lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Thu, 28 Jul 2022 06:20:07 -0700
From:   Guenter Roeck <linux@...ck-us.net>
To:     Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
        linux-kernel@...r.kernel.org
Cc:     stable@...r.kernel.org, torvalds@...ux-foundation.org,
        akpm@...ux-foundation.org, shuah@...nel.org, patches@...nelci.org,
        lkft-triage@...ts.linaro.org, pavel@...x.de, jonathanh@...dia.com,
        f.fainelli@...il.com, sudipm.mukherjee@...il.com,
        slade@...dewatkins.com
Subject: Re: [PATCH 5.10 000/105] 5.10.134-rc1 review

On 7/27/22 09:09, Greg Kroah-Hartman wrote:
> This is the start of the stable review cycle for the 5.10.134 release.
> There are 105 patches in this series, all will be posted as a response
> to this one.  If anyone has any issues with these being applied, please
> let me know.
> 
> Responses should be made by Fri, 29 Jul 2022 16:09:50 +0000.
> Anything received after that time might be too late.
> 

Crashes when trying to boot from btrfs file system. Crash log below.
I'll bisect.

Guenter

---
[   15.603570] BUG: kernel NULL pointer dereference, address: 0000000000000110
[   15.603709] #PF: supervisor read access in kernel mode
[   15.603776] #PF: error_code(0x0000) - not-present page
[   15.603896] PGD 0 P4D 0
[   15.604068] Oops: 0000 [#1] SMP PTI
[   15.604243] CPU: 1 PID: 1 Comm: swapper/0 Not tainted 5.10.134-rc1+ #1
[   15.604329] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
[   15.604688] RIP: 0010:bio_alloc_bioset+0x27/0x2a0
[   15.604897] Code: 00 66 90 41 57 41 56 41 89 f6 41 55 41 89 fd 41 54 55 53 48 89 d3 48 83 ec 20 65 48 8b 04 25 28 00 00 00 48 89 44 24 18 31 c0 <48> 83 ba 10 01 00 00 00 75 08 85 f6 0f 85 40 02 00 00 65 48 8b 04
[   15.605103] RSP: 0000:ffffa56b8001fa68 EFLAGS: 00000246
[   15.605191] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000001
[   15.605274] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000cc0
[   15.605356] RBP: ffffa56b8001faf0 R08: 0000000000000000 R09: ffff8fe184b96400
[   15.605439] R10: 0000000000000001 R11: ffff8fe184b91c00 R12: ffff8fe184b96400
[   15.605520] R13: 0000000000000cc0 R14: 0000000000000000 R15: ffff8fe184bc9428
[   15.605649] FS:  0000000000000000(0000) GS:ffff8fe19f700000(0000) knlGS:0000000000000000
[   15.605742] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   15.605809] CR2: 0000000000000110 CR3: 000000000b022000 CR4: 00000000001506e0
[   15.605960] Call Trace:
[   15.606189]  ? rcu_read_lock_sched_held+0x3e/0x80
[   15.606355]  ? kmem_cache_alloc_trace+0x1cc/0x270
[   15.606420]  btrfs_alloc_device+0x62/0x1f0
[   15.606505]  device_list_add.constprop.0+0x2d4/0x780
[   15.606574]  ? btrfs_scan_one_device+0xf3/0x1b0
[   15.606627]  btrfs_scan_one_device+0xf3/0x1b0
[   15.606688]  btrfs_mount_root+0x257/0x4e0
[   15.606747]  ? rcu_read_lock_sched_held+0x3e/0x80
[   15.606802]  ? kfree+0x1c8/0x2a0
[   15.606851]  legacy_get_tree+0x2b/0x50
[   15.606898]  vfs_get_tree+0x23/0xc0
[   15.606946]  vfs_kern_mount.part.0+0x74/0xb0
[   15.606999]  btrfs_mount+0x134/0x3e0
[   15.607051]  ? cred_has_capability.isra.0+0x73/0x120
[   15.607118]  ? legacy_get_tree+0x2b/0x50
[   15.607166]  ? btrfs_show_options+0x570/0x570
[   15.607216]  legacy_get_tree+0x2b/0x50
[   15.607263]  vfs_get_tree+0x23/0xc0
[   15.607309]  path_mount+0x2b2/0xc00
[   15.607365]  init_mount+0x53/0x87
[   15.607417]  do_mount_root+0x81/0x112
[   15.607468]  mount_block_root+0x112/0x209
[   15.607548]  prepare_namespace+0x136/0x165
[   15.607600]  kernel_init_freeable+0x28c/0x299
[   15.607662]  ? rest_init+0x25a/0x25a
[   15.607710]  kernel_init+0x5/0x106
[   15.607756]  ret_from_fork+0x22/0x30
[   15.607861] Modules linked in:
[   15.608000] CR2: 0000000000000110
[   15.608390] ---[ end trace dfad67f752e12a9e ]---
[   15.608510] RIP: 0010:bio_alloc_bioset+0x27/0x2a0
[   15.608570] Code: 00 66 90 41 57 41 56 41 89 f6 41 55 41 89 fd 41 54 55 53 48 89 d3 48 83 ec 20 65 48 8b 04 25 28 00 00 00 48 89 44 24 18 31 c0 <48> 83 ba 10 01 00 00 00 75 08 85 f6 0f 85 40 02 00 00 65 48 8b 04
[   15.608751] RSP: 0000:ffffa56b8001fa68 EFLAGS: 00000246
[   15.608815] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000001
[   15.608891] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000cc0
[   15.608967] RBP: ffffa56b8001faf0 R08: 0000000000000000 R09: ffff8fe184b96400
[   15.609042] R10: 0000000000000001 R11: ffff8fe184b91c00 R12: ffff8fe184b96400
[   15.609117] R13: 0000000000000cc0 R14: 0000000000000000 R15: ffff8fe184bc9428
[   15.609193] FS:  0000000000000000(0000) GS:ffff8fe19f700000(0000) knlGS:0000000000000000
[   15.609278] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   15.609340] CR2: 0000000000000110 CR3: 000000000b022000 CR4: 00000000001506e0
[   15.609496] BUG: sleeping function called from invalid context at include/linux/percpu-rwsem.h:49
[   15.609604] in_atomic(): 0, irqs_disabled(): 1, non_block: 0, pid: 1, name: swapper/0
[   15.609726] INFO: lockdep is turned off.
[   15.609790] irq event stamp: 481426
[   15.609842] hardirqs last  enabled at (481425): [<ffffffff9c82d234>] kmem_cache_alloc_trace+0x264/0x270
[   15.609946] hardirqs last disabled at (481426): [<ffffffff9d4fa5bd>] exc_page_fault+0x2d/0x200
[   15.610043] softirqs last  enabled at (481406): [<ffffffff9cb53aba>] get_gendisk+0xfa/0x150
[   15.610136] softirqs last disabled at (481404): [<ffffffff9cb53a58>] get_gendisk+0x98/0x150
[   15.610291] CPU: 1 PID: 1 Comm: swapper/0 Tainted: G      D           5.10.134-rc1+ #1
[   15.610374] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
[   15.610478] Call Trace:
[   15.610523]  dump_stack+0x77/0x9b
[   15.610573]  ___might_sleep.cold+0xa6/0xb6
[   15.610627]  exit_signals+0x17/0x2d0
[   15.610674]  do_exit+0xd0/0xb70
[   15.610719]  ? prepare_namespace+0x136/0x165
[   15.610776]  rewind_stack_do_exit+0x17/0x20
[   15.610948] RIP: 0000:0x0
[   15.611077] Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6.
[   15.611155] RSP: 0000:0000000000000000 EFLAGS: 00000000 ORIG_RAX: 0000000000000000
[   15.611252] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
[   15.611326] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[   15.611398] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[   15.611474] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
[   15.611546] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[   15.611771] Kernel panic - not syncing: Attempted to kill init! exitcode=0x00000009
[   15.612465] Kernel Offset: 0x1b600000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff)
[   15.612831] ACPI MEMORY or I/O RESET_REG.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ