Processed: Re: Bug#410204: linux-image-2.6.18-4-amd64: Data corruption on dm-crypt+XFS

2007-02-17 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 severity 410204 important
Bug#410204: linux-image-2.6.18-4-amd64: Data corruption on dm-crypt+XFS
Severity set to `important' from `critical'

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#410204: linux-image-2.6.18-4-amd64: Data corruption on dm-crypt+XFS

2007-02-16 Thread Steve Langasek
Hi Sami,

I'm told that dmcrypt+XFS has never worked in the upstream kernel or in
Debian, so this is essentially an unsupported configuration.  But you've
filed this bug as critical with the justification that it causes serious
data loss.  Did you lose data as a result of this bug?  Could you explain
the process by which that happened?  It's my impression that this
combination is so unreliable that it will oops before you really have a
chance to try to use it for storing data, so you can't really lose any data
if you can't put it there in the first place.

Based on the status as a known-buggy and unsupported config I think this bug
should be downgraded to non-RC status for etch, but I'd like to be sure
first that I understand the impact of any real-world risk of data loss.

Thanks,
-- 
Steve Langasek   Give me a lever long enough and a Free OS
Debian Developer   to set it on, and I can move the world.
[EMAIL PROTECTED]   http://www.debian.org/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#410204: linux-image-2.6.18-4-amd64: Data corruption on dm-crypt+XFS

2007-02-08 Thread Sami Liedes
Package: linux-image-2.6.18-4-amd64
Version: 2.6.18.dfsg.1-10
Severity: critical
Tags: patch
Justification: causes serious data loss

The current latest 2.6 kernel in unstable causes serious data loss
when using XFS over dm-crypt due to a bug or a number of bugs in
dm-crypt. Generally XFS metadata corruption sooner or later causes an
oops. It's not clear if this will be triggered by anything else than
XFS, but that triggers it easily and often. A fix was merged upstream
in 2.6.18.6 ([PATCH] dm crypt: Fix data corruption with dm-crypt over
RAID5), but is not apparently included in the Debian kernel (or at
least I ran into this with a very similar backtrace). See:

1. http://bugzilla.kernel.org/show_bug.cgi?id=7258

(There's some kind of patch referenced in comment #4 and available at
http://marc.theaimsgroup.com/?l=linux-kernelm=116503133222152w=2)

Also note

2. http://bugzilla.kernel.org/show_bug.cgi?id=7799

(esp. the last comment:
Bug in dmcrypt. There's been several bugs in dmcrypt that   
only XFS has triggered and the last of these that I know about   
was fixed in 2.6.19.)

Sami


-- System Information:
Debian Release: 4.0
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-4-amd64
Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15)

Versions of packages linux-image-2.6.18-4-amd64 depends on:
ii  coreutil 5.97-5.3The GNU core utilities
ii  debconf  1.5.11  Debian configuration management sy
ii  e2fsprog 1.39+1.40-WIP-2006.11.14+dfsg-1 ext2 file system utilities and lib
ii  initramf 0.85e   tools for generating an initramfs
ii  module-i 3.3-pre4-1  tools for managing Linux kernel mo
ii  yaird [l 0.0.12-18   Yet Another mkInitRD

linux-image-2.6.18-4-amd64 recommends no packages.

-- debconf information:
  linux-image-2.6.18-4-amd64/postinst/kimage-is-a-directory:
  linux-image-2.6.18-4-amd64/postinst/bootloader-test-error-2.6.18-4-amd64:
  linux-image-2.6.18-4-amd64/preinst/lilo-initrd-2.6.18-4-amd64: true
  linux-image-2.6.18-4-amd64/preinst/initrd-2.6.18-4-amd64:
  linux-image-2.6.18-4-amd64/preinst/failed-to-move-modules-2.6.18-4-amd64:
  linux-image-2.6.18-4-amd64/postinst/old-initrd-link-2.6.18-4-amd64: true
  linux-image-2.6.18-4-amd64/preinst/lilo-has-ramdisk:
  linux-image-2.6.18-4-amd64/postinst/old-dir-initrd-link-2.6.18-4-amd64: true
  linux-image-2.6.18-4-amd64/prerm/removing-running-kernel-2.6.18-4-amd64: true
  linux-image-2.6.18-4-amd64/preinst/already-running-this-2.6.18-4-amd64:
  linux-image-2.6.18-4-amd64/preinst/abort-install-2.6.18-4-amd64:
  shared/kernel-image/really-run-bootloader: true
  linux-image-2.6.18-4-amd64/preinst/abort-overwrite-2.6.18-4-amd64:
  linux-image-2.6.18-4-amd64/postinst/depmod-error-initrd-2.6.18-4-amd64: false
  linux-image-2.6.18-4-amd64/postinst/create-kimage-link-2.6.18-4-amd64: true
  linux-image-2.6.18-4-amd64/postinst/depmod-error-2.6.18-4-amd64: false
  linux-image-2.6.18-4-amd64/postinst/bootloader-error-2.6.18-4-amd64:
  linux-image-2.6.18-4-amd64/postinst/old-system-map-link-2.6.18-4-amd64: true
  linux-image-2.6.18-4-amd64/preinst/bootloader-initrd-2.6.18-4-amd64: true
  linux-image-2.6.18-4-amd64/preinst/overwriting-modules-2.6.18-4-amd64: true
  linux-image-2.6.18-4-amd64/preinst/elilo-initrd-2.6.18-4-amd64: true
  linux-image-2.6.18-4-amd64/prerm/would-invalidate-boot-loader-2.6.18-4-amd64: 
true


signature.asc
Description: Digital signature


Bug#410204: linux-image-2.6.18-4-amd64: Data corruption on dm-crypt+XFS

2007-02-08 Thread Sami Liedes
On Thu, Feb 08, 2007 at 05:11:32PM +0200, Sami Liedes wrote:
 XFS, but that triggers it easily and often. A fix was merged upstream
 in 2.6.18.6 ([PATCH] dm crypt: Fix data corruption with dm-crypt over
 RAID5), but is not apparently included in the Debian kernel (or at
 least I ran into this with a very similar backtrace). See:

Hmm, seems it (the entire 2.6.18.6) IS included in the Debian kernel.
I wonder which fix is missing then, or if the bug is still in the
vanilla kernel tree. Here's the oops:


Feb  8 04:43:08 lh kernel: Filesystem dm-7: Disabling barriers, not supported 
by the underlying device
Feb  8 04:43:08 lh kernel: XFS mounting filesystem dm-7
Feb  8 04:43:08 lh kernel: Ending clean XFS mount for filesystem: dm-7
Feb  8 04:46:10 lh kernel: Unable to handle kernel NULL pointer dereference at 
 RIP:
Feb  8 04:46:10 lh kernel:  [802a749a] page_to_pfn+0x0/0x33
Feb  8 04:46:10 lh kernel: PGD 24a6c067 PUD 1da31067 PMD 0
Feb  8 04:46:10 lh kernel: Oops:  [1] SMP
Feb  8 04:46:10 lh kernel: CPU 0
Feb  8 04:46:10 lh kernel: Modules linked in: sha256 aes dm_crypt snd_intel8x0 
xfs ipt_owner ipt_REJECT xt_state xt_tcpudp iptable_filter ipt_MASQUERADE 
iptable_nat ip_nat ip_conntrack nfnetlink ip_tables x_tables radeon drm 
binfmt_misc freq_table ppdev lp button ac battery ipv6 nls_iso8859_1 nls_cp437 
vfat fat ext2it87 hwmon_vid i2c_isa eeprom usbmouse ide_cd cdrom tsdev 
snd_ac97_codec snd_ac97_bus snd_opl3_lib snd_pcm_oss snd_mixer_oss snd_hwdep 
snd_mpu401 snd_mpu401_uart i2c_nforce2 snd_rawmidi snd_seq_device analog 
i2c_core parport_pc parport snd_pcm snd_timer psmouse serio_raw snd 
snd_page_alloc gameport evdev floppy soundcore pcspkr ext3 jbd mbcache 
dm_mirror dm_snapshot dm_mod ide_generic sd_mod ide_disk sata_nv libata 
scsi_mod 3c59x mii forcedeth generic amd74xx ide_core ehci_hcd ohci_hcd thermal 
processor fan
Feb  8 04:46:10 lh kernel: Pid: 198, comm: pdflush Not tainted 2.6.18-4-amd64 #1
Feb  8 04:46:10 lh kernel: RIP: 0010:[802a749a]  [802a749a] 
page_to_pfn+0x0/0x33
Feb  8 04:46:10 lh kernel: RSP: 0018:81003e7e97d8  EFLAGS: 00010297
Feb  8 04:46:10 lh kernel: RAX:  RBX: 81000bce2640 RCX: 

Feb  8 04:46:10 lh kernel: RDX: 0056 RSI: 81000bce2640 RDI: 

Feb  8 04:46:10 lh kernel: RBP: 81003b3c8000 R08:  R09: 
810037ade870
Feb  8 04:46:10 lh kernel: R10:  R11: 81000c1a1ec0 R12: 
81000bce2640
Feb  8 04:46:10 lh kernel: R13:  R14:  R15: 
81003e8f8088
Feb  8 04:46:10 lh kernel: FS:  2b4d40df3d20() 
GS:80521000() knlGS:f7b446c0
Feb  8 04:46:10 lh kernel: CS:  0010 DS: 0018 ES: 0018 CR0: 8005003b
Feb  8 04:46:10 lh kernel: CR2:  CR3: 1e0c6000 CR4: 
06e0
Feb  8 04:46:10 lh kernel: Process pdflush (pid: 198, threadinfo 
81003e7e8000, task 810037ade870)
Feb  8 04:46:10 lh kernel: Stack:  8022bf96 810037ade870 
d400 
Feb  8 04:46:10 lh kernel:  8101 0001 81000bce2640 
81003e8f8088
Feb  8 04:46:10 lh kernel:  8100192517c0 810007f997a8 0056 
0002a000
Feb  8 04:46:10 lh kernel: Call Trace:
Feb  8 04:46:10 lh kernel:  [8022bf96] blk_recount_segments+0x7e/0x21b
Feb  8 04:46:10 lh kernel:  [802bb9ae] __bio_clone+0x71/0x8a
Feb  8 04:46:10 lh kernel:  [802bb9fc] bio_clone+0x35/0x3d
Feb  8 04:46:10 lh kernel:  [8822776a] :dm_crypt:crypt_map+0xcd/0x304
Feb  8 04:46:10 lh kernel:  [880d92bf] :dm_mod:__map_bio+0x47/0x9b
Feb  8 04:46:10 lh kernel:  [880d9c1f] :dm_mod:__split_bio+0x172/0x37d
Feb  8 04:46:10 lh kernel:  [880da432] :dm_mod:dm_request+0x101/0x110
Feb  8 04:46:10 lh kernel:  [80219f55] 
generic_make_request+0x13a/0x14d
Feb  8 04:46:10 lh kernel:  [80231028] submit_bio+0xcb/0xd2
Feb  8 04:46:10 lh kernel:  [8022aaa5] __bio_add_page+0x188/0x1ce
Feb  8 04:46:10 lh kernel:  [883ccd8b] 
:xfs:xfs_submit_ioend_bio+0x1e/0x27
Feb  8 04:46:10 lh kernel:  [883cd7c3] 
:xfs:xfs_page_state_convert+0xa2f/0xb6e
Feb  8 04:46:10 lh kernel:  [883cdb30] :xfs:xfs_vm_writepage+0xa7/0xdd
Feb  8 04:46:10 lh kernel:  [8021ac61] mpage_writepages+0x1a6/0x34d
Feb  8 04:46:10 lh kernel:  [883cda89] :xfs:xfs_vm_writepage+0x0/0xdd
Feb  8 04:46:10 lh kernel:  [80256d07] do_writepages+0x20/0x2f
Feb  8 04:46:10 lh kernel:  [8022dbd7] 
__writeback_single_inode+0x1b4/0x38b
Feb  8 04:46:10 lh kernel:  [880d9a46] 
:dm_mod:dm_any_congested+0x38/0x3f
Feb  8 04:46:10 lh kernel:  [880db58a] 
:dm_mod:dm_table_any_congested+0x46/0x63
Feb  8 04:46:10 lh kernel:  [8021edb1] sync_sb_inodes+0x1d1/0x2b5
Feb  8 04:46:10 lh kernel:  [802901be]