lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Tue, 3 Jun 2014 11:58:55 +0200
From:	Jan Kara <jack@...e.cz>
To:	Meelis Roos <mroos@...ux.ee>
Cc:	Linux Kernel list <linux-kernel@...r.kernel.org>,
	linux-ext4@...r.kernel.org, sparclinux@...r.kernel.org
Subject: Re: kernel BUG at fs/jbd2/journal.c:1951!

On Sun 25-05-14 22:50:53, Meelis Roos wrote:
> Tried yesterdays git v3.15-rc6-190-g1ee1cea on Sun Fire T2000 (32-thread 
> sparc64) and got reproducibly stuck on boot with ext journal replay like 
> below. Booting Debian 3.14.2-1 replayed the log and mounted FS fine. 
> After that, my test kernel works fine too. SO I can not reproduce it any 
> more but it seems like I hit a bug.
> 
> [   62.064329] EXT4-fs (sda1): INFO: recovery required on readonly filesystem
> [   62.064395] EXT4-fs (sda1): write access will be enabled during recovery
> [   62.077043] EXT4-fs (sda1): orphan cleanup on readonly fs
> [   62.156585] EXT4-fs (sda1): 14 orphan inodes deleted
> [   62.156645] EXT4-fs (sda1): recovery complete
> [   62.156702] kernel BUG at fs/jbd2/journal.c:1951!
  So if I'm right this is assertion:
	J_ASSERT(!journal->j_running_transaction);

  But I don't really see how that could happen especially during mount when
there are really just two processes operating in the filesystem - mount and
jbd2 process. Hum, after some more thought, maybe this is some strange
interaction between writeback completion starting a reserved handle and
journal_flush()... There is some potential for problems. Let me think about
it for some time.

									Honza

> [   62.156752]               \|/ ____ \|/
> [   62.156752]               "@'/ .. \`@"
> [   62.156752]               /_| \__/ |_\
> [   62.156752]                  \__U_/
> [   62.156893] swapper/0(1): Kernel bad sw trap 5 [#1]
> [   62.156943] CPU: 8 PID: 1 Comm: swapper/0 Not tainted 3.15.0-rc6+ #6
> [   62.157004] task: ffffff8008677640 ti: ffffff800870c000 task.ti: ffffff800870c000
> [   62.157079] TSTATE: 0000004480001605 TPC: 00000000005f3c00 TNPC: 00000000005f3c04 Y: 00000000    Not tainted
> [   62.157180] TPC: <jbd2_journal_flush+0x11c/0x190>
> [   62.157225] g0: 00000000009528c8 g1: 0000000000000000 g2: 0000000000a17f88 g3: 0000000000a17f80
> [   62.157301] g4: ffffff8008677640 g5: ffffff83f6a4a000 g6: ffffff800870c000 g7: ffffff8008633fa0
> [   62.157375] o0: 0000000000000025 o1: 0000000000961ed8 o2: 000000000000079f o3: ffffff83f3aab888
> [   62.157451] o4: ffffff83ffb72000 o5: 0000000000961ed8 sp: ffffff800870ed11 ret_pc: 00000000005f3bf8
> [   62.157530] RPC: <jbd2_journal_flush+0x114/0x190>
> [   62.157575] l0: 0000000000000000 l1: 000000000000000e l2: 0000000010018001 l3: 000000000088e438
> [   62.157650] l4: 00000000009528c8 l5: 000000000000ff00 l6: 0000000000ff0000 l7: 000000000095ee30
> [   62.157726] i0: ffffff83f3aab800 i1: ffffff83f3aab824 i2: ffffff83f3aabb98 i3: ffffff83f3aab8e8
> [   62.157801] i4: ffffff83f3aab824 i5: ffffff83f3aab8e8 i6: ffffff800870edc1 i7: 00000000005bd640
> [   62.157887] I7: <ext4_mark_recovery_complete.isra.232+0x4c/0xb0>
> [   62.157942] Call Trace:
> [   62.157990]  [00000000005bd640] ext4_mark_recovery_complete.isra.232+0x4c/0xb0
> [   62.158068]  [00000000005c3860] ext4_fill_super+0x303c/0x33e8
> [   62.158132]  [0000000000538fc4] mount_bdev+0x124/0x18c
> [   62.158192]  [0000000000539a4c] mount_fs+0x60/0x17c
> [   62.158246]  [000000000055087c] vfs_kern_mount+0x48/0xe4
> [   62.158309]  [0000000000552e24] do_mount+0x808/0x974
> [   62.158370]  [00000000005531b0] SyS_mount+0x6c/0xa4
> [   62.158427]  [0000000000a74cb8] mount_block_root+0x108/0x2ac
> [   62.158490]  [0000000000a75180] prepare_namespace+0x180/0x1bc
> [   62.158552]  [0000000000a74a80] kernel_init_freeable+0x208/0x218
> [   62.158619]  [0000000000864724] kernel_init+0x4/0xf4
> [   62.158684]  [0000000000406084] ret_from_fork+0x1c/0x2c
> [   62.158738]  [0000000000000000]           (null)
> [   62.158780] Disabling lock debugging due to kernel taint
> [   62.158847] Caller[00000000005bd640]: ext4_mark_recovery_complete.isra.232+0x4c/0xb0
> [   62.158926] Caller[00000000005c3860]: ext4_fill_super+0x303c/0x33e8
> [   62.158990] Caller[0000000000538fc4]: mount_bdev+0x124/0x18c
> [   62.159051] Caller[0000000000539a4c]: mount_fs+0x60/0x17c
> [   62.159143] Caller[000000000055087c]: vfs_kern_mount+0x48/0xe4
> [   62.159215] Caller[0000000000552e24]: do_mount+0x808/0x974
> [   62.159279] Caller[00000000005531b0]: SyS_mount+0x6c/0xa4
> [   62.159345] Caller[0000000000a74cb8]: mount_block_root+0x108/0x2ac
> [   62.159411] Caller[0000000000a75180]: prepare_namespace+0x180/0x1bc
> [   62.159475] Caller[0000000000a74a80]: kernel_init_freeable+0x208/0x218
> [   62.159540] Caller[0000000000864724]: kernel_init+0x4/0xf4
> [   62.159604] Caller[0000000000406084]: ret_from_fork+0x1c/0x2c
> [   62.159660] Caller[0000000000000000]:           (null)
> [   62.166652] Instruction DUMP: 901222d8  7ff8d20a  01000000 <91d02005> 11002587  921027a1  0af07ffb  901222d8  c45e2310
> [   62.207443] Kernel panic - not syncing: Attempted to kill init! exitcode=0x00000009
> 
> 
> -- 
> Meelis Roos (mroos@...ux.ee)
> --
> To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
> the body of a message to majordomo@...r.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
-- 
Jan Kara <jack@...e.cz>
SUSE Labs, CR
--
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ