lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <14473.1389810012@turing-police.cc.vt.edu>
Date:	Wed, 15 Jan 2014 13:20:12 -0500
From:	Valdis Kletnieks <Valdis.Kletnieks@...edu>
To:	Andrew Morton <akpm@...ux-foundation.org>,
	Christoph Hellwig <hch@....de>, Jan Kara <jack@...e.cz>
Cc:	linux-kernel@...r.kernel.org
Subject: next-20140114 - BUG: spinlock wrong CPU on CPU#3, mount/597

Am seeing this at boot on next-20140114, but I hit this same exact stack trace
at least once on next-20131218.  v3.13-rc7 doesn't have the problem, so it's
not a 3.13 release showstopper.  I may not be able to bisect this, as there's 2
or 3 other now-fixed bugs that cause lots of 'bisect skips' because the system
won't boot far enough to hit this issue.

I'm not sure who to blame - Jan beat up on fs/notify/notification.c pretty
heavily a few days ago, but I hit this at least once last month and that file
hasn't been touched since 2012, so the root cause is probably elsewhere.

I'm reasonably sure that rebuilding with CONFIG_DEBUG_SPINLOCK=n will "fix"
my issue, but that's just papering it over...

[   93.724597] SELinux: initialized (dev autofs, type autofs), uses genfs_contexts
[   93.759851] BUG: spinlock wrong CPU on CPU#3, mount/597
[   93.759854]  lock: 0xffff8800b87f04a8, .magic: dead4ead, .owner: mount/597, .owner_cpu: 35
[   93.759857] CPU: 3 PID: 597 Comm: mount Not tainted 3.13.0-rc8-next-20140114 #151
[   93.759858] Hardware name: Dell Inc. Latitude E6530/07Y85M, BIOS A11 03/12/2013
[   93.759863]  0000000000000000 ffff8800b87e7cd8 ffffffff8164e7e7 ffff8800b8194590
[   93.759867]  ffff8800b87e7cf8 ffffffff8107c42c ffff8800b87f04a8 0000000000000001
[   93.759871]  ffff8800b87e7d18 ffffffff8107c457 ffff8800b87f04a8 ffffffff81aa8b43
[   93.759872] Call Trace:
[   93.759879]  [<ffffffff8164e7e7>] dump_stack+0x4f/0xa2
[   93.759883]  [<ffffffff8107c42c>] spin_dump+0x8c/0x91
[   93.759886]  [<ffffffff8107c457>] spin_bug+0x26/0x28
[   93.759889]  [<ffffffff8107c75e>] do_raw_spin_unlock+0xdc/0xf3
[   93.759892]  [<ffffffff816586b0>] _raw_spin_unlock_irqrestore+0x27/0x83
[   93.759895]  [<ffffffff81073b76>] __wake_up+0x3f/0x46
[   93.759899]  [<ffffffff811630c6>] fsnotify_add_notify_event+0xba/0xdf
[   93.759902]  [<ffffffff81166058>] ? SyS_inotify_rm_watch+0xf3/0xf3
[   93.759905]  [<ffffffff81166265>] fanotify_handle_event+0x16f/0x256
[   93.759910]  [<ffffffff8112069b>] ? ac_get_obj.constprop.61+0x39/0x1be
[   93.759913]  [<ffffffff8116293b>] send_to_group.isra.1+0x114/0x123
[   93.759915]  [<ffffffff81162c49>] fsnotify+0x2dd/0x41d
[   93.759918]  [<ffffffff8165864a>] ? _raw_spin_unlock+0x5b/0x67
[   93.759922]  [<ffffffff8112a73d>] do_sys_open+0x109/0x12e
[   93.759925]  [<ffffffff8112a77b>] SyS_open+0x19/0x1b
[   93.759928]  [<ffffffff8165f7a2>] system_call_fastpath+0x16/0x1b
[   93.994336] SELinux: initialized (dev hugetlbfs, type hugetlbfs), uses transition SIDs

Any brilliant ideas?

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ