lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Thu, 1 Jan 2009 22:08:31 +0100
From:	Christoph Hellwig <hch@....de>
To:	Jens Axboe <jens.axboe@...cle.com>
Cc:	linux-kernel@...r.kernel.org
Subject: Re: oops in __bounce_end_io_read under kvm

On Sun, Dec 28, 2008 at 07:25:00PM +0100, Jens Axboe wrote:
> On Sun, Dec 28 2008, Christoph Hellwig wrote:
> > On Sun, Dec 28, 2008 at 07:10:59PM +0100, Jens Axboe wrote:
> > > Is this -rc9 stock + xfs patches, or does it include -mm or -next
> > > patches (or the block patches)?
> > 
> > Just -rc9 and xfs updates.  The only change outside of fs/xfs/ is a new
> > define in fs.h and a couple new helpers in inode.c
> 
> OK, then it's surely a new bug. Could you do a gdb l *0xbla on that
> address to check where it's faulting?

It took a while to reproduce it again, but I got it again today.


(gdb) l *0xc01a5444
0xc01a5444 is in __bounce_end_io_read
(/home/hch/work/xfs/arch/x86/include/asm/string_32.h:35).
30	extern size_t strlen(const char *s);
31	
32	static __always_inline void *__memcpy(void *to, const void *from, size_t n)
33	{
34		int d0, d1, d2;
35		asm volatile("rep ; movsl\n\t"
36			     "movl %4,%%ecx\n\t"
37			     "andl $3,%%ecx\n\t"
38			     "jz 1f\n\t"
39			     "rep ; movsb\n\t"

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ