lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <alpine.SOC.1.00.1405252240110.16480@math.ut.ee>
Date:	Sun, 25 May 2014 22:50:53 +0300 (EEST)
From:	Meelis Roos <mroos@...ux.ee>
To:	Linux Kernel list <linux-kernel@...r.kernel.org>,
	linux-ext4@...r.kernel.org, sparclinux@...r.kernel.org
Subject: kernel BUG at fs/jbd2/journal.c:1951!

Tried yesterdays git v3.15-rc6-190-g1ee1cea on Sun Fire T2000 (32-thread 
sparc64) and got reproducibly stuck on boot with ext journal replay like 
below. Booting Debian 3.14.2-1 replayed the log and mounted FS fine. 
After that, my test kernel works fine too. SO I can not reproduce it any 
more but it seems like I hit a bug.

[   62.064329] EXT4-fs (sda1): INFO: recovery required on readonly filesystem
[   62.064395] EXT4-fs (sda1): write access will be enabled during recovery
[   62.077043] EXT4-fs (sda1): orphan cleanup on readonly fs
[   62.156585] EXT4-fs (sda1): 14 orphan inodes deleted
[   62.156645] EXT4-fs (sda1): recovery complete
[   62.156702] kernel BUG at fs/jbd2/journal.c:1951!
[   62.156752]               \|/ ____ \|/
[   62.156752]               "@'/ .. \`@"
[   62.156752]               /_| \__/ |_\
[   62.156752]                  \__U_/
[   62.156893] swapper/0(1): Kernel bad sw trap 5 [#1]
[   62.156943] CPU: 8 PID: 1 Comm: swapper/0 Not tainted 3.15.0-rc6+ #6
[   62.157004] task: ffffff8008677640 ti: ffffff800870c000 task.ti: ffffff800870c000
[   62.157079] TSTATE: 0000004480001605 TPC: 00000000005f3c00 TNPC: 00000000005f3c04 Y: 00000000    Not tainted
[   62.157180] TPC: <jbd2_journal_flush+0x11c/0x190>
[   62.157225] g0: 00000000009528c8 g1: 0000000000000000 g2: 0000000000a17f88 g3: 0000000000a17f80
[   62.157301] g4: ffffff8008677640 g5: ffffff83f6a4a000 g6: ffffff800870c000 g7: ffffff8008633fa0
[   62.157375] o0: 0000000000000025 o1: 0000000000961ed8 o2: 000000000000079f o3: ffffff83f3aab888
[   62.157451] o4: ffffff83ffb72000 o5: 0000000000961ed8 sp: ffffff800870ed11 ret_pc: 00000000005f3bf8
[   62.157530] RPC: <jbd2_journal_flush+0x114/0x190>
[   62.157575] l0: 0000000000000000 l1: 000000000000000e l2: 0000000010018001 l3: 000000000088e438
[   62.157650] l4: 00000000009528c8 l5: 000000000000ff00 l6: 0000000000ff0000 l7: 000000000095ee30
[   62.157726] i0: ffffff83f3aab800 i1: ffffff83f3aab824 i2: ffffff83f3aabb98 i3: ffffff83f3aab8e8
[   62.157801] i4: ffffff83f3aab824 i5: ffffff83f3aab8e8 i6: ffffff800870edc1 i7: 00000000005bd640
[   62.157887] I7: <ext4_mark_recovery_complete.isra.232+0x4c/0xb0>
[   62.157942] Call Trace:
[   62.157990]  [00000000005bd640] ext4_mark_recovery_complete.isra.232+0x4c/0xb0
[   62.158068]  [00000000005c3860] ext4_fill_super+0x303c/0x33e8
[   62.158132]  [0000000000538fc4] mount_bdev+0x124/0x18c
[   62.158192]  [0000000000539a4c] mount_fs+0x60/0x17c
[   62.158246]  [000000000055087c] vfs_kern_mount+0x48/0xe4
[   62.158309]  [0000000000552e24] do_mount+0x808/0x974
[   62.158370]  [00000000005531b0] SyS_mount+0x6c/0xa4
[   62.158427]  [0000000000a74cb8] mount_block_root+0x108/0x2ac
[   62.158490]  [0000000000a75180] prepare_namespace+0x180/0x1bc
[   62.158552]  [0000000000a74a80] kernel_init_freeable+0x208/0x218
[   62.158619]  [0000000000864724] kernel_init+0x4/0xf4
[   62.158684]  [0000000000406084] ret_from_fork+0x1c/0x2c
[   62.158738]  [0000000000000000]           (null)
[   62.158780] Disabling lock debugging due to kernel taint
[   62.158847] Caller[00000000005bd640]: ext4_mark_recovery_complete.isra.232+0x4c/0xb0
[   62.158926] Caller[00000000005c3860]: ext4_fill_super+0x303c/0x33e8
[   62.158990] Caller[0000000000538fc4]: mount_bdev+0x124/0x18c
[   62.159051] Caller[0000000000539a4c]: mount_fs+0x60/0x17c
[   62.159143] Caller[000000000055087c]: vfs_kern_mount+0x48/0xe4
[   62.159215] Caller[0000000000552e24]: do_mount+0x808/0x974
[   62.159279] Caller[00000000005531b0]: SyS_mount+0x6c/0xa4
[   62.159345] Caller[0000000000a74cb8]: mount_block_root+0x108/0x2ac
[   62.159411] Caller[0000000000a75180]: prepare_namespace+0x180/0x1bc
[   62.159475] Caller[0000000000a74a80]: kernel_init_freeable+0x208/0x218
[   62.159540] Caller[0000000000864724]: kernel_init+0x4/0xf4
[   62.159604] Caller[0000000000406084]: ret_from_fork+0x1c/0x2c
[   62.159660] Caller[0000000000000000]:           (null)
[   62.166652] Instruction DUMP: 901222d8  7ff8d20a  01000000 <91d02005> 11002587  921027a1  0af07ffb  901222d8  c45e2310
[   62.207443] Kernel panic - not syncing: Attempted to kill init! exitcode=0x00000009


-- 
Meelis Roos (mroos@...ux.ee)
--
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists