lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 2 Jul 2012 11:39:14 +0800
From:	Fengguang Wu <fengguang.wu@...el.com>
To:	Christoph Lameter <cl@...ux.com>
Cc:	Trond Myklebust <Trond.Myklebust@...app.com>,
	"J. Bruce Fields" <bfields@...ldses.org>,
	linux-nfs@...r.kernel.org, LKML <linux-kernel@...r.kernel.org>,
	netdev <netdev@...r.kernel.org>,
	Pekka Enberg <penberg@...nel.org>,
	Linux Memory Management List <linux-mm@...ck.org>,
	Stephen Rothwell <sfr@...b.auug.org.au>
Subject: Re: linux-next BUG: held lock freed!

On Mon, Jul 02, 2012 at 10:56:25AM +0800, Fengguang Wu wrote:
> Hi all,
> 
> More observations on this bug:
> 
> The slab tree itself actually boots fine. So Christoph's commit may be
> merely disclosing some bug hidden in another for-next tree which
> happens to be merged before the slab tree..

Sorry: the bug does appear in the standalone slab tree, where the
dmesg is

[  307.648802] blkid (2963) used greatest stack depth: 2832 bytes left
[  307.892070] vhci_hcd: changed 0
[  308.766647] 
[  308.766648] =========================
[  308.766649] [ BUG: held lock freed! ]
[  308.766651] 3.5.0-rc1+ #44 Not tainted
[  308.766651] -------------------------
[  308.766653] mtd_probe/3040 is freeing memory ffff880006defdd0-ffff880006df0dcf, with a lock still held there!
[  308.766662]  (&type->s_umount_key#31/1){+.+.+.}, at: [<ffffffff81187166>] sget+0x299/0x463
[  308.766663] 3 locks held by mtd_probe/3040:
[  308.766667]  #0:  (&type->s_umount_key#31/1){+.+.+.}, at: [<ffffffff81187166>] sget+0x299/0x463
[  308.766671]  #1:  (sb_lock){+.+.-.}, at: [<ffffffff81186f00>] sget+0x33/0x463
[  308.766675]  #2:  (unnamed_dev_lock){+.+...}, at: [<ffffffff81186711>] get_anon_bdev+0x38/0xe8
[  308.766675] 
[  308.766675] stack backtrace:
[  308.766677] Pid: 3040, comm: mtd_probe Not tainted 3.5.0-rc1+ #44
[  308.766678] Call Trace:
[  308.766683]  [<ffffffff810ddc6e>] debug_check_no_locks_freed+0x109/0x14b
[  308.766703]  [<ffffffff81173f7c>] kmem_cache_free+0x2e/0xa7
[  308.766708]  [<ffffffff816a5d9d>] ida_get_new_above+0x173/0x184
[  308.766711]  [<ffffffff810db9a4>] ? lock_acquired+0x1e4/0x219
[  308.766713]  [<ffffffff81186727>] get_anon_bdev+0x4e/0xe8
[  308.766715]  [<ffffffff811867d8>] set_anon_super+0x17/0x2a
[  308.766717]  [<ffffffff81187270>] sget+0x3a3/0x463
[  308.766719]  [<ffffffff811867c1>] ? get_anon_bdev+0xe8/0xe8
[  308.766722]  [<ffffffff811a1fbe>] mount_pseudo+0x31/0x152
[  308.766727]  [<ffffffff81cb1f54>] mtd_inodefs_mount+0x24/0x26
[  308.766729]  [<ffffffff81187e34>] mount_fs+0x69/0x155
[  308.766733]  [<ffffffff811531b2>] ? __alloc_percpu+0x10/0x12
[  308.766736]  [<ffffffff8119ca4c>] vfs_kern_mount+0x62/0xd9
[  308.766739]  [<ffffffff811a1b43>] simple_pin_fs+0x4c/0x9b
[  308.766741]  [<ffffffff81cb338a>] mtdchar_open+0x42/0x188
[  308.766744]  [<ffffffff811886ef>] chrdev_open+0x11f/0x14a
[  308.766747]  [<ffffffff810c0880>] ? local_clock+0x19/0x52
[  308.766750]  [<ffffffff811885d0>] ? cdev_put+0x26/0x26
[  308.766752]  [<ffffffff811836cc>] do_dentry_open+0x1e4/0x2b2
[  308.766754]  [<ffffffff8118434a>] nameidata_to_filp+0x5e/0xa3
[  308.766756]  [<ffffffff8119118f>] do_last+0x68f/0x6d3
[  308.766759]  [<ffffffff811912d8>] path_openat+0xd2/0x32a
[  308.766762]  [<ffffffff8111eed8>] ? time_hardirqs_off+0x26/0x2a
[  308.766765]  [<ffffffff810d9e88>] ? trace_hardirqs_off+0xd/0xf
[  308.766767]  [<ffffffff81191630>] do_filp_open+0x38/0x86
[  308.766771]  [<ffffffff82e95e22>] ? _raw_spin_unlock+0x28/0x3b
[  308.766773]  [<ffffffff8119baa7>] ? alloc_fd+0xe5/0xf7
[  308.766776]  [<ffffffff811843fd>] do_sys_open+0x6e/0xfb
[  308.766777]  [<ffffffff811844ab>] sys_open+0x21/0x23
[  308.766780]  [<ffffffff82e9cb69>] system_call_fastpath+0x16/0x1b

Thanks,
Fengguang
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ