lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Mon, 10 Nov 2008 09:09:22 +0800
From:	Li Zefan <lizf@...fujitsu.com>
To:	linux-ext4@...r.kernel.org
Subject: kernel BUG at fs/ext4/mballoc.c:1240!

I used soft raid on IA64 and got the following oops.

# fdisk -l

Disk /dev/sdc: 881.0 GB, 881005166592 bytes
255 heads, 63 sectors/track, 107109 cylinders
Units = cylinders of 16065 * 512 = 8225280 bytes
Disk identifier: 0x0000544c

   Device Boot      Start         End      Blocks   Id  System
/dev/sdc1               1      107109   860353011   fd  Linux raid autodetect
...
   Device Boot      Start         End      Blocks   Id  System
/dev/sdd1               1      107109   860353011   fd  Linux raid autodetect
...
   Device Boot      Start         End      Blocks   Id  System
/dev/sde1               1      107109   860353011   fd  Linux raid autodetect
...
   Device Boot      Start         End      Blocks   Id  System
/dev/sdf1               1      107109   860353011   fd  Linux raid autodetect

# mdadm --create /dev/md0 --level=0 --raid-devices=4 /dev/sdc1 /dev/sdd1 /dev/sde1 /dev/sdf1
# mkfs.ext4 -b 65536 /dev/md0
# mount -t ext4 /dev/md0 /mnt
# cd /mnt
# dd if=/dev/zero of=tmp_file bs=1M count=700
(stuck)

(another console)
EXT4-fs: barriers enabled
kjournald2 starting.  Commit interval 5 seconds
EXT4 FS on md0, internal journal on md0:8
EXT4-fs: delayed allocation enabled
EXT4-fs: file extents enabled
EXT4-fs: mballoc enabled
EXT4-fs: mounted filesystem with ordered data mode.
JBD: barrier-based sync failed on md0:8 - disabling barriers
kernel BUG at fs/ext4/mballoc.c:1240!
pdflush[12068]: bugcheck! 0 [1]
Modules linked in: ext4 jbd2 crc16 raid0 nfsd lockd nfs_acl auth_rpcgss exportfs autofs4 sunrpc ipmi_watchdog mptctl ipmi_devintf ipmi_si ipmi_msghandler vfat fat dm_mirror dm_region_hash dm_log dm_multipath dm_mod e100 mii rng_core iTCO_wdt iTCO_vendor_support lpfc tg3 scsi_transport_fc libphy button sg usb_storage shpchp mptspi mptscsih mptbase scsi_transport_spi sd_mod scsi_mod ext3 jbd mbcache uhci_hcd ohci_hcd ehci_hcd [last unloaded: ipmi_watchdog]

Pid: 12068, CPU 0, comm:              pdflush
psr : 0000101008526030 ifs : 8000000000000814 ip  : [<a000000207dde590>]    Not tainted (2.6.28-rc3-git4)
ip is at ext4_mb_use_best_found+0xd0/0xb00 [ext4]
unat: 0000000000000000 pfs : 0000000000000814 rsc : 0000000000000003
rnat: 0000000000000000 bsps: 0000000000000000 pr  : 0000000000001941
ldrs: 0000000000000000 ccv : 0000000000000000 fpsr: 0009804c8a70433f
csd : 0000000000000000 ssd : 0000000000000000
b0  : a000000207dde590 b6  : a000000100039260 b7  : a00000010000bb00
f6  : 000000000000000000000 f7  : 1003e0000000000000020
f8  : 1003ee0000040878b0000 f9  : 1003e0000000000000000
f10 : 1003ee0000040a19c0000 f11 : 1003e0000000000000000
r1  : a000000100e24b80 r2  : a000000100bc5210 r3  : 0000000000004000
r8  : 0000000000000029 r9  : 0000000000000001 r10 : a000000100a50000
r11 : ffffffffffff0420 r12 : e00000005bfbfa40 r13 : e00000005bfb0000
r14 : a000000100bc5218 r15 : e00001200ac5fe18 r16 : ffffffffffff6fd0
r17 : a000000100c3f7c8 r18 : 000000000000000a r19 : 0000000000000026
r20 : 0000000000020000 r21 : a000000100c3cb78 r22 : a000000100c3cb74
r23 : a000000100c3cb88 r24 : a000000100c3f7a0 r25 : a000000100c2dba0
r26 : a000000100c3cb74 r27 : 0000001008522030 r28 : 0000000000000034
r29 : a0000001012ce0e3 r30 : 0000000000000000 r31 : a000000100bef7d8

Call Trace:
 [<a000000100015ca0>] show_stack+0x40/0xa0
                                sp=e00000005bfbf610 bsp=e00000005bfb1618
 [<a0000001000165b0>] show_regs+0x850/0x8a0
                                sp=e00000005bfbf7e0 bsp=e00000005bfb15b8
 [<a000000100039970>] die+0x1b0/0x2c0
                                sp=e00000005bfbf7e0 bsp=e00000005bfb1570
 [<a000000100039ad0>] die_if_kernel+0x50/0x80
                                sp=e00000005bfbf7e0 bsp=e00000005bfb1540
 [<a00000010066a010>] ia64_bad_break+0x230/0x460
                                sp=e00000005bfbf7e0 bsp=e00000005bfb1518
 [<a00000010000c300>] ia64_native_leave_kernel+0x0/0x270
                                sp=e00000005bfbf870 bsp=e00000005bfb1518
 [<a000000207dde590>] ext4_mb_use_best_found+0xd0/0xb00 [ext4]
                                sp=e00000005bfbfa40 bsp=e00000005bfb1478
 [<a000000207ddf130>] ext4_mb_check_limits+0x170/0x1a0 [ext4]
                                sp=e00000005bfbfa50 bsp=e00000005bfb1440
 [<a000000207de8e90>] ext4_mb_regular_allocator+0x1910/0x1f20 [ext4]
                                sp=e00000005bfbfa70 bsp=e00000005bfb13a8
 [<a000000207dec6d0>] ext4_mb_new_blocks+0x3b0/0x1400 [ext4]
                                sp=e00000005bfbfad0 bsp=e00000005bfb1328
 [<a000000207dda050>] ext4_ext_get_blocks+0x16d0/0x1b40 [ext4]
                                sp=e00000005bfbfae0 bsp=e00000005bfb1248
 [<a000000207dae570>] ext4_get_blocks_wrap+0x1d0/0x4c0 [ext4]
                                sp=e00000005bfbfb50 bsp=e00000005bfb11d0
 [<a000000207db6c70>] ext4_da_get_block_write+0xd0/0x300 [ext4]
                                sp=e00000005bfbfb50 bsp=e00000005bfb1180
 [<a000000207dabc10>] mpage_da_map_blocks+0xf0/0xce0 [ext4]
                                sp=e00000005bfbfb50 bsp=e00000005bfb1118
 [<a000000207db4240>] ext4_da_writepages+0x4a0/0x780 [ext4]
                                sp=e00000005bfbfc40 bsp=e00000005bfb1088
 [<a000000100126c90>] do_writepages+0xb0/0x120
                                sp=e00000005bfbfcf0 bsp=e00000005bfb1060
 [<a0000001001d1070>] __writeback_single_inode+0x370/0x6e0
                                sp=e00000005bfbfcf0 bsp=e00000005bfb1018
 [<a0000001001d1cb0>] generic_sync_sb_inodes+0x4b0/0x7a0
                                sp=e00000005bfbfd30 bsp=e00000005bfb0fc8
 [<a0000001001d1fd0>] sync_sb_inodes+0x30/0x60
                                sp=e00000005bfbfd30 bsp=e00000005bfb0fa0
 [<a0000001001d28f0>] writeback_inodes+0x130/0x260
                                sp=e00000005bfbfd30 bsp=e00000005bfb0f70
 [<a0000001001283a0>] background_writeout+0x140/0x1e0
                                sp=e00000005bfbfd30 bsp=e00000005bfb0f38
 [<a000000100129460>] pdflush+0x2e0/0x4e0
                                sp=e00000005bfbfd80 bsp=e00000005bfb0f18
 [<a0000001000b8ba0>] kthread+0xa0/0x120
                                sp=e00000005bfbfe30 bsp=e00000005bfb0ee8
 [<a000000100014430>] kernel_thread_helper+0x30/0x60
                                sp=e00000005bfbfe30 bsp=e00000005bfb0ec0
 [<a00000010000a0c0>] start_kernel_thread+0x20/0x40
                                sp=e00000005bfbfe30 bsp=e00000005bfb0ec0
--
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists