lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <46D3A390.5000202@redhat.com>
Date:	Mon, 27 Aug 2007 23:24:48 -0500
From:	Eric Sandeen <sandeen@...hat.com>
To:	ext4 development <linux-ext4@...r.kernel.org>
Subject: Re: [PATCH] fix mballoc oopses on mkdir

Ugh, scratch that, taking out some other debugging printk's I had and I
see the oops again... guess I'll have to look more closely. :)

EXT4-fs: file extents enabled
EXT4-fs: mballoc enabled
EXT4-fs: mballoc: 0 blocks 0 reqs (0 success)
EXT4-fs: mballoc: 0 extents scanned, 0 goal hits, 0 2^N hits, 0 breaks,
0 lost
EXT4-fs: mballoc: 0 generated and it took 0
EXT4-fs: mballoc: 0 preallocated, 0 discarded
EXT4-fs: file extents enabled
EXT4-fs: mballoc enabled
------------[ cut here ]------------
kernel BUG at /src/ext4.git/fs/ext4/mballoc.c:3413!
invalid opcode: 0000 [#1]
SMP
Modules linked in: ext4dev jbd2 autofs4 hidp rfcomm l2cap bluetooth
sunrpc ipv6 cpufreq_ondemand video output sbs button dock battery ac
parport_pc lp parport sg ata_generic cfi_cmdset_0002 cfi_util mtdpart
jedec_probe cfi_probe gen_probe ck804xrom i2c_nforce2 i2c_core k8temp
pata_amd mtdcore tg3 chipreg map_funcs hwmon serio_raw rtc_cmos
dm_snapshot dm_zero dm_mirror dm_mod qla2xxx scsi_transport_fc sata_nv
libata mptspi mptscsih mptbase scsi_transport_spi sd_mod scsi_mod ext3
jbd mbcache
CPU:    0
EIP:    0060:[<f91acb3f>]    Not tainted VLI
EFLAGS: 00010287   (2.6.23-rc1 #1)
EIP is at ext4_mb_new_group_pa+0x39/0x1ed [ext4dev]
eax: 00004000   ebx: f5b13d30   ecx: 00000005   edx: f7ea8bd0
esi: f583f4d8   edi: f5b13d30   ebp: f5b13d00   esp: f5b13ce8
ds: 007b   es: 007b   fs: 00d8  gs: 0033  ss: 0068
Process lt-fsstress (pid: 3254, ti=f5b13000 task=f5ae8000 task.ti=f5b13000)
Stack: f5fa14f0 f5b13cf4 f5fa14f0 f5b13d30 f583f4d8 f5b13df4 f5b13d08
f91acf68
       f5b13da8 f91af0fc f5ae8624 f5ae8000 00000001 f5b13d34 f5b13e3c
f5a80000
       f5fa14f0 00000001 f583f4d8 f5fa14f0 00000000 00000c00 00000008
00000001
Call Trace:
 [<c040608e>] show_trace_log_lvl+0x1a/0x2f
 [<c040613e>] show_stack_log_lvl+0x9b/0xa3
 [<c04062fe>] show_registers+0x1b8/0x289
 [<c04064eb>] die+0x11c/0x24f
 [<c06011f8>] do_trap+0x8a/0xa3
 [<c04068dd>] do_invalid_op+0x88/0x92
 [<c0600fc2>] error_code+0x72/0x78
 [<f91acf68>] ext4_mb_new_preallocation+0xe/0x17 [ext4dev]
 [<f91af0fc>] ext4_mb_new_blocks+0x145/0x241 [ext4dev]
 [<f91a7e2c>] ext4_ext_get_blocks+0x424/0x5bc [ext4dev]
 [<f91995b1>] ext4_getblk+0xb5/0x2ae [ext4dev]
 [<f919a647>] ext4_bread+0x1a/0x83 [ext4dev]
 [<f919ea7b>] ext4_mkdir+0x138/0x296 [ext4dev]
 [<c0487051>] vfs_mkdir+0xc6/0x12f
 [<c0489584>] sys_mkdirat+0x86/0xb9
 [<c04895d7>] sys_mkdir+0x20/0x22
 [<c040501a>] syscall_call+0x7/0xb
 =======================
Code: 89 45 e8 8b 47 34 39 47 14 72 04 0f 0b eb fe 80 7f 56 02 74 04 0f
0b eb fe 8b 07 0f b7 40 72 25 00 f0 00 00 3d 00 80 00 00 74 04 <0f> 0b
eb fe a1 b8 ff 1b f9 85 c0 75 04 0f 0b eb fe ba 50 00 00
EIP: [<f91acb3f>] ext4_mb_new_group_pa+0x39/0x1ed [ext4dev] SS:ESP
0068:f5b13ce8
-
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ