lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Fri, 30 Sep 2016 09:51:02 +0800
From:   kernel test robot <xiaolong.ye@...el.com>
To:     Con Kolivas <kernel@...ivas.org>
Cc:     Ingo Molnar <mingo@...nel.org>, Alfred Chen <cchalpha@...il.com>,
        Peter Zijlstra <peterz@...radead.org>,
        LKML <linux-kernel@...r.kernel.org>,
        Stephen Rothwell <sfr@...b.auug.org.au>, lkp@...org
Subject: [lkp] [sched/core]  4fa5cd5245: BUG: sleeping function called from
 invalid context at kernel/locking/mutex.c:97


FYI, we noticed the following commit:

https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master
commit 4fa5cd5245b627db88c9ca08ae442373b02596b4 ("sched/core: Do not use smp_processor_id() with preempt enabled in smpboot_thread_fn()")

in testcase: will-it-scale
with following parameters:

	test: open2
	cpufreq_governor: performance


Will It Scale takes a testcase and runs it from 1 through to n parallel copies to see if the testcase will scale. It builds both a process and threads based test in order to see any differences between the two.


on test machine: 48 threads 2 sockets Intel(R) Xeon(R) CPU E5-2697 v2 @ 2.70GHz with 64G memory

caused below changes:


+-----------------------------------------------------------------------------+------------+------------+
|                                                                             | d59dc7bcfa | 4fa5cd5245 |
+-----------------------------------------------------------------------------+------------+------------+
| boot_successes                                                              | 15         | 2          |
| boot_failures                                                               | 8          | 12         |
| WARNING:at_kernel/events/core.c:#perf_event_read                            | 7          | 2          |
| calltrace:SyS_read                                                          | 7          | 2          |
| BUG:kernel_reboot-without-warning_in_test_stage                             | 1          | 2          |
| BUG:sleeping_function_called_from_invalid_context_at_kernel/locking/mutex.c | 0          | 10         |
| calltrace:smpboot_thread_fn                                                 | 0          | 10         |
+-----------------------------------------------------------------------------+------------+------------+




user  :notice: [   37.079160] IPMI Device Information
kern  :info  : [   37.086367] ipmi device interface
kern  :err   : [   37.180350] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:97
kern  :err   : [   37.192550] in_atomic(): 1, irqs_disabled(): 0, pid: 14, name: watchdog/0
kern  :warn  : [   37.200866] CPU: 0 PID: 14 Comm: watchdog/0 Not tainted 4.8.0-rc5-00037-g4fa5cd5 #1
kern  :warn  : [   37.210142] Hardware name: Intel Corporation S2600WP/S2600WP, BIOS SE5C600.86B.02.02.0002.122320131210 12/23/2013
kern  :warn  : [   37.222331]  0000000000000000 ffff88081ab67d90 ffffffff8144f659 ffff88081ab3cb80
kern  :warn  : [   37.231371]  0000000000000061 ffff88081ab67da8 ffffffff810a4ca4 ffffffff81ca2258
kern  :warn  : [   37.240415]  ffff88081ab67dd0 ffffffff810a4d39 ffff88081e01d1a8 ffff88081dc37800
kern  :warn  : [   37.249439] Call Trace:
kern  :warn  : [   37.252907]  [<ffffffff8144f659>] dump_stack+0x63/0x8a
kern  :warn  : [   37.259387]  [<ffffffff810a4ca4>] ___might_sleep+0xd4/0x120
kern  :warn  : [   37.266354]  [<ffffffff810a4d39>] __might_sleep+0x49/0x80
kern  :warn  : [   37.273104]  [<ffffffff81930e20>] mutex_lock+0x20/0x50
kern  :warn  : [   37.279565]  [<ffffffff81169b72>] perf_event_ctx_lock_nested+0x52/0xa0
kern  :warn  : [   37.288360]  [<ffffffff8116ccaf>] perf_event_disable+0xf/0x30
kern  :warn  : [   37.295509]  [<ffffffff8112e906>] watchdog_nmi_disable+0x36/0x70
kern  :warn  : [   37.302948]  [<ffffffff810a15b4>] ? smpboot_thread_fn+0x34/0x1e0
kern  :warn  : [   37.310388]  [<ffffffff8112e98d>] watchdog_disable+0x4d/0x60
kern  :warn  : [   37.317430]  [<ffffffff810a16de>] smpboot_thread_fn+0x15e/0x1e0
kern  :warn  : [   37.324750]  [<ffffffff810a1580>] ? sort_range+0x30/0x30
kern  :warn  : [   37.331394]  [<ffffffff8109e194>] kthread+0xd4/0xf0
kern  :warn  : [   37.337548]  [<ffffffff81933c3f>] ret_from_fork+0x1f/0x40
kern  :warn  : [   37.344284]  [<ffffffff8109e0c0>] ? kthread_create_on_node+0x180/0x180
user  :notice: [   37.466233] BMC ARP Control         : ARP Responses Enabled, Gratuitous ARP Disabled
user  :notice: [   38.078292] 2016-09-29 21:16:05 ./runtest.py open2 25 both 1 12 24 36 48
kern  :notice: [  112.518727] random: crng init done
kern  :warn  : [  124.655523] ------------[ cut here ]------------
kern  :warn  : [  124.662221] WARNING: CPU: 2 PID: 883 at kernel/events/core.c:3554 perf_event_read+0x17d/0x190
kern  :warn  : [  124.675342] Modules linked in: ipmi_devintf rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver sd_mod sg intel_rapl sb_edac edac_core x86_pkg_temp_thermal mgag200 intel_powerclamp ttm coretemp drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops kvm_intel isci drm snd_pcm kvm snd_timer irqbypass libsas crct10dif_pclmul crc32_pclmul ahci snd scsi_transport_sas crc32c_intel soundcore ghash_clmulni_intel libahci aesni_intel lrw gf128mul glue_helper ablk_helper cryptd pcspkr libata shpchp wmi ipmi_si ipmi_msghandler ip_tables
kern  :warn  : [  124.739874] CPU: 2 PID: 883 Comm: perf Tainted: G        W       4.8.0-rc5-00037-g4fa5cd5 #1
kern  :warn  : [  124.750790] Hardware name: Intel Corporation S2600WP/S2600WP, BIOS SE5C600.86B.02.02.0002.122320131210 12/23/2013
kern  :warn  : [  124.763775]  0000000000000000 ffff880806c9fcf0 ffffffff8144f659 0000000000000000
kern  :warn  : [  124.773539]  0000000000000000 ffff880806c9fd30 ffffffff8107e70b 00000de20a73d540
kern  :warn  : [  124.783256]  ffff8808032a8800 0000000000000000 0000000000000003 ffff8808032a8800
kern  :warn  : [  124.793019] Call Trace:
kern  :warn  : [  124.797047]  [<ffffffff8144f659>] dump_stack+0x63/0x8a
kern  :warn  : [  124.804100]  [<ffffffff8107e70b>] __warn+0xcb/0xf0
kern  :warn  : [  124.810741]  [<ffffffff8107e7fd>] warn_slowpath_null+0x1d/0x20
kern  :warn  : [  124.818591]  [<ffffffff8116961d>] perf_event_read+0x17d/0x190
kern  :warn  : [  124.826322]  [<ffffffff81169675>] perf_event_read_value+0x45/0x130
kern  :warn  : [  124.834551]  [<ffffffff8116dceb>] perf_read+0x17b/0x2d0
kern  :warn  : [  124.841694]  [<ffffffff8120d108>] __vfs_read+0x28/0x130
kern  :warn  : [  124.848827]  [<ffffffff813dbc90>] ? security_file_permission+0xa0/0xc0
kern  :warn  : [  124.857433]  [<ffffffff8120d4ce>] ? rw_verify_area+0x4e/0xb0
kern  :warn  : [  124.865067]  [<ffffffff8120d5c6>] vfs_read+0x96/0x130
kern  :warn  : [  124.871984]  [<ffffffff8120e9b6>] SyS_read+0x46/0xa0
kern  :warn  : [  124.878800]  [<ffffffff81933a32>] entry_SYSCALL_64_fastpath+0x1a/0xa4
kern  :warn  : [  124.887299] ---[ end trace 7fd930587be847d3 ]---
kern  :warn  : [  124.887299] ---[ end trace 7fd930587be847d3 ]---


To reproduce:

        git clone git://git.kernel.org/pub/scm/linux/kernel/git/wfg/lkp-tests.git
        cd lkp-tests
        bin/lkp install job.yaml  # job file is attached in this email
        bin/lkp run     job.yaml



Thanks,
Xiaolong

View attachment "config-4.8.0-rc5-00037-g4fa5cd5" of type "text/plain" (152641 bytes)

View attachment "job-script" of type "text/plain" (6479 bytes)

Download attachment "kmsg.xz" of type "application/octet-stream" (21644 bytes)

View attachment "will-it-scale" of type "text/plain" (330 bytes)

View attachment "job.yaml" of type "text/plain" (4094 bytes)

View attachment "reproduce" of type "text/plain" (144 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ