lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Wed, 06 Jan 2016 09:48:54 +0800
From:	kernel test robot <ying.huang@...ux.intel.com>
TO:	Aditya Kali <adityakali@...gle.com>
CC:	Serge Hallyn <serge.hallyn@...ntu.com>
Subject: [lkp] [cgroup] 6adb73eff2: BUG: sleeping function called from
 invalid context at kernel/locking/mutex.c:97

FYI, we noticed the below changes on

https://git.kernel.org/pub/scm/linux/kernel/git/sergeh/linux-security cgroupns.v9
commit 6adb73eff28e2ae9876bc5bce4e4ec7d15bab537 ("cgroup: introduce cgroup namespaces")


+-----------------------------------------------------------------------------+------------+------------+
|                                                                             | f2a74e2f95 | 6adb73eff2 |
+-----------------------------------------------------------------------------+------------+------------+
| boot_successes                                                              | 8          | 4          |
| boot_failures                                                               | 0          | 4          |
| BUG:sleeping_function_called_from_invalid_context_at_kernel/locking/mutex.c | 0          | 4          |
| WARNING:at_kernel/softirq.c:#__local_bh_enable_ip()                         | 0          | 4          |
| backtrace:vfs_read                                                          | 0          | 4          |
| backtrace:SyS_read                                                          | 0          | 4          |
+-----------------------------------------------------------------------------+------------+------------+



[   23.823700] systemd-journald[1771]: Vacuuming done, freed 0 bytes

LKP: HOSTNAME vm-kbuild-2G-8, MAC 52:54:00:12:34:56, kernel 4.4.0-rc1-00024-g6adb73e 1, serial console /dev/ttyS0
[   32.251978] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:97
[   32.253721] in_atomic(): 1, irqs_disabled(): 1, pid: 2642, name: cat
[   32.255555] CPU: 0 PID: 2642 Comm: cat Not tainted 4.4.0-rc1-00024-g6adb73e #1
[   32.271987] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Debian-1.8.2-1 04/01/2014
[   32.293786]  0000000000000000 ffff88007efcbc30 ffffffff814bec06 ffffffff81ec2c6f
[   32.296552]  ffff88007efcbc40 ffffffff8111b4ed ffff88007efcbc68 ffffffff8111b58e
[   32.307644]  ffffffff82266330 ffffffff822662a0 0000000000000000 ffff88007efcbc80
[   32.340424] Call Trace:
[   32.345652]  [<ffffffff814bec06>] dump_stack+0x4b/0x63
[   32.347428]  [<ffffffff8111b4ed>] ___might_sleep+0x133/0x135
[   32.349358]  [<ffffffff8111b58e>] __might_sleep+0x9f/0xa6
[   32.359114]  [<ffffffff81a5192b>] mutex_lock+0x20/0x42
[   32.360762]  [<ffffffff8116d714>] cgroup_path_ns+0x2a/0x72
[   32.370694]  [<ffffffff81131a64>] task_group_path+0x31/0x33
[   32.372667]  [<ffffffff8113227d>] print_cfs_rq+0x52/0x7d9
[   32.374494]  [<ffffffff8112c44a>] print_cfs_stats+0x6d/0x8f
[   32.376061]  [<ffffffff81131ead>] print_cpu+0x447/0x7a3
[   32.377525]  [<ffffffff81131776>] ? sched_debug_header+0x2c8/0x4e1
[   32.379402]  [<ffffffff81132220>] sched_debug_show+0x17/0x22
[   32.381049]  [<ffffffff81239fa2>] seq_read+0x252/0x337
[   32.382636]  [<ffffffff81276198>] proc_reg_read+0x48/0x67
[   32.384256]  [<ffffffff81276150>] ? proc_reg_write+0x67/0x67
[   32.386007]  [<ffffffff8121c5b0>] __vfs_read+0x26/0xb0
[   32.387636]  [<ffffffff81082763>] ? __do_page_fault+0x3a5/0x41f
[   32.389352]  [<ffffffff8121cc53>] vfs_read+0x98/0x123
[   32.390782]  [<ffffffff8121d778>] SyS_read+0x4e/0x89
[   32.392136]  [<ffffffff81a53872>] entry_SYSCALL_64_fastpath+0x12/0x71
[   32.393861] ------------[ cut here ]------------
[   32.395321] WARNING: CPU: 0 PID: 2642 at kernel/softirq.c:150 __local_bh_enable_ip+0x45/0xb4()
[   32.399495] Modules linked in: acpi_cpufreq
[   32.401129] CPU: 0 PID: 2642 Comm: cat Not tainted 4.4.0-rc1-00024-g6adb73e #1
[   32.403887] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Debian-1.8.2-1 04/01/2014
[   32.407054]  0000000000000000 ffff88007efcbc08 ffffffff814bec06 0000000000000000
[   32.410215]  ffff88007efcbc40 ffffffff810fabbd ffffffff810fec1b 0000000000000201
[   32.413558]  ffffffff8116d745 0000000000000000 0000000000000000 ffff88007efcbc50
[   32.416393] Call Trace:
[   32.417475]  [<ffffffff814bec06>] dump_stack+0x4b/0x63
[   32.418930]  [<ffffffff810fabbd>] warn_slowpath_common+0x9f/0xb8
[   32.420502]  [<ffffffff810fec1b>] ? __local_bh_enable_ip+0x45/0xb4
[   32.422131]  [<ffffffff8116d745>] ? cgroup_path_ns+0x5b/0x72
[   32.423642]  [<ffffffff810fac89>] warn_slowpath_null+0x1a/0x1c
[   32.425210]  [<ffffffff810fec1b>] __local_bh_enable_ip+0x45/0xb4
[   32.426824]  [<ffffffff81a53234>] _raw_spin_unlock_bh+0x1a/0x1c
[   32.428614]  [<ffffffff8116d745>] cgroup_path_ns+0x5b/0x72
[   32.430200]  [<ffffffff81131a64>] task_group_path+0x31/0x33
[   32.432014]  [<ffffffff8113227d>] print_cfs_rq+0x52/0x7d9
[   32.433806]  [<ffffffff8112c44a>] print_cfs_stats+0x6d/0x8f
[   32.435586]  [<ffffffff81131ead>] print_cpu+0x447/0x7a3
[   32.438569]  [<ffffffff81131776>] ? sched_debug_header+0x2c8/0x4e1
[   32.441797]  [<ffffffff81132220>] sched_debug_show+0x17/0x22
[   32.443660]  [<ffffffff81239fa2>] seq_read+0x252/0x337
[   32.448305]  [<ffffffff81276198>] proc_reg_read+0x48/0x67
[   32.454036]  [<ffffffff81276150>] ? proc_reg_write+0x67/0x67
[   32.455716]  [<ffffffff8121c5b0>] __vfs_read+0x26/0xb0
[   32.465920]  [<ffffffff81082763>] ? __do_page_fault+0x3a5/0x41f
[   32.467854]  [<ffffffff8121cc53>] vfs_read+0x98/0x123
[   32.477553]  [<ffffffff8121d778>] SyS_read+0x4e/0x89
[   32.479155]  [<ffffffff81a53872>] entry_SYSCALL_64_fastpath+0x12/0x71
[   32.480923] ---[ end trace e8da3a8fb61be5a1 ]---
[   32.480923] ---[ end trace e8da3a8fb61be5a1 ]---


To reproduce:

        git clone git://git.kernel.org/pub/scm/linux/kernel/git/wfg/lkp-tests.git
        cd lkp-tests
        bin/lkp install job.yaml  # job file is attached in this email
        bin/lkp run     job.yaml



Thanks,
Kernel Test Robot

View attachment "config-4.4.0-rc1-00024-g6adb73e" of type "text/plain" (91057 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (14116 bytes)

View attachment "job.yaml" of type "text/plain" (3160 bytes)

Download attachment "reproduce.sh" of type "application/x-sh" (36 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ