lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20100702140353.GA3981@swordfish.minsk.epam.com>
Date:	Fri, 2 Jul 2010 17:03:53 +0300
From:	Sergey Senozhatsky <sergey.senozhatsky@...il.com>
To:	Frederic Weisbecker <fweisbec@...il.com>
Cc:	Sergey Senozhatsky <sergey.senozhatsky@...il.com>,
	Jan Kara <jack@...e.cz>, Christoph Hellwig <hch@....de>,
	Andrew Morton <akpm@...ux-foundation.org>,
	reiserfs-devel@...r.kernel.org, linux-kernel@...r.kernel.org,
	Chris Mason <chris.mason@...cle.com>,
	Jeff Mahoney <jeffm@...freymahoney.com>
Subject: Re: reiserfs locking (v2)

On (07/02/10 15:12), Frederic Weisbecker wrote:
> > As well as this:
> > 
> > [  202.300464] REISERFS error (device sda9): vs-2100 add_save_link:
> > search_by_key ([-1 7812832 0x1 IND]) returned 1
> > [  202.300473] REISERFS (device sda9): Remounting filesystem read-only
> > [  202.301603] ------------[ cut here ]------------
> > [  202.301615] WARNING: at fs/reiserfs/journal.c:3436
> > journal_end+0x5b/0xaf()
> > [  202.301619] Hardware name: F3JC                
> > [  202.301622] Modules linked in: snd_seq_dummy snd_seq_oss
> > snd_seq_midi_event snd_seq snd_seq_device snd_hda_codec_si3054
> > snd_hda_codec_realtek snd_hwdep snd_pcm_oss snd_mixer_oss asus_laptop
> > sparse_keymap sdhci_pci sdhci snd_hda_intel mmc_core led_class snd_hda_codec
> > rng_core snd_pcm snd_timer snd_page_alloc snd i2c_i801 soundcore psmouse sg
> > evdev serio_raw r8169 mii usbhid hid uhci_hcd ehci_hcd sr_mod usbcore cdrom
> > sd_mod ata_piix
> > [  202.301689] Pid: 5055, comm: a.out Not tainted
> > 2.6.35-rc3-dbg-git6-00502-g94feaba-dirty #65
> > [  202.301693] Call Trace:
> > [  202.301701]  [<c102e3a2>] warn_slowpath_common+0x65/0x7a
> > [  202.301707]  [<c1102d95>] ? journal_end+0x5b/0xaf
> > [  202.301712]  [<c102e3c6>] warn_slowpath_null+0xf/0x13
> > [  202.301718]  [<c1102d95>] journal_end+0x5b/0xaf
> > [  202.301725]  [<c10eebaa>] reiserfs_truncate_file+0x19f/0x233
> > [  202.301733]  [<c10f1ba1>] reiserfs_vfs_truncate_file+0xd/0xf
> > [  202.301738]  [<c1084883>] vmtruncate+0x23/0x29
> > [  202.301745]  [<c10b4ad4>] inode_setattr+0x47/0x68
> > [  202.301751]  [<c10f1b3f>] reiserfs_setattr+0x242/0x297
> > [  202.301758]  [<c12c5d05>] ? down_write+0x22/0x2a
> > [  202.301764]  [<c10b4d6f>] notify_change+0x15c/0x26b
> > [  202.301770]  [<c10a35c7>] do_truncate+0x64/0x7d
> > [  202.301776]  [<c12c69b0>] ? _raw_spin_unlock+0x33/0x3f
> > [  202.301783]  [<c10ad892>] do_last+0x450/0x459
> > [  202.301789]  [<c10ada5b>] do_filp_open+0x1c0/0x41a
> > [  202.301798]  [<c1029081>] ? get_parent_ip+0xb/0x31
> > [  202.301804]  [<c1029123>] ? sub_preempt_count+0x7c/0x89
> > [  202.301810]  [<c10b5746>] ? alloc_fd+0xb4/0xbf
> > [  202.301816]  [<c10a3f46>] do_sys_open+0x48/0xdf
> > [  202.301821]  [<c10a3ffb>] sys_open+0x1e/0x26
> > [  202.301827]  [<c10027d3>] sysenter_do_call+0x12/0x32
> > [  202.301833] ---[ end trace c4e3312bdadd2dc5 ]---
> 
> 
> 
> Ah that's wicked. I'll try your testcase for that too.
> 
> Thanks a lot for providing these!
> 

I'm not very lucky at hitting this. Saw it several times (may be 3).


	Sergey

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ