lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <a4423d670912241428n6917d2adsad887548612cf8ce@mail.gmail.com>
Date:	Fri, 25 Dec 2009 01:28:34 +0300
From:	Alexander Beregalov <a.beregalov@...il.com>
To:	Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
	linux-ext4@...r.kernel.org, Jens Axboe <jens.axboe@...cle.com>,
	"Theodore Ts'o" <tytso@....edu>
Subject: 2.6.33-rc1: kernel BUG at fs/ext4/inode.c:1063 (sparc)

Hi

Kernel is 2.6.33-rc1-00366-g2f99f5c
Ext4 mounts ext3 filesystem



kernel BUG at fs/ext4/inode.c:1063!
              \|/ ____ \|/
              "@'/ .. \`@"
              /_| \__/ |_\
                 \__U_/
flush-8:0(1137): Kernel bad sw trap 5 [#1]
TSTATE: 0000000080001603 TPC: 0000000000544fb4 TNPC: 0000000000544fb8
Y: 00000000    Not tainted
TPC: <ext4_get_blocks+0x3f4/0x400>
g0: fffff800dc862fe0 g1: 0000000000000001 g2: 0000000000000001 g3:
fffff800dc85f9c1
g4: fffff800df305880 g5: 2e68006800002e68 g6: fffff800dc860000 g7:
0000000000833e08
o0: 00000000007b0cb8 o1: 0000000000000427 o2: 0000000000000040 o3:
0000000000000040
o4: fffff800dc8630a0 o5: 000000000000000d sp: fffff800dc8628d1 ret_pc:
0000000000544fac
RPC: <ext4_get_blocks+0x3ec/0x400>
l0: 0000000000000002 l1: fffff800c2674000 l2: fffff800c26740d0 l3:
0000000000000001
l4: fffff800df39d2d0 l5: 00000000000003f9 l6: 0006000000000000 l7:
0000000000001ffe
i0: 0000000000000040 i1: fffff800c2674130 i2: 000000000000064c i3:
fffff800c26745a8
i4: fffff800dc863308 i5: 0000000000000003 i6: fffff800dc8629a1 i7:
0000000000545380
I7: <mpage_da_map_blocks+0x80/0x800>
Disabling lock debugging due to kernel taint
Caller[0000000000545380]: mpage_da_map_blocks+0x80/0x800
Caller[00000000005461c0]: mpage_add_bh_to_extent+0x40/0x100
Caller[000000000054642c]: __mpage_da_writepage+0x1ac/0x220
Caller[00000000004a951c]: write_cache_pages+0x19c/0x380
Caller[0000000000545d7c]: ext4_da_writepages+0x27c/0x680
Caller[00000000004a978c]: do_writepages+0x2c/0x60
Caller[00000000004f94cc]: writeback_single_inode+0xcc/0x3c0
Caller[00000000004fa3d8]: writeback_inodes_wb+0x338/0x500
Caller[00000000004fa6e8]: wb_writeback+0x148/0x220
Caller[00000000004fab00]: wb_do_writeback+0x240/0x260
Caller[00000000004fab8c]: bdi_writeback_task+0x6c/0xc0
Caller[00000000004b6f50]: bdi_start_fn+0x70/0xe0
Caller[000000000047030c]: kthread+0x6c/0x80
Caller[000000000042bc9c]: kernel_thread+0x3c/0x60
Caller[0000000000470408]: kthreadd+0xe8/0x160
Instruction DUMP: 92102427  7ffb95a5  901220b8 <91d02005> 01000000
01000000  9de3bf40  11002096  a4100018
note: flush-8:0[1137] exited with preempt_count 1
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ