lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 03 Sep 2008 09:35:23 -0700
From:	Randy Dunlap <randy.dunlap@...cle.com>
To:	lkml <linux-kernel@...r.kernel.org>, reiserfs-devel@...r.kernel.org
Subject: reiserfs  BUG in 2.6.27-rc5

Running fsx-linux on x86_64.
reiserfs blocksize = 1 KB, data=journal.

.config and full kernel log attached.



kernel BUG at fs/reiserfs/journal.c:530!
invalid opcode: 0000 [1] SMP
CPU 3
Modules linked in: reiserfs parport_pc lp parport tg3 lpfc cciss ehci_hcd ohci_hcd uhci_hcd [last unloaded: reiserfs]
Pid: 19141, comm: pdflush Not tainted 2.6.27-rc5 #1
RIP: 0010:[<ffffffffa00b3e35>]  [<ffffffffa00b3e35>] reiserfs_in_journal+0xed/0x155 [reiserfs]
RSP: 0018:ffff88006ac6b6f0  EFLAGS: 00010246
RAX: 00000000000023fe RBX: ffff88006ac6b744 RCX: 00000000000023fe
RDX: ffffc20011c881d8 RSI: ffffc20011bf21f0 RDI: ffff88027d830800
RBP: ffff88006ac6b700 R08: 0000000000000005 R09: ffff88017b50a400
R10: ffffc20011bf2000 R11: 0000000000000008 R12: ffff88006ac6b814
R13: ffff88019f05bbd0 R14: ffff88017b50a400 R15: 0000000000000001
FS:  00007f742f1fd6f0(0000) GS:ffff88027f618c80(0000) knlGS:00000000f7fde6c0
CS:  0010 DS: 0018 ES: 0018 CR0: 000000008005003b
CR2: 00007f74228fa000 CR3: 000000016f983000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process pdflush (pid: 19141, threadinfo ffff88006ac6a000, task ffff88027dc24560)
Stack:  ffff88017b50a400 00000000000003fe ffff88006ac6b770 ffffffffa00963c5
 000000016ac6b740 0000200000000001 ffff8801f849e080 ffffc20000c74004
 000003fdf849e080 ffff880170c44080 000000006ac6b750 ffff88006ac6b940
Call Trace:
 [<ffffffffa00963c5>] scan_bitmap_block+0xd5/0x227 [reiserfs]
 [<ffffffffa0097160>] reiserfs_allocate_blocknrs+0x87e/0xa94 [reiserfs]
 [<ffffffffa00acedd>] ? search_for_position_by_key+0x165/0x2c7 [reiserfs]
 [<ffffffffa009e341>] reiserfs_get_block+0x3b8/0xf67 [reiserfs]
 [<ffffffff80554083>] ? mutex_unlock+0x9/0xb
 [<ffffffffa009f614>] reiserfs_writepage+0x724/0xad6 [reiserfs]
 [<ffffffff8026d180>] ? find_get_pages_tag+0x41/0xe0
 [<ffffffff80273789>] __writepage+0x12/0x2b
 [<ffffffff80273c7f>] write_cache_pages+0x1c4/0x328
 [<ffffffff80273777>] ? __writepage+0x0/0x2b
 [<ffffffff80273e02>] generic_writepages+0x1f/0x25
 [<ffffffff80273e37>] do_writepages+0x2f/0x37
 [<ffffffff802b5540>] __writeback_single_inode+0x145/0x284
 [<ffffffffa00b3c9c>] ? reiserfs_flush_old_commits+0x1e/0xca [reiserfs]
 [<ffffffffa00b2234>] ? journal_end_sync+0x75/0x7d [reiserfs]
 [<ffffffff802b5a5d>] generic_sync_sb_inodes+0x1c3/0x29e
 [<ffffffff802b5b41>] sync_sb_inodes+0x9/0xb
 [<ffffffff802b5eaf>] writeback_inodes+0x75/0xbe
 [<ffffffff80274701>] wb_kupdate+0x9f/0x112
 [<ffffffff80274ae1>] ? pdflush+0x0/0x1e5
 [<ffffffff80274ae1>] ? pdflush+0x0/0x1e5
 [<ffffffff80274c1a>] pdflush+0x139/0x1e5
 [<ffffffff80274662>] ? wb_kupdate+0x0/0x112
 [<ffffffff802472bb>] kthread+0x49/0x76
 [<ffffffff8020ce49>] child_rip+0xa/0x11
 [<ffffffff80247272>] ? kthread+0x0/0x76
 [<ffffffff8020ce3f>] ? child_rip+0x0/0x11


Code: d0 25 ff 1f 00 00 49 8b 94 c2 f8 01 00 00 eb 12 8b 42 10 48 39 c8 75 06 4c 39 4a 08 74 0d 48 8b 52 40 48 85 d2 75 e9 31 c0 eb 63 <0f> 0b eb fe 49 8b 41 18 48 c1 e0 03 48 0f af c8 48 63 c2 48 01
RIP  [<ffffffffa00b3e35>] reiserfs_in_journal+0xed/0x155 [reiserfs]
 RSP <ffff88006ac6b6f0>
Kernel panic - not syncing: Fatal exception

View attachment "kconfig.4930" of type "text/plain" (47638 bytes)

View attachment "netcon-4930.log" of type "text/x-log" (84471 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ