lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Thu, 14 Jul 2022 11:24:21 +1000
From:   Dave Chinner <david@...morbit.com>
To:     Oliver Sang <oliver.sang@...el.com>
Cc:     "Darrick J. Wong" <djwong@...nel.org>,
        Dave Chinner <dchinner@...hat.com>,
        LKML <linux-kernel@...r.kernel.org>, linux-xfs@...r.kernel.org,
        lkp@...ts.01.org, lkp@...el.com
Subject: Re: [xfs]  47a6df7cd3: Assertion_failed

On Wed, Jul 13, 2022 at 02:25:25PM +0800, Oliver Sang wrote:
> hi Dave,
> 
> On Wed, Jul 13, 2022 at 07:47:45AM +1000, Dave Chinner wrote:
> > > 
> > > If you fix the issue, kindly add following tag
> > > Reported-by: kernel test robot <oliver.sang@...el.com>
> > > 
> > > 
> > > [   94.271323][ T9089] XFS (sda5): Mounting V5 Filesystem
> > > [   94.369992][ T9089] XFS (sda5): Ending clean mount
> > > [   94.376046][ T9089] xfs filesystem being mounted at /fs/scratch supports timestamps until 2038 (0x7fffffff)
> > > [  112.154792][  T311] xfs/076       IPMI BMC is not supported on this machine, skip bmc-watchdog setup!
> > > [  112.154805][  T311]
> > > [  161.426026][T29384] XFS: Assertion failed: xfs_is_shutdown(mp) || list_empty(&tp->t_dfops), file: fs/xfs/xfs_trans.c, line: 951
> > > [  161.437713][T29384] ------------[ cut here ]------------
> > > [  161.443155][T29384] kernel BUG at fs/xfs/xfs_message.c:110!
> > > [  161.448854][T29384] invalid opcode: 0000 [#1] SMP KASAN PTI
> > > [  161.454536][T29384] CPU: 1 PID: 29384 Comm: touch Not tainted 5.16.0-rc5-00001-g47a6df7cd317 #1
> > 
> > 5.16-rc5? Seems like a really old kernel to be testing....
> > 
> > Does this reproduce on a current 5.19-rc6 kernel?
> 
> yes, it's still reproducible. however, it's actually random on both 47a6df7cd3
> and 5.19-rc6, as below.
> it's clean on 40 runs of v5.16-rc5,
> on 47a6df7cd3, it's reproduced 9 times out of 40 runs,

Of course, 47a6df7cd3 introduced the ASSERT that is firing. You'll
never see the failure on kernels before this, even if the issue is
occurring. It also points out this isn't a new issue, it's been
around since before we added detection of it.

> on v5.19-rc6, it's reprodced 7 times out of 20 runs.

Hmmm. I've just run 50 iterations here on my 5.19-rc6 based VMs
and I haven't seen a single failure. So it's not failing regularly
here which means it is influenced by environmental factors.

How big are the disks you are testing with?

Cheers,

Dave.
-- 
Dave Chinner
david@...morbit.com

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ