R14: ffff8800772fcc48 R15:
0000000000000000
[1297561.794611] FS:  00007f016e2e9700(0000) GS:ffff88000ae62000(0000)
knlGS:0000000000000000
[1297561.794659] CS:  e033 DS: 0000 ES: 0000 CR0: 000000008005003b
[1297561.794689] CR2: 00007f2f2565e1d0 CR3: 0000000139615000 CR4:
0000000000002660
[1297561.794736] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
0000000000000000
[1297561.794784] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7:
0000000000000400
[1297561.794831] Process tar (pid: 13884, threadinfo ffff880120cfa000,
task ffff8801c92a3170)
[1297561.794879] Stack:
[1297561.794902]  000000000002277a 02000000000002c0 000000000ae740b0
ffff88013879d770
[1297561.794943] <0> 00000001a018bdcc 0000000000000000 ffff8801c928dd80
ffff8801988b8000
[1297561.795004] <0> 00000000704e4a4a 0000000000000001 0000000000000000
ffff8800772fcb88
[1297561.795083] Call Trace:
[1297561.795114]  [<ffffffffa018cdb6>] ?
ext4_ext_get_blocks+0x17b/0x19a5 [ext4]
[1297561.795151]  [<ffffffffa018cca1>] ? ext4_ext_get_blocks+0x66/0x19a5
[ext4]
[1297561.795188]  [<ffffffff8100e629>] ? xen_force_evtchn_callback+0x9/0xa
[1297561.795220]  [<ffffffff8100e629>] ? xen_force_evtchn_callback+0x9/0xa
[1297561.795252]  [<ffffffff8100ece2>] ? check_events+0x12/0x20
[1297561.795287]  [<ffffffffa0171047>] ? ext4_get_blocks+0x82/0x253 [ext4]
[1297561.795319]  [<ffffffff8100eccf>] ? xen_restore_fl_direct_end+0x0/0x1
[1297561.795352]  [<ffffffff810e8191>] ? kmem_cache_alloc+0x8c/0xf0
[1297561.795387]  [<ffffffffa017266e>] ? ext4_get_block+0xa5/0xe2 [ext4]
[1297561.795420]  [<ffffffff81110bb3>] ? block_read_full_page+0xf4/0x1ea
[1297561.795456]  [<ffffffffa01725c9>] ? ext4_get_block+0x0/0xe2 [ext4]
[1297561.795491]  [<ffffffffa017266e>] ? ext4_get_block+0xa5/0xe2 [ext4]
[1297561.795523]  [<ffffffff81115bc6>] ? do_mpage_readpage+0x41f/0x421
[1297561.795568]  [<ffffffffa01725c9>] ? ext4_get_block+0x0/0xe2 [ext4]
[1297561.795603]  [<ffffffffa01725c9>] ? ext4_get_block+0x0/0xe2 [ext4]
[1297561.795636]  [<ffffffff810b5491>] ? add_to_page_cache_locked+0x98/0xc1
[1297561.795671]  [<ffffffffa01725c9>] ? ext4_get_block+0x0/0xe2 [ext4]
[1297561.795703]  [<ffffffff81115d06>] ? mpage_readpages+0xcc/0x112
[1297561.795737]  [<ffffffffa01725c9>] ? ext4_get_block+0x0/0xe2 [ext4]
[1297561.795773]  [<ffffffffa018a944>] ? __ext4_ext_check+0x136/0x1ba [ext4]
[1297561.795807]  [<ffffffff81065e17>] ? bit_waitqueue+0x10/0xa0
[1297561.795837]  [<ffffffff81065ee5>] ? wake_up_bit+0x11/0x22
[1297561.795869]  [<ffffffff810bcb31>] ?
__do_page_cache_readahead+0x11b/0x1b4
[1297561.795901]  [<ffffffff810bcbe6>] ? ra_submit+0x1c/0x20
[1297561.795931]  [<ffffffff810b65bf>] ? generic_file_aio_read+0x1ff/0x536
[1297561.795966]  [<ffffffffa016b7ea>] ? ext4_file_open+0x0/0xe8 [ext4]
[1297561.795999]  [<ffffffff810efb25>] ? do_sync_read+0xce/0x113
[1297561.796030]  [<ffffffff810f2e77>] ? cp_new_stat+0xe9/0xfc
[1297561.796060]  [<ffffffff81065ef6>] ? autoremove_wake_function+0x0/0x2e
[1297561.796092]  [<ffffffff8100e629>] ? xen_force_evtchn_callback+0x9/0xa
[1297561.796126]  [<ffffffff811542e1>] ? cap_dentry_open+0x0/0x3
[1297561.796156]  [<ffffffff810ee262>] ? do_sys_open+0xec/0xfc
[1297561.796186]  [<ffffffff8100e629>] ? xen_force_evtchn_callback+0x9/0xa
[1297561.796218]  [<ffffffff8100ece2>] ? check_events+0x12/0x20
[1297561.796249]  [<ffffffff811542e1>] ? cap_dentry_open+0x0/0x3
[1297561.796279]  [<ffffffff810f0548>] ? vfs_read+0xa6/0xff
[1297561.796309]  [<ffffffff8100eccf>] ? xen_restore_fl_direct_end+0x0/0x1
[1297561.796341]  [<ffffffff810f065d>] ? sys_read+0x45/0x6e
[1297561.796371]  [<ffffffff81011b42>] ? system_call_fastpath+0x16/0x1b
[1297561.796401] Code: 20 48 09 c3 44 89 f8 44 29 e8 48 01 d8 48 89 44
24 40 44 89 e8 44 29 f8 44 01 e0 66 81 f9 00 80 89 44 24 4c 77 48 45 85
e4 75 04 <0f> 0b eb fe 48 8b 7c 24 68 e8 a3 02 18 e1 48 8b 44 24 58 c7 80
[1297561.796707] RIP  [<ffffffffa018ceb2>]
ext4_ext_get_blocks+0x277/0x19a5 [ext4]
[1297561.796761]  RSP <ffff880120cfb768>
[1297561.796985] ---[ end trace 6b9b0a3ce202271a ]---


I used often these commands and this is the first time when it became
something like that.



--- End Message ---
--- Begin Message ---
Hi

This bug was filed for a very old kernel or the bug is old itself
without resolution.

If you can reproduce it with

- the current version in unstable/testing
- the latest kernel from backports

please reopen the bug, see https://www.debian.org/Bugs/server-control
for details.

Regards,
Salvatore

--- End Message ---

Reply to: