lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <bug-203317-13602@https.bugzilla.kernel.org/>
Date:   Mon, 15 Apr 2019 07:58:49 +0000
From:   bugzilla-daemon@...zilla.kernel.org
To:     linux-ext4@...r.kernel.org
Subject: [Bug 203317] New: WARNING: CPU: 2 PID: 925 at fs/ext4/inode.c:3897
 ext4_set_page_dirty+0x39/0x50

https://bugzilla.kernel.org/show_bug.cgi?id=203317

            Bug ID: 203317
           Summary: WARNING: CPU: 2 PID: 925 at fs/ext4/inode.c:3897
                    ext4_set_page_dirty+0x39/0x50
           Product: File System
           Version: 2.5
    Kernel Version: 4.19.23
          Hardware: x86-64
                OS: Linux
              Tree: Mainline
            Status: NEW
          Severity: normal
          Priority: P1
         Component: ext4
          Assignee: fs_ext4@...nel-bugs.osdl.org
          Reporter: upfefferlein@...il.com
        Regression: No

Created attachment 282335
  --> https://bugzilla.kernel.org/attachment.cgi?id=282335&action=edit
kernel config

I found #201631, but i am not on ppc-64 so creating a new ticket.

Apr 12 17:00:37 localhost kernel: [28248.756299] WARNING: CPU: 2 PID: 925 at
fs/ext4/inode.c:3897 ext4_set_page_dirty+0x39/0x50
Apr 12 17:00:37 localhost kernel: [28248.756300] Modules linked in: vboxpci(O)
vboxnetadp(O) vboxnetflt(O) vboxdrv(O) iwlmvm x86_pkg_temp_thermal iwlwifi
Apr 12 17:00:37 localhost kernel: [28248.756309] CPU: 2 PID: 925 Comm: kswapd0
Tainted: G           O      4.19.23-gentoo #1
Apr 12 17:00:37 localhost kernel: [28248.756309] Hardware name: LENOVO
20FB006BGE/20FB006BGE, BIOS N1FET44W (1.18 ) 09/01/2016
Apr 12 17:00:37 localhost kernel: [28248.756312] RIP:
0010:ext4_set_page_dirty+0x39/0x50
Apr 12 17:00:37 localhost kernel: [28248.756313] Code: 48 8b 00 a8 01 75 16 48
8b 57 08 48 8d 42 ff 83 e2 01 48 0f 44 c7 48 8b 00 a8 10 74 0d 48 8b 07 f6 c4
10 74 0f e9 f7 8e f9 ff <0f> 0b 48 8b 07 f6 c4 10 75 f1 0f 0b e9 e6 8e f9 ff 66
0f 1f 44 00
Apr 12 17:00:37 localhost kernel: [28248.756314] RSP: 0018:ffffc9000331bb68
EFLAGS: 00010246
Apr 12 17:00:37 localhost kernel: [28248.756316] RAX: 020000000001006c RBX:
00000000003b964e RCX: 0000000000000000
Apr 12 17:00:37 localhost kernel: [28248.756317] RDX: 0000000000000000 RSI:
00000002ae380000 RDI: ffffea000ee59380
Apr 12 17:00:37 localhost kernel: [28248.756318] RBP: ffff8883ff6f1800 R08:
0000000000000000 R09: 0000000000000000
Apr 12 17:00:37 localhost kernel: [28248.756319] R10: 0000000000000000 R11:
ffff888403f9c000 R12: ffffea000ee59380
Apr 12 17:00:37 localhost kernel: [28248.756320] R13: ffff888073eed000 R14:
ffff888074529a80 R15: 0000000000000000
Apr 12 17:00:37 localhost kernel: [28248.756321] FS:  0000000000000000(0000)
GS:ffff888411300000(0000) knlGS:0000000000000000
Apr 12 17:00:37 localhost kernel: [28248.756322] CS:  0010 DS: 0000 ES: 0000
CR0: 0000000080050033
Apr 12 17:00:37 localhost kernel: [28248.756323] CR2: 00007f4f5ecb21f8 CR3:
0000000003a0a006 CR4: 00000000003626e0
Apr 12 17:00:37 localhost kernel: [28248.756324] DR0: 0000000000000000 DR1:
0000000000000000 DR2: 0000000000000000
Apr 12 17:00:37 localhost kernel: [28248.756325] DR3: 0000000000000000 DR6:
00000000fffe0ff0 DR7: 0000000000000400
Apr 12 17:00:37 localhost kernel: [28248.756325] Call Trace:
Apr 12 17:00:37 localhost kernel: [28248.756330] 
i915_gem_userptr_put_pages+0x144/0x180
Apr 12 17:00:37 localhost kernel: [28248.756334] 
__i915_gem_object_put_pages+0x61/0x70
Apr 12 17:00:37 localhost kernel: [28248.756336]  i915_gem_shrink+0x2ab/0x4b0

-- 
You are receiving this mail because:
You are watching the assignee of the bug.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ