lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <bug-216251-13602@https.bugzilla.kernel.org/>
Date:   Fri, 15 Jul 2022 11:58:45 +0000
From:   bugzilla-daemon@...nel.org
To:     linux-ext4@...r.kernel.org
Subject: [Bug 216251] New: kernel BUG at fs/jbd2/transaction.c:1629

https://bugzilla.kernel.org/show_bug.cgi?id=216251

            Bug ID: 216251
           Summary: kernel BUG at fs/jbd2/transaction.c:1629
           Product: File System
           Version: 2.5
    Kernel Version: 5.19-rc6
          Hardware: All
                OS: Linux
              Tree: Mainline
            Status: NEW
          Severity: normal
          Priority: P1
         Component: ext4
          Assignee: fs_ext4@...nel-bugs.osdl.org
          Reporter: chengzhihao1@...wei.com
        Regression: No

[  227.908690] ------------[ cut here ]------------
[  227.909523] kernel BUG at fs/jbd2/transaction.c:1629!
[  227.910466] invalid opcode: 0000 [#1] PREEMPT SMP
[  227.911306] CPU: 2 PID: 584 Comm: unlink Tainted: G        W        
5.19.0-rc6-00115-g4a57a8400075-dirty #697
[  227.913010] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
?-20190727_073836-buildvm-ppc64le-16.ppc.fedoraproject.org-3.f4
[  227.915264] RIP: 0010:jbd2_journal_dirty_metadata+0x3c5/0x470
[  227.916286] Code: 44 24 10 48 83 05 2a 15 97 0b 01 41 83 f8 01 0f 85 89 78
9f 00 48 83 05 30 15 97 0b 01 e9 32 ff ff ff 48 83 05 eb 154
[  227.918779] RSP: 0018:ffffc90000be7ce0 EFLAGS: 00010202
[  227.919284] RAX: 0000000001116019 RBX: ffff8881027df000 RCX:
ffff88817d11c000
[  227.919967] RDX: 0000000000000018 RSI: ffffffff82c73015 RDI:
0000000000000000
[  227.920653] RBP: ffff888101852270 R08: 0000000000000000 R09:
ffffc90000be7b70
[  227.921331] R10: 0000000000000001 R11: 0000000000000001 R12:
ffff88810185f258
[  227.922015] R13: 0000000000000000 R14: ffff88810185f260 R15:
ffff88817d11c000
[  227.922705] FS:  00007fa2fbc564c0(0000) GS:ffff888237c80000(0000)
knlGS:0000000000000000
[  227.923472] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  227.924031] CR2: 000055623fe24008 CR3: 000000017c264000 CR4:
00000000000006e0
[  227.924725] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
0000000000000000
[  227.925408] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:
0000000000000400
[  227.926086] Call Trace:
[  227.926339]  <TASK>
[  227.926558]  __ext4_handle_dirty_metadata+0xa0/0x290
[  227.927042]  ext4_handle_dirty_dirblock+0x10c/0x1d0
[  227.927515]  ext4_delete_entry+0x104/0x200
[  227.927912]  __ext4_unlink+0x22b/0x360
[  227.928276]  ? __ext4_journal_start_sb+0x1af/0x1f0
[  227.928745]  ext4_unlink+0x275/0x390
[  227.929097]  vfs_unlink+0x20b/0x4c0
[  227.929439]  do_unlinkat+0x42f/0x4c0
[  227.929792]  __x64_sys_unlink+0x37/0x50
[  227.930159]  do_syscall_64+0x35/0x80

-- 
You may reply to this email to add a comment.

You are receiving this mail because:
You are watching the assignee of the bug.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ