lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <87ip46ss0o.fsf@openvz.org>
Date:	Mon, 01 Apr 2013 10:07:35 +0400
From:	Dmitry Monakhov <dmonakhov@...nvz.org>
To:	CAI Qian <caiqian@...hat.com>, Theodore Ts'o <tytso@....edu>
Cc:	LKML <linux-kernel@...r.kernel.org>,
	linux-s390 <linux-s390@...r.kernel.org>,
	Steve Best <sbest@...hat.com>, linux-ext4@...r.kernel.org
Subject: Re: s390x: kernel BUG at fs/ext4/inode.c:1591!

On Fri, 29 Mar 2013 05:27:02 -0400 (EDT), CAI Qian <caiqian@...hat.com> wrote:
> 
I've spent a half of weekend by trying to create s390x guest image,
without any success. Can you please share it.
> 
> ----- Original Message -----
> > From: "Theodore Ts'o" <tytso@....edu>
> > To: "CAI Qian" <caiqian@...hat.com>
> > Cc: "LKML" <linux-kernel@...r.kernel.org>, "linux-s390" <linux-s390@...r.kernel.org>, "Steve Best"
> > <sbest@...hat.com>, linux-ext4@...r.kernel.org
> > Sent: Thursday, March 28, 2013 8:05:17 PM
> > Subject: Re: s390x: kernel BUG at fs/ext4/inode.c:1591!
> > 
> > On Thu, Mar 28, 2013 at 02:40:33AM -0400, CAI Qian wrote:
> > > System hung when running xfstests-dev 013 test case on an s390x
> > > guest. Never saw
> > > this on 3.9-rc3 before but need to double-check. Any idea?
> > > 
> > > Ý 1113.795759¨ ------------Ý cut here ¨------------
> > > Ý 1113.795771¨ kernel BUG at fs/ext4/inode.c:1591!
> > 
> > thanks for the report.  What kernel version did this come from?  Was
> > it 3.9-rc4?  (line 1591 for 3.9-rc3 doesn't contain a BUG_ON).
> Yes, the lastest mainline.
> > 
> > If it is indeed 3.9-rc4, it would be helpful, since you can reproduce
> > the problem, to insert a debugging printk which fires when
> > bh->b_blocknr != pblock before the BUG_ON, and have it print the
> > b_blocknr and pblock values.
> bh->b_blocknr=100346
> pblock=66797
> 
> Bisecting results so far,
> git bisect start
> # good: [a937536b868b8369b98967929045f1df54234323] Linux 3.9-rc3
> git bisect good a937536b868b8369b98967929045f1df54234323
> # bad: [9064171268d838b8f283fe111ef086b9479d059a] Merge tag 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/sfr/next-fixes
> git bisect bad 9064171268d838b8f283fe111ef086b9479d059a
> # bad: [38d78e587d4960d0db94add518d27ee74bad2301] mqueue: sys_mq_open: do not call mnt_drop_write() if read-only
> git bisect bad 38d78e587d4960d0db94add518d27ee74bad2301
> # good: [e7489622d3603b7d161b484dcd340d9f678b0c7a] Merge tag 'arm64-fixes' of git://git.kernel.org/pub/scm/linux/kernel/git/cmarinas/linux-aarch64
> git bisect good e7489622d3603b7d161b484dcd340d9f678b0c7a
> # good: [172a271b5e090da7468c66b9ccbcdb3d929eed75] Merge branch 'drm-fixes' of git://people.freedesktop.org/~airlied/linux
> git bisect good 172a271b5e090da7468c66b9ccbcdb3d929eed75
> # good: [0a7e453103b9718d357688b83bb968ee108cc874] Merge branch 'next' of git://git.kernel.org/pub/scm/linux/kernel/git/rzhang/linux
> git bisect good 0a7e453103b9718d357688b83bb968ee108cc874
> # bad: [0e401101db49959f5783f6ee9e676124b5a183ac] ext4: fix memory leakage in mext_check_coverage
> git bisect bad 0e401101db49959f5783f6ee9e676124b5a183ac
> CAI Qian
> > 
> > Thanks,
> > 
> > 						- Ted
> > 
> --
> To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
> the body of a message to majordomo@...r.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
> Please read the FAQ at  http://www.tux.org/lkml/
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ