lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 28 Oct 2011 02:08:01 -0400
From:	Christoph Hellwig <hch@...radead.org>
To:	Miklos Szeredi <miklos@...redi.hu>
Cc:	viro@...IV.linux.org.uk, linux-fsdevel@...r.kernel.org,
	linux-kernel@...r.kernel.org, jack@...e.cz, hch@...radead.org,
	akpm@...ux-foundation.org, toshi.okajima@...fujitsu.com,
	mszeredi@...e.cz
Subject: Re: [PATCH 12/13] vfs: count unlinked inodes

This one gets me a repeated spew of WARN_ONs during XFS log recover,
repeating the following pattern:

[ 1083.852789] ------------[ cut here ]------------
[ 1083.854471] WARNING: at /home/hch/work/linux-2.6/fs/inode.c:323
set_nlink+0x46/0x50()
[ 1083.857632] Hardware name: Bochs
[ 1083.858731] Modules linked in:
[ 1083.859932] Pid: 3111, comm: mount Not tainted 3.1.0+ #88
[ 1083.861735] Call Trace:
[ 1083.862694]  [<ffffffff8108743a>] warn_slowpath_common+0x7a/0xb0
[ 1083.864995]  [<ffffffff81087485>] warn_slowpath_null+0x15/0x20
[ 1083.867465]  [<ffffffff81153b76>] set_nlink+0x46/0x50
[ 1083.868970]  [<ffffffff813d70a9>] xfs_setup_inode+0x59/0x2b0
[ 1083.870817]  [<ffffffff813d1b36>] xfs_iget+0x386/0x880
[ 1083.871809]  [<ffffffff81427406>] xlog_recover_process_one_iunlink+0x46/0x1f0
[ 1083.872675]  [<ffffffff813c914c>] ? xfs_buf_rele+0x8c/0x1e0
[ 1083.873523]  [<ffffffff81427648>] xlog_recover_process_iunlinks+0x98/0x130
[ 1083.874378]  [<ffffffff8142833e>] xlog_recover_finish+0x3e/0xd0
[ 1083.875130]  [<ffffffff8142ebd4>] xfs_log_mount_finish+0x44/0x50
[ 1083.875933]  [<ffffffff8142b91e>] xfs_mountfs+0x51e/0x7c0
[ 1083.876748]  [<ffffffff813d8eda>] ? xfs_mru_cache_create+0x15a/0x180
[ 1083.877582]  [<ffffffff813db42d>] xfs_fs_fill_super+0x1cd/0x280
[ 1083.878399]  [<ffffffff8113e662>] mount_bdev+0x1a2/0x1e0
[ 1083.879090]  [<ffffffff813db260>] ? xfs_finish_flags+0x120/0x120
[ 1083.879881]  [<ffffffff813d92c0>] xfs_fs_mount+0x10/0x20
[ 1083.880716]  [<ffffffff8113f12b>] mount_fs+0x1b/0xd0
[ 1083.881374]  [<ffffffff81157e19>] vfs_kern_mount+0x69/0xf0
[ 1083.882117]  [<ffffffff811582af>] do_kern_mount+0x4f/0x100
[ 1083.882831]  [<ffffffff81159dd2>] do_mount+0x542/0x850
[ 1083.883642]  [<ffffffff81116621>] ? memdup_user+0x41/0x80
[ 1083.884347]  [<ffffffff811166b3>] ? strndup_user+0x53/0x70
[ 1083.885062]  [<ffffffff81180c6f>] compat_sys_mount+0xdf/0x260
[ 1083.885798]  [<ffffffff819e15c5>] sysenter_dispatch+0x7/0x2b
[ 1083.886518] ---[ end trace 4902e59f8848ff74 ]---

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ