Bug#677655: 3.4-trunk-486: kernel oops: EIP is at __destroy_inode+0x56/0x8d

2013-07-14 Thread Touko Korpela
On Sun, Jul 14, 2013 at 06:32:05PM +0200, Moritz Mühlenhoff wrote:
 Version: 3.9-1
 
 On Fri, Jul 12, 2013 at 11:19:56AM +0300, Martin-Éric Racine wrote:
  It still does with 3.2 in stable, but not with 3.9 in testing.
 
 Closing with that version, then.

No such version (3.9-1) was uploaded, 3.9.4-1 was first 3.9 upload.


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130714181954.GA3982@lisko



Bug#677655: 3.4-trunk-486: kernel oops: EIP is at __destroy_inode+0x56/0x8d

2013-07-12 Thread Moritz Muehlenhoff
reassign 677655 src:linux
thanks

On Sat, Jun 16, 2012 at 03:48:45AM -0500, Jonathan Nieder wrote:
 Martin-Éric Racine wrote:
 
  Yup, this issue returns every now and then on the exact same host
  (which was recently migrated from Ubuntu to Debian, now that Ubuntu
  stopped supporting anything older than non-PAE 686 hardware), whenever
  someone touches the inode code again. The nice thing, this time, is
  that it has become non-fatal; the kernel simply reports the oops and
  continues operating.
 
 Thanks for the background.  That would have indeed been useful context
 in the original report (though perhaps it had been long enough since
 the last appearance that you had forgotten).
 
 If I have any more questions, I'll ask them upstream.

Does this still occur with current kernels?

Cheers,
Moritz


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130712074654.ga3...@inutil.org



Bug#677655: 3.4-trunk-486: kernel oops: EIP is at __destroy_inode+0x56/0x8d

2013-07-12 Thread Martin-Éric Racine
It still does with 3.2 in stable, but not with 3.9 in testing.

Martin-Éric


2013/7/12 Moritz Muehlenhoff j...@inutil.org

 reassign 677655 src:linux
 thanks

 On Sat, Jun 16, 2012 at 03:48:45AM -0500, Jonathan Nieder wrote:
  Martin-Éric Racine wrote:
 
   Yup, this issue returns every now and then on the exact same host
   (which was recently migrated from Ubuntu to Debian, now that Ubuntu
   stopped supporting anything older than non-PAE 686 hardware), whenever
   someone touches the inode code again. The nice thing, this time, is
   that it has become non-fatal; the kernel simply reports the oops and
   continues operating.
 
  Thanks for the background.  That would have indeed been useful context
  in the original report (though perhaps it had been long enough since
  the last appearance that you had forgotten).
 
  If I have any more questions, I'll ask them upstream.

 Does this still occur with current kernels?

 Cheers,
 Moritz



Bug#677655: 3.4-trunk-486: kernel oops: EIP is at __destroy_inode+0x56/0x8d

2012-06-16 Thread Martin-Éric Racine
2012/6/16 Jonathan Nieder jrnie...@gmail.com:
 Jonathan Nieder wrote:

 By the way, searching for that particular address yields the following
 interesting result.  (Nothing else recent, alas.)

 Better link:

  https://bugzilla.kernel.org/show_bug.cgi?id=13941

Yup, this issue returns every now and then on the exact same host
(which was recently migrated from Ubuntu to Debian, now that Ubuntu
stopped supporting anything older than non-PAE 686 hardware), whenever
someone touches the inode code again. The nice thing, this time, is
that it has become non-fatal; the kernel simply reports the oops and
continues operating.



--
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CAPZXPQcsOE=E_KNsbfu_0Vfm4Q00+7xD=U+bP_3H941gJs�q...@mail.gmail.com



Bug#677655: 3.4-trunk-486: kernel oops: EIP is at __destroy_inode+0x56/0x8d

2012-06-16 Thread Martin-Éric Racine
2012/6/16 Ben Hutchings b...@decadent.org.uk:
 On Fri, 2012-06-15 at 22:37 +0300, Martin-Éric Racine wrote:
 Hi Jonathan,

 2012/6/15 Jonathan Nieder jrnie...@gmail.com:
  Hi Martin-Éric,
 
  Martin-Éric Racine wrote:
 
  I'm not sure if it's too early to report on kernel 3.4 or not, but
  here it goes:
 
  Any package uploaded to the archive is open for bug reports. :)
 
  Could you send the full oops trace, starting at the first BUG line?
  (It should include the text Not tainted.)  Even better would be full
  dmesg output from booting and reproducing the bug.

 Here's the dmesg output at bootup, right after the first few oopses
 have started to appear.

 The kernel is trying to free an inode and using an ACL pointer that
 should presumably be 0x (special value for ACL not in memory)
 but is instead 0xb4ff.  This memory corruption could be a software
 bug (e.g. use after free) or a hardware fault.

 What was the last working kernel version on this system?

3.2.0-19 (or whatever 486 kernel is in Testing) is what's normally
running on this one.



--
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/capzxpqcn42h4ypn_xghz4cvhxvdazhbtanpkksvxjnzanv1...@mail.gmail.com



Bug#677655: 3.4-trunk-486: kernel oops: EIP is at __destroy_inode+0x56/0x8d

2012-06-16 Thread Jonathan Nieder
Martin-Éric Racine wrote:

 Yup, this issue returns every now and then on the exact same host
 (which was recently migrated from Ubuntu to Debian, now that Ubuntu
 stopped supporting anything older than non-PAE 686 hardware), whenever
 someone touches the inode code again. The nice thing, this time, is
 that it has become non-fatal; the kernel simply reports the oops and
 continues operating.

Thanks for the background.  That would have indeed been useful context
in the original report (though perhaps it had been long enough since
the last appearance that you had forgotten).

If I have any more questions, I'll ask them upstream.

Thanks,
Jonathan



--
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120616084815.GA24896@burratino



Bug#677655: 3.4-trunk-486: kernel oops: EIP is at __destroy_inode+0x56/0x8d

2012-06-15 Thread Martin-Éric Racine
Package: linux-2.6
Version: 3.4.1-1~experimental.1
Severity: normal

I'm not sure if it's too early to report on kernel 3.4 or not, but here it 
goes: dmesg keeps on reporting spurious kernel oppses involving inode 
destructions, as seen below, whenever running kernel 3.4-trunk.

-- Package-specific info:
** Version:
Linux version 3.4-trunk-486 (Debian 3.4.1-1~experimental.1) 
(debian-kernel@lists.debian.org) (gcc version 4.6.3 (Debian 4.6.3-7) ) #1 Wed 
Jun 6 14:24:16 UTC 2012

** Command line:
BOOT_IMAGE=/boot/vmlinuz-3.4-trunk-486 
root=UUID=97b2628b-28a5-49f2-85f7-495728b3bef8 ro panic=15 pnpbios=off quiet 
splash

** Tainted: D (128)
 * Kernel has oopsed before.

** Kernel log:
[   29.054891] DR0:  DR1:  DR2:  DR3: 
[   29.054909] DR6: 0ff0 DR7: 0400
[   29.054928] Process mount (pid: 697, ti=f3eee000 task=f4c69c00 
task.ti=f3eee000)
[   29.054944] Stack:
[   29.054955]  f551f7d8 c10b6cdd f5624138 c10b5104 f5624138 f3eeff20 f3eeff20 
c10b5149
[   29.054998]  f5624198 f5817c00 f5817c80 c10b5362 f5624318 f5624218 f5817c00 

[   29.055040]  fff3 c10a9dd3    002e 0027 
f5812090
[   29.055081] Call Trace:
[   29.055107]  [c10b6cdd] ? destroy_inode+0x1a/0x3e
[   29.055132]  [c10b5104] ? dentry_kill+0x7f/0x8c
[   29.055157]  [c10b5149] ? shrink_dentry_list+0x38/0x62
[   29.055183]  [c10b5362] ? shrink_dcache_sb+0x40/0x51
[   29.055209]  [c10a9dd3] ? do_remount_sb+0x5b/0x11c
[   29.055236]  [c10b9acc] ? do_mount+0x1de/0x5ca
[   29.055265]  [c113b3f0] ? _copy_from_user+0x28/0x47
[   29.055293]  [c108b524] ? memdup_user+0x26/0x43
[   29.055318]  [c10b9f21] ? sys_mount+0x67/0x96
[   29.055349]  [c128e6ec] ? syscall_call+0x7/0xb
[   29.055364] Code: 85 c0 75 0f ba ee 00 00 00 b8 58 a4 33 c1 e8 87 6e f6 ff 
8b 43 1c ff 88 c4 01 00 00 8b 43 10 8d 50 ff 83 fa fd 77 14 85 c0 74 10 ff 08 
0f 94 c2 84 d2 74 07 31 d2 e8 ee be fa ff 8b 43 14 8d 50 
[   29.055607] EIP: [c10b698e] __destroy_inode+0x56/0x8d SS:ESP 0068:f3eefef0
[   29.055640] CR2: b4ff
[   29.055657] ---[ end trace b7c0a963a9f117a3 ]---
[   32.438125] 8139too :00:0d.0: eth0: link up, 100Mbps, full-duplex, lpa 
0x45E1
[   43.136054] eth0: no IPv6 routers present
[   44.435375] snd-malloc: invalid device type 0
[   44.436817] snd-malloc: invalid device type 0
[   44.551172] snd-malloc: invalid device type 0
[   44.555444] snd-malloc: invalid device type 0
[   44.557438] snd-malloc: invalid device type 0
[   44.558636] snd-malloc: invalid device type 0
[   44.560411] snd-malloc: invalid device type 0
[   44.565241] snd-malloc: invalid device type 0
[   44.566586] snd-malloc: invalid device type 0
[   44.567750] snd-malloc: invalid device type 0
[   44.570206] snd-malloc: invalid device type 0
[   44.574927] snd-malloc: invalid device type 0
[   44.576796] snd-malloc: invalid device type 0
[   44.578073] snd-malloc: invalid device type 0
[   44.579760] snd-malloc: invalid device type 0
[   44.584799] snd-malloc: invalid device type 0
[   44.586063] snd-malloc: invalid device type 0
[   44.587221] snd-malloc: invalid device type 0
[   44.590101] snd-malloc: invalid device type 0
[   44.595537] snd-malloc: invalid device type 0
[   44.717354] snd-malloc: invalid device type 0
[   44.718582] snd-malloc: invalid device type 0
[   44.720941] snd-malloc: invalid device type 0
[   44.725762] snd-malloc: invalid device type 0
[   49.744081] Bluetooth: Core ver 2.16
[   49.744207] NET: Registered protocol family 31
[   49.744223] Bluetooth: HCI device and connection manager initialized
[   49.745567] Bluetooth: HCI socket layer initialized
[   49.745590] Bluetooth: L2CAP socket layer initialized
[   49.745621] Bluetooth: SCO socket layer initialized
[   49.788365] Bluetooth: RFCOMM TTY layer initialized
[   49.788395] Bluetooth: RFCOMM socket layer initialized
[   49.788412] Bluetooth: RFCOMM ver 1.11
[   50.045149] Bluetooth: BNEP (Ethernet Emulation) ver 1.3
[   50.045173] Bluetooth: BNEP filters: protocol multicast
[   64.436997] colord[2225]: segfault at 8 ip 08052674 sp bf8a6c00 error 4 in 
colord[8048000+2]
[   67.658424] BUG: unable to handle kernel paging request at 00ff
[   67.658453] IP: [c10b698e] __destroy_inode+0x56/0x8d
[   67.658494] *pde = 01462067 *pte =  
[   67.658516] Oops:  [#2] 
[   67.658532] Modules linked in: mperf cpufreq_conservative cpufreq_userspace 
cpufreq_powersave cpufreq_stats bnep rfcomm bluetooth rfkill snd_cs5535audio 
snd_ac97_codec snd_pcm snd_page_alloc ecb snd_seq scx200_acb i2c_core cryptd 
aes_i586 snd_seq_device snd_timer aes_generic snd geode_aes geode_rng rng_core 
cs5535_mfd soundcore ac97_bus processor evdev thermal_sys ac ext4 crc16 jbd2 
mbcache msr usbhid hid sd_mod crc_t10dif ata_generic ohci_hcd pata_cs5536 
libata ehci_hcd usbcore scsi_mod button 8139too 8139cp usb_common mii [last 
unloaded: scsi_wait_scan]
[   67.658775] 
[   67.658793] Pid: 1946, comm: gnome-session Tainted: G  D  

Bug#677655: 3.4-trunk-486: kernel oops: EIP is at __destroy_inode+0x56/0x8d

2012-06-15 Thread Jonathan Nieder
Hi Martin-Éric,

Martin-Éric Racine wrote:

 I'm not sure if it's too early to report on kernel 3.4 or not, but
 here it goes:

Any package uploaded to the archive is open for bug reports. :)

[...]
 ** Kernel log:
 [   29.054891] DR0:  DR1:  DR2:  DR3: 
 [   29.054909] DR6: 0ff0 DR7: 0400
 [   29.054928] Process mount (pid: 697, ti=f3eee000 task=f4c69c00 
 task.ti=f3eee000)
 [   29.054944] Stack:
 [   29.054955]  f551f7d8 c10b6cdd f5624138 c10b5104 f5624138 f3eeff20 
 f3eeff20 c10b5149
 [   29.054998]  f5624198 f5817c00 f5817c80 c10b5362 f5624318 f5624218 
 f5817c00 
 [   29.055040]  fff3 c10a9dd3    002e 
 0027 f5812090
 [   29.055081] Call Trace:
 [   29.055107]  [c10b6cdd] ? destroy_inode+0x1a/0x3e
 [   29.055132]  [c10b5104] ? dentry_kill+0x7f/0x8c
 [   29.055157]  [c10b5149] ? shrink_dentry_list+0x38/0x62
 [   29.055183]  [c10b5362] ? shrink_dcache_sb+0x40/0x51
 [   29.055209]  [c10a9dd3] ? do_remount_sb+0x5b/0x11c
 [   29.055236]  [c10b9acc] ? do_mount+0x1de/0x5ca
 [   29.055265]  [c113b3f0] ? _copy_from_user+0x28/0x47
 [   29.055293]  [c108b524] ? memdup_user+0x26/0x43
 [   29.055318]  [c10b9f21] ? sys_mount+0x67/0x96
 [   29.055349]  [c128e6ec] ? syscall_call+0x7/0xb
 [   29.055364] Code: 85 c0 75 0f ba ee 00 00 00 b8 58 a4 33 c1 e8 87 6e f6 ff 
 8b 43 1c ff 88 c4 01 00 00 8b 43 10 8d 50 ff 83 fa fd 77 14 85 c0 74 10 ff 
 08 0f 94 c2 84 d2 74 07 31 d2 e8 ee be fa ff 8b 43 14 8d 50 
 [   29.055607] EIP: [c10b698e] __destroy_inode+0x56/0x8d SS:ESP 
 0068:f3eefef0
 [   29.055640] CR2: b4ff
 [   29.055657] ---[ end trace b7c0a963a9f117a3 ]---

Could you send the full oops trace, starting at the first BUG line?
(It should include the text Not tainted.)  Even better would be full
dmesg output from booting and reproducing the bug.

Thanks for catching it,
Jonathan



--
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120615185243.GA11941@burratino



Bug#677655: 3.4-trunk-486: kernel oops: EIP is at __destroy_inode+0x56/0x8d

2012-06-15 Thread Martin-Éric Racine
Hi Jonathan,

2012/6/15 Jonathan Nieder jrnie...@gmail.com:
 Hi Martin-Éric,

 Martin-Éric Racine wrote:

 I'm not sure if it's too early to report on kernel 3.4 or not, but
 here it goes:

 Any package uploaded to the archive is open for bug reports. :)

 Could you send the full oops trace, starting at the first BUG line?
 (It should include the text Not tainted.)  Even better would be full
 dmesg output from booting and reproducing the bug.

Here's the dmesg output at bootup, right after the first few oopses
have started to appear.

Cheers!
Martin-Éric
6[0.00] Initializing cgroup subsys cpuset
6[0.00] Initializing cgroup subsys cpu
5[0.00] Linux version 3.4-trunk-486 (Debian 3.4.1-1~experimental.1) 
(debian-kernel@lists.debian.org) (gcc version 4.6.3 (Debian 4.6.3-7) ) #1 Wed 
Jun 6 14:24:16 UTC 2012
6[0.00] BIOS-provided physical RAM map:
6[0.00]  BIOS-e820:  - 0009e800 (usable)
6[0.00]  BIOS-e820: 0009e800 - 000a (reserved)
6[0.00]  BIOS-e820: 000f - 0010 (reserved)
6[0.00]  BIOS-e820: 0010 - 37fb (usable)
6[0.00]  BIOS-e820: 37fb - 37fb3000 (ACPI NVS)
6[0.00]  BIOS-e820: 37fb3000 - 37fc (ACPI data)
6[0.00]  BIOS-e820:  - 0001 (reserved)
5[0.00] Notice: NX (Execute Disable) protection missing in CPU!
6[0.00] DMI 2.2 present.
7[0.00] DMI: First International Computer, Inc.  ION603/ION603, BIOS 
6.00 PG 11/08/2007
7[0.00] e820 update range:  - 0001 
(usable) == (reserved)
7[0.00] e820 remove range: 000a - 0010 
(usable)
6[0.00] last_pfn = 0x37fb0 max_arch_pfn = 0x10
7[0.00] initial memory mapped : 0 - 0180
7[0.00] Base memory trampoline at [c009b000] 9b000 size 12288
6[0.00] init_memory_mapping: -377fe000
7[0.00]  00 - 40 page 4k
7[0.00]  40 - 003740 page 2M
7[0.00]  003740 - 00377fe000 page 4k
7[0.00] kernel direct mapping tables up to 377fe000 @ 17fb000-180
6[0.00] RAMDISK: 35fca000 - 36fdd000
4[0.00] ACPI: RSDP 000f5910 00014 (v00 AMDGX3)
4[0.00] ACPI: RSDT 37fb3000 00028 (v01 AMDGX3 AWRDACPI 42302E31 AWRD 
)
4[0.00] ACPI: FACP 37fb3080 00074 (v01 AMDGX3 AWRDACPI 42302E31 AWRD 
)
4[0.00] ACPI Warning: Invalid length for Pm2ControlBlock: 16, using 
default 8 (20120320/tbfadt-629)
4[0.00] ACPI: DSDT 37fb3100 01581 (v01 AMDGX3 AWRDACPI 1017 MSFT 
0300)
4[0.00] ACPI: FACS 37fb 00040
5[0.00] 7MB HIGHMEM available.
5[0.00] 887MB LOWMEM available.
6[0.00]   mapped low ram: 0 - 377fe000
6[0.00]   low ram: 0 - 377fe000
4[0.00] Zone PFN ranges:
4[0.00]   DMA  0x0010 - 0x1000
4[0.00]   Normal   0x1000 - 0x000377fe
4[0.00]   HighMem  0x000377fe - 0x00037fb0
4[0.00] Movable zone start PFN for each node
4[0.00] Early memory PFN ranges
4[0.00] 0: 0x0010 - 0x009e
4[0.00] 0: 0x0100 - 0x00037fb0
7[0.00] On node 0 totalpages: 229182
7[0.00] free_area_init_node: node 0, pgdat c13e6e08, node_mem_map 
f70fd200
7[0.00]   DMA zone: 32 pages used for memmap
7[0.00]   DMA zone: 0 pages reserved
7[0.00]   DMA zone: 3950 pages, LIFO batch:0
7[0.00]   Normal zone: 1744 pages used for memmap
7[0.00]   Normal zone: 221486 pages, LIFO batch:31
7[0.00]   HighMem zone: 16 pages used for memmap
7[0.00]   HighMem zone: 1954 pages, LIFO batch:0
6[0.00] Using APIC driver default
6[0.00] ACPI: PM-Timer IO Port: 0x9c10
6[0.00] No local APIC present or hardware disabled
6[0.00] APIC: disable apic facility
6[0.00] APIC: switched to apic NOOP
7[0.00] nr_irqs_gsi: 16
6[0.00] PM: Registered nosave memory: 0009e000 - 
0009f000
6[0.00] PM: Registered nosave memory: 0009f000 - 
000a
6[0.00] PM: Registered nosave memory: 000a - 
000f
6[0.00] PM: Registered nosave memory: 000f - 
0010
6[0.00] Allocating PCI resources starting at 37fc (gap: 
37fc:c803)
6[0.00] Booting paravirtualized kernel on bare hardware
7[0.00] pcpu-alloc: s0 r0 d32768 u32768 alloc=1*32768
7[0.00] pcpu-alloc: [0] 0 
4[0.00] Built 1 zonelists in Zone order, mobility grouping on.  Total 
pages: 227390
5[0.00] Kernel command line: BOOT_IMAGE=/boot/vmlinuz-3.4-trunk-486 
root=UUID=97b2628b-28a5-49f2-85f7-495728b3bef8 ro panic=15 pnpbios=off quiet 
splash
6[0.00] PID hash table entries: 4096 (order: 2, 16384 

Bug#677655: 3.4-trunk-486: kernel oops: EIP is at __destroy_inode+0x56/0x8d

2012-06-15 Thread Jonathan Nieder
Martin-Éric Racine wrote:

 Here's the dmesg output at bootup, right after the first few oopses
 have started to appear.

Thanks, nice and quick.

Let's see:

[...]
 6[   28.167997] EXT4-fs (sda1): re-mounted. Opts: (null)
 6[   28.721401] EXT4-fs (sda1): re-mounted. Opts: (null)
 1[   29.595342] BUG: unable to handle kernel paging request at b4ff
 1[   29.595373] IP: [c10b698e] __destroy_inode+0x56/0x8d

Bad pointer.

[...]
 4[   29.595737] EIP is at __destroy_inode+0x56/0x8d
 4[   29.595756] EAX: b4ff EBX: f54f1d38 ECX: f6871ed8 EDX: b4fe
 4[   29.595777] ESI: f55475d8 EDI: f54f1d38 EBP:  ESP: f6871ef0
 4[   29.595798]  DS: 007b ES: 007b FS:  GS: 00e0 SS: 0068
 4[   29.595818] CR0: 8005003b CR2: b4ff CR3: 36877000 CR4: 0090
 4[   29.595839] DR0:  DR1:  DR2:  DR3: 
 4[   29.595856] DR6: 0ff0 DR7: 0400
 0[   29.595876] Process mount (pid: 693, ti=f687 task=f37f1810 
 task.ti=f687)

Call chain: mount - do_mount - do_remount_sb - shrink_dcache_db - ...

[...]
 0[   29.596036] Code: 85 c0 75 0f ba ee 00 00 00 b8 58 a4 33 c1 e8 87 6e f6 
 ff 8b 43 1c ff 88 c4 01 00 00 8b 43 10 8d 50 ff 83 fa fd 77 14 85 c0 74 10 
 ff 08 0f 94 c2 84 d2 74 07 31 d2 e8 ee be fa ff 8b 43 14 8d 50 

Decoding, this is:

  1c:   8b 43 10mov0x10(%ebx),%eax
  1f:   8d 50 fflea-0x1(%eax),%edx
  22:   83 fa fdcmp$0xfffd,%edx
  25:   77 14   ja 0x3b
  27:   85 c0   test   %eax,%eax
  29:   74 10   je 0x3b
  2b:*  ff 08   decl   (%eax) -- trapping instruction
  2d:   0f 94 c2sete   %dl

which corresponds to

 77d:   8b 43 10mov0x10(%ebx),%eax
 780:   8d 50 fflea-0x1(%eax),%edx
 783:   83 fa fdcmp$0xfffd,%edx
 786:   77 05   ja 78d __destroy_inode+0x57
posix_acl_release(inode-i_acl);
 788:   e8 94 ff ff ff  call   721 posix_acl_release

from fs/inode.c.  (Your call to posix_acl_release is inlined while mine
is not because your kernel was built with an older GCC and I'm too
lazy to downgrade.)  Here's posix_acl_release:

static inline void
posix_acl_release(struct posix_acl *acl)
{
if (acl  atomic_dec_and_test(acl-a_refcount))
kfree_rcu(acl, a_rcu);
}

a_refcount is at offset 0 in struct posix_acl.  The dec_and_test
fails because acl is a bad pointer.

So inode is incompletely initialized, I guess.  Climbing the call
chain:

 0[   29.595892] Stack:
 4[   29.595903]  f54f1d38 c10b6cdd f5538898 c10b5104 f5538898 f6871f20 
 f6871f20 c10b5149
 4[   29.595946]  f55388f8 f5817c00 f5817c80 c10b5362 f55b8a78 f55389f8 
 f5817c00 
 4[   29.595988]  fff3 c10a9dd3    002e 
 0027 f5812090
 0[   29.596030] Call Trace:
 4[   29.596036]  [c10b6cdd] ? destroy_inode+0x1a/0x3e
 4[   29.596036]  [c10b5104] ? dentry_kill+0x7f/0x8c
 4[   29.596036]  [c10b5149] ? shrink_dentry_list+0x38/0x62
 4[   29.596036]  [c10b5362] ? shrink_dcache_sb+0x40/0x51
 4[   29.596036]  [c10a9dd3] ? do_remount_sb+0x5b/0x11c
 4[   29.596036]  [c10b9acc] ? do_mount+0x1de/0x5ca
 4[   29.596036]  [c113b3f0] ? _copy_from_user+0x28/0x47
 4[   29.596036]  [c108b524] ? memdup_user+0x26/0x43
 4[   29.596036]  [c10b9f21] ? sys_mount+0x67/0x96
 4[   29.596036]  [c128e6ec] ? syscall_call+0x7/0xb
 0[   29.596036] EIP: [c10b698e] __destroy_inode+0x56/0x8d SS:ESP 
 0068:f6871ef0

Probably:

dentry_kill - d_kill - dentry_iput - iput - ...

Meaning dentry-d_inode has invalid -i_acl.  Walking further:

sys_mount - do_mount - do_remount - do_remount_sb -
- shrink_dcache_sb - shrink_dentry_list -
- try_prune_one_dentry - dentry_kill

I got nothin'.  Could you try 3.5-rc2 or newer so we can pester
upstream?  Like this:

 0. prerequisites:

apt-get install git build-essential

 1. grab the kernel history if you don't already have it:

git clone \
  git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git

 2. checkout latest, configure, build:

cd linux
git fetch --all
git checkout origin/master
cp /boot/config-$(uname -r) .config; # current configuration
scripts/config --disable DEBUG_INFO
make localmodconfig; # optional: minimize configuration
make deb-pkg; # optionally with -jnum for parallel build
dpkg -i ../name of package; # as root
reboot
... test test test ...

 3. celebrate or complain

If it fails, please send a summary of symptoms to
linux-fsde...@vger.kernel.org, cc-ing either me or this bug log so we
can track it.  Be sure to mention:

 - steps to reproduce, expected result, actual result, and how the
   difference indicates a bug (should be 

Bug#677655: 3.4-trunk-486: kernel oops: EIP is at __destroy_inode+0x56/0x8d

2012-06-15 Thread Ben Hutchings
On Fri, 2012-06-15 at 22:37 +0300, Martin-Éric Racine wrote:
 Hi Jonathan,
 
 2012/6/15 Jonathan Nieder jrnie...@gmail.com:
  Hi Martin-Éric,
 
  Martin-Éric Racine wrote:
 
  I'm not sure if it's too early to report on kernel 3.4 or not, but
  here it goes:
 
  Any package uploaded to the archive is open for bug reports. :)
 
  Could you send the full oops trace, starting at the first BUG line?
  (It should include the text Not tainted.)  Even better would be full
  dmesg output from booting and reproducing the bug.
 
 Here's the dmesg output at bootup, right after the first few oopses
 have started to appear.

The kernel is trying to free an inode and using an ACL pointer that
should presumably be 0x (special value for ACL not in memory)
but is instead 0xb4ff.  This memory corruption could be a software
bug (e.g. use after free) or a hardware fault.

What was the last working kernel version on this system?

Ben.

-- 
Ben Hutchings
We get into the habit of living before acquiring the habit of thinking.
  - Albert Camus


signature.asc
Description: This is a digitally signed message part


Bug#677655: 3.4-trunk-486: kernel oops: EIP is at __destroy_inode+0x56/0x8d

2012-06-15 Thread Jonathan Nieder
Ben Hutchings wrote:
 On Fri, 2012-06-15 at 22:37 +0300, Martin-Éric Racine wrote:

 Here's the dmesg output at bootup, right after the first few oopses
 have started to appear.

 The kernel is trying to free an inode and using an ACL pointer that
 should presumably be 0x (special value for ACL not in memory)
 but is instead 0xb4ff.  This memory corruption could be a software
 bug (e.g. use after free) or a hardware fault.

 What was the last working kernel version on this system?

By the way, searching for that particular address yields the following
interesting result.  (Nothing else recent, alas.)

  https://launchpad.net/bugs/848864

Thanks,
Jonathan



--
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120616010042.GD3547@burratino



Bug#677655: 3.4-trunk-486: kernel oops: EIP is at __destroy_inode+0x56/0x8d

2012-06-15 Thread Jonathan Nieder
Jonathan Nieder wrote:

 By the way, searching for that particular address yields the following
 interesting result.  (Nothing else recent, alas.)

Better link:

  https://bugzilla.kernel.org/show_bug.cgi?id=13941



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120616022318.GC3201@burratino



Bug#677655: 3.4-trunk-486: kernel oops: EIP is at __destroy_inode+0x56/0x8d

2012-06-15 Thread Ben Hutchings
On Fri, 2012-06-15 at 21:23 -0500, Jonathan Nieder wrote:
 Jonathan Nieder wrote:
 
  By the way, searching for that particular address yields the following
  interesting result.  (Nothing else recent, alas.)
 
 Better link:
 
   https://bugzilla.kernel.org/show_bug.cgi?id=13941

Oohkay, so you've seen this same bug across a wide range of kernel
versions (and presumably compiler versions).  It would have been helpful
to mention this instead of letting Jonathan work it out.

It does seem unlikely that this would be a hardware fault, since the
source line and value involved are the same while memory layout must
have changed a lot over those 13 upstream stable releases.

Ben.

-- 
Ben Hutchings
We get into the habit of living before acquiring the habit of thinking.
  - Albert Camus


signature.asc
Description: This is a digitally signed message part