lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <46E95011.7040309@bull.net>
Date:	Thu, 13 Sep 2007 16:58:25 +0200
From:	Valerie Clement <valerie.clement@...l.net>
To:	cmm@...ibm.com
Cc:	linux-ext4 <linux-ext4@...r.kernel.org>, tytso@....edu
Subject: Re: ext4 patch queue updated(2.6.23-rc5)

Mingming Cao wrote:
> Rebased the patches to 2.6.23-rc5,  I reordered the series file to move
> cleanups/fixes to the beginning of the series file. Added a patch to
> cleanup slab useage in jbd/jbd2, and fixed some checkpatch.pl warnings.
> Added large block patch and Jose's FLEX_BG patch.

With those new patches, I've got a segmentation fault when unmounting 
the ext4 filesystem:

------------[ cut here ]------------
kernel BUG at /home/src/linux-2.6.23-rc5/mm/slab.c:592!
invalid opcode: 0000 [1] SMP
CPU 3
Modules linked in: qla2xxx
Pid: 4163, comm: umount Not tainted 2.6.23-rc5 #1
RIP: 0010:[<ffffffff80276fe8>]  [<ffffffff80276fe8>] kfree+0x5f/0x1a0
RSP: 0018:ffff810022143d88  EFLAGS: 00010046
RAX: 0000000000000000 RBX: ffff81002889e154 RCX: 000000000000003f
RDX: ffff81007ec4f290 RSI: ffffffff80245947 RDI: 000000000002889e
RBP: ffff81002889e000 R08: 0000000000000001 R09: ffff81007c556400
R10: ffff810022143d48 R11: ffffffff802fd50d R12: ffff81007c556400
R13: ffff81002889e000 R14: 0000000000000286 R15: 0000000000513150
FS:  00002b2fc8bafe20(0000) GS:ffff81007e0b5d40(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: 00000000005b2b50 CR3: 000000007621e000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process umount (pid: 4163, threadinfo ffff810022142000, task 
ffff81007e0d8180)
Stack:  ffff81007c556400 ffff81002889e024 ffff81002889e154 ffff81002889e000
  ffff81007c556400 ffff81002889e024 00000000005130c0 ffffffff8031ac12
  0000000000656473 ffff81007e0d8180 ffffffff80245a06 ffff810022143de0
Call Trace:
  [<ffffffff8031ac12>] jbd2_journal_destroy+0x257/0x262
  [<ffffffff80245a06>] autoremove_wake_function+0x0/0x2e
  [<ffffffff802ac42c>] mb_cache_shrink+0x1e/0x95
  [<ffffffff802fda67>] ext4_put_super+0x39/0x1d8
  [<ffffffff8027cf07>] generic_shutdown_super+0x60/0xf1
  [<ffffffff8027cfa5>] kill_block_super+0xd/0x1e
  [<ffffffff8027d04d>] deactivate_super+0x47/0x5f
  [<ffffffff8028f37f>] sys_umount+0x1f7/0x22a
  [<ffffffff8027e3c9>] sys_newstat+0x19/0x31
  [<ffffffff8020b3ae>] system_call+0x7e/0x83

Code: 0f 0b eb fe 65 8b 04 25 24 00 00 00 83 3d c1 9e 55 00 00 4c
RIP  [<ffffffff80276fe8>] kfree+0x5f/0x1a0
  RSP <ffff810022143d88>
WARNING: at /home/src/linux-2.6.23-rc5/kernel/exit.c:901 do_exit()

Call Trace:
  [<ffffffff80236ff3>] do_exit+0x4f/0x7ac
  [<ffffffff8020cb6d>] kernel_math_error+0x0/0x71
  [<ffffffff8020cf94>] do_invalid_op+0x85/0x8f
  [<ffffffff80276fe8>] kfree+0x5f/0x1a0
  [<ffffffff80245947>] bit_waitqueue+0x1c/0x8c
  [<ffffffff802459f5>] wake_up_bit+0x11/0x22
  [<ffffffff80295178>] __writeback_single_inode+0x395/0x3a7
  [<ffffffff805daa5d>] error_exit+0x0/0x84
  [<ffffffff802fd50d>] ext4_destroy_inode+0x0/0x77
  [<ffffffff80245947>] bit_waitqueue+0x1c/0x8c
  [<ffffffff80276fe8>] kfree+0x5f/0x1a0
  [<ffffffff80276fb7>] kfree+0x2e/0x1a0
  [<ffffffff8031ac12>] jbd2_journal_destroy+0x257/0x262
  [<ffffffff80245a06>] autoremove_wake_function+0x0/0x2e
  [<ffffffff802ac42c>] mb_cache_shrink+0x1e/0x95
  [<ffffffff802fda67>] ext4_put_super+0x39/0x1d8
  [<ffffffff8027cf07>] generic_shutdown_super+0x60/0xf1
  [<ffffffff8027cfa5>] kill_block_super+0xd/0x1e
  [<ffffffff8027d04d>] deactivate_super+0x47/0x5f
  [<ffffffff8028f37f>] sys_umount+0x1f7/0x22a
  [<ffffffff8027e3c9>] sys_newstat+0x19/0x31
  [<ffffffff8020b3ae>] system_call+0x7e/0x83


Replacing  kfree(journal)  by jbd2_free(journal, sizeof(*journal)) in 
fs/jbd2/journal.c fixes the problem.

Who could check this?


Another thing: JBD-blocks-reservation-fix-for-large-blk.patch is in the 
series file but not present in the ext4 patch queue.

   Valérie
-
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ