lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:   Thu, 13 Oct 2016 21:58:32 +0800
From:   kernel test robot <xiaolong.ye@...el.com>
To:     Daniel Lezcano <daniel.lezcano@...aro.org>
Cc:     lkp@...org, Daniel Lezcano <daniel.lezcano@...aro.org>,
        LKML <linux-kernel@...r.kernel.org>
Subject: [cpuidle]  00da7dafbf: BUG: sleeping function called from invalid context at kernel/locking/mutex.c:620


FYI, we noticed the following commit:

http://git.linaro.org/people/daniel.lezcano/linux sched/idle
commit 00da7dafbfd7d57e72ea4ca098570424e27d0949 ("cpuidle: irq: Add a new irq based governor")

in testcase: boot

on test machine: qemu-system-i386 -enable-kvm -cpu Haswell,+smep,+smap -m 360M

caused below changes:


+-----------------------------------------------------------------------------+------------+------------+
|                                                                             | 5ecb2d8276 | 00da7dafbf |
+-----------------------------------------------------------------------------+------------+------------+
| boot_successes                                                              | 23         | 0          |
| boot_failures                                                               | 1          | 30         |
| BUG:kernel_reboot-without-warning_in_test_stage                             | 1          |            |
| BUG:sleeping_function_called_from_invalid_context_at_kernel/locking/mutex.c | 0          | 30         |
| calltrace:SyS_open                                                          | 0          | 30         |
+-----------------------------------------------------------------------------+------------+------------+



[   12.161229] random: init: uninitialized urandom read (12 bytes read)
[   12.170017] hostname (169) used greatest stack depth: 6880 bytes left
[   12.190659] sh (174) used greatest stack depth: 6800 bytes left
[   12.192357] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:620
[   12.193520] in_atomic(): 1, irqs_disabled(): 1, pid: 175, name: init
[   12.194234] 3 locks held by init/175:
[   12.194647]  #0:  (&tty->legacy_mutex){......}, at: [<c13ab8eb>] tty_lock+0x76/0x7e
[   12.195619]  #1:  (&port->mutex){......}, at: [<c13b05b2>] uart_open+0x4c/0xd7
[   12.196521]  #2:  (&irq_desc_lock_class){......}, at: [<c1067b71>] __setup_irq+0x15c/0x493
[   12.197548] CPU: 0 PID: 175 Comm: init Tainted: G S              4.8.0-00006-g00da7da #1
[   12.198463] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Debian-1.8.2-1 04/01/2014
[   12.199455]  00000000 c9b62280 c9b5fc58 c12f6835 c9b5fc68 c1050bc2 00000000 00000000
[   12.200447]  c9b5fc84 c1050c68 0000026c c1aba08a c1d67340 00000000 00000000 c9b5fcb8
[   12.201436]  c17b8497 00000046 c9b5fcd0 c105dd09 c9b626d8 c9b62628 00000046 c9b626ac
[   12.202423] Call Trace:
[   12.202723]  [<c12f6835>] dump_stack+0x16/0x18
[   12.203238]  [<c1050bc2>] ___might_sleep+0xf5/0xfc
[   12.203785]  [<c1050c68>] __might_sleep+0x9f/0xa7
[   12.204335]  [<c17b8497>] mutex_lock_nested+0x23/0x32c
[   12.204933]  [<c105dd09>] ? lock_release+0x122/0x317
[   12.205503]  [<c10ef8fe>] pcpu_alloc+0xbb/0x41a
[   12.206021]  [<c105fd51>] ? do_raw_spin_unlock+0xa2/0xcb
[   12.206616]  [<c17bafaf>] ? _raw_spin_unlock_irqrestore+0x2c/0x36
[   12.207308]  [<c101b304>] ? startup_ioapic_irq+0x5e/0x68
[   12.207919]  [<c10efc83>] __alloc_percpu+0x14/0x16
[   12.208464]  [<c106c6aa>] irq_timings_alloc+0x1a/0x57
[   12.209042]  [<c1067d65>] __setup_irq+0x350/0x493
[   12.209576]  [<c106806f>] request_threaded_irq+0x11d/0x14b
[   12.210205]  [<c13b1deb>] univ8250_setup_irq+0x174/0x1bf
[   12.210821]  [<c13b3da5>] serial8250_do_startup+0x303/0x491
[   12.211451]  [<c13b3f4b>] serial8250_startup+0x18/0x1a
[   12.212037]  [<c13b04b6>] uart_startup+0x8b/0x13b
[   12.212567]  [<c13b0613>] uart_open+0xad/0xd7
[   12.213066]  [<c13a6200>] tty_open+0x239/0x34c
[   12.213580]  [<c111c68d>] ? chrdev_open+0xc2/0x148
[   12.214132]  [<c111c6fa>] chrdev_open+0x12f/0x148
[   12.214668]  [<c1117331>] do_dentry_open+0x1cd/0x2b5
[   12.215310]  [<c111c5cb>] ? cdev_put+0x1f/0x1f
[   12.215820]  [<c1117dd3>] vfs_open+0x75/0x7c
[   12.216307]  [<c1126178>] path_openat+0x695/0x85b
[   12.216853]  [<c100aa00>] ? hw_breakpoint_exceptions_notify+0x14e/0x16e
[   12.217590]  [<c1126372>] do_filp_open+0x34/0x9c
[   12.218130]  [<c105fd51>] ? do_raw_spin_unlock+0xa2/0xcb
[   12.218727]  [<c17baf18>] ? _raw_spin_unlock+0x22/0x2b
[   12.219314]  [<c113147b>] ? __alloc_fd+0x11b/0x126
[   12.219859]  [<c1117f7f>] do_sys_open+0x5f/0xd4
[   12.220371]  [<c1118011>] SyS_open+0x1d/0x1f
[   12.220860]  [<c100152e>] do_fast_syscall_32+0xb4/0xf3
[   12.221435]  [<c17bb663>] sysenter_past_esp+0x40/0x6a
[   12.241872] random: trinity: uninitialized urandom read (4 bytes read)
[   12.253291] mountall (175) used greatest stack depth: 6332 bytes left
mountall: Event failed





Thanks,
Kernel Test Robot

View attachment "config-4.8.0-00006-g00da7da" of type "text/plain" (111424 bytes)

View attachment "job-script" of type "text/plain" (3821 bytes)

Download attachment "dmesg.xz" of type "application/octet-stream" (17816 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ