lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Sun, 23 Mar 2014 19:01:01 +0800
From:	Fengguang Wu <fengguang.wu@...el.com>
To:	Prasad Joshi <prasadjoshi.linux@...il.com>
Cc:	Joern Engel <joern@...fs.org>, Yinghai Lu <yinghai@...nel.org>,
	logfs@...fs.org, LKML <linux-kernel@...r.kernel.org>
Subject: Re: [logfs] BUG: unable to handle kernel NULL pointer dereference at
 (null)

Hi Prasad,

I'm running a minimal yocto image for kernel testing. It seems trying
to auto mount nbdXX:

[    0.916579] EXT2-fs (nbd8): error: unable to read superblock
[    0.917449] block nbd8: Attempted send on closed socket
[    0.918250] FAT-fs (nbd8): unable to read boot sector
[    0.919032] block nbd7: Attempted send on closed socket
[    0.919840] EXT2-fs (nbd7): error: unable to read superblock
[    0.920685] block nbd7: Attempted send on closed socket
[    0.921483] FAT-fs (nbd7): unable to read boot sector
[    0.922329] block nbd9: Attempted send on closed socket
[    0.923141] EXT2-fs (nbd9): error: unable to read superblock
[    0.924018] block nbd9: Attempted send on closed socket
[    0.924840] FAT-fs (nbd9): unable to read boot sector
[    0.926133] block nbd13: Attempted send on closed socket
[    0.926961] FAT-fs (nbd13): unable to read boot sector
[    0.927794] block nbd14: Attempted send on closed socket
[    0.928616] FAT-fs (nbd14): unable to read boot sector
[    0.929437] block nbd5: Attempted send on closed socket
[    0.930244] FAT-fs (nbd5): unable to read boot sector

> > [    0.931658] LogFS: Start unmounting
> > [    0.932279] LogFS: Start mount 1
> 
> Does this happen first time you try to mount LogFS?
> If yes can you please recreate the file system (mklogfs). To recreate
> the file system please clone the latest logfsprogs from
> https://github.com/prasad-joshi/logfsprogs.git
> 
> If this does not help, can you please email me steps for reproducing
> the problem on my setup?

You may run this script to reproduce the problem. I'll send you the
3MB yocto image file in another email.

#!/bin/bash

kernel=$1

kvm=(
	qemu-system-x86_64 -cpu kvm64 -enable-kvm
	-kernel $kernel
	-initrd /kernel-tests/initrd/yocto-minimal-x86_64.cgz
	# -initrd /kernel-tests/initrd/yocto-minimal-i386.cgz
	# -initrd /kernel-tests/initrd/quantal-core-i386.cgz
	# -initrd /kernel-tests/initrd/quantal-core-x86_64.cgz
	-smp 2
	-m 256M
	-net nic,vlan=0,macaddr=00:00:00:00:00:00,model=virtio
	-net user,vlan=0
	-net nic,vlan=1,model=e1000
	-net user,vlan=1
	-boot order=nc
	-no-reboot
	-watchdog i6300esb
	-serial stdio
	-display none
	-monitor null
)

append=(
	debug
	sched_debug
	apic=debug
	ignore_loglevel
	# dyndbg=\"func kobject_release +p\"
	sysrq_always_enabled
	panic=10
	prompt_ramdisk=0
	earlyprintk=ttyS0,115200
	console=ttyS0,115200
	console=tty0
	vga=normal
	root=/dev/ram0
	rw
)

"${kvm[@]}" --append "${append[*]}"
 
Thanks,
Fengguang

> Thanks and Regards,
> Prasad
> 
> > [    0.932857] LogFS: Start unmounting
> > [    0.933482] BUG: unable to handle kernel NULL pointer dereference at           (null)
> > [    0.934337] IP: [<ffffffff8149797f>] __mutex_lock_slowpath+0x4b/0xc2
> > [    0.934337] PGD 11e41067 PUD 1183f067 PMD 0
> > [    0.934337] Oops: 0002 [#1]
> > [    0.934337] Modules linked in:
> > [    0.934337] CPU: 0 PID: 498 Comm: mount Not tainted 3.14.0-rc7-next-20140321 #10
> > [    0.934337] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
> > [    0.934337] task: ffff8800007c3a80 ti: ffff880011fc8000 task.ti: ffff880011fc8000
> > [    0.934337] RIP: 0010:[<ffffffff8149797f>]  [<ffffffff8149797f>] __mutex_lock_slowpath+0x4b/0xc2
> > [    0.934337] RSP: 0018:ffff880011fc9d10  EFLAGS: 00010286
> > [    0.934337] RAX: 0000000000000000 RBX: ffff880011fbbcc0 RCX: 0000000000000002
> > [    0.934337] RDX: 0000000000000000 RSI: 0000000000000067 RDI: ffff880011fbbcc0
> > [    0.934337] RBP: ffff880011fc9d50 R08: ffff880011fc8000 R09: 0000000000000100
> > [    0.934337] R10: 0000000000000001 R11: ffffffff81072933 R12: ffff880011fbbcc8
> > [    0.934337] R13: ffff8800007c3a80 R14: 00000000ffffffff R15: ffff880011fbb000
> > [    0.934337] FS:  00007f08f76f8700(0000) GS:ffffffff8181c000(0000) knlGS:0000000000000000
> > [    0.934337] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
> > [    0.934337] CR2: 0000000000000000 CR3: 0000000011847000 CR4: 00000000000006b0
> > [    0.934337] Stack:
> > [    0.934337]  ffff880011fbbcc8 0000000000000000 ffff880011fc9d18 0000000000000850
> > [    0.934337]  ffff880011fbbcc0 ffff880011e8e000 ffff880011fbb000 ffff880013365e00
> > [    0.934337]  ffff880011fc9d68 ffffffff81497a1d ffff880011e8e000 ffff880011fc9d80
> > [    0.934337] Call Trace:
> > [    0.934337]  [<ffffffff81497a1d>] mutex_lock+0x27/0x2a
> > [    0.934337]  [<ffffffff8118ba48>] logfs_get_wblocks+0x55/0x60
> > [    0.934337]  [<ffffffff81189078>] logfs_sync_fs+0x14/0x30
> > [    0.934337]  [<ffffffff811012b4>] sync_filesystem+0x49/0x8e
> > [    0.934337]  [<ffffffff8118f1ec>] logfs_kill_sb+0x27/0xdc
> > [    0.934337]  [<ffffffff810e23cb>] deactivate_locked_super+0x2e/0x4f
> > [    0.934337]  [<ffffffff8118ff5d>] logfs_mount+0x6bd/0x6d5
> > [    0.934337]  [<ffffffff810e35c7>] mount_fs+0x10/0xa9
> > [    0.934337]  [<ffffffff810f7003>] vfs_kern_mount+0x5f/0xe3
> > [    0.934337]  [<ffffffff810f938f>] do_mount+0x72f/0x826
> > [    0.934337]  [<ffffffff810bb997>] ? strndup_user+0x35/0xcb
> > [    0.934337]  [<ffffffff810f96a8>] SyS_mount+0x80/0xb9
> > [    0.934337]  [<ffffffff81499137>] system_call_fastpath+0x16/0x1b
> > [    0.934337] Code: 25 50 b0 81 81 ff 04 25 50 b0 81 81 8b 07 85 c0 79 23 48 8b 43 10 4c 8d 63 08 48 89 63 10 41 83 ce ff 4c 89 24 24 48 89 44 24 08 <48> 89 20 4c 89 6c 24 10 eb 2e 31 c0 87 07 ff c8 75 d5 eb 48 44
> > [    0.934337] RIP  [<ffffffff8149797f>] __mutex_lock_slowpath+0x4b/0xc2
> > [    0.934337]  RSP <ffff880011fc9d10>
> > [    0.934337] CR2: 0000000000000000
> > [    0.934337] ---[ end trace 5506712fb917b42d ]---
> > [    0.934337] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:20
> >
> > git bisect start v3.9 v3.8 --
> > git bisect  bad 20f22ab42e9c832bde6e9a7ed04cdc73ec737e5b  # 09:52      2-      3  signals: fix new kernel-doc warnings
> > git bisect good bbbd27e694ce2c5fde9c8fcedbea618dd9153fe7  # 10:07     27+     27  Merge branch 'for_linus' of git://git.kernel.org/pub/scm/linux/kernel/git/jack/linux-fs
> > git bisect good bc2e4a90d9f75f1664c1587eb09ecd10bb71b022  # 10:19     27+     19  Merge tag 'usb-3.9-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usb
> > git bisect  bad d381f45c890a3fb136afb0dc1cbe025e066cb981  # 10:37      3-     19  Merge branch 'for-3.9/upstream-fixes' of git://git.kernel.org/pub/scm/linux/kernel/git/jikos/hid
> > git bisect good e3b59518c10e08eeb06215abf06f50e8f83b51dc  # 10:46     27+     18  Merge branch 'irq-urgent-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip
> > git bisect good d345243629db38a6340bcb69f372329d35b8f650  # 11:01     27+     19  Merge tag 'regulator-3.9-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/broonie/regulator
> > git bisect good af2841cdd4cb35248e41f7427d996c8f6b563051  # 11:12     27+     17  Merge branch 'drm-fixes' of git://people.freedesktop.org/~airlied/linux
> > git bisect  bad 7b54c165a0c012edbaeaa73c5c87cb73721eb580  # 11:31      1-     19  vfs: don't BUG_ON() if following a /proc fd pseudo-symlink results in a symlink
> > git bisect  bad 47b3bc907328db968bc9b43c41f48f8d1e140750  # 11:47      0-      6  Merge branch 'x86-urgent-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip
> > git bisect  bad 3c4aff6b9a183b4f24eb7b8dd6c8a92cdba3bc75  # 12:05      0-      3  x86, doc: Be explicit about what the x86 struct boot_params requires
> > git bisect good 015221fefbc93689dd47508a66326556adf2abcd  # 12:54     27+     15  x86: Fix 32-bit *_cpu_data initializers
> > git bisect  bad 2e604c0f19dcdd433b3863ffc3da9bc0787ca765  # 13:21      2-      6  x86: Don't clear efi_info even if the sentinel hits
> > git bisect  bad 98e7a989979b185f49e86ddaed2ad6890299d9f0  # 13:29      0-      4  x86, mm: Make sure to find a 2M free block for the first mapped area
> > # first bad commit: [98e7a989979b185f49e86ddaed2ad6890299d9f0] x86, mm: Make sure to find a 2M free block for the first mapped area
> > git bisect good 015221fefbc93689dd47508a66326556adf2abcd  # 13:38     81+     73  x86: Fix 32-bit *_cpu_data initializers
> > git bisect  bad 06ed26d1de59ce7cbbe68378b7e470be169750e5  # 13:39      0-     12  Add linux-next specific files for 20140321
> > git bisect  bad 774868c7094d35b4518be3d0e654de000a5d11fc  # 13:55      0-      3  Merge branch 'perf-urgent-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip
> > git bisect  bad 06ed26d1de59ce7cbbe68378b7e470be169750e5  # 13:56      0-     12  Add linux-next specific files for 20140321
> >
> > Thanks,
> > Fengguang
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ