lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Tue, 02 Nov 2021 19:08:19 +0000
From:   bugzilla-daemon@...zilla.kernel.org
To:     linux-ext4@...r.kernel.org
Subject: [Bug 214917] New: 5.15: kernel BUG at fs/ext4/inode.c:1721!

https://bugzilla.kernel.org/show_bug.cgi?id=214917

            Bug ID: 214917
           Summary: 5.15: kernel BUG at fs/ext4/inode.c:1721!
           Product: File System
           Version: 2.5
    Kernel Version: 5.15.0
          Hardware: All
                OS: Linux
              Tree: Mainline
            Status: NEW
          Severity: normal
          Priority: P1
         Component: ext4
          Assignee: fs_ext4@...nel-bugs.osdl.org
          Reporter: gerbilsoft@...bilsoft.com
        Regression: No

Since upgrading from 5.14.12 to 5.15, I've been getting a number of kernel BUGs
at fs/ext4/inode.c:1721!. I'm using inline_data on my ext4 file systems, and
this code path seems to be hit most often when using Google Chrome.

The BUG_ON() being hit was introduced by this commit:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=948ca5f30e1df0c11eb5b0f410b9ceb97fa77ad9

[  131.934142] ------------[ cut here ]------------
[  131.934148] kernel BUG at fs/ext4/inode.c:1721!
[  131.934155] invalid opcode: 0000 [#1] PREEMPT SMP PTI
[  131.934162] CPU: 2 PID: 6307 Comm: ThreadPoolForeg Tainted: G           O   
T 5.15.0-DEK-X230 #1
[  131.934167] Hardware name: LENOVO 2320HQU/2320HQU, BIOS G2ETB7WW (2.77 )
09/24/2019
[  131.934170] RIP: 0010:ext4_da_get_block_prep+0x422/0x460
[  131.934178] Code: ff f0 80 4b 01 01 e9 21 ff ff ff f0 80 0b 20 e9 0c ff ff
ff f0 80 0b 10 e9 de fe ff ff e8 36 89 fe ff 41 89 c4 e9 23 fe ff ff <0f> 0b 0f
0b 48 8b 7d 10 50 45 89 e1 48 c7 c1 30 10 d3 98 4c 8b 85
[  131.934182] RSP: 0018:ffffa9058ffafbb8 EFLAGS: 00010206
[  131.934185] RAX: 27ffffffffffffff RBX: ffffa0b6d40d3c98 RCX:
0000000000000000
[  131.934188] RDX: 0000000000000004 RSI: 0000000000000000 RDI:
0000000000000000
[  131.934191] RBP: ffffa0b6535fab00 R08: 0000000000000000 R09:
0000000000000000
[  131.934194] R10: 0000000000000000 R11: 0000000000001000 R12:
ffffa9058ffafc80
[  131.934197] R13: 0000000000000001 R14: ffffffffffff0000 R15:
ffffd265c7add0c0
[  131.934200] FS:  00007efc4ff3a640(0000) GS:ffffa0b8ce280000(0000)
knlGS:0000000000000000
[  131.934204] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  131.934207] CR2: 0000156a01674000 CR3: 000000016da9e003 CR4:
00000000001706e0
[  131.934210] Call Trace:
[  131.934215]  __block_write_begin_int+0x14e/0x590
[  131.934223]  ? ext4_da_release_space+0x100/0x100
[  131.934228]  ext4_da_write_begin+0x11d/0x2c0
[  131.934232]  ? generic_write_end+0xe3/0x150
[  131.934237]  generic_perform_write+0xc4/0x220
[  131.934258]  ext4_buffered_write_iter+0xa2/0x180
[  131.934266]  new_sync_write+0x156/0x200
[  131.934273]  vfs_write+0x216/0x2b0
[  131.934278]  __x64_sys_pwrite64+0x94/0xc0
[  131.934284]  do_syscall_64+0x66/0xa0
[  131.934291]  ? do_syscall_64+0xe/0xa0
[  131.934295]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[  131.934300] RIP: 0033:0x7efc57997217
[  131.934305] Code: 08 89 3c 24 48 89 4c 24 18 e8 05 bc f8 ff 4c 8b 54 24 18
41 89 c0 48 8b 54 24 10 b8 12 00 00 00 48 8b 74 24 08 8b 3c 24 0f 05 <48> 3d 00
f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 35 bc f8 ff 48 8b
[  131.934309] RSP: 002b:00007efc4ff38ff0 EFLAGS: 00000293 ORIG_RAX:
0000000000000012
[  131.934315] RAX: ffffffffffffffda RBX: 0000000000000000 RCX:
00007efc57997217
[  131.934318] RDX: 0000000000001b20 RSI: 000026fc07ab5c00 RDI:
000000000000012e
[  131.934321] RBP: 00007efc4ff39100 R08: 0000000000000000 R09:
0000000000000000
[  131.934324] R10: 000000000000006f R11: 0000000000000293 R12:
0000000000001b20
[  131.934327] R13: 000000000000006f R14: 000026fc07ab5c00 R15:
000026fc0e84dac0
[  131.934332] Modules linked in: fuse snd_seq_dummy snd_hrtimer snd_seq
snd_seq_device bnep bluetooth ecdh_generic ecc lz4 lz4_compress zram zsmalloc
squashfs lz4_decompress algif_skcipher vhost_net tun vhost vhost_iotlb tap
vboxnetadp(O) vboxnetflt(O) vboxdrv(O) vhba(O) drivetemp iwlmvm
snd_hda_codec_hdmi mac80211 x86_pkg_temp_thermal coretemp libarc4 snd_ctl_led
kvm_intel iwlwifi snd_hda_codec_realtek at24 sdhci_pci kvm regmap_i2c uvcvideo
cqhci snd_hda_codec_generic cfg80211 irqbypass joydev videobuf2_vmalloc
ghash_clmulni_intel videobuf2_memops videobuf2_v4l2 sdhci i2c_i801
snd_hda_intel i2c_smbus videobuf2_common snd_intel_dspcfg lpc_ich mousedev
snd_hda_codec mmc_core videodev snd_hwdep snd_hda_core mc snd_pcm e1000e
snd_timer thinkpad_acpi tpm_tis ledtrig_audio platform_profile tpm_tis_core snd
tpm soundcore
[  131.934455] ---[ end trace 07f79dcd9bd2996e ]---

-- 
You may reply to this email to add a comment.

You are receiving this mail because:
You are watching the assignee of the bug.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ