lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <9f1b81682e853655c74589ace5debf9a55edff51.camel@sapience.com>
Date: Sat, 16 Nov 2024 07:01:28 -0500
From: Genes Lists <lists@...ience.com>
To: Yu Kuai <yukuai1@...weicloud.com>, Song Liu <song@...nel.org>, 
	dm-devel@...ts.linux.dev, Alasdair Kergon <agk@...hat.com>, Mike Snitzer
	 <snitzer@...nel.org>, Mikulas Patocka <mpatocka@...hat.com>
Cc: linux-raid@...r.kernel.org, linux-kernel@...r.kernel.org, 
	linux@...mhuis.info, "yukuai (C)" <yukuai3@...wei.com>
Subject: Re: md-raid 6.11.8 page fault oops

On Sat, 2024-11-16 at 11:34 +0800, Yu Kuai wrote:
> 
> 
> While reporting bugs, it'll be much helpful if you can provide
> addr2line
> here, fo example:
> 
> gdb dm_mod.ko
> list *(clone_endio+0x43)
> 
> Thanks,
> Kuai
> 
Of course thank you.

Let me know if there's anything else that would be helpful.

I needed to rebuild with debug turned on as production build has it off
- but toolchain is unchanged so this should be valid:

(gdb) list *(clone_endio+0x43)
0x3733 is in clone_endio (drivers/md/dm.c:1111).
1106	static void clone_endio(struct bio *bio)
1107	{
1108		blk_status_t error = bio->bi_status;
1109		struct dm_target_io *tio = clone_to_tio(bio);
1110		struct dm_target *ti = tio->ti;
1111		dm_endio_fn endio = likely(ti != NULL) ? ti->type-
>end_io : NULL;
1112		struct dm_io *io = tio->io;
1113		struct mapped_device *md = io->md;
1114	
1115		if (unlikely(error == BLK_STS_TARGET)) {

-- 
Gene


Download attachment "signature.asc" of type "application/pgp-signature" (229 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ