lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <bug-60788-13602@https.bugzilla.kernel.org/>
Date:	Sat, 24 Aug 2013 19:02:59 +0000
From:	bugzilla-daemon@...zilla.kernel.org
To:	linux-ext4@...r.kernel.org
Subject: [Bug 60788] New: xfstest generic/068 failure - kernel BUG at
 fs/buffer.c:3005!

https://bugzilla.kernel.org/show_bug.cgi?id=60788

            Bug ID: 60788
           Summary: xfstest generic/068 failure - kernel BUG at
                    fs/buffer.c:3005!
           Product: File System
           Version: 2.5
    Kernel Version: 3.11-rc6
          Hardware: x86-64
                OS: Linux
              Tree: Mainline
            Status: NEW
          Severity: normal
          Priority: P1
         Component: ext4
          Assignee: fs_ext4@...nel-bugs.osdl.org
          Reporter: enwlinux@...il.com
        Regression: No

Created attachment 107298
  --> https://bugzilla.kernel.org/attachment.cgi?id=107298&action=edit
kernel trace with timestamps and system name trimmed

Xfstest generic/068 fails roughly 5% of the time when run on a 3.11-rc6 x86-64
KVM guest against a test filesystem mounted with the data=journal option.  The
failure is actually a test hang rather than an error exit.  When the hang
occurs, a kernel failure in reported in the log: "kernel BUG at
fs/buffer.c:3005!" (full trace attached).  Recovering from the bug requires
rebooting and restarting the guest.  It also occurs on a Pandaboard ES running
3.11-rc6 at about the same frequency of occurrence.

Some evidence suggests that running additional tests prior to generic/068
increases the occurrence rate.  Running generic/062 prior to 068 increased the
failure rate to 15% in set of 20 tests on the same KVM guest, for example. 
Also, my sense is that 068 fails more frequently than 15% of the time when
running the entire xfstests-bld data_journal test series from the top in normal
regression, but I've not yet tried to quantify this.

The same bug has been seen on both x86_64 and ARM in previous releases and
release candidates at least as far back as 3.8.  Jan Kara may have made the
most recent comments related to this and another similar bug:
http://www.spinics.net/lists/linux-ext4/msg36858.html (also, see bug id 60786).


Test system hardware configuration:
KVM x86_64 virtual machine (2 cores, 1 GB memory) on physical four core x86_64
Virtual system and test disk raw images located on two physical 147 GB SAS
disks
Test file systems located in three 5.66 GB virtual disks


Test system software configuration:

Mainline kernel 3.11-rc6 on Ubuntu 12.10 x86-64 base
e2fsprogs, master branch 93061ea0f4d9f94579d09480f17dd47169c82081
xfsprogs, master branch 1a78b0840afcfbe01c12e6af04659388d62efeea
xfstests, master branch 6fe0ad6fafd76ef3d5b01639f22b747f4a317b63
xfstests-bld, master branch 723c23e1b2756b911dbb50bbd08c0afa5b836e3b

-- 
You are receiving this mail because:
You are watching the assignee of the bug.
--
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ