lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 26 Jul 2011 12:49:08 +0800
From:	Ming Lei <tom.leiming@...il.com>
To:	Jens Axboe <jaxboe@...ionio.com>
Cc:	Linux Kernel Mailing List <linux-kernel@...r.kernel.org>
Subject: block: BUG: using smp_processor_id() in preemptible [00000000] code

Hi,

The bug is observed in -next-20110725, follows the stack trace[1], and
seems the attachment patch can fix the bug.



[1], stack trace

[   22.247222] BUG: using smp_processor_id() in preemptible [00000000]
code: kjournald/514
[   22.255737] caller is __make_request+0x1b8/0x308
[   22.260681] [<c0019f44>] (unwind_backtrace+0x0/0xe8) from
[<c024b4cc>] (debug_smp_processor_id+0xbc/0xf0)
[   22.270751] [<c024b4cc>] (debug_smp_processor_id+0xbc/0xf0) from
[<c0223d14>] (__make_request+0x1b8/0x308)
[   22.280944] [<c0223d14>] (__make_request+0x1b8/0x308) from
[<c02215ac>] (generic_make_request+0x4dc/0x558)
[   22.291107] [<c02215ac>] (generic_make_request+0x4dc/0x558) from
[<c022173c>] (submit_bio+0x114/0x138)
[   22.300903] [<c022173c>] (submit_bio+0x114/0x138) from [<c011f504>]
(submit_bh+0x148/0x16c)
[   22.309692] [<c011f504>] (submit_bh+0x148/0x16c) from [<c0121ed8>]
(__sync_dirty_buffer+0x88/0xd8)
[   22.319122] [<c0121ed8>] (__sync_dirty_buffer+0x88/0xd8) from
[<c01aff78>] (journal_commit_transaction+0x1198/0
x1688)
[   22.330322] [<c01aff78>] (journal_commit_transaction+0x1198/0x1688)
from [<c01b4034>] (kjournald+0xb4/0x224)
[   22.340667] [<c01b4034>] (kjournald+0xb4/0x224) from [<c0069ea0>]
(kthread+0x8c/0x94)
[   22.348937] [<c0069ea0>] (kthread+0x8c/0x94) from [<c00137f8>]
(kernel_thread_exit+0x0/0x8)


thanks,
-- 
Ming Lei

View attachment "fix_blk_bug_smp_processor_id.patch" of type "text/x-patch" (449 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ