lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <87a8n2d7xa.fsf@yhuang-dev.intel.com>
Date:	Mon, 15 Feb 2016 10:27:45 +0800
From:	kernel test robot <ying.huang@...ux.intel.com>
TO:	Jan Kara <jack@...e.cz>
CC:	LKML <linux-kernel@...r.kernel.org>
Subject: [lkp] [quota] 7955118eaf: WARNING: CPU: 10 PID: 30952 at
 fs/ext4/ext4_jbd2.c:48 ext4_journal_check_start+0x67/0xa0()

FYI, we noticed the below changes on

https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master
commit 7955118eafc4a2621fd88e92b505919af344583f ("quota: Allow Q_GETQUOTA for frozen filesystem")


<6>[  851.605803] EXT4-fs (sdg1): re-mounted. Opts: (null)
<6>[  851.617814] EXT4-fs (sdg1): re-mounted. Opts: (null)
<4>[  851.744797] ------------[ cut here ]------------
<4>[  851.749567] WARNING: CPU: 10 PID: 30952 at fs/ext4/ext4_jbd2.c:48 ext4_journal_check_start+0x67/0xa0()
<4>[  851.763884] Modules linked in: loop dm_flakey dm_mod btrfs xor raid6_pq ses enclosure ipmi_devintf rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver sg sr_mod ata_generic sd_mod cdrom pata_acpi mptsas coretemp mptscsih kvm_intel kvm irqbypass ahci crct10dif_pclmul mptbase snd_pcm scsi_transport_sas crc32_pclmul snd_timer crc32c_intel pata_jmicron ghash_clmulni_intel libahci aesni_intel lrw gf128mul snd glue_helper ablk_helper ppdev soundcore ipmi_si pcspkr i7core_edac serio_raw libata parport_pc edac_core shpchp cryptd parport ipmi_msghandler acpi_cpufreq
<4>[  851.815707] CPU: 10 PID: 30952 Comm: setquota Not tainted 4.5.0-rc3-00011-g7955118 #1
<4>[  851.816359] Hardware name: Supermicro X8DTN/X8DTN, BIOS 4.6.3 01/06/2010
<4>[  851.816359]  0000000000000000 ffff88043b397c50 ffffffff8142400a 0000000000000000
<4>[  851.816359]  ffffffff81bee540 ffff88043b397c88 ffffffff8107a476 ffff88043ca70800
<4>[  851.816359]  0000000000000049 0000000000000000 ffffffff812978d7 ffff88043aa91900
<4>[  851.816359] Call Trace:
<4>[  851.816359]  [<ffffffff8142400a>] dump_stack+0x63/0x89
<4>[  851.816359]  [<ffffffff8107a476>] warn_slowpath_common+0x86/0xc0
<4>[  851.816359]  [<ffffffff812978d7>] ? ext4_acquire_dquot+0x57/0xa0
<4>[  851.816359]  [<ffffffff8107a56a>] warn_slowpath_null+0x1a/0x20
<4>[  851.816359]  [<ffffffff812b4bf7>] ext4_journal_check_start+0x67/0xa0
<4>[  851.816359]  [<ffffffff812b4d36>] __ext4_journal_start_sb+0x36/0xe0
<4>[  851.816359]  [<ffffffff812978d7>] ext4_acquire_dquot+0x57/0xa0
<4>[  851.816359]  [<ffffffff81259ca0>] dqget+0x3f0/0x450
<4>[  851.816359]  [<ffffffff8125a464>] dquot_get_dqblk+0x14/0xf0
<4>[  851.816359]  [<ffffffff8125dbb6>] quota_getquota+0x96/0x190
<4>[  851.816359]  [<ffffffff812048d4>] ? getname_kernel+0x34/0x120
<4>[  851.816359]  [<ffffffff811d1a57>] ? kmem_cache_alloc+0x197/0x200
<4>[  851.816359]  [<ffffffff8120caa1>] ? dput+0xc1/0x250
<4>[  851.816359]  [<ffffffff813b6e4b>] ? selinux_quotactl+0x6b/0xa0
<4>[  851.816359]  [<ffffffff813b14ab>] ? security_quotactl+0x4b/0x70
<4>[  851.816359]  [<ffffffff8125ed6e>] SyS_quotactl+0x6be/0x880
<4>[  851.816359]  [<ffffffff81064d2a>] ? __do_page_fault+0x1ca/0x410
<4>[  851.816359]  [<ffffffff818e162e>] entry_SYSCALL_64_fastpath+0x12/0x71
<4>[  851.962595] ---[ end trace 7ebc0d116cff0409 ]---
<47>


To reproduce:

        git clone git://git.kernel.org/pub/scm/linux/kernel/git/wfg/lkp-tests.git
        cd lkp-tests
        bin/lkp install job.yaml  # job file is attached in this email
        bin/lkp run     job.yaml



Thanks,
Kernel Test Robot

View attachment "config-4.5.0-rc3-00011-g7955118" of type "text/plain" (145338 bytes)

Download attachment "kmsg.xz" of type "application/x-xz" (33200 bytes)

View attachment "job.yaml" of type "text/plain" (3169 bytes)

Download attachment "reproduce.sh" of type "application/x-sh" (2542 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ