lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20060905171049.GB27433@ele.uri.edu>
Date:	Tue, 5 Sep 2006 13:10:49 -0400
From:	Will Simoneau <simoneau@....uri.edu>
To:	linux-kernel@...r.kernel.org
Subject: BUG: warning at fs/ext3/inode.c:1016/ext3_getblk()

Has anyone seen this before? These three traces occured at different times
today when three new user accounts (and associated quotas) were created. This
machine is an NFS server which uses quotas on an ext3 fs (dir_index is on).
Kernel is 2.6.17.11 on an x86 smp w/64G highmem; 4G ram is installed. The
affected filesystem is on a software raid1 of two hardware raid0 volumes from a
megaraid card.

BUG: warning at fs/ext3/inode.c:1016/ext3_getblk()
 <c01c5140> ext3_getblk+0x98/0x2a6  <c03b2806> md_wakeup_thread+0x26/0x2a
 <c01c536d> ext3_bread+0x1f/0x88  <c01cedf9> ext3_quota_read+0x136/0x1ae
 <c018b683> v1_read_dqblk+0x61/0xac  <c0188f32> dquot_acquire+0xf6/0x107
 <c01ceaba> ext3_acquire_dquot+0x46/0x68  <c01897d4> dqget+0x155/0x1e7
 <c018a97b> dquot_transfer+0x3e0/0x3e9  <c016fe52> dput+0x23/0x13e
 <c01c7986> ext3_setattr+0xc3/0x240  <c0120f66> current_fs_time+0x52/0x6a
 <c017320e> notify_change+0x2bd/0x30d  <c0159246> chown_common+0x9c/0xc5
 <c02a222c> strncpy_from_user+0x3b/0x68  <c0167fe6> do_path_lookup+0xdf/0x266
 <c016841b> __user_walk_fd+0x44/0x5a  <c01592b9> sys_chown+0x4a/0x55
 <c015a43c> vfs_write+0xe7/0x13c  <c01695d4> sys_mkdir+0x1f/0x23
 <c0102a97> syscall_call+0x7/0xb 

BUG: warning at fs/ext3/inode.c:1016/ext3_getblk()
 <c01c5140> ext3_getblk+0x98/0x2a6  <c0141311> buffered_rmqueue+0xed/0x15b
 <c01414a6> get_page_from_freelist+0x80/0x9e  <c01c536d> ext3_bread+0x1f/0x88
 <c01cedf9> ext3_quota_read+0x136/0x1ae  <c018b683> v1_read_dqblk+0x61/0xac
 <c0188f32> dquot_acquire+0xf6/0x107  <c01ceaba> ext3_acquire_dquot+0x46/0x68
 <c01897d4> dqget+0x155/0x1e7  <c018a97b> dquot_transfer+0x3e0/0x3e9
 <c016fe52> dput+0x23/0x13e  <c01c7986> ext3_setattr+0xc3/0x240
 <c0120f66> current_fs_time+0x52/0x6a  <c017320e> notify_change+0x2bd/0x30d
 <c0159246> chown_common+0x9c/0xc5  <c02a222c> strncpy_from_user+0x3b/0x68
 <c0167fe6> do_path_lookup+0xdf/0x266  <c016841b> __user_walk_fd+0x44/0x5a
 <c01592b9> sys_chown+0x4a/0x55  <c015a43c> vfs_write+0xe7/0x13c
 <c0104f4f> do_IRQ+0x63/0xa1  <c0102a97> syscall_call+0x7/0xb

BUG: warning at fs/ext3/inode.c:1016/ext3_getblk()
 <c01c5140> ext3_getblk+0x98/0x2a6  <c01d5f8b> __journal_file_buffer+0x18d/0x284
 <c01d5142> journal_dirty_metadata+0x141/0x218  <c01dad97> journal_alloc_journal_head+0x12/0x68
 <c01c536d> ext3_bread+0x1f/0x88  <c01cedf9> ext3_quota_read+0x136/0x1ae
 <c018b683> v1_read_dqblk+0x61/0xac  <c0188f32> dquot_acquire+0xf6/0x107
 <c01ceaba> ext3_acquire_dquot+0x46/0x68  <c01897d4> dqget+0x155/0x1e7
 <c018a97b> dquot_transfer+0x3e0/0x3e9  <c016fe52> dput+0x23/0x13e
 <c01c7986> ext3_setattr+0xc3/0x240  <c0120f66> current_fs_time+0x52/0x6a
 <c017320e> notify_change+0x2bd/0x30d  <c0159246> chown_common+0x9c/0xc5
 <c02a222c> strncpy_from_user+0x3b/0x68  <c0167fe6> do_path_lookup+0xdf/0x266
 <c016841b> __user_walk_fd+0x44/0x5a  <c01592b9> sys_chown+0x4a/0x55
 <c015a43c> vfs_write+0xe7/0x13c  <c01695d4> sys_mkdir+0x1f/0x23
 <c0102a97> syscall_call+0x7/0xb 

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ