lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20070218114903.a8160301.akpm@linux-foundation.org>
Date:	Sun, 18 Feb 2007 11:49:03 -0800
From:	Andrew Morton <akpm@...ux-foundation.org>
To:	Mattia Dongili <malattia@...ux.it>
Cc:	Laurent Riffard <laurent.riffard@...e.fr>,
	linux-kernel@...r.kernel.org, axboe@...nel.dk
Subject: Re: 2.6.20-mm2: Oops in generic_make_request

On Sun, 18 Feb 2007 18:58:05 +0100 Mattia Dongili <malattia@...ux.it> wrote:

> On Sun, Feb 18, 2007 at 02:06:59PM +0100, Laurent Riffard wrote:
> > Le 18.02.2007 06:51, Andrew Morton a écrit :
> > >Temporarily at
> > >
> > >  http://userweb.kernel.org/~akpm/2.6.20-mm2/
> > >
> > >Will appear later at
> > >
> > > ftp://ftp.kernel.org/pub/linux/kernel/people/akpm/patches/2.6/2.6.20/2.6.20-mm2/
> > 
> > Hello, I've got a fully reproducible Oops. I just have to boot to 
> > runlevel 2 and wait less than one minute.
> 
> Maybe this oops is related too?

Looks that way.

> Can't yet tell if it's easily reproducible, this is on a JFS filesystem.
> 
> BUG: unable to handle kernel NULL pointer dereference at virtual address 00000004
>  printing eip:
> c02206aa
> *pde = 00000000
> Oops: 0000 [#1]
> PREEMPT 
> last sysfs file: /devices/pci0000:00/0000:00:00.0/class
> CPU:    0
> EIP:    0060:[<c02206aa>]    Not tainted VLI
> EFLAGS: 00010297   (2.6.20-mm2-1 #1)
> EIP is at __make_request+0x13a/0x390
> eax: ffffffff   ebx: 00000000   ecx: 042b0dd8   edx: 00010485
> esi: c5f8cea0   edi: cfd587f8   ebp: c653dadc   esp: c653dabc
> ds: 007b   es: 007b   fs: 00d8  gs: 0033  ss: 0068
> Process sh (pid: 4549, ti=c653c000 task=ccca2090 task.ti=c653c000)
> Stack: c137eae8 00000001 cfd587e4 c5f8cea0 c5f893e4 c137eae8 c5f8cea0 00000008 
>        c653db28 c021e0ca cfa3ffa0 cee6a2e0 cfa3ffa0 00000000 00000008 00000100 
>        00011250 cfedaf60 c653db10 00000206 00000000 c653db18 c014a31e c653db48 
> Call Trace:
>  [<c01048ba>] show_trace_log_lvl+0x1a/0x30
>  [<c0104979>] show_stack_log_lvl+0xa9/0xd0
>  [<c0104ba6>] show_registers+0x206/0x350
>  [<c0104dfe>] die+0x10e/0x210
>  [<c0114652>] do_page_fault+0x2d2/0x600
>  [<c0351f84>] error_code+0x74/0x7c
>  [<c021e0ca>] generic_make_request+0x15a/0x200
>  [<c0220318>] submit_bio+0x58/0xe0
>  [<c0205d0f>] metapage_writepage+0x18f/0x1b0
>  [<c014cc2b>] __writepage+0xb/0x30
>  [<c014d20f>] write_cache_pages+0x22f/0x300
>  [<c014d303>] generic_writepages+0x23/0x30
>  [<c014d36c>] do_writepages+0x5c/0x60
>  [<c0148307>] __filemap_fdatawrite_range+0x67/0x80
>  [<c0149785>] filemap_flush+0x25/0x30
>  [<c02080cd>] lmLogSync+0x19d/0x230
>  [<c020871e>] lmLog+0x5e/0x190
>  [<c020a360>] txCommit+0x8c0/0x1010
>  [<c01eecf4>] jfs_create+0x324/0x370
>  [<c016f38f>] vfs_create+0xaf/0x100
>  [<c017269c>] open_namei+0x58c/0x640
>  [<c0165b7c>] do_filp_open+0x2c/0x50
>  [<c0165be7>] do_sys_open+0x47/0xe0
>  [<c0165cbc>] sys_open+0x1c/0x20
>  [<c01041c0>] syscall_call+0x7/0xb

Michal Piotrowski is hitting it too, and has bisected it down to
git-block.patch.

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ