lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Sun, 27 Mar 2016 10:57:32 +0200
From:	Sedat Dilek <sedat.dilek@...il.com>
To:	"Theodore Ts'o" <tytso@....edu>
Cc:	linux-fsdevel <linux-fsdevel@...r.kernel.org>,
	LKML <linux-kernel@...r.kernel.org>,
	Linus Torvalds <torvalds@...ux-foundation.org>
Subject: Re: [Linux-v4.6-rc1] ext4: WARNING: CPU: 2 PID: 2692 at
 kernel/locking/lockdep.c:2017 __lock_acquire+0x180e/0x2260

On Sun, Mar 27, 2016 at 10:15 AM, Sedat Dilek <sedat.dilek@...il.com> wrote:
> Hi,
>
> I tried Linux v4.6-rc1 and found an easter-egg :-)?
>
> [   77.403377] ------------[ cut here ]------------
> [   77.403391] WARNING: CPU: 2 PID: 2692 at
> kernel/locking/lockdep.c:2017 __lock_acquire+0x180e/0x2260
> [   77.403394] DEBUG_LOCKS_WARN_ON(chain->depth != curr->lockdep_depth
> - (i - 1))
> [   77.403397] Modules linked in: ppp_deflate bsd_comp ppp_async
> crc_ccitt option usb_wwan cdc_ether usbserial usbnet arc4 iwldvm bnep
> mac80211 rfcomm uvcvideo i915 snd_hda_codec_hdmi snd_hda_codec_realtek
> kvm_intel videobuf2_vmalloc snd_hda_codec_generic videobuf2_memops
> snd_hda_intel kvm joydev videobuf2_v4l2 snd_hda_codec videobuf2_core
> videodev usb_storage snd_hwdep btusb snd_hda_core btrtl snd_pcm
> parport_pc btbcm i2c_algo_bit irqbypass drm_kms_helper iwlwifi btintel
> ppdev psmouse snd_seq_midi bluetooth snd_seq_midi_event syscopyarea
> snd_rawmidi sysfillrect serio_raw snd_seq sysimgblt samsung_laptop
> fb_sys_fops snd_timer drm snd_seq_device cfg80211 intel_rst wmi snd
> video soundcore lpc_ich mac_hid lp parport binfmt_misc hid_generic
> usbhid hid r8169 mii
> [   77.403485] CPU: 2 PID: 2692 Comm: URL Classifier Not tainted
> 4.6.0-rc1-1-iniza-small #1
> [   77.403487] Hardware name: SAMSUNG ELECTRONICS CO., LTD.
> 530U3BI/530U4BI/530U4BH/530U3BI/530U4BI/530U4BH, BIOS 13XK 03/28/2013
> [   77.403490]  0000000000000000 ffff88005dadb910 ffffffff81411955
> ffff88005dadb960
> [   77.403496]  0000000000000000 ffff88005dadb950 ffffffff81083db1
> 000007e15dadba00
> [   77.403502]  ffff88006acdd900 0000000000000000 0000000000000004
> 31018a8cbc5d051b
> [   77.403506] Call Trace:
> [   77.403513]  [<ffffffff81411955>] dump_stack+0x85/0xc0
> [   77.403517]  [<ffffffff81083db1>] __warn+0xd1/0xf0
> [   77.403521]  [<ffffffff81083e1f>] warn_slowpath_fmt+0x4f/0x60
> [   77.403526]  [<ffffffff810df01e>] __lock_acquire+0x180e/0x2260
> [   77.403532]  [<ffffffff812ff494>] ? __ext4_handle_dirty_metadata+0x94/0x220
> [   77.403539]  [<ffffffff812cd17b>] ? ext4_mark_iloc_dirty+0x43b/0x790
> [   77.403543]  [<ffffffff810e0709>] lock_acquire+0x119/0x220
> [   77.403547]  [<ffffffff81300972>] ? ext4_mb_initialize_context+0x142/0x180
> [   77.403552]  [<ffffffff81809359>] mutex_lock_nested+0x69/0x3d0
> [   77.403557]  [<ffffffff81300972>] ? ext4_mb_initialize_context+0x142/0x180
> [   77.403560]  [<ffffffff810dd24d>] ? mark_held_locks+0x6d/0x90
> [   77.403563]  [<ffffffff810db9c9>] ? __lock_is_held+0x49/0x70
> [   77.403568]  [<ffffffff81300972>] ext4_mb_initialize_context+0x142/0x180
> [   77.403572]  [<ffffffff81307b39>] ext4_mb_new_blocks+0x169/0x840
> [   77.403575]  [<ffffffff812f6657>] ? ext4_find_extent+0x1b7/0x320
> [   77.403578]  [<ffffffff810db9c9>] ? __lock_is_held+0x49/0x70
> [   77.403583]  [<ffffffff812fb005>] ext4_ext_map_blocks+0xab5/0x2100
> [   77.403589]  [<ffffffff812ca33c>] ext4_map_blocks+0x10c/0x510
> [   77.403593]  [<ffffffff812f59f4>] ? ext4_alloc_file_blocks.isra.35+0xe4/0x310
> [   77.403598]  [<ffffffff812f5a17>] ext4_alloc_file_blocks.isra.35+0x107/0x310
> [   77.403603]  [<ffffffff812fdd6d>] ext4_fallocate+0x45d/0xb40
> [   77.403608]  [<ffffffff810d97ee>] ? update_fast_ctr+0x1e/0x40
> [   77.403612]  [<ffffffff810d989c>] ? percpu_down_read+0x5c/0xa0
> [   77.403617]  [<ffffffff812310cd>] vfs_fallocate+0x13d/0x220
> [   77.403622]  [<ffffffff81231ea3>] SyS_fallocate+0x43/0x70
> [   77.403625]  [<ffffffff8180d900>] entry_SYSCALL_64_fastpath+0x23/0xc1
> [   77.403629] ---[ end trace b0a1385410b98c5a ]---
>
> $ egrep -i 'lockdep|ext4' /boot/config-4.6.0-rc1-1-iniza-small
> CONFIG_LOCKDEP_SUPPORT=y
> CONFIG_EXT4_FS=y
> CONFIG_EXT4_USE_FOR_EXT2=y
> CONFIG_EXT4_FS_POSIX_ACL=y
> CONFIG_EXT4_FS_SECURITY=y
> CONFIG_EXT4_ENCRYPTION=y
> CONFIG_EXT4_FS_ENCRYPTION=y
> # CONFIG_EXT4_DEBUG is not set
> CONFIG_LOCKDEP=y
> CONFIG_DEBUG_LOCKDEP=y
>
> Full dmesg-log and linux-config attached.
>
> Hope this helps.
>

I pulled ext4.git#dev on top of Linux v4.6-rc1...

Miklos Szeredi (4):
      fs: add file_dentry()
      nfs: use file_dentry()
      ext4: use dget_parent() in ext4_file_open()
      ext4: use file_dentry()

Theodore Ts'o (3):
      ext4: check if in-inode xattr is corrupted in ext4_expand_extra_isize_ea()
      ext4 crypto: don't let data integrity writebacks fail with ENOMEM
      ext4 crypto: use dget_parent() in ext4_d_revalidate()

... and did not see the call-trace.

- Sedat -

View attachment "dmesg_4.6.0-rc1-2-iniza-small.txt" of type "text/plain" (54763 bytes)

View attachment "4.6.0-rc1-2-iniza-small.patch" of type "text/x-patch" (19153 bytes)

Download attachment "config-4.6.0-rc1-2-iniza-small" of type "application/octet-stream" (134977 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ