lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Mon, 15 Jun 2020 00:10:53 +0000
From:   bugzilla-daemon@...zilla.kernel.org
To:     linux-ext4@...r.kernel.org
Subject: [Bug 208173] New: BUG: using smp_processor_id() in preemptible,
 caller is ext4_mb_new_blocks

https://bugzilla.kernel.org/show_bug.cgi?id=208173

            Bug ID: 208173
           Summary: BUG: using smp_processor_id() in preemptible, caller
                    is ext4_mb_new_blocks
           Product: File System
           Version: 2.5
    Kernel Version: 5.8.0-rc1
          Hardware: x86-64
                OS: Linux
              Tree: Mainline
            Status: NEW
          Severity: normal
          Priority: P1
         Component: ext4
          Assignee: fs_ext4@...nel-bugs.osdl.org
          Reporter: tseewald@...il.com
        Regression: No

Created attachment 289655
  --> https://bugzilla.kernel.org/attachment.cgi?id=289655&action=edit
dmesg

Immediately after booting 5.8.0-rc1 and logging in, dmesg is filled with BUG
backtraces like:

[   10.823091] BUG: using smp_processor_id() in preemptible [00000000] code:
auditd/788
[   10.823095] caller is ext4_mb_new_blocks+0x285/0xd50
[   10.823096] CPU: 2 PID: 788 Comm: auditd Not tainted 5.8.0-rc1 #15
[   10.823097] Hardware name: To Be Filled By O.E.M. To Be Filled By O.E.M./Z77
Extreme4, BIOS P2.90 07/11/2013
[   10.823097] Call Trace:
[   10.823104]  dump_stack+0x57/0x70
[   10.823107]  check_preemption_disabled+0xab/0xc0
[   10.823109]  ext4_mb_new_blocks+0x285/0xd50
[   10.823112]  ? __kmalloc+0x1ac/0x280
[   10.823114]  ? ext4_find_extent+0x2a1/0x370
[   10.823116]  ? ext4_find_extent+0x163/0x370
[   10.823118]  ? release_pages+0x3b1/0x470
[   10.823120]  ext4_ext_map_blocks+0x84d/0xcc0
[   10.823122]  ext4_map_blocks+0xef/0x560
[   10.823124]  ? kmem_cache_alloc+0x181/0x220
[   10.823126]  ext4_writepages+0x856/0xe00
[   10.823130]  ? futex_wait+0x11d/0x210
[   10.823132]  ? do_writepages+0x41/0xd0
[   10.823134]  ? __ext4_mark_inode_dirty+0x250/0x250
[   10.823134]  do_writepages+0x41/0xd0
[   10.823137]  ? wbc_attach_and_unlock_inode+0xd6/0x140
[   10.823139]  __filemap_fdatawrite_range+0xcb/0x100
[   10.823141]  file_write_and_wait_range+0x5e/0xb0
[   10.823143]  ext4_sync_file+0x10c/0x3a0
[   10.823144]  do_fsync+0x38/0x70
[   10.823146]  __x64_sys_fsync+0x10/0x20
[   10.823147]  do_syscall_64+0x47/0x80
[   10.823150]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[   10.823152] RIP: 0033:0x7fb904384f1b
[   10.823152] Code: Bad RIP value.
[   10.823153] RSP: 002b:00007fb903d4cd00 EFLAGS: 00000293 ORIG_RAX:
000000000000004a
[   10.823154] RAX: ffffffffffffffda RBX: 0000000000000000 RCX:
00007fb904384f1b
[   10.823155] RDX: 0000000000000001 RSI: 0000000000000081 RDI:
0000000000000005
[   10.823155] RBP: 000055c4f63e82c0 R08: 0000000000000000 R09:
00007fb903d4d700
[   10.823156] R10: 0000000000000000 R11: 0000000000000293 R12:
00007ffd56550cce
[   10.823156] R13: 00007ffd56550ccf R14: 00007ffd56550cd0 R15:
00007fb903d4d700

-- 
You are receiving this mail because:
You are watching the assignee of the bug.

Powered by blists - more mailing lists