Bug#587763: linux-image-2.6.32-5-amd64: scary messages from JBD when manipulating quotas on ext4

2012-02-16 Thread Robert L Mathews

Jonathan Nieder wrote:


Sounds like nothing good.  There's a proposed patch described at
 but we can't apply it unless it is tested
against a 2.6.32-based kernel and confirmed to fix the problem.  So:

 - are you still interested in pursuing this?


Unfortunately, I'm not able to reproduce the original problem on a test 
system for some reason (and I tried quite hard). It only happens on one 
of my production servers, but I can't experiment on that one. Sorry 
about that.  :-(




--
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4f3d9dd4.4000...@tigertech.com



Bug#587763: linux-image-2.6.32-5-amd64: scary messages from JBD when manipulating quotas on ext4

2012-01-26 Thread Jonathan Nieder
Hi again,

Jonathan Nieder wrote:
> Laurent Bonnaud wrote:

>> 1. set up quotas on an ext4 filesystem
>> 2. use edquota to change the quotas of some user
>>
>> Actual result: the kernel outputs this scary message:
>[...]
>> Expected result: 
>>  - no scary message
>>  - no filesystem corruption
>>  - changed quotas

Sounds like nothing good.  There's a proposed patch described at
 but we can't apply it unless it is tested
against a 2.6.32-based kernel and confirmed to fix the problem.  So:

 - are you still interested in pursuing this?
 - if so, is there anything I can do to help?

Thanks,
Jonathan



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120126204854.GA5122@burratino



Bug#587763: linux-image-2.6.32-5-amd64: scary messages from JBD when manipulating quotas on ext4

2011-11-26 Thread Jonathan Nieder
found 587763 linux-2.6/2.6.32-35squeeze2
tags 587763 + upstream patch moreinfo
quit

Hi,

Laurent Bonnaud wrote:

> 1. set up quotas on an ext4 filesystem
> 2. use edquota to change the quotas of some user
>
> Actual result: the kernel outputs this scary message:
[...]
> Expected result: 
>  - no scary message
>  - no filesystem corruption
>  - changed quotas

Robert L Mathews wrote:

> This bug still exists in squeeze kernel 2.6.32-35squeeze2 (I'm using
> "linux-image-2.6.32-5-amd64 2.6.32-35squeeze2").
>
> The patch wasn't committed to the upstream kernel until 2.6.35 on July 27,
> 2010:
>
> http://git.strongswan.org/?p=linux-dumm.git;a=commitdiff;h=62d2b5f2dcd3707b070efb16bbfdf6947c38c194

Thanks.

Robert, Laurent, please confirm that this fix works against a squeeze
kernel.  Instructions for building and testing a patched kernel are
at [1].  If it works well, we can consider applying it and propose it
for inclusion in the next upstream 2.6.32.y kernel.

Regards,
Jonathan

[1] http://kernel-handbook.alioth.debian.org/ch-common-tasks.html



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/2027042935.ga13...@elie.hsd1.il.comcast.net



Bug#587763: linux-image-2.6.32-5-amd64: scary messages from JBD when manipulating quotas on ext4

2011-09-18 Thread Robert L Mathews

Moritz wrote:

>This might have been fixed in 2.6.32.17 (and thus in Debian revision
>2.6.32-19 for Squeeze and 2.6.33 for sid). Can you confirm?

This bug still exists in squeeze kernel 2.6.32-35squeeze2 (I'm using 
"linux-image-2.6.32-5-amd64 2.6.32-35squeeze2").


The patch wasn't committed to the upstream kernel until 2.6.35 on July 
27, 2010:


http://git.strongswan.org/?p=linux-dumm.git;a=commitdiff;h=62d2b5f2dcd3707b070efb16bbfdf6947c38c194

--
Robert L Mathews, Tiger Technologies, http://www.tigertech.net/



--
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4e76d14c.6040...@tigertech.com



Bug#587763: linux-image-2.6.32-5-amd64: scary messages from JBD when manipulating quotas on ext4

2011-07-30 Thread Moritz Mühlenhoff
On Thu, Jul 01, 2010 at 03:29:52PM +0200, Laurent Bonnaud wrote:
> Package: linux-2.6
> Version: 2.6.32-15
> Severity: important
> 
> 
> Hi,
> 
> here is how to reproduce this bug:
> 
> 1. set up quotas on an ext4 filesystem
> 2. use edquota to change the quotas of some user
> 
> Actual result: the kernel outputs this scary message:
> 
> [  399.792052] JBD: Spotted dirty metadata buffer (dev = sdb1, blocknr =
> 34816). There's a risk of filesystem corruption in case of system crash.
> 
> Expected result: 
>  - no scary message
>  - no filesystem corruption
>  - changed quotas

This might have been fixed in 2.6.32.17 (and thus in Debian revision
2.6.32-19 for Squeeze and 2.6.33 for sid). Can you confirm?

Cheers,
Moritz



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110730094256.GA4476@pisco.westfalen.local



Bug#587763: linux-image-2.6.32-5-amd64: scary messages from JBD when manipulating quotas on ext4

2010-07-02 Thread Ben Hutchings
On Thu, 2010-07-01 at 15:29 +0200, Laurent Bonnaud wrote:
> Package: linux-2.6
> Version: 2.6.32-15
> Severity: important
> 
> 
> Hi,
> 
> here is how to reproduce this bug:
> 
> 1. set up quotas on an ext4 filesystem
> 2. use edquota to change the quotas of some user
> 
> Actual result: the kernel outputs this scary message:
> 
> [  399.792052] JBD: Spotted dirty metadata buffer (dev = sdb1, blocknr =
> 34816). There's a risk of filesystem corruption in case of system crash.
> 
> Expected result: 
>  - no scary message
>  - no filesystem corruption
>  - changed quotas
> 
> A patch has been proposed here:
> 
>   http://www.spinics.net/lists/linux-ext4/msg19302.html
> 
> This bug has also been reported here:
> 
> https://bugzilla.redhat.com/show_bug.cgi?id=578674
[...]

That proposed patch seems to have been contentious and has not been
applied upstream.  I think you will need to revive the discussion with
the upstream developers.

Ben.

-- 
Ben Hutchings
Once a job is fouled up, anything done to improve it makes it worse.


signature.asc
Description: This is a digitally signed message part


Bug#587763: linux-image-2.6.32-5-amd64: scary messages from JBD when manipulating quotas on ext4

2010-07-01 Thread Laurent Bonnaud
Package: linux-2.6
Version: 2.6.32-15
Severity: important


Hi,

here is how to reproduce this bug:

1. set up quotas on an ext4 filesystem
2. use edquota to change the quotas of some user

Actual result: the kernel outputs this scary message:

[  399.792052] JBD: Spotted dirty metadata buffer (dev = sdb1, blocknr =
34816). There's a risk of filesystem corruption in case of system crash.

Expected result: 
 - no scary message
 - no filesystem corruption
 - changed quotas

A patch has been proposed here:

  http://www.spinics.net/lists/linux-ext4/msg19302.html

This bug has also been reported here:

https://bugzilla.redhat.com/show_bug.cgi?id=578674


-- Package-specific info:
** Version:
Linux version 2.6.32-5-amd64 (Debian 2.6.32-15) (b...@decadent.org.uk)
(gcc version 4.3.5 (Debian 4.3.5-1) ) #1 SMP Tue Jun 1 04:34:03 UTC 2010

-- System Information:
Debian Release: squeeze/sid
  APT prefers testing-proposed-updates
  APT policy: (500, 'testing-proposed-updates'), (500, 'testing')
Architecture: amd64 (x86_64)


-- 
Laurent Bonnaud.
http://www.lis.inpg.fr/pages_perso/bonnaud/





-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/1277990992.2934.35.ca...@localhost