From: CAI Qian <caiqian@redhat.com>
To: Eric Sandeen <sandeen@sandeen.net>
Cc: xfs@oss.sgi.com
Subject: Re: 3.9.0: XFS rootfs corruption
Date: Wed, 22 May 2013 00:10:07 -0400 (EDT) [thread overview]
Message-ID: <2132292786.4417784.1369195807747.JavaMail.root@redhat.com> (raw)
In-Reply-To: <51895115.90108@sandeen.net>
OK, this has never been reproduced in 3.9-rc1 so far. It may because the
rootfs became full after crash dump testing though.
CAI Qian
----- Original Message -----
> From: "Eric Sandeen" <sandeen@sandeen.net>
> To: "CAI Qian" <caiqian@redhat.com>
> Cc: xfs@oss.sgi.com
> Sent: Wednesday, May 8, 2013 3:08:05 AM
> Subject: Re: 3.9.0: XFS rootfs corruption
>
> On 5/7/13 2:53 AM, CAI Qian wrote:
> >
> >
> > ----- Original Message -----
> >> From: "Eric Sandeen" <sandeen@sandeen.net>
> >> To: "CAI Qian" <caiqian@redhat.com>
> >> Cc: xfs@oss.sgi.com
> >> Sent: Monday, May 6, 2013 10:31:01 PM
> >> Subject: Re: 3.9.0: XFS rootfs corruption
> >>
> >> On 5/6/13 2:50 AM, CAI Qian wrote:
> >>> Saw this on several different Power7 systems after kdump reboot. It has
> >>> xfsprogs-3.1.10
> >>> and rootfs in on LVM. Never saw one of those in any of the RC releases.
> >>>
> >>> ] Reached target Basic System.
> >>> [ 4.919316] bio: create slab <bio-1> at 1
> >>> [ 5.078616] SGI XFS with ACLs, security attributes, large block/inode
> >>> numbers, no debug enabled
> >>> [ 5.081925] XFS (dm-1): Mounting Filesystem
> >>> [ 5.168530] XFS (dm-1): Starting recovery (logdev: internal)
> >>> [ 5.333575] XFS: Internal error XFS_WANT_CORRUPTED_RETURN at line 176
> >>> of
> >>> file fs/xfs/xfs_dir2_data.c. Caller 0xd000000002396fdc
> >>
> >> here:
> >>
> >> /*
> >> * Need to have seen all the entries and all the bestfree slots.
> >> */
> >> XFS_WANT_CORRUPTED_RETURN(freeseen == 7);
> >>
> >> I hope Dave knows offhand what this might mean. :)
> >>
> >> Could you get a metadump of the filesystem in question?
> > Err, less familiar here. May I ask how can I do that?
>
> since it's the root fs, you might need to do it from some sort of rescue
> shell, then just do xfs_metadump /dev/<device> <metadump filename>
>
> the resulting file should compress further with something like bzip2.
>
> ...
>
> >>> Also, never saw any of those in other architectures like x64, but started
> >>> get those there in 3.9.0.
> >>> Unsure if those are related.
> >>>
> >>> [ 3224.369782]
> >>> =============================================================================
> >>> [ 3224.370017] BUG xfs_efi_item (Tainted: GF B ): Poison
> >>> overwritten
> >>> [ 3224.370017]
> >>> -----------------------------------------------------------------------------
> >>
> >> 2: 'F' if any module was force loaded by "insmod -f", ' ' if all
> >> modules were loaded normally.
> >>
> >> Force loaded modules, what's that from?
> > This could be just happened after the booting done or we were running a
> > stress test later
> > that does load (modprobe *) and unload (modprobe -r *) every module. Again,
> > those warnings
> > could be totally unrelated to the above rootfs corruption.
> > CAI Qian
>
> hmmm :) So any one of those modules could have caused memory corruption I
> guess.
>
> If you can hit it reliably you might try to narrow it down to whether it
> is a particular module causing it.
>
> -Eric
>
>
_______________________________________________
xfs mailing list
xfs@oss.sgi.com
http://oss.sgi.com/mailman/listinfo/xfs
next prev parent reply other threads:[~2013-05-22 4:10 UTC|newest]
Thread overview: 14+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <2105365384.7582278.1367825507929.JavaMail.root@redhat.com>
2013-05-06 7:50 ` 3.9.0: XFS rootfs corruption CAI Qian
2013-05-06 14:31 ` Eric Sandeen
2013-05-07 7:53 ` CAI Qian
2013-05-07 19:08 ` Eric Sandeen
2013-05-14 2:28 ` CAI Qian
2013-05-14 3:17 ` Dave Chinner
2013-05-22 4:10 ` CAI Qian [this message]
2013-05-22 8:48 ` CAI Qian
2013-05-22 9:46 ` Dave Chinner
2013-06-03 7:44 ` CAI Qian
2013-06-03 8:09 ` CAI Qian
2013-06-04 4:36 ` Dave Chinner
2013-06-04 4:48 ` CAI Qian
2013-06-04 5:02 ` CAI Qian
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=2132292786.4417784.1369195807747.JavaMail.root@redhat.com \
--to=caiqian@redhat.com \
--cc=sandeen@sandeen.net \
--cc=xfs@oss.sgi.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox