lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Fri, 26 Feb 2016 09:06:49 +0800
From:	kernel test robot <ying.huang@...ux.intel.com>
TO:	Chris Wilson <chris@...is-wilson.co.uk>
CC:	0day robot <fengguang.wu@...el.com>
Subject: [lkp] [kernfs] abb29ac83c: WARNING: CPU: 3 PID: 406 at
 fs/sysfs/file.c:117 sysfs_kf_read+0x75/0x90()

FYI, we noticed the below changes on

https://github.com/0day-ci/linux Chris-Wilson/kernfs-Move-faulting-copy_user-operations-outside-of-the-mutex/20160223-194306
commit abb29ac83c6117ea1311b0b0d7bcb24316f907e7 ("kernfs: Move faulting copy_user operations outside of the mutex")


+---------------------------------------------+------------+------------+
|                                             | 112d125a89 | abb29ac83c |
+---------------------------------------------+------------+------------+
| boot_successes                              | 23         | 18         |
| boot_failures                               | 0          | 5          |
| WARNING:at_fs/sysfs/file.c:#sysfs_kf_read() | 0          | 4          |
| backtrace:vfs_read                          | 0          | 4          |
| backtrace:SyS_read                          | 0          | 4          |
| backtrace:__vfs_read                        | 0          | 1          |
| BUG:kernel_test_crashed                     | 0          | 1          |
+---------------------------------------------+------------+------------+



[    7.695817] ------------[ cut here ]------------
[    7.696041] md: bind<sda7>
[    7.696149] ------------[ cut here ]------------
[    7.696153] WARNING: CPU: 3 PID: 406 at fs/sysfs/file.c:117 sysfs_kf_read+0x75/0x90()
[    7.696166] Modules linked in: sg sr_mod cdrom sd_mod snd_hda_codec_realtek coretemp snd_hda_codec_generic snd_hda_codec_hdmi kvm_intel dcdbas ata_generic pata_acpi ata_piix snd_hda_intel kvm irqbypass snd_hda_codec i7core_edac snd_hda_core crc32c_intel snd_hwdep pcspkr serio_raw edac_core firewire_ohci libata snd_pcm usb_storage firewire_core crc_itu_t snd_timer snd soundcore shpchp acpi_cpufreq broadcom bcm_phy_lib
[    7.696167] CPU: 3 PID: 406 Comm: mdadm Not tainted 4.5.0-rc4-00017-gabb29ac #1
[    7.696168] Hardware name: Dell Inc. Studio XPS 8000/0X231R, BIOS A01 08/11/2009
[    7.696170]  0000000000000000 ffff8800a9bbbda8 ffffffff8141e56a 0000000000000000
[    7.696170]  ffffffff81be47f8 ffff8800a9bbbde0 ffffffff81078ec6 0000000000000400
[    7.696171]  ffff8800aa3a6800 ffff8800a9bbbf20 ffff8800aaddc680 00007ffcebaa7c80
[    7.696172] Call Trace:
[    7.696177]  [<ffffffff8141e56a>] dump_stack+0x63/0x89
[    7.696180]  [<ffffffff81078ec6>] warn_slowpath_common+0x86/0xc0
[    7.696181]  [<ffffffff81078fba>] warn_slowpath_null+0x1a/0x20
[    7.696182]  [<ffffffff81270b25>] sysfs_kf_read+0x75/0x90
[    7.696183]  [<ffffffff8126fe4b>] kernfs_fop_read+0xab/0x160
[    7.696185]  [<ffffffff811f0dc8>] __vfs_read+0x28/0xd0
[    7.696187]  [<ffffffff813accc3>] ? security_file_permission+0xa3/0xc0
[    7.696188]  [<ffffffff811f1ac7>] ? rw_verify_area+0x57/0xd0
[    7.696188]  [<ffffffff811f1bc6>] vfs_read+0x86/0x130
[    7.696190]  [<ffffffff811f2af6>] SyS_read+0x46/0xa0
[    7.696192]  [<ffffffff818daf2e>] entry_SYSCALL_64_fastpath+0x12/0x6d
[    7.696193] ---[ end trace 2d6d55c322d0a900 ]---
[    7.698291] md: bind<sda6>


To reproduce:

        git clone git://git.kernel.org/pub/scm/linux/kernel/git/wfg/lkp-tests.git
        cd lkp-tests
        bin/lkp install job.yaml  # job file is attached in this email
        bin/lkp run     job.yaml



Thanks,
Kernel Test Robot

View attachment "config-4.5.0-rc4-00017-gabb29ac" of type "text/plain" (145378 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (13592 bytes)

View attachment "job.yaml" of type "text/plain" (3622 bytes)

View attachment "reproduce" of type "text/plain" (39 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ