lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20251119063848.2461235-1-jiping.ma2@windriver.com>
Date: Wed, 19 Nov 2025 06:38:48 +0000
From: Jiping Ma <jiping.ma2@...driver.com>
To: agk@...hat.com, snitzer@...nel.org, dm-devel@...ts.linux.dev
Cc: linux-kernel@...r.kernel.org, jiping.ma2@...driver.com
Subject: BUG: scheduling while atomic: lvm/1380/0x00000003

I'd like to draw the attention of the dm_snapshot maintainers to "BUG: scheduling while atomic:", the kernel version is 6.6.71.
The issue can be reproduced during rollback to the old version(6.6.71) from the new version(6.12.40).

We haven't yet bottomed out the root cause.
Any suggestions or assistance would be appreciated.

thanks,
Jiping

[   35.418736] iTCO_wdt iTCO_wdt: unable to reset NO_REBOOT flag, device disabled by hardware/BIOS
Discovering and coalescing multipaths...[   35.481177] device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log.
[   35.481226] device-mapper: uevent: version 1.0.3
[   35.481395] device-mapper: ioctl: 4.48.0-ioctl (2023-03-01) initialised: dm-devel@...hat.com
done.
Multipath activation: SUCCESS
[   36.563812] BUG: scheduling while atomic: lvm/1380/0x00000003
[   36.563817] Modules linked in: dm_snapshot dm_bufio dm_multipath dm_mod iTCO_wdt pmt_telemetry iTCO_vendor_support intel_sdsi pmt_class intel_uncore_frequency intel_uncore_frequency_common x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm irqbypass crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel sha512_ssse3 rapl intel_cstate nvme nvme_core intel_uncore t10_pi crc64_rocksoft_generic idxd ahci crc64_rocksoft i2c_i801 mei_me intel_vsec idxd_bus crc64 libahci i2c_smbus mei i2c_ismt wmi acpi_ipmi ipmi_si ipmi_devintf ipmi_msghandler acpi_power_meter iavf(O) i40e(O) ice(O)
[   36.563841] CPU: 32 PID: 1380 Comm: lvm Tainted: G           O       6.6.0-1-rt-amd64 #1  Debian 6.6.71-1.stx.104
[   36.563844] Hardware name: ZTSYSTEMS Galene EI/Galene, BIOS 1.01 12/07/2023
[   36.563845] Call Trace:
[   36.563848]  <TASK>
[   36.563849]  dump_stack_lvl+0x37/0x50
[   36.563855]  __schedule_bug+0x52/0x60
[   36.563859]  __schedule+0x87d/0xb10
[   36.563861]  ? update_load_avg+0x7e/0x750
[   36.563865]  schedule_rtlock+0x1f/0x40
[   36.563866]  rtlock_slowlock_locked+0x232/0xd40
[   36.563870]  ? __set_cpus_allowed_ptr+0x55/0xa0
[   36.563873]  ? dm_add_exception+0xb4/0xf0 [dm_snapshot]
[   36.563879]  rt_spin_lock+0x45/0x60
[   36.563881]  kmem_cache_free+0x182/0x480
[   36.563884]  dm_add_exception+0xb4/0xf0 [dm_snapshot]
[   36.563889]  persistent_read_metadata+0x29d/0x550 [dm_snapshot]
[   36.563895]  ? __pfx_dm_add_exception+0x10/0x10 [dm_snapshot]
[   36.563900]  snapshot_ctr+0x60b/0x8f0 [dm_snapshot]
[   36.563905]  dm_table_add_target+0x246/0x3b0 [dm_mod]
[   36.563919]  table_load+0x136/0x4b0 [dm_mod]
[   36.563930]  ? __pfx_table_load+0x10/0x10 [dm_mod]
[   36.563940]  ctl_ioctl+0x1b3/0x500 [dm_mod]
[   36.563950]  dm_ctl_ioctl+0xe/0x20 [dm_mod]
[   36.563960]  __x64_sys_ioctl+0x8f/0xd0
[   36.563964]  do_syscall_64+0x58/0xb0
[   36.563967]  ? dm_ctl_ioctl+0xe/0x20 [dm_mod]
[   36.563976]  ? __ct_user_enter+0x2f/0xd0
[   36.563978]  ? syscall_exit_to_user_mode+0x32/0x40
[   36.563980]  ? do_syscall_64+0x65/0xb0
[   36.563983]  ? exit_to_user_mode_prepare+0xa9/0x190
[   36.563985]  ? __ct_user_enter+0x2f/0xd0
[   36.563987]  ? syscall_exit_to_user_mode+0x32/0x40
[   36.563989]  ? do_syscall_64+0x65/0xb0
[   36.563991]  ? __ct_user_enter+0x2f/0xd0
[   36.563993]  ? syscall_exit_to_user_mode+0x32/0x40
[   36.563994]  ? do_syscall_64+0x65/0xb0
[   36.563996]  ? __ct_user_enter+0x2f/0xd0
[   36.563998]  ? syscall_exit_to_user_mode+0x32/0x40
[   36.563999]  ? do_syscall_64+0x65/0xb0
[   36.564001]  ? __ct_user_enter+0x2f/0xd0
[   36.564003]  ? syscall_exit_to_user_mode+0x32/0x40
[   36.564005]  ? do_syscall_64+0x65/0xb0
[   36.564006]  ? do_syscall_64+0x65/0xb0
[   36.564008]  ? exc_page_fault+0x3f7/0x740
[   36.564010]  ? __ct_user_enter+0x2f/0xd0
[   36.564012]  entry_SYSCALL_64_after_hwframe+0x78/0xe2
[   36.564015] RIP: 0033:0x7f092a7fe2e7
[   36.564017] Code: 00 00 00 48 8b 05 a9 cb 0d 00 64 c7 00 26 00 00 00 48 c7 c0 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 79 cb 0d 00 f7 d8 64 89 01 48
[   36.564019] RSP: 002b:00007ffe43a0fa58 EFLAGS: 00000206 ORIG_RAX: 0000000000000010
[   36.564021] RAX: ffffffffffffffda RBX: 000055622809697b RCX: 00007f092a7fe2e7
[   36.564022] RDX: 000055624b967380 RSI: 00000000c138fd09 RDI: 0000000000000004
[   36.564023] RBP: 00007ffe43a0fb10 R08: 00005562281fc6d0 R09: 00007ffe43a0f8c0
[   36.564024] R10: 00005562281fc3f8 R11: 0000000000000206 R12: 00005562281fb98a
[   36.564025] R13: 00005562281fb98a R14
[   36.564025] R13: 00005562281fb98a R14: 00005562281fb98a R15: 00005562281fb98a

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ