lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <1213233701.4597.70.camel@localhost.localdomain>
Date:	Wed, 11 Jun 2008 21:21:41 -0400
From:	Eric Paris <eparis@...hat.com>
To:	ecryptfs-devel@...ts.sourceforge.net
Cc:	mhalcrow@...ibm.com, phillip@...lewell.homeip.net,
	linux-kernel@...r.kernel.org, linux-fsdevel@...r.kernel.org
Subject: [2.6.26-rc5-git4] kernel BUG at fs/dcache.c:637

Kernel is git from yesterday (around 2.6.26-rc5-git4) using the fedora
ecryptfs-utils-46-0.fc10.x86_64 I can reliably hit a BUG()

mkdir /tmp/mntpnt
mount -t tmpfs /tmp/mntpnt /tmp/mntpnt
mount -t encryptfs /tmp/mntpnt /tmp/mntpnt
  # passphrase
  # aes
  # 32 bytes
touch /tmp/mntpnt/hello
umount /tmp/mntpnt
umount /tmp/mntpnt

Is there other information people would like me to collect, or file a
kernel.org bugzilla?  Don't know if this is a ecryptfs or a tmpfs bug,
hopefully someone who knows the relevant code areas can help.

BUG: Dentry ffff81000e839668{i=1cc2,n=hello2} still in use (1) [unmount of tmpfs tmpfs]
------------[ cut here ]------------
kernel BUG at fs/dcache.c:637!
invalid opcode: 0000 [1] SMP DEBUG_PAGEALLOC
CPU 1 
Modules linked in: cbc aes_x86_64 aes_generic ecb crypto_blkcipher ecryptfs sunrpc ipt_REJECT nf_conntrack_ipv4 iptable_filter ip_tables ip6t_REJECT xt_tcpudp nf_conntrack_ipv6 xt_state nf_conntrack ip6table_filter ip6_tables x_tables ipv6 ext3 jbd loop ppdev sr_mod cdrom parport_pc parport floppy e1000 pcspkr pata_acpi ata_generic sg ata_piix libata i2c_piix4 shpchp ac button i2c_core dm_snapshot dm_zero dm_mirror dm_log dm_mod mptspi mptscsih mptbase scsi_transport_spi sd_mod scsi_mod ext4dev jbd2 mbcache crc16 uhci_hcd ohci_hcd ehci_hcd [last unloaded: scsi_wait_scan]
Pid: 2205, comm: umount Not tainted 2.6.26-rc5 #104
RIP: 0010:[<ffffffff810bed3a>]  [<ffffffff810bed3a>] shrink_dcache_for_umount_subtree+0x166/0x246
RSP: 0018:ffff81000d825d78  EFLAGS: 00010296
RAX: 000000000000005b RBX: ffff81000e8007c0 RCX: ffffffff813ec9d8
RDX: ffff810015874b40 RSI: 000000000000005b RDI: 0000000000000096
RBP: ffff81000d825da8 R08: ffffffff813ec9c0 R09: ffff8100010765c8
R10: 0000000000000001 R11: 0000000000000000 R12: ffff81000e839668
R13: ffff81000e8396f8 R14: 0000000000000000 R15: 0000000000000000
FS:  00007f36426407d0(0000) GS:ffff810017411640(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f3641f9e160 CR3: 000000000e53d000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process umount (pid: 2205, threadinfo ffff81000d824000, task ffff810015874b40)
Stack:  ffff8100169867f8 ffffffff812ca9a0 ffff810016986360 ffffffff812ca9a0
 0000000000000040 ffff810016986360 ffff81000d825dc8 ffffffff810bfc32
 ffff810016986360 ffff810016986360 ffff81000d825de8 ffffffff810afa79
Call Trace:
 [<ffffffff810bfc32>] shrink_dcache_for_umount+0x37/0x47
 [<ffffffff810afa79>] generic_shutdown_super+0x1a/0xd8
 [<ffffffff810afb72>] kill_anon_super+0x11/0x42
 [<ffffffff810afbc5>] kill_litter_super+0x22/0x27
 [<ffffffff810afc32>] deactivate_super+0x68/0x7d
 [<ffffffff810c453e>] mntput_no_expire+0xea/0x129
 [<ffffffff810c4b2a>] sys_umount+0x2f0/0x355
 [<ffffffff81073a0e>] ? audit_syscall_entry+0x141/0x17c
 [<ffffffff8100c090>] tracesys+0xd5/0xda


Code: 08 49 8b 44 24 40 48 85 c0 74 04 48 8b 50 40 48 8d 86 98 04 00 00 48 c7 c7 3f 57 39 81 4c 89 e6 48 89 04 24 31 c0 e8 f0 7f f7 ff <0f> 0b eb fe 49 8b 5c 24 58 4c 39 e3 75 04 31 db eb 03 f0 ff 0b 
RIP  [<ffffffff810bed3a>] shrink_dcache_for_umount_subtree+0x166/0x246
 RSP <ffff81000d825d78>
---[ end trace eefd8d16176b81fe ]---

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ