Package: base
Severity: grave
Justification: renders package unusable

Dear Maintainer,

   * What led up to the situation?

Two-host virtualization cluster with DRBD mirrored volume and OCFS2 filesystem.

   * What exactly did you do (or not do) that was effective (or
     ineffective)?

Simply writing data to the volume exposed a kernel bug in OCFS2.

   * What was the outcome of this action?

Oct 17 09:57:38 vhost002 kernel: ------------[ cut here ]------------
Oct 17 09:57:38 vhost002 kernel: kernel BUG at 
/build/linux-rAvIHq/linux-4.7.5/fs/ocfs2/alloc.c:1514!
Oct 17 09:57:38 vhost002 kernel: invalid opcode: 0000 [#1] SMP
Oct 17 09:57:38 vhost002 kernel: Modules linked in: vhost_net vhost macvtap 
macvlan tun ocfs2 quota_tree cfg80211 rfkill iptable_filter ip_tables x_tables 
nfsd auth_rpcgss nfs_acl nfs lockd grace fscache ocfs2_dlmfs ocfs2_stack_o2cb 
sunrpc ocfs2_dlm ocfs2_nodemanager ocfs2_stackglue configfs bridge stp llc 
bonding ipmi_watchdog intel_rapl sb_edac edac_core x86_pkg_temp_thermal 
intel_powerclamp coretemp kvm_intel kvm irqbypass crct10dif_pclmul crc32_pclmul 
ghash_clmulni_intel hmac drbg ansi_cprng igb iTCO_wdt ast iTCO_vendor_support 
mxm_wmi ttm evdev drm_kms_helper aesni_intel drm aes_x86_64 lrw xhci_pci 
gf128mul glue_helper xhci_hcd ablk_helper cryptd ehci_pci dca ehci_hcd e1000e 
i2c_algo_bit pcspkr usbcore ptp mei_me lpc_ich i2c_i801 sg mei shpchp mfd_core 
usb_common pps_core fjes wmi ipmi_si ipmi_poweroff ipmi_devintf
Oct 17 09:57:38 vhost002 kernel:  ipmi_msghandler tpm_tis tpm acpi_power_meter 
acpi_pad button fuse drbd lru_cache libcrc32c crc32c_generic autofs4 ext4 crc16 
jbd2 mbcache dm_mod md_mod sd_mod ahci libahci libata crc32c_intel scsi_mod
Oct 17 09:57:38 vhost002 kernel: CPU: 7 PID: 17663 Comm: qemu-system-x86 Not 
tainted 4.7.0-0.bpo.1-amd64 #1 Debian 4.7.5-1~bpo8+2
Oct 17 09:57:38 vhost002 kernel: Hardware name: To Be Filled By O.E.M. To Be 
Filled By O.E.M./EPC612D4I, BIOS P2.10 03/31/2016
Oct 17 09:57:38 vhost002 kernel: task: ffff8802547d9040 ti: ffff880257640000 
task.ti: ffff880257640000
Oct 17 09:57:38 vhost002 kernel: RIP: 0010:[<ffffffffc09f4221>]  
[<ffffffffc09f4221>] ocfs2_grow_tree+0x6f1/0x770 [ocfs2]
Oct 17 09:57:38 vhost002 kernel: RSP: 0018:ffff880257643618  EFLAGS: 00010246
Oct 17 09:57:38 vhost002 kernel: RAX: 0000000000000000 RBX: 000000000000000d 
RCX: ffff880257643790
Oct 17 09:57:38 vhost002 kernel: RDX: ffff8802576436bc RSI: ffff880257643968 
RDI: ffff8801803473f0
Oct 17 09:57:38 vhost002 kernel: RBP: ffff880257643678 R08: 0000000000000000 
R09: 0000000000390ce8
Oct 17 09:57:38 vhost002 kernel: R10: 0000000002a15008 R11: ffff880257d9a030 
R12: 0000000000000001
Oct 17 09:57:38 vhost002 kernel: R13: ffff880257643828 R14: ffff8802622020c0 
R15: 0000000000000002
Oct 17 09:57:38 vhost002 kernel: FS:  00007f718f75d700(0000) 
GS:ffff88103f3c0000(0000) knlGS:0000000000000000
Oct 17 09:57:38 vhost002 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 
0000000080050033
Oct 17 09:57:38 vhost002 kernel: CR2: 00007f7ba6591e4c CR3: 00000002825db000 
CR4: 00000000001426e0
Oct 17 09:57:38 vhost002 kernel: Stack:
Oct 17 09:57:38 vhost002 kernel:  ffff880257643728 ffff880257643728 
ffffffffc0a612a5 ffff88025da1a880
Oct 17 09:57:38 vhost002 kernel:  ffff8801803fd340 ffffffffb2c2fd37 
000000008a1a0f55 000000000000000d
Oct 17 09:57:38 vhost002 kernel:  0000000000000001 ffff880257643828 
ffff880257643968 ffff88025da1a880
Oct 17 09:57:38 vhost002 kernel: Call Trace:
Oct 17 09:57:38 vhost002 kernel:  [<ffffffffc0a612a5>] ? 
ocfs2_set_buffer_uptodate+0x35/0x4a0 [ocfs2]
Oct 17 09:57:38 vhost002 kernel:  [<ffffffffb2c2fd37>] ? 
__find_get_block+0xa7/0x110
Oct 17 09:57:38 vhost002 kernel:  [<ffffffffc09f6067>] ? 
ocfs2_split_and_insert+0x307/0x490 [ocfs2]
Oct 17 09:57:38 vhost002 kernel:  [<ffffffffc09fc51d>] ? 
ocfs2_split_extent+0x3ed/0x560 [ocfs2]
Oct 17 09:57:38 vhost002 kernel:  [<ffffffffc09fc903>] ? 
ocfs2_change_extent_flag+0x273/0x450 [ocfs2]
Oct 17 09:57:38 vhost002 kernel:  [<ffffffffc09fcbf0>] ? 
ocfs2_mark_extent_written+0x110/0x1d0 [ocfs2]
Oct 17 09:57:38 vhost002 kernel:  [<ffffffffc0a0100d>] ? 
ocfs2_dio_end_io_write+0x44d/0x600 [ocfs2]
Oct 17 09:57:38 vhost002 kernel:  [<ffffffffc0a27a50>] ? 
ocfs2_allocate_extend_trans+0x180/0x180 [ocfs2]
Oct 17 09:57:38 vhost002 kernel:  [<ffffffffc0a011fb>] ? 
ocfs2_dio_end_io+0x3b/0x60 [ocfs2]
Oct 17 09:57:38 vhost002 kernel:  [<ffffffffb2c35934>] ? dio_complete+0x64/0x160
Oct 17 09:57:38 vhost002 kernel:  [<ffffffffb2c386fa>] ? 
do_blockdev_direct_IO+0x1f5a/0x2350
Oct 17 09:57:38 vhost002 kernel:  [<ffffffffc0a04ed0>] ? 
ocfs2_write_end_nolock+0x560/0x560 [ocfs2]
Oct 17 09:57:38 vhost002 kernel:  [<ffffffffc0a00714>] ? 
ocfs2_direct_IO+0x84/0x90 [ocfs2]
Oct 17 09:57:38 vhost002 kernel:  [<ffffffffb2b7c893>] ? 
generic_file_direct_write+0xb3/0x180
Oct 17 09:57:38 vhost002 kernel:  [<ffffffffb2b7ca16>] ? 
__generic_file_write_iter+0xb6/0x1e0
Oct 17 09:57:38 vhost002 kernel:  [<ffffffffc0a1f8ad>] ? 
ocfs2_file_write_iter+0x44d/0xae0 [ocfs2]
Oct 17 09:57:38 vhost002 kernel:  [<ffffffffb2ae87c0>] ? hrtimer_init+0xf0/0xf0
Oct 17 09:57:38 vhost002 kernel:  [<ffffffffb2bf8f20>] ? 
do_iter_readv_writev+0xb0/0x130
Oct 17 09:57:38 vhost002 kernel:  [<ffffffffb2bf9c92>] ? 
do_readv_writev+0x1a2/0x240
Oct 17 09:57:38 vhost002 kernel:  [<ffffffffc0a1f460>] ? 
ocfs2_check_range_for_refcount+0x130/0x130 [ocfs2]
Oct 17 09:57:38 vhost002 kernel:  [<ffffffffb2bfa0dc>] ? do_pwritev+0x8c/0xc0
Oct 17 09:57:38 vhost002 kernel:  [<ffffffffb2fde3f6>] ? 
system_call_fast_compare_end+0xc/0x96
Oct 17 09:57:38 vhost002 kernel: Code: 24 28 48 c7 c1 b0 72 a8 c0 ba 1c 06 00 
00 48 c7 c6 b0 99 a7 c0 31 c0 44 89 4c 24 18 e8 79 33 d5 ff 44 8b 4c 24 18 e9 
27 fc ff ff <0f> 0b 48 8b 04 24 48 83 38 00 75 6c f0 ff 43 60 48 8b 04 24 45
Oct 17 09:57:38 vhost002 kernel: RIP  [<ffffffffc09f4221>] 
ocfs2_grow_tree+0x6f1/0x770 [ocfs2]
Oct 17 09:57:38 vhost002 kernel:  RSP <ffff880257643618>
Oct 17 09:57:38 vhost002 kernel: ---[ end trace 7692d04456f49f33 ]---

   * What outcome did you expect instead?

The code should work, not bomb.

-- System Information:
Debian Release: 8.6
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.7.0-0.bpo.1-amd64 (SMP w/12 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Reply via email to