Your message dated Sun, 12 Jan 2025 12:02:46 +0000 with message-id <E1tWwg2-008phk-TJ@fasolo.debian.org> and subject line Bug#1087900: fixed in linux 6.13~rc6-1~exp1 has caused the Debian Bug report #1087900, regarding linux: kernel BUG at fs/nfsd/nfs4recover.c:534 to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 1087900: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087900 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: linux: kernel BUG at fs/nfsd/nfs4recover.c:534
- From: Benjamin Drung <bdrung@debian.org>
- Date: Wed, 20 Nov 2024 02:22:42 +0100
- Message-id: <173206576297.1569353.2079379839443675132.reportbug@deep-thought>
Package: linux Version: 6.11.9-1 Severity: normal X-Debbugs-Cc: bdrung@debian.org Dear Maintainer, Running the dracut test TEST-60-NFS on Debian unstable with linux-image-6.11.9-amd64 fails with following kernel crash: ``` [ 15.600535] NFSD: Using /var/lib/nfs/v4recovery as the NFSv4 state recovery directory [ 15.602863] NFSD: Using legacy client tracking operations. [ 15.603059] NFSD: Using /var/lib/nfs/v4recovery as the NFSv4 state recovery directory [ 15.603569] ------------[ cut here ]------------ [ 15.603706] kernel BUG at fs/nfsd/nfs4recover.c:534! [ 15.604360] Oops: invalid opcode: 0000 [#1] PREEMPT SMP NOPTI [ 15.604743] CPU: 0 UID: 0 PID: 471 Comm: rpc.nfsd Not tainted 6.11.9-amd64 #1 Debian 6.11.9-1 [ 15.605019] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.605337] RIP: 0010:nfsd4_legacy_tracking_init+0x17d/0x1b0 [nfsd] [ 15.606083] Code: 19 48 89 de 48 c7 c7 10 90 9c c0 e8 6d fb ff ff 89 c5 85 c0 0f 85 30 60 00 00 48 c7 c7 c0 af a3 c0 31 ed e8 25 b0 ca d2 eb 07 <0f> 0b bd f4 ff ff ff 48 8b 44 24 08 65 48 2b 04 25 28 00 00 00 75 [ 15.606343] RSP: 0018:ff345c4e803fbb60 EFLAGS: 00010286 [ 15.606343] RAX: 0000000000000049 RBX: ff2fd43447182000 RCX: 0000000000000003 [ 15.606343] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000001 [ 15.606343] RBP: ffffffff9525dd40 R08: 0000000000000000 R09: ff345c4e803fb9f0 [ 15.606343] R10: ffffffff946b41e8 R11: 0000000000000003 R12: ff2fd43447182000 [ 15.606343] R13: ff2fd43447182000 R14: ff2fd43469336c00 R15: ff2fd43447182000 [ 15.606343] FS: 00007fe05a5e9740(0000) GS:ff2fd4347ce00000(0000) knlGS:0000000000000000 [ 15.606343] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 15.606343] CR2: 0000559addf39db0 CR3: 000000002836e000 CR4: 0000000000751ef0 [ 15.606343] PKRU: 55555554 [ 15.606343] Call Trace: [ 15.606343] <TASK> [ 15.606343] ? __die_body.cold+0x19/0x27 [ 15.606343] ? die+0x2e/0x50 [ 15.606343] ? do_trap+0xca/0x110 [ 15.606343] ? do_error_trap+0x6a/0x90 [ 15.606343] ? nfsd4_legacy_tracking_init+0x17d/0x1b0 [nfsd] [ 15.606343] ? exc_invalid_op+0x50/0x70 [ 15.606343] ? nfsd4_legacy_tracking_init+0x17d/0x1b0 [nfsd] [ 15.606343] ? asm_exc_invalid_op+0x1a/0x20 [ 15.606343] ? nfsd4_legacy_tracking_init+0x17d/0x1b0 [nfsd] [ 15.606343] nfsd4_client_tracking_init+0x57/0x1b0 [nfsd] [ 15.606343] nfs4_state_start_net+0x2f9/0x3a0 [nfsd] [ 15.606343] nfsd_svc+0x1b9/0x340 [nfsd] [ 15.606343] write_threads+0xfc/0x1c0 [nfsd] [ 15.606343] ? __pfx_write_threads+0x10/0x10 [nfsd] [ 15.606343] nfsctl_transaction_write+0x4d/0x80 [nfsd] [ 15.606343] vfs_write+0xfe/0x460 [ 15.606343] ksys_write+0x6d/0xf0 [ 15.606343] do_syscall_64+0x82/0x190 [ 15.606343] ? syscall_exit_to_user_mode+0x4d/0x210 [ 15.606343] ? do_syscall_64+0x8e/0x190 [ 15.606343] ? __x64_sys_getdents64+0xfa/0x130 [ 15.606343] ? __pfx_filldir64+0x10/0x10 [ 15.606343] ? syscall_exit_to_user_mode+0x4d/0x210 [ 15.606343] ? do_syscall_64+0x8e/0x190 [ 15.606343] ? __count_memcg_events+0x58/0xf0 [ 15.606343] ? count_memcg_events.constprop.0+0x1a/0x30 [ 15.606343] ? handle_mm_fault+0x1bb/0x2c0 [ 15.606343] ? do_user_addr_fault+0x36c/0x620 [ 15.606343] ? exc_page_fault+0x7e/0x180 [ 15.606343] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 15.606343] RIP: 0033:0x7fe05a6f0210 [ 15.606343] Code: 2c 0e 00 64 c7 00 16 00 00 00 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 80 3d 59 ae 0e 00 00 74 17 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 58 c3 0f 1f 80 00 00 00 00 48 83 ec 28 48 89 [ 15.606343] RSP: 002b:00007fff649d2b08 EFLAGS: 00000202 ORIG_RAX: 0000000000000001 [ 15.606343] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007fe05a6f0210 [ 15.606343] RDX: 0000000000000002 RSI: 000056540dbbb340 RDI: 0000000000000003 [ 15.606343] RBP: 000056540dbbb340 R08: 0000000000000064 R09: 00000000ffffffff [ 15.606343] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000020000 [ 15.606343] R13: 000056540dbb7116 R14: 000056543353a2a0 R15: 0000000000000000 [ 15.606343] </TASK> [ 15.606343] Modules linked in: nfsd auth_rpcgss nfs_acl lockd grace ext4 crc16 mbcache jbd2 crc32c_generic sd_mod ahci libahci libata virtio_scsi scsi_mod crc32_pclmul crc32c_intel scsi_common virtio_net net_failover failover i6300esb watchdog sunrpc qemu_fw_cfg virtio_rng autofs4 [ 15.618032] ---[ end trace 0000000000000000 ]--- [ 15.618166] RIP: 0010:nfsd4_legacy_tracking_init+0x17d/0x1b0 [nfsd] [ 15.618718] Code: 19 48 89 de 48 c7 c7 10 90 9c c0 e8 6d fb ff ff 89 c5 85 c0 0f 85 30 60 00 00 48 c7 c7 c0 af a3 c0 31 ed e8 25 b0 ca d2 eb 07 <0f> 0b bd f4 ff ff ff 48 8b 44 24 08 65 48 2b 04 25 28 00 00 00 75 [ 15.619086] RSP: 0018:ff345c4e803fbb60 EFLAGS: 00010286 [ 15.619198] RAX: 0000000000000049 RBX: ff2fd43447182000 RCX: 0000000000000003 [ 15.619336] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000001 [ 15.619472] RBP: ffffffff9525dd40 R08: 0000000000000000 R09: ff345c4e803fb9f0 [ 15.619609] R10: ffffffff946b41e8 R11: 0000000000000003 R12: ff2fd43447182000 [ 15.619746] R13: ff2fd43447182000 R14: ff2fd43469336c00 R15: ff2fd43447182000 [ 15.619888] FS: 00007fe05a5e9740(0000) GS:ff2fd4347ce00000(0000) knlGS:0000000000000000 [ 15.620045] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 15.620158] CR2: 0000559addf39db0 CR3: 000000002836e000 CR4: 0000000000751ef0 [ 15.620296] PKRU: 55555554 [ 15.620469] Kernel panic - not syncing: Fatal exception [ 15.621342] Kernel Offset: 0x11a00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) ``` This crash is 100% reproducible and I can easily test different kernels. The TEST-60-NFS works fine on Ubuntu oracular. linux-image-6.12-rc6-amd64 6.12~rc6-1~exp1 from experimental is affected as well. -- Benjamin Drung Debian & Ubuntu Developer
--- End Message ---
--- Begin Message ---
- To: 1087900-close@bugs.debian.org
- Subject: Bug#1087900: fixed in linux 6.13~rc6-1~exp1
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Sun, 12 Jan 2025 12:02:46 +0000
- Message-id: <E1tWwg2-008phk-TJ@fasolo.debian.org>
- Reply-to: Bastian Blank <waldi@debian.org>
Source: linux Source-Version: 6.13~rc6-1~exp1 Done: Bastian Blank <waldi@debian.org> We believe that the bug you reported is fixed in the latest version of linux, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 1087900@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Bastian Blank <waldi@debian.org> (supplier of updated linux package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmaster@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Sun, 12 Jan 2025 11:40:45 +0100 Source: linux Architecture: source Version: 6.13~rc6-1~exp1 Distribution: experimental Urgency: medium Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org> Changed-By: Bastian Blank <waldi@debian.org> Closes: 1078005 1086172 1087900 1089515 1090071 Changes: linux (6.13~rc6-1~exp1) experimental; urgency=medium . * NOTE: This release is unable to build external modules! . * New upstream release candidate . [ Bastian Blank ] * Re-enable compressing all modules: (closes: #1089515) - Set MODULE_COMPRESS. . [ Salvatore Bonaccorso ] * d/u/signing-key.asc: Merge keys into a single OpenPGP ASCII Armored block * drivers/block/zram: Enable lz4, lz4hc and zstd compression support - Enable ZRAM_BACKEND_LZ4, ZRAM_BACKEND_LZ4HC and ZRAM_BACKEND_ZSTD (Closes: #1086172) * drivers/block/zram: Enable ZRAM_BACKEND_DEFLATE * drivers/hwmon: Enable SENSORS_SPD5118 as module (Closes: #1090071) * debian/salsa-ci.yml: Include run of .build-after-script from common pipeline. * nfsd: fix legacy client tracking initialization (Closes: #1087900) * drivers/nvme/host: Enable NVME_HOST_AUTH * drivers/nvme/target: Enable NVME_TARGET_AUTH * drivers/nvme/host: Enable NVME_TCP_TLS * drivers/nvme/target: Enable NVME_TARGET_TCP_TLS * debian/salsa-ci.yml: Reference .build-after-script from after_script section * [mips*] Increase RELOCATION_TABLE_SIZE to 0x00201000 (fixes FTBFS) * [rt] Update to 6.13-rc1-rt1 * Update "kbuild: Make the toolchain variables easily overwritable" to include .kernelvariables from $(objtree) * debian/rules.real: Make sure kernel module build finds it's tree * [amd64/cloud] drivers/idle: Enable INTEL_IDLE (Closes: #1078005) . [ Uwe Kleine-König ] * [arm64] Enable rx8025 driver as module. Checksums-Sha1: 522828a9333f7a8e636ffbd551e15d41058e7ca9 208079 linux_6.13~rc6-1~exp1.dsc 0010f4ef5437a80b194ab305223281cc3dd9d09e 151475648 linux_6.13~rc6.orig.tar.xz 117bc983f4dfc22e5914fea1b2e287b8353e058e 1542240 linux_6.13~rc6-1~exp1.debian.tar.xz 1c093fefeabb35f6780141635b98b4840b7a164c 6999 linux_6.13~rc6-1~exp1_source.buildinfo Checksums-Sha256: 28568e5700e31e7551414c8e53f8b4417709c22fdb3cb6bd4f25d8578b6d58c8 208079 linux_6.13~rc6-1~exp1.dsc d44d52ef4d3988024bf090ff23319a8efea69ab2711841bb393156b24fa840fa 151475648 linux_6.13~rc6.orig.tar.xz 82649e84fabcdbbc373ce591c98287a5eb740b30dc3a85ee9e6a3571e5c47316 1542240 linux_6.13~rc6-1~exp1.debian.tar.xz 55028b9481997a92618b20f995aae36052af1076fa0275bfbb5967bae4490413 6999 linux_6.13~rc6-1~exp1_source.buildinfo Files: 326e99e4a74ce44797919a72d43474a9 208079 kernel optional linux_6.13~rc6-1~exp1.dsc 455277e065d0a1936a0c198d70629fc3 151475648 kernel optional linux_6.13~rc6.orig.tar.xz b03964366d354dad12cca59ff7a6cd84 1542240 kernel optional linux_6.13~rc6-1~exp1.debian.tar.xz 1b21960386297742ef70c2bbf7e218d8 6999 kernel optional linux_6.13~rc6-1~exp1_source.buildinfo -----BEGIN PGP SIGNATURE----- iHUEARYKAB0WIQQ8pEKDNIgQDAQDOBFji0aBW7swjwUCZ4OiMwAKCRBji0aBW7sw jwvaAQD9T65rjw40TigP0uwqjSPBGs9Z7jgvYVNeqbJmwDAnJQD+IenbpowiKGKE HvhLtr46yI0iCpAut1WCm2ylSPjprA8= =Xx9E -----END PGP SIGNATURE-----Attachment: pgpsr6NLTQG2k.pgp
Description: PGP signature
--- End Message ---