You have been subscribed to a public bug:
Original report: https://bugzilla.kernel.org/show_bug.cgi?id=220818
Was not fixed, with a request to report to the distro provider (Ubuntu
Canonical)
---
Getting a reproducible GPF in ext4 filesystem dentry_unlink_inode while
running userland 'sudo umount /media/some-mountpoint' after a large
backup where many modifications are delayed waiting to be flushed to
disk on a multi-core host with SSD storage.
System is amdgpu multicore if that is relevant.
Kernel is: 6.8.0-88-generic.
Full kernel GPF report appears below the ---- line.
One effect of this bug is that once the (ext4) file system fails to sync
to disk and remains marked 'dirty': any further attempt to 'sync' or
'umount' results in an additional unkillable and ininterruptible process
that is hung (state 'D' in ps). The only way out is to power-cycle the
machine (hard-reboot.)
I've seen multiple very similar kernel GPFs since upgrading Ubuntu from
20.04 to 24.04 (switch to kernel version 6.x) across the 6.x kernel
series, including 6.14.x and 6.8.x series
The particular kernel oops attached is from Ubuntu repos: linux-image-
generic-6.8 -> version 6.8.0-88.89 but the problem seems more pervasive,
including in the latest linux-image-generic-hwe-24.04 (currently
pointing to kernel version 6.14.0-36.36~24.04.1).
----------------- syslog portion of kernel GPF very slightly redacted
-------------------
2025-11-30T14:09:36.659261-08:00 xxx kernel: general protection fault, probably
for non-canonical address 0xfffe88b8340239e0: 0000 [#1] PREEMPT SMP NOPTI
2025-11-30T14:09:36.659275-08:00 xxx kernel: CPU: 3 PID: 41857 Comm: umount Not
tainted 6.8.0-88-generic #89-Ubuntu
2025-11-30T14:09:36.659277-08:00 xxx kernel: Hardware name: To Be Filled By
O.E.M. To Be Filled By O.E.M./xxxxx BIOS xxxx 11/30/2020
2025-11-30T14:09:36.659279-08:00 xxx kernel: RIP:
0010:dentry_unlink_inode+0x52/0x150
2025-11-30T14:09:36.659280-08:00 xxx kernel: Code: 81 e2 ff ff 8f ff 89 17 3d
00 00 08 00 75 08 65 48 ff 05 79 9e 51 4a 48 8b 83 b8 00 00 00 48 85 c0 74 29
48 8b 93 b0 00 00 00 <48> 89 10 48 85 d2 74 04 48 89 42 08 48 c7 83 b0 00 00 00
00 00 00
2025-11-30T14:09:36.659281-08:00 xxx kernel: RSP: 0018:ffffcab9013a7cc8 EFLAGS:
00010282
2025-11-30T14:09:36.659282-08:00 xxx kernel: RAX: fffe88b8340239e0 RBX:
ffff88b833fbd140 RCX: 0000000000000000
2025-11-30T14:09:36.659282-08:00 xxx kernel: RDX: ffff88b833fbd430 RSI:
0000000000000000 RDI: ffff88b833fbd140
2025-11-30T14:09:36.659283-08:00 xxx kernel: RBP: ffffcab9013a7cd8 R08:
0000000000000000 R09: 0000000000000000
2025-11-30T14:09:36.659284-08:00 xxx kernel: R10: 0000000000000000 R11:
0000000000000000 R12: ffff88b8340238a8
2025-11-30T14:09:36.659285-08:00 xxx kernel: R13: ffff88b833fbd1a0 R14:
ffff88b833fbd1a0 R15: 0000000000000000
2025-11-30T14:09:36.659286-08:00 xxx kernel: FS: 00007a2ccb86f800(0000)
GS:ffff88c00eb80000(0000) knlGS:0000000000000000
2025-11-30T14:09:36.659287-08:00 xxx kernel: CS: 0010 DS: 0000 ES: 0000 CR0:
0000000080050033
2025-11-30T14:09:36.659288-08:00 xxx kernel: CR2: 00003c48b4ab5004 CR3:
00000005b06c0000 CR4: 0000000000350ef0
2025-11-30T14:09:36.659289-08:00 xxx kernel: Call Trace:
2025-11-30T14:09:36.659289-08:00 xxx kernel: Call Trace:
2025-11-30T14:09:36.659290-08:00 xxx kernel: <TASK>
2025-11-30T14:09:36.659290-08:00 xxx kernel: __dentry_kill+0x73/0x180
2025-11-30T14:09:36.659291-08:00 xxx kernel: shrink_dentry_list+0xaa/0x180
2025-11-30T14:09:36.659292-08:00 xxx kernel: shrink_dcache_parent+0xc9/0x140
2025-11-30T14:09:36.659312-08:00 xxx kernel:
shrink_dcache_for_umount+0x3c/0x130
2025-11-30T14:09:36.659313-08:00 xxx kernel: generic_shutdown_super+0x21/0x180
2025-11-30T14:09:36.659314-08:00 xxx kernel: kill_block_super+0x1b/0x50
2025-11-30T14:09:36.659315-08:00 xxx kernel: ext4_kill_sb+0x22/0x50
2025-11-30T14:09:36.659316-08:00 xxx kernel: deactivate_locked_super+0x35/0xc0
2025-11-30T14:09:36.659317-08:00 xxx kernel: deactivate_super+0x46/0x60
2025-11-30T14:09:36.659318-08:00 xxx kernel: cleanup_mnt+0xc3/0x170
2025-11-30T14:09:36.659319-08:00 xxx kernel: __cleanup_mnt+0x12/0x20
2025-11-30T14:09:36.659320-08:00 xxx kernel: task_work_run+0x61/0xa0
2025-11-30T14:09:36.659322-08:00 xxx kernel:
syscall_exit_to_user_mode+0x1d8/0x1e0
2025-11-30T14:09:36.659323-08:00 xxx kernel: do_syscall_64+0x8c/0x180
2025-11-30T14:09:36.659324-08:00 xxx kernel: ?
irqentry_exit_to_user_mode+0x38/0x1e0
2025-11-30T14:09:36.659325-08:00 xxx kernel: ? srso_return_thunk+0x5/0x5f
2025-11-30T14:09:36.659326-08:00 xxx kernel: ? irqentry_exit+0x43/0x50
2025-11-30T14:09:36.659327-08:00 xxx kernel: ? srso_return_thunk+0x5/0x5f
2025-11-30T14:09:36.659328-08:00 xxx kernel: ? exc_page_fault+0x94/0x1b0
2025-11-30T14:09:36.659329-08:00 xxx kernel:
entry_SYSCALL_64_after_hwframe+0x78/0x80
2025-11-30T14:09:36.659330-08:00 xxx kernel: RIP: 0033:0x7a2ccb72aa2b
2025-11-30T14:09:36.659331-08:00 xxx kernel: Code: c3 66 2e 0f 1f 84 00 00 00
00 00 0f 1f 40 00 f3 0f 1e fa 31 f6 e9 05 00 00 00 0f 1f 44 00 00 f3 0f 1e fa
b8 a6 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 05 c3 0f 1f 40 00 48 8b 15 b9 83 0d
00 f7 d8
2025-11-30T14:09:36.659333-08:00 xxx kernel: RSP: 002b:00007ffe39f5fc78 EFLAGS:
00000246 ORIG_RAX: 00000000000000a6
2025-11-30T14:09:36.659334-08:00 xxx kernel: RAX: 0000000000000000 RBX:
000062409016fad0 RCX: 00007a2ccb72aa2b
2025-11-30T14:09:36.659336-08:00 xxx kernel: RDX: 0000000000000000 RSI:
0000000000000000 RDI: 000062409016fee0
2025-11-30T14:09:36.659337-08:00 xxx kernel: RBP: 00007ffe39f5fd50 R08:
0000000000000000 R09: 0000000000000000
2025-11-30T14:09:36.659338-08:00 xxx kernel: R10: 0000000000000103 R11:
0000000000000246 R12: 000062409016fbd0
2025-11-30T14:09:36.659340-08:00 xxx kernel: R13: 0000000000000000 R14:
000062409016fee0 R15: 0000000000000000
2025-11-30T14:09:36.659341-08:00 xxx kernel: </TASK>
2025-11-30T14:09:36.659342-08:00 xxx kernel: Modules linked in: tls dm_crypt
xt_LOG nf_log_syslog ipt_REJECT nf_reject_ipv4 xt_mac ccm xt_tcpudp
xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nft_compat nf_tables
rfcomm snd_seq_dummy snd_hrtimer qrtr cmac algif_hash algif_skcipher af_alg
bnep binfmt_misc intel_rapl_msr intel_rapl_common amdgpu snd_hda_codec_realtek
snd_hda_codec_generic snd_hda_codec_hdmi iwlmvm snd_hda_intel snd_intel_dspcfg
snd_intel_sdw_acpi snd_hda_codec snd_hda_core amdxcp drm_exec edac_mce_amd
snd_hwdep gpu_sched mac80211 drm_buddy snd_pcm drm_suballoc_helper
drm_ttm_helper btusb kvm_amd ttm btrtl snd_seq_midi nls_iso8859_1 libarc4
drm_display_helper btintel snd_seq_midi_event btbcm cec btmtk kvm snd_rawmidi
iwlwifi snd_seq irqbypass snd_seq_device input_leds rapl snd_timer wmi_bmof
bluetooth rc_core cfg80211 i2c_algo_bit snd i2c_piix4 ecdh_generic k10temp
soundcore ccp ecc joydev gpio_amdpt mac_hid sch_fq_codel msr parport_pc ppdev
lp parport efi_pstore nfnetlink dmi_sysfs ip_tables x_tables autofs4 btrfs
2025-11-30T14:09:36.659344-08:00 xxx kernel: blake2b_generic xor raid6_pq
libcrc32c dm_mirror dm_region_hash dm_log uas usb_storage hid_generic usbhid
hid crct10dif_pclmul crc32_pclmul polyval_clmulni nvme polyval_generic
ghash_clmulni_intel sha256_ssse3 sha1_ssse3 nvme_core ahci igc xhci_pci
nvme_auth libahci xhci_pci_renesas video wmi aesni_intel crypto_simd cryptd
2025-11-30T14:09:36.659345-08:00 xxx kernel: ---[ end trace 0000000000000000
]---
2025-11-30T14:09:36.659346-08:00 xxx kernel: RIP:
0010:dentry_unlink_inode+0x52/0x150
2025-11-30T14:09:36.659347-08:00 xxx kernel: Code: 81 e2 ff ff 8f ff 89 17 3d
00 00 08 00 75 08 65 48 ff 05 79 9e 51 4a 48 8b 83 b8 00 00 00 48 85 c0 74 29
48 8b 93 b0 00 00 00 <48> 89 10 48 85 d2 74 04 48 89 42 08 48 c7 83 b0 00 00 00
00 00 00
2025-11-30T14:09:36.659348-08:00 xxx kernel: RSP: 0018:ffffcab9013a7cc8 EFLAGS:
00010282
2025-11-30T14:09:36.659349-08:00 xxx kernel: RAX: fffe88b8340239e0 RBX:
ffff88b833fbd140 RCX: 0000000000000000
2025-11-30T14:09:36.659350-08:00 xxx kernel: RDX: ffff88b833fbd430 RSI:
0000000000000000 RDI: ffff88b833fbd140
2025-11-30T14:09:36.659351-08:00 xxx kernel: RBP: ffffcab9013a7cd8 R08:
0000000000000000 R09: 0000000000000000
2025-11-30T14:09:36.659352-08:00 xxx kernel: R10: 0000000000000000 R11:
0000000000000000 R12: ffff88b8340238a8
2025-11-30T14:09:36.659353-08:00 xxx kernel: R13: ffff88b833fbd1a0 R14:
ffff88b833fbd1a0 R15: 0000000000000000
2025-11-30T14:09:36.659353-08:00 xxx kernel: FS: 00007a2ccb86f800(0000)
GS:ffff88c00eb80000(0000) knlGS:0000000000000000
2025-11-30T14:09:36.659354-08:00 xxx kernel: CS: 0010 DS: 0000 ES: 0000 CR0:
0000000080050033
2025-11-30T14:09:36.659355-08:00 xxx kernel: CR2: 00003c48b4ab5004 CR3:
00000005b06c0000 CR4: 0000000000350ef0
2025-11-30T14:09:36.659356-08:00 xxx kernel: note: umount[41857] exited with
preempt_count 2
** Affects: linux-meta-hwe-6.14 (Ubuntu)
Importance: Undecided
Status: New
** Tags: ext4 gpf kernel segv umount
--
kernel General Protection Fault (GPF) in ext4: umount, dentry_unlink_inode
https://bugs.launchpad.net/bugs/2133654
You received this bug notification because you are a member of Ubuntu Bugs,
which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs