lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 7 Dec 2015 12:40:47 +0100
From:	Jan Stancek <jstancek@...hat.com>
To:	linux-mm@...ck.org, linux-kernel@...r.kernel.org
Cc:	jstancek@...hat.com
Subject: kernel BUG at mm/filemap.c:238! (4.4.0-rc4)

Hi,

"ADSP018" test from LTP[1] is triggering BUG_ON below reliably for me on 4.4.0-rc4.
I'll start a bisect - if someone already sees a suspect/culprit that could narrow
it down, please let me know.

# ./aiodio_sparse -i 4 -a 8k -w 16384k -s 65536k -n 2
aiodio_sparse    0  TINFO  :  Dirtying free blocks
aiodio_sparse    0  TINFO  :  Starting I/O tests
aiodio_sparse    0  TINFO  :  Killing childrens(s)

[  637.250251] ------------[ cut here ]------------
[  637.255404] kernel BUG at mm/filemap.c:238!
[  637.260069] invalid opcode: 0000 [#1] SMP
[  637.264655] Modules linked in: loop x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm irqbypass crct10dif_pclmul crc32_pclmul iTCO_wdt iTCO_vendor_support ipmi_devintf ppdev aesni_intel lrw gf128mul glue_helper ablk_helper cryptd ipmi_ssif lpc_ich sg pcspkr shpchp i2c_i801 mfd_core ipmi_si winbond_cir parport_pc rc_core parport ipmi_msghandler video nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables xfs libcrc32c sr_mod sd_mod cdrom mgag200 drm_kms_helper igb syscopyarea sysfillrect sysimgblt ptp fb_sys_fops pps_core ttm dca i2c_algo_bit drm ahci libahci crc32c_intel libata i2c_core dm_mirror dm_region_hash dm_log dm_mod
[  637.328054] CPU: 6 PID: 22523 Comm: aiodio_sparse Not tainted 4.4.0-rc4 #1
[  637.335723] Hardware name: Intel Corporation S1200RP/S1200RP, BIOS S1200RP.86B.03.01.0002.041520151123 04/15/2015
[  637.347173] task: ffff880437fab200 ti: ffff8804379f4000 task.ti: ffff8804379f4000
[  637.355522] RIP: 0010:[<ffffffff811cd141>]  [<ffffffff811cd141>] delete_from_page_cache+0x81/0x90
[  637.365433] RSP: 0018:ffff8804379f7978  EFLAGS: 00010246
[  637.371358] RAX: 002fffff80020028 RBX: ffffea000fe71c40 RCX: 0000000000000000
[  637.379319] RDX: ffff88043e410220 RSI: 0000000000000000 RDI: ffffea000fe71c40
[  637.387280] RBP: ffff8804379f79a0 R08: 0000000000000000 R09: 0000000000000001
[  637.395241] R10: 0000000000000000 R11: 0000000000000001 R12: ffff880430b543b8
[  637.403202] R13: ffff8804379f79f0 R14: 0000000000000964 R15: 0000000000000000
[  637.411161] FS:  00007fd344bab740(0000) GS:ffff88043e400000(0000) knlGS:0000000000000000
[  637.420188] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  637.426598] CR2: 00007ffc755f8aef CR3: 0000000001ad6000 CR4: 00000000003406e0
[  637.434560] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  637.442518] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  637.450479] Stack:
[  637.452718]  ffffea000fe71c40 ffff880430b543b8 ffff8804379f79f0 0000000000000964
[  637.461009]  0000000000000000 ffff8804379f79c0 ffffffff811dee66 ffffffffffffffff
[  637.469299]  ffff8804379f7a60 ffff8804379f7b10 ffffffff811df2cb 0000000000000000
[  637.477590] Call Trace:
[  637.480316]  [<ffffffff811dee66>] truncate_inode_page+0x56/0x90
[  637.486922]  [<ffffffff811df2cb>] truncate_inode_pages_range+0x3eb/0x760
[  637.494399]  [<ffffffff811df6ac>] truncate_inode_pages_final+0x4c/0x60
[  637.501695]  [<ffffffffa02b2537>] xfs_fs_evict_inode+0x77/0x1b0 [xfs]
[  637.508881]  [<ffffffff8127c22f>] evict+0xaf/0x180
[  637.514223]  [<ffffffff8127cc6f>] iput+0x1af/0x290
[  637.519566]  [<ffffffff812763fc>] __dentry_kill+0x17c/0x1e0
[  637.525782]  [<ffffffff812776ad>] dput+0x25d/0x310
[  637.531126]  [<ffffffff81277470>] ? dput+0x20/0x310
[  637.536566]  [<ffffffff8125f904>] __fput+0x1a4/0x240
[  637.542102]  [<ffffffff8125f9de>] ____fput+0xe/0x10
[  637.547542]  [<ffffffff810b91a7>] task_work_run+0x77/0xa0
[  637.553565]  [<ffffffff81098fdf>] do_exit+0x33f/0xc60
[  637.559199]  [<ffffffff8109998c>] do_group_exit+0x4c/0xc0
[  637.565221]  [<ffffffff810a7a11>] get_signal+0x331/0x8f0
[  637.571147]  [<ffffffff8101d3c7>] do_signal+0x37/0x680
[  637.576878]  [<ffffffff81113ab3>] ? rcu_read_lock_sched_held+0x93/0xa0
[  637.584160]  [<ffffffff8123303e>] ? kfree+0x1ae/0x270
[  637.589794]  [<ffffffff8108f2e4>] ? exit_to_usermode_loop+0x33/0xac
[  637.596785]  [<ffffffff8108f30f>] exit_to_usermode_loop+0x5e/0xac
[  637.603584]  [<ffffffff81003d0b>] syscall_return_slowpath+0xbb/0x130
[  637.610673]  [<ffffffff81761ada>] int_ret_from_sys_call+0x25/0x9f
[  637.617469] Code: e8 65 3d 59 00 4c 89 ef e8 1d 72 07 00 4d 85 f6 74 06 48 89 df 41 ff d6 48 89 df e8 1a fb 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 <0f> 0b 66 66 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 55
[  637.639172] RIP  [<ffffffff811cd141>] delete_from_page_cache+0x81/0x90
[  637.646464]  RSP <ffff8804379f7978>

Regards,
Jan

[1] https://github.com/linux-test-project/ltp
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ