Devuan bug report logs - #589
This version introduce btrfs free cache incompatibility

version graph

Package: linux-image-4.9.0-16-686-pae; Maintainer for linux-image-4.9.0-16-686-pae is (unknown);

Reported by: Klaus Ethgen <Klaus@ethgen.de>

Date: Sat, 3 Jul 2021 21:33:01 UTC

Severity: critical

Found in version 4.9.272-1

Done: Arne Wichmann <aw@anhrefn.saar.de>

Full log


🔗 View this message in rfc822 format

X-Loop: owner@bugs.devuan.org
Subject: bug#589: This version introduce btrfs free cache incompatibility
Reply-To: Klaus Ethgen <Klaus@ethgen.de>, 589@bugs.devuan.org
Resent-From: Klaus Ethgen <Klaus@ethgen.de>
Resent-To: devuan-bugs@lists.dyne.org
Resent-CC: devuan-dev@lists.dyne.org
X-Loop: owner@bugs.devuan.org
Resent-Date: Sat, 03 Jul 2021 21:33:01 +0000
Resent-Message-ID: <handler.589.B.162534780218224@bugs.devuan.org>
Resent-Sender: owner@bugs.devuan.org
X-Devuan-PR-Message: report 589
X-Devuan-PR-Package: linux-image-4.9.0-16-686-pae
X-Devuan-PR-Keywords: 
Received: via spool by submit@bugs.devuan.org id=B.162534780218224
          (code B); Sat, 03 Jul 2021 21:33:01 +0000
Received: (at submit) by bugs.devuan.org; 3 Jul 2021 21:30:02 +0000
Delivered-To: devuanbugs@dyne.org
Received: from tupac3.dyne.org [195.169.149.119]
	by doc.devuan.org with IMAP (fetchmail-6.4.0.beta4)
	for <debbugs@localhost> (single-drop); Sat, 03 Jul 2021 21:30:02 +0000 (UTC)
Received: from tschil.ethgen.ch (tschil.ethgen.ch [5.9.7.51])
	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by vm6.ganeti.dyne.org (Postfix) with ESMTPS id 1E764F604DB
	for <submit@bugs.devuan.org>; Sat,  3 Jul 2021 23:21:45 +0200 (CEST)
Authentication-Results: vm6.ganeti.dyne.org;
	dkim=pass (4096-bit key; unprotected) header.d=ethgen.de header.i=@ethgen.de header.b="aYb9hTvQ";
	dkim-atps=neutral
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ethgen.de;
	 s=mail; h=Content-Type:MIME-Version:Message-ID:Subject:To:From:Date:Sender:
	Reply-To:Cc:Content-Transfer-Encoding:Content-ID:Content-Description:
	Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:
	In-Reply-To:References:List-Id:List-Help:List-Unsubscribe:List-Subscribe:
	List-Post:List-Owner:List-Archive;
	bh=tIZf7LoFs5X/Zg+NnnfACwNwNFoOEfXpEn/9WM3qG2o=; b=aYb9hTvQzyYx3+ifhavJg1IDBE
	6RR/E7ZiPKBb5kBmbo7hpvFkLJjMdD8lKO4g6C0dxWqfZTqTmbFKWt91R0g/rW1eazu5clhpJX7jw
	gON3YpT/cKLw8l1u5HKekLUwcxz6pU/ESJKiRXxWttAgNFHLTy6w8TKFekF3GoPMa5Quqc7jHjTTL
	NlrL9kW3WAY/ZJEGN0+ZZGR3D7CbMWahqkap+GvIF3HsFqHpk9iCtzokw/qgn99z7WRU1/FrBHno0
	4Gi/UnPVN2piPjrqpJa5uVC8skZGfrbzfor+Lf52wbgcltKOJfOp5iAnRPgsBnWU8cZ8Y6WXUGtgy
	pLXriBinDra+8SO27gxp/R4Fa7OXXlPgGpU6yifXAs8270j+GlUxUA1Q+G7/r6PLs4Y/bNMKOXuYC
	g45f7yhU47Fg9qoKJIwZP3hRkWOLeicZWEvuCfiKipXTtuom6lFKJ1Y9LBfQKso7OBnEPEk1WCfPN
	vKPNPIztrCA4XOJzh1/3ZA+d07gL95VPZ3klRCGTPKtNKGPNE71X/9t3AXKqDWiJWkocHZ0wmjKWz
	gzpXnh2b+jcQAT9hsJiwh2sa9d1Hkifud49lO4BCRtynTCwiZpwHaVA8Wc4afKA//L+eXqFgkHLv7
	4q6PXJA7WsT/VA3ymkMKGQsAyYwKNNLslgTbutpyw=;
Received: from [192.168.17.4] (helo=ikki.ket)
	by tschil.ethgen.ch with esmtpsa (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256)
	(Exim 4.92)
	(envelope-from <Klaus@ethgen.de>)
	id 1lzn55-0003HV-3x; Sat, 03 Jul 2021 21:21:43 +0000
Received: from klaus by ikki.ket with local (Exim 4.94.2)
	(envelope-from <Klaus@ethgen.de>)
	id 1lzn54-0008PL-ML; Sat, 03 Jul 2021 23:21:42 +0200
Date: Sat, 3 Jul 2021 22:21:42 +0100
From: Klaus Ethgen <Klaus@ethgen.de>
To: Devuan Bug Tracking System <submit@bugs.devuan.org>
Message-ID: <YODU5puB0l3w3XPn@ikki.ethgen.ch>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha512;
	protocol="application/pgp-signature"; boundary="LbMJt/na8YtplF78"
Content-Disposition: inline
X-Reportbug-Version: 7.10.3+devuan1
OpenPGP: id=79D0B06F4E20AF1C;
 url=http://www.ethgen.ch/~klaus/79D0B06F4E20AF1C.txt; preference=signencrypt
X-Spam-Status: No, score=-2.5 required=5.0 tests=DKIM_SIGNED,DKIM_VALID,
	DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_PASS
	autolearn=disabled version=3.4.2
X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on tupac3.dyne.org
[Message part 1 (text/plain, inline)]
Package: linux-image-4.9.0-16-686-pae
Version: 4.9.272-1
Severity: critical

This release introduce introduce an incompatibility in btrfs free space
cache which leads to an filesystem corruption!

The solution is simple but not obvious: Do a `mount -o
remount,clear_cache,space_cache /filesystem` as early as possible after
boot into the new kernel for every btrfs filesystem.

Please add a release note and a warning for the admin.

-- System Information:
Distributor ID:	Devuan
Description:	Devuan GNU/Linux 4 (chimaera)
Release:	4
Codename:	n/a
Architecture: x86_64

Kernel: Linux 5.10.21 (SMP w/8 CPU threads)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_FIRMWARE_WORKAROUND, TAINT_OOT_MODULE
Locale: LANG=C, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)
-- 
Klaus Ethgen                                       http://www.ethgen.ch/
pub  4096R/4E20AF1C 2011-05-16            Klaus Ethgen <Klaus@Ethgen.ch>
Fingerprint: 85D4 CA42 952C 949B 1753  62B3 79D0 B06F 4E20 AF1C
[signature.asc (application/pgp-signature, inline)]

Send a report that this bug log contains spam.


Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.

Devuan Bugs Owner <owner@bugs.devuan.org>.
Last modified: Sat Nov 23 05:07:04 2024;