Linux Archive

Linux Archive (http://www.linux-archive.org/)
-   Debian Kernel (http://www.linux-archive.org/debian-kernel/)
-   -   Bug#649606: Kernel bug while umounting partition. (http://www.linux-archive.org/debian-kernel/601329-bug-649606-kernel-bug-while-umounting-partition.html)

Tomasz Gemza 11-22-2011 02:25 PM

Bug#649606: Kernel bug while umounting partition.
 
Package: linux-image-2.6-xen-amd64
Version: 2.6.32+29

After taring image of the partition umount hangs. I've used following
commands:

on #1 terminal:

$ mount -r -o loop /root/image.img /mnt/work
$ cd /mnt/work
$ nice -n 15 ionice -n 7 tar -pczf /root/image.tar.gz ./

on #2 terminal:

$ cpulimit -e gzip -z -l 50

after finnish, on #1 termina:
umount /mnt/work

Umount command hangs (system is still running). Here is dmesg output:


[1297561.793377] EXT4-fs error (device loop0): ext4_ext_find_extent: bad
header/extent in inode #4436213: invalid magic - magic 3951, entries
13611, max 25957(0), depth 22612(0)
[1297561.793511] ------------[ cut here ]------------
[1297561.793541] kernel BUG at
/build/buildd-linux-2.6_2.6.32-35squeeze2-amd64-OT816k/linux-2.6-2.6.32/debian/build/source_amd64_xen/fs/ext4/extents.c:1873!
[1297561.793612] invalid opcode: 0000 [#1] SMP
[1297561.793649] last sysfs file:
/sys/devices/vbd-22-51714/statistics/wr_sect
[1297561.793681] CPU 1
[1297561.793707] Modules linked in: virtio_balloon virtio usb_storage
nf_conntrack_netlink nfnetlink xt_tcpudp nf_conntrack_ipv4
nf_defrag_ipv4 xt_state nf_conntrack xt_physdev iptable_filter ip_tables
x_tables bridge stp xen_evtchn xenfs ext3 jbd dm_snapshot coretemp
ipmi_si ipmi_msghandler loop radeon snd_pcm ttm snd_timer drm_kms_helper
i5000_edac processor snd drm edac_core soundcore snd_page_alloc
i2c_algo_bit acpi_processor i2c_core i5k_amb rng_core dcdbas psmouse
evdev serio_raw pcspkr joydev button shpchp pci_hotplug ext4 mbcache
jbd2 crc16 dm_mod usbhid hid sg sr_mod ses cdrom sd_mod crc_t10dif
enclosure ata_generic uhci_hcd ata_piix ehci_hcd libata megaraid_sas
bnx2 usbcore nls_base scsi_mod thermal thermal_sys [last unloaded:
scsi_wait_scan]
[1297561.794228] Pid: 13884, comm: tar Not tainted 2.6.32-5-xen-amd64 #1
PowerEdge 1950
[1297561.794275] RIP: e030:[<ffffffffa018ceb2>] [<ffffffffa018ceb2>]
ext4_ext_get_blocks+0x277/0x19a5 [ext4]
[1297561.794344] RSP: e02b:ffff880120cfb768 EFLAGS: 00010246
[1297561.794373] RAX: 0000000000000000 RBX: 00000000704e4a4a RCX:
0000000000000000
[1297561.794420] RDX: ffff8801c928ddb0 RSI: ffff8801988c0000 RDI:
00000000704e4a4a
[1297561.794467] RBP: ffff8801988cbff8 R08: aaaaaaaaaaaaaa00 R09:
ffff8801988cbff8
[1297561.794514] R10: 0000000000000000 R11: ffffffffa01a0340 R12:
0000000000000000
[1297561.794561] R13: 0000000000000000 R14: ffff8800772fcc48 R15:
0000000000000000
[1297561.794611] FS: 00007f016e2e9700(0000) GS:ffff88000ae62000(0000)
knlGS:0000000000000000
[1297561.794659] CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b
[1297561.794689] CR2: 00007f2f2565e1d0 CR3: 0000000139615000 CR4:
0000000000002660
[1297561.794736] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
0000000000000000
[1297561.794784] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7:
0000000000000400
[1297561.794831] Process tar (pid: 13884, threadinfo ffff880120cfa000,
task ffff8801c92a3170)
[1297561.794879] Stack:
[1297561.794902] 000000000002277a 02000000000002c0 000000000ae740b0
ffff88013879d770
[1297561.794943] <0> 00000001a018bdcc 0000000000000000 ffff8801c928dd80
ffff8801988b8000
[1297561.795004] <0> 00000000704e4a4a 0000000000000001 0000000000000000
ffff8800772fcb88
[1297561.795083] Call Trace:
[1297561.795114] [<ffffffffa018cdb6>] ?
ext4_ext_get_blocks+0x17b/0x19a5 [ext4]
[1297561.795151] [<ffffffffa018cca1>] ? ext4_ext_get_blocks+0x66/0x19a5
[ext4]
[1297561.795188] [<ffffffff8100e629>] ? xen_force_evtchn_callback+0x9/0xa
[1297561.795220] [<ffffffff8100e629>] ? xen_force_evtchn_callback+0x9/0xa
[1297561.795252] [<ffffffff8100ece2>] ? check_events+0x12/0x20
[1297561.795287] [<ffffffffa0171047>] ? ext4_get_blocks+0x82/0x253 [ext4]
[1297561.795319] [<ffffffff8100eccf>] ? xen_restore_fl_direct_end+0x0/0x1
[1297561.795352] [<ffffffff810e8191>] ? kmem_cache_alloc+0x8c/0xf0
[1297561.795387] [<ffffffffa017266e>] ? ext4_get_block+0xa5/0xe2 [ext4]
[1297561.795420] [<ffffffff81110bb3>] ? block_read_full_page+0xf4/0x1ea
[1297561.795456] [<ffffffffa01725c9>] ? ext4_get_block+0x0/0xe2 [ext4]
[1297561.795491] [<ffffffffa017266e>] ? ext4_get_block+0xa5/0xe2 [ext4]
[1297561.795523] [<ffffffff81115bc6>] ? do_mpage_readpage+0x41f/0x421
[1297561.795568] [<ffffffffa01725c9>] ? ext4_get_block+0x0/0xe2 [ext4]
[1297561.795603] [<ffffffffa01725c9>] ? ext4_get_block+0x0/0xe2 [ext4]
[1297561.795636] [<ffffffff810b5491>] ? add_to_page_cache_locked+0x98/0xc1
[1297561.795671] [<ffffffffa01725c9>] ? ext4_get_block+0x0/0xe2 [ext4]
[1297561.795703] [<ffffffff81115d06>] ? mpage_readpages+0xcc/0x112
[1297561.795737] [<ffffffffa01725c9>] ? ext4_get_block+0x0/0xe2 [ext4]
[1297561.795773] [<ffffffffa018a944>] ? __ext4_ext_check+0x136/0x1ba [ext4]
[1297561.795807] [<ffffffff81065e17>] ? bit_waitqueue+0x10/0xa0
[1297561.795837] [<ffffffff81065ee5>] ? wake_up_bit+0x11/0x22
[1297561.795869] [<ffffffff810bcb31>] ?
__do_page_cache_readahead+0x11b/0x1b4
[1297561.795901] [<ffffffff810bcbe6>] ? ra_submit+0x1c/0x20
[1297561.795931] [<ffffffff810b65bf>] ? generic_file_aio_read+0x1ff/0x536
[1297561.795966] [<ffffffffa016b7ea>] ? ext4_file_open+0x0/0xe8 [ext4]
[1297561.795999] [<ffffffff810efb25>] ? do_sync_read+0xce/0x113
[1297561.796030] [<ffffffff810f2e77>] ? cp_new_stat+0xe9/0xfc
[1297561.796060] [<ffffffff81065ef6>] ? autoremove_wake_function+0x0/0x2e
[1297561.796092] [<ffffffff8100e629>] ? xen_force_evtchn_callback+0x9/0xa
[1297561.796126] [<ffffffff811542e1>] ? cap_dentry_open+0x0/0x3
[1297561.796156] [<ffffffff810ee262>] ? do_sys_open+0xec/0xfc
[1297561.796186] [<ffffffff8100e629>] ? xen_force_evtchn_callback+0x9/0xa
[1297561.796218] [<ffffffff8100ece2>] ? check_events+0x12/0x20
[1297561.796249] [<ffffffff811542e1>] ? cap_dentry_open+0x0/0x3
[1297561.796279] [<ffffffff810f0548>] ? vfs_read+0xa6/0xff
[1297561.796309] [<ffffffff8100eccf>] ? xen_restore_fl_direct_end+0x0/0x1
[1297561.796341] [<ffffffff810f065d>] ? sys_read+0x45/0x6e
[1297561.796371] [<ffffffff81011b42>] ? system_call_fastpath+0x16/0x1b
[1297561.796401] Code: 20 48 09 c3 44 89 f8 44 29 e8 48 01 d8 48 89 44
24 40 44 89 e8 44 29 f8 44 01 e0 66 81 f9 00 80 89 44 24 4c 77 48 45 85
e4 75 04 <0f> 0b eb fe 48 8b 7c 24 68 e8 a3 02 18 e1 48 8b 44 24 58 c7 80
[1297561.796707] RIP [<ffffffffa018ceb2>]
ext4_ext_get_blocks+0x277/0x19a5 [ext4]
[1297561.796761] RSP <ffff880120cfb768>
[1297561.796985] ---[ end trace 6b9b0a3ce202271a ]---


I used often these commands and this is the first time when it became
something like that.



--
To UNSUBSCRIBE, email to debian-kernel-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
Archive: 4ECBBED8.4020501@secit.pl">http://lists.debian.org/4ECBBED8.4020501@secit.pl


All times are GMT. The time now is 06:38 PM.

VBulletin, Copyright ©2000 - 2014, Jelsoft Enterprises Ltd.
Content Relevant URLs by vBSEO ©2007, Crawlability, Inc.