lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <bug-42052-13602@https.bugzilla.kernel.org/>
Date:	Tue, 30 Aug 2011 15:02:33 GMT
From:	bugzilla-daemon@...zilla.kernel.org
To:	linux-ext4@...r.kernel.org
Subject: [Bug 42052] New: kernel BUG at
 build/buildd/linux-2.6.38/kernel/timer.c:668

https://bugzilla.kernel.org/show_bug.cgi?id=42052

           Summary: kernel BUG at
                    build/buildd/linux-2.6.38/kernel/timer.c:668
           Product: File System
           Version: 2.5
    Kernel Version: 2.6.38.8
          Platform: All
        OS/Version: Linux
              Tree: Mainline
            Status: NEW
          Severity: normal
          Priority: P1
         Component: ext4
        AssignedTo: fs_ext4@...nel-bugs.osdl.org
        ReportedBy: sanjeevmk4890@...il.com
        Regression: No


+++ This bug was initially created as a clone of Bug #12370 +++

Latest working kernel version: none
Earliest failing kernel version: 2.6.28
Distribution: mint

Hardware Environment: 
   Processor - 6x AMD Phenom II X6 1055T
   RAM - 1GB

Software Environment:
   Linux Mint 11 (Katya)
   Kernel - 2.6.38-8-generic(i686)

Problem Description:
On mounting the attached ext4 image the kernel prints a backtrace. The
backtrace ends with: *ERROR* invalid framebuffer id. The backtrace pasted here:

[  447.967920] ------------[ cut here ]------------
[  447.971889] kernel BUG at /build/buildd/linux-2.6.38/kernel/timer.c:668!
[  447.971889] invalid opcode: 0000 [#3] SMP
[  447.971889] last sysfs file: /sys/devices/virtual/block/loop2/removable
[  447.971889] Modules linked in: binfmt_misc pci_stub vboxpci vboxnetadp
vboxnetflt vboxdrv dm_crypt sp5100_tco i2c_piix4 snd_hda_codec_hdmi
asus_atk0110 snd_hda_codec_via snd_hda_intel k10temp snd_hda_codec ppdev
snd_hwdep snd_pcm snd_seq_midi snd_rawmidi snd_seq_midi_event shpchp snd_seq
snd_timer snd_seq_device snd soundcore snd_page_alloc parport_pc lp parport
dm_raid45 xor btrfs zlib_deflate libcrc32c radeon ttm drm_kms_helper
firewire_ohci drm firewire_core usbhid ahci hid libahci crc_itu_t r8169
i2c_algo_bit pata_atiixp
[  447.971889]
[  447.971889] Pid: 2414, comm: mount Tainted: G      D     2.6.38-8-generic
#42-Ubuntu System manufacturer System Product Name/M4A785TD-V EVO
[  447.971889] EIP: 0060:[<c105e392>] EFLAGS: 00010246 CPU: 4
[  447.971889] EIP is at mod_timer+0x232/0x250
[  447.971889] EAX: 00000000 EBX: 014a277f ECX: 00000000 EDX: 014a277f
[  447.971889] ESI: ef5cae20 EDI: 000001ac EBP: ee91dc80 ESP: ee91dc64
[  447.971889]  DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068
[  448.072035] Process mount (pid: 2414, ti=ee91c000 task=ee92a5e0
task.ti=ee91c000)
[  448.072035] Stack:
[  448.072035]  ee91dc74 c10b6882 014a277f 00000000 f45b1400 ef656b7c 000001ac
ee91dc98
[  448.072035]  c11c144a c152dda2 ef656a00 00000000 00000000 ee91dca4 c11c5aa6
ef2d5f68
[  448.072035]  ee91dcd8 c11c7816 c15082d1 00000002 f6038310 f45b1400 00000000
ee92a5e0
[  448.072035] Call Trace:
[  448.072035]  [<c10b6882>] ? __delayacct_blkio_end+0x32/0x60
[  448.072035]  [<c11c144a>] __save_error_info.clone.59+0x7a/0xf0
[  448.072035]  [<c11c5aa6>] save_error_info+0x16/0x30
[  448.072035]  [<c11c7816>] ext4_error_inode+0x46/0xe0
[  448.072035]  [<c15082d1>] ? out_of_line_wait_on_bit+0x61/0x70
[  448.072035]  [<c106d3c0>] ? wake_bit_function+0x0/0x60
[  448.072035]  [<c11ce0a5>] __ext4_ext_check+0x1b5/0x210
[  448.072035]  [<c11cfdb0>] ext4_ext_check_inode+0x30/0x40
[  448.072035]  [<c11af86f>] ext4_iget+0x60f/0x730
[  448.072035]  [<c10fae58>] ? pcpu_next_pop+0x38/0x50
[  448.072035]  [<c10fba32>] ? pcpu_populate_chunk+0x92/0x360
[  448.072035]  [<c10fb399>] ? pcpu_alloc_area+0x109/0x250
[  448.072035]  [<c11c6c20>] ext4_get_journal+0x30/0x130
[  448.072035]  [<c10fc1ac>] ? pcpu_alloc+0x26c/0x360
[  448.072035]  [<c11c8292>] ext4_load_journal+0xa2/0x4c0
[  448.072035]  [<c11ca967>] ext4_fill_super+0x1347/0x1a70
[  448.072035]  [<c10fc1ac>] ? pcpu_alloc+0x26c/0x360
[  448.072035]  [<c1129a21>] mount_bdev+0x191/0x1d0
[  448.072035]  [<c11c9620>] ? ext4_fill_super+0x0/0x1a70
[  448.072035]  [<c11bfd0f>] ext4_mount+0x1f/0x30
[  448.072035]  [<c11c9620>] ? ext4_fill_super+0x0/0x1a70
[  448.072035]  [<c1129315>] vfs_kern_mount+0x75/0x250
[  448.072035]  [<c113fa63>] ? get_fs_type+0x33/0xb0
[  448.072035]  [<c11bfcf0>] ? ext4_mount+0x0/0x30
[  448.072035]  [<c112954e>] do_kern_mount+0x3e/0xe0
[  448.072035]  [<c1142993>] do_mount+0x1b3/0x1e0
[  448.072035]  [<c1142d2b>] sys_mount+0x6b/0xa0
[  448.072035]  [<c1509bf4>] syscall_call+0x7/0xb
[  448.072035] Code: ff 8b 5d ec 29 c3 c1 eb 08 e9 18 fe ff ff 8d 76 00 c7 45
e4 01 00 00 00 8b 45 e4 83 c4 10 5b 5e 5f 5d c3 8b 5d e8 e9 c3 fe ff ff <0f> 0b
8b 55 04 89 f0 e8 02 f9 ff ff e9 0a fe ff ff 8d b6 00 00
[  448.072035] EIP: [<c105e392>] mod_timer+0x232/0x250 SS:ESP 0068:ee91dc64
[  448.140440] ---[ end trace b3d414c7835387c1 ]---
[  460.292249] [drm:drm_mode_getfb] *ERROR* invalid framebuffer id


Was working on bug #12370. Followed the steps to reproduce the bug (given in
#12370) on 2.6.38 (what i'm using) and the backtrace was printed, mount failed. 

Steps to reproduce:
Mount the image provided with the following command:
mount -t ext4  -o loop ext4.212.img /media/tmp

-- 
Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching the assignee of the bug.
--
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ