lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1389210102.23310.31.camel@ret.masoncoding.com>
Date:	Wed, 8 Jan 2014 19:41:14 +0000
From:	Chris Mason <clm@...com>
To:	"muthu.lkml@...il.com" <muthu.lkml@...il.com>
CC:	"kmo@...erainc.com" <kmo@...erainc.com>,
	"linux-btrfs@...r.kernel.org" <linux-btrfs@...r.kernel.org>,
	"fengguang.wu@...el.com" <fengguang.wu@...el.com>,
	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
	"lkp@...ux.intel.com" <lkp@...ux.intel.com>,
	"axboe@...nel.dk" <axboe@...nel.dk>,
	"linux-fsdevel@...r.kernel.org" <linux-fsdevel@...r.kernel.org>
Subject: Re: [block:for-3.14/core] kernel BUG at fs/bio.c:1748

On Tue, 2014-01-07 at 13:23 -0800, Muthu Kumar wrote:
> Chris,
> This is based off of Jens block tree, for-3.14/core branch...
> 

Ok, Kent did pull in one of my hunks, one was a comment and the third
was effectively the same as your patch.  I tried to test the end result
today, but get these on boot with ext4:

[    8.336061] WARNING: CPU: 0 PID: 0 at fs/bio.c:1778 bio_endio+0xbe/0x100()
[    8.336062] bio_endio: bio for (unknown) without endio
[    8.336063] Modules linked in: megaraid_sas(+)
[    8.336065] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 3.13.0-rc7-mason+ #1
[    8.336066] Hardware name: ZTSYSTEMS Echo Ridge T4  /A9DRPF-10D, BIOS 1.07 05/10/2012
[    8.336069]  00000000000006f2 ffff88087fc03c28 ffffffff815cb8c6 00000000000006f2
[    8.336071]  ffff88087fc03c78 ffff88087fc03c68 ffffffff81047497 ffff88085561a8e8
[    8.336073]  ffff8808582b6d80 00000000000000fe 00000000fffffffb ffff8808582b6d80
[    8.336073] Call Trace:
[    8.336078]  <IRQ>  [<ffffffff815cb8c6>] dump_stack+0x49/0x5b
[    8.336082]  [<ffffffff81047497>] warn_slowpath_common+0x87/0xb0
[    8.336084]  [<ffffffff81047561>] warn_slowpath_fmt+0x41/0x50
[    8.336086]  [<ffffffff813aa6b8>] ? scsi_request_fn+0xc8/0x6a0
[    8.336087]  [<ffffffff8119bc8e>] bio_endio+0xbe/0x100
[    8.336091]  [<ffffffff8128c1d3>] blk_update_request+0x243/0x3a0
[    8.336092]  [<ffffffff8128c352>] blk_update_bidi_request+0x22/0xa0
[    8.336094]  [<ffffffff8128ceca>] blk_end_bidi_request+0x2a/0x80
[    8.336096]  [<ffffffff8128cf5b>] blk_end_request+0xb/0x10
[    8.336098]  [<ffffffff813ab916>] scsi_io_completion+0xa6/0x700
[    8.336100]  [<ffffffff813a2b68>] scsi_finish_command+0xc8/0x130
[    8.336101]  [<ffffffff813ac0bf>] scsi_softirq_done+0x13f/0x160
[    8.336104]  [<ffffffff812937ad>] blk_done_softirq+0x6d/0x80
[    8.336106]  [<ffffffff8104c26b>] __do_softirq+0xdb/0x290
[    8.336108]  [<ffffffff8104c51d>] irq_exit+0xbd/0xd0
[    8.336110]  [<ffffffff81003db1>] do_IRQ+0x61/0xe0
[    8.336112]  [<ffffffff815d012a>] common_interrupt+0x6a/0x6a
[    8.336117]  <EOI>  [<ffffffff814e213a>] ? cpuidle_enter_state+0x4a/0xc0
[    8.336119]  [<ffffffff814e2136>] ? cpuidle_enter_state+0x46/0xc0
[    8.336121]  [<ffffffff814e2277>] cpuidle_idle_call+0xc7/0x160
[    8.336123]  [<ffffffff8100b2c9>] arch_cpu_idle+0x9/0x20
[    8.336126]  [<ffffffff8108fd8a>] cpu_startup_entry+0x9a/0x250
[    8.336128]  [<ffffffff815c3702>] rest_init+0x72/0x80
[    8.336131]  [<ffffffff81ac2047>] start_kernel+0x3fd/0x40a
[    8.336133]  [<ffffffff81ac1a78>] ? repair_env_string+0x5b/0x5b
[    8.336134]  [<ffffffff81ac159d>] x86_64_start_reservations+0x2a/0x2c
[    8.336136]  [<ffffffff81ac16df>] x86_64_start_kernel+0x140/0x147
[    8.336137] ---[ end trace d0966e2430ea53b4 ]---
[    8.336146] ------------[ cut here ]------------
[    8.336146] kernel BUG at fs/bio.c:523!
[    8.336148] invalid opcode: 0000 [#1] SMP
[    8.336148] Modules linked in: megaraid_sas(+)
[    8.336150] CPU: 0 PID: 2911 Comm: scsi_id Tainted: G        W    3.13.0-rc7-mason+ #1
[    8.336150] Hardware name: ZTSYSTEMS Echo Ridge T4  /A9DRPF-10D, BIOS 1.07 05/10/2012
[    8.336151] task: ffff8808556b4150 ti: ffff8808556b6000 task.ti: ffff8808556b6000
[    8.336153] RIP: 0010:[<ffffffff8119bbba>]  [<ffffffff8119bbba>] bio_put+0x8a/0xa0
[    8.336153] RSP: 0018:ffff8808556b7b68  EFLAGS: 00010246
[    8.336154] RAX: 0000000000000000 RBX: ffff8808582b6d80 RCX: 0000000000000000
[    8.336155] RDX: ffff8808582b6dec RSI: 0000000000000003 RDI: ffff8808582b6d80
[    8.336155] RBP: ffff8808556b7b78 R08: 0000000000000004 R09: 0000000000000000
[    8.336156] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
[    8.336156] R13: 0000000000000000 R14: ffff8808567ebe28 R15: ffff8808582b6d80
[    8.336157] FS:  00007f16056bd700(0000) GS:ffff88087fc00000(0000) knlGS:0000000000000000
[    8.336158] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[    8.336159] CR2: ffffe8f7ffc00000 CR3: 0000000856303000 CR4: 00000000000407f0
[    8.336159] Stack:
[    8.336164]  ffff8808582b6d80 0000000000000000 ffff8808556b7ba8 ffffffff81291b37
[    8.336168]  ffff8808556b7b88 ffff8808556b7cf8 ffff88085561a8e8 ffff880855685400
[    8.336172]  ffff8808556b7c78 ffffffff8129b42d ffff8808556b7be8 ffffffff8119e09b
[    8.336172] Call Trace:
[    8.336174]  [<ffffffff81291b37>] blk_rq_unmap_user+0x47/0x60
[    8.336177]  [<ffffffff8129b42d>] sg_io+0x26d/0x370
[    8.336179]  [<ffffffff8119e09b>] ? bdget+0x11b/0x130
[    8.336183]  [<ffffffff811068c9>] ? find_get_page+0x19/0xa0
[    8.336185]  [<ffffffff8129bc79>] scsi_cmd_ioctl+0x409/0x480
[    8.336186]  [<ffffffff81106af2>] ? unlock_page+0x22/0x30
[    8.336189]  [<ffffffff81130949>] ? __do_fault+0x439/0x560
[    8.336191]  [<ffffffff8129bd3c>] scsi_cmd_blk_ioctl+0x4c/0x70
[    8.336194]  [<ffffffff81437d6f>] sd_ioctl+0xcf/0x160
[    8.336196]  [<ffffffff81298003>] __blkdev_driver_ioctl+0x23/0x30
[    8.336198]  [<ffffffff81298638>] blkdev_ioctl+0x1f8/0x790
[    8.336199]  [<ffffffff8119d717>] block_ioctl+0x37/0x40
[    8.336201]  [<ffffffff811790c7>] do_vfs_ioctl+0x87/0x4f0
[    8.336204]  [<ffffffff8126374a>] ? file_has_perm+0x8a/0xa0
[    8.336205]  [<ffffffff811795c1>] SyS_ioctl+0x91/0xa0
[    8.336207]  [<ffffffff815d77e2>] system_call_fastpath+0x16/0x1b
[    8.336218] Code: 8b 74 24 10 48 29 fb 48 89 df e8 a2 d2 f6 ff 48 8b 1c 24 4c 8b 64 24 08 c9 c3 0f 1f 80 00 00 00 00 48 89 df e8 38 60 fb ff eb 9a <0f> 0b 0f 1f 40 00 eb f
a 66 66 66 66 66 2e 0f 1f 84 00 00 00 00
[    8.336220] RIP  [<ffffffff8119bbba>] bio_put+0x8a/0xa0
[    8.336220]  RSP <ffff8808556b7b68>
[    8.336221] ---[ end trace d0966e2430ea53b5 ]---

Trying to track it down.

-chris
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ