lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Thu, 17 Apr 2014 11:59:59 +0800
From:	Fengguang Wu <fengguang.wu@...el.com>
To:	Shaohua Li <shli@...nel.org>
Cc:	NeilBrown <neilb@...e.de>, LKML <linux-kernel@...r.kernel.org>,
	lkp@...org
Subject: [raid5] kernel BUG at drivers/md/raid5.c:4374!

Shaohua,

We noticed the below BUG on

commit e240c1839d11152b0355442f8ac6d2d2d921be36 ("raid5: get_active_stripe avoids device_lock")

test case: lkp-ws02/micro/dd-write/11HDD-RAID5-cfq-ext4-10dd

27c0f68f0745218  e240c1839d11152b0355442f8  
---------------  -------------------------  
         0           +Inf%          1 ~ 0%  TOTAL dmesg.kernel_BUG_at_drivers/md/raid5.c
         0           +Inf%          1 ~ 0%  TOTAL dmesg.invalid_opcode
         0           +Inf%          1 ~ 0%  TOTAL dmesg.RIP:handle_active_stripes
         0           +Inf%          1 ~ 0%  TOTAL dmesg.Kernel_panic-not_syncing:Fatal_exception

Legend:
	~XX%    - stddev percent
	[+-]XX% - change percent

[  264.260444] kernel BUG at drivers/md/raid5.c:4374!
[  264.267590] invalid opcode: 0000 [#1] SMP
[  264.272076] Modules linked in: btrfs microcode ipmi_si ipmi_msghandler acpi_cpufreq processor
[  264.281514] CPU: 0 PID: 4005 Comm: md0_raid5 Not tainted 3.15.0-rc1-00611-g2e76799 #1
[  264.289823] Hardware name: Supermicro X8DTN/X8DTN, BIOS 4.6.3 01/06/2010
[  264.296789] task: ffff8804151e41a0 ti: ffff88041672c000 task.ti: ffff88041672c000
[  264.304750] RIP: 0010:[<ffffffff81804ef1>]  [<ffffffff81804ef1>] handle_active_stripes.isra.24+0x254/0x360
[  264.314951] RSP: 0018:ffff88041672dd10  EFLAGS: 00010002
[  264.320527] RAX: ffff88021dc46000 RBX: ffff880220a4e000 RCX: ffff880220a4e080
[  264.327926] RDX: 0000000000000001 RSI: ffff88021e0d7010 RDI: ffff880220a4e000
[  264.335325] RBP: ffff88041672dda8 R08: 0000000000000000 R09: 0000000000000000
[  264.342724] R10: 0000000000000000 R11: 000000000000ef58 R12: 0000000000000000
[  264.350131] R13: ffff880220a4e080 R14: 0000000000000000 R15: ffff880220a4e268
[  264.357530] FS:  0000000000000000(0000) GS:ffff880237c00000(0000) knlGS:0000000000000000
[  264.366099] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[  264.372111] CR2: 0000000001e21d64 CR3: 000000000200f000 CR4: 00000000000007f0
[  264.379509] Stack:
[  264.381780]  ffff8804173d7de0 ffff880220a4e000 ffff88041672dd38 ffffffffffffffd8
[  264.389907]  ffffffff1e1bd000 ffff880220a4e090 ffffffff817fdba2 ffff880220a4e000
[  264.398043]  0000000000000021 ffff880220a4e268 0000000000000000 ffff88041672dd78
[  264.406172] Call Trace:
[  264.408893]  [<ffffffff817fdba2>] ? do_release_stripe+0xdf/0x158
[  264.415168]  [<ffffffff817fdc30>] ? __release_stripe+0x15/0x17
[  264.421266]  [<ffffffff818054f2>] raid5d+0x3e2/0x4f2
[  264.426497]  [<ffffffff819bcacf>] ? schedule_timeout+0x2f/0x19f
[  264.432681]  [<ffffffff81826151>] md_thread+0x123/0x139
[  264.438171]  [<ffffffff811148b6>] ? __wake_up_sync+0x12/0x12
[  264.444096]  [<ffffffff8182602e>] ? md_register_thread+0xd5/0xd5
[  264.450368]  [<ffffffff810fa267>] kthread+0xdb/0xe3
[  264.455511]  [<ffffffff810fa18c>] ? kthread_create_on_node+0x16f/0x16f
[  264.462310]  [<ffffffff819c7d7c>] ret_from_fork+0x7c/0xb0
[  264.467973]  [<ffffffff810fa18c>] ? kthread_create_on_node+0x16f/0x16f
[  264.474764] Code: 60 00 00 00 00 48 8b 70 10 48 8b 48 18 48 8d 50 10 48 89 4e 08 48 89 31 48 89 50 10 48 89 50 18 f0 ff 40 50 8b 50 50
ff ca 74 02 <0f> 0b 4a 89 44 d5 98 49 ff c2 49 83 fa 08 0f 85 d7 fd ff ff 41
[  264.498252] RIP  [<ffffffff81804ef1>] handle_active_stripes.isra.24+0x254/0x360
[  264.506112]  RSP <ffff88041672dd10>
[  264.509869] ---[ end trace 58f3875ff7b4e923 ]---

Thanks,
Fengguang

View attachment ".dmesg" of type "text/plain" (137012 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ