lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <87egc4xmap.fsf@yhuang-dev.intel.com>
Date:	Tue, 23 Feb 2016 09:11:58 +0800
From:	kernel test robot <ying.huang@...ux.intel.com>
TO:	Jan Kara <jack@...e.cz>
CC:	LKML <linux-kernel@...r.kernel.org>
Subject: [lkp] [quota] ba5da72c22: WARNING: CPU: 0 PID: 29133 at
 fs/ext4/ext4_jbd2.c:48 ext4_journal_check_start+0x67/0xa0()

FYI, we noticed the below changes on

https://git.kernel.org/pub/scm/linux/kernel/git/jack/linux-fs.git getnextquota
commit ba5da72c225b3588000a7ecfacb5f510c29a3723 ("quota: Allow Q_GETQUOTA for frozen filesystem")


+------------------------------------------------------------+------------+------------+
|                                                            | fa03786fb0 | ba5da72c22 |
+------------------------------------------------------------+------------+------------+
| boot_successes                                             | 8          | 16         |
| boot_failures                                              | 0          | 5          |
| WARNING:at_fs/ext4/ext4_jbd2.c:#ext4_journal_check_start() | 0          | 4          |
| backtrace:quota_getquota                                   | 0          | 4          |
| backtrace:SyS_quotactl                                     | 0          | 4          |
| BUG:kernel_test_crashed                                    | 0          | 1          |
+------------------------------------------------------------+------------+------------+



[  639.272995] EXT4-fs (sda8): re-mounted. Opts: (null)
[  639.284083] EXT4-fs (sda8): re-mounted. Opts: (null)
[  639.406731] ------------[ cut here ]------------
[  639.413284] WARNING: CPU: 0 PID: 29133 at fs/ext4/ext4_jbd2.c:48 ext4_journal_check_start+0x67/0xa0()
[  639.426236] Modules linked in: loop dm_flakey dm_mod rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver netconsole btrfs xor raid6_pq sg sd_mod x86_pkg_temp_thermal coretemp ata_generic kvm_intel pata_acpi kvm irqbypass crct10dif_pclmul eeepc_wmi crc32_pclmul asus_wmi sparse_keymap rfkill ppdev crc32c_intel snd_hda_codec_hdmi snd_hda_codec_realtek snd_hda_codec_generic ghash_clmulni_intel ata_piix pata_via serio_raw pcspkr i915 aesni_intel lrw gf128mul glue_helper ablk_helper drm_kms_helper syscopyarea cryptd sysfillrect sysimgblt fb_sys_fops snd_hda_intel snd_hda_codec snd_hda_core drm snd_hwdep snd_pcm snd_timer snd soundcore shpchp libata wmi parport_pc parport tpm_infineon video
[  639.497181] CPU: 0 PID: 29133 Comm: setquota Not tainted 4.5.0-rc3-00004-gba5da72 #1
[  639.506282] Hardware name: System manufacturer System Product Name/P8H67-M PRO, BIOS 1002 04/01/2011
[  639.516768]  0000000000000000 ffff880093f0fc50 ffffffff81423a8a 0000000000000000
[  639.525616]  ffffffff81bef128 ffff880093f0fc88 ffffffff8107a476 ffff8800950d1000
[  639.534438]  0000000000000049 0000000000000000 ffffffff812978d7 ffff8800977a8a00
[  639.543268] Call Trace:
[  639.547044]  [<ffffffff81423a8a>] dump_stack+0x63/0x89
[  639.553514]  [<ffffffff8107a476>] warn_slowpath_common+0x86/0xc0
[  639.560835]  [<ffffffff812978d7>] ? ext4_acquire_dquot+0x57/0xa0
[  639.568132]  [<ffffffff8107a56a>] warn_slowpath_null+0x1a/0x20
[  639.575257]  [<ffffffff812b4bf7>] ext4_journal_check_start+0x67/0xa0
[  639.582873]  [<ffffffff812b4d36>] __ext4_journal_start_sb+0x36/0xe0
[  639.590421]  [<ffffffff812978d7>] ext4_acquire_dquot+0x57/0xa0
[  639.597495]  [<ffffffff81259ca0>] dqget+0x3f0/0x450
[  639.603594]  [<ffffffff8125a464>] dquot_get_dqblk+0x14/0xf0
[  639.610379]  [<ffffffff8125dbb6>] quota_getquota+0x96/0x190
[  639.617165]  [<ffffffff812048d4>] ? getname_kernel+0x34/0x120
[  639.624089]  [<ffffffff811d1a57>] ? kmem_cache_alloc+0x197/0x200
[  639.631264]  [<ffffffff8120caa1>] ? dput+0xc1/0x250
[  639.637323]  [<ffffffff813b68cb>] ? selinux_quotactl+0x6b/0xa0
[  639.644325]  [<ffffffff813b0f2b>] ? security_quotactl+0x4b/0x70
[  639.651369]  [<ffffffff8125ed6e>] SyS_quotactl+0x6be/0x880
[  639.657964]  [<ffffffff81064d2a>] ? __do_page_fault+0x1ca/0x410
[  639.665012]  [<ffffffff818e10ae>] entry_SYSCALL_64_fastpath+0x12/0x71
[  639.672564] ---[ end trace ccf7f0485c6586e4 ]---
[  639.673125] systemd-journald[125]: Compressed data object 683 -> 508


To reproduce:

        git clone git://git.kernel.org/pub/scm/linux/kernel/git/wfg/lkp-tests.git
        cd lkp-tests
        bin/lkp install job.yaml  # job file is attached in this email
        bin/lkp run     job.yaml



Thanks,
Ying Huang

View attachment "config-4.5.0-rc3-00004-gba5da72" of type "text/plain" (145338 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (22008 bytes)

View attachment "job.yaml" of type "text/plain" (3471 bytes)

Download attachment "reproduce.sh" of type "application/x-sh" (2542 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ