lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <53BBEFA9.9020608@oracle.com>
Date:	Tue, 08 Jul 2014 09:18:33 -0400
From:	Sasha Levin <sasha.levin@...cle.com>
To:	Hugh Dickins <hughd@...gle.com>
CC:	Andrew Morton <akpm@...ux-foundation.org>,
	LKML <linux-kernel@...r.kernel.org>,
	"linux-mm@...ck.org" <linux-mm@...ck.org>,
	Dave Jones <davej@...hat.com>
Subject: mm: shmem: WARNING: CPU: 1 PID: 8994 at mm/shmem.c:594 shmem_evict_inode+0x123/0x150()

Hi Hugh,

This is the first time I saw the warning at mm/shmem.c:594 getting hit. Your comments on
that warning is that you saw it getting hit yourself (and changed it from a BUG_ON to WARN),
but it's still useful to know about it.

So this is my FYI report about that warning still being triggered :)

[  297.375500] WARNING: CPU: 1 PID: 8994 at mm/shmem.c:594 shmem_evict_inode+0x123/0x150()
[  297.380368] Modules linked in:
[  297.381370] CPU: 1 PID: 8994 Comm: trinity-c84 Not tainted 3.16.0-rc4-next-20140708-sasha-00022-g94c7290-dirty #770
[  297.384668]  0000000000000009 ffff880248403ae8 ffffffff8d495ea4 0000000000000000
[  297.387501]  0000000000000000 ffff880248403b28 ffffffff8a16ad4c ffff880248403b28
[  297.389813]  ffff88006d8340d0 ffff88006d8340d0 ffff88006d8340d0 ffff88006d834128
[  297.393372] Call Trace:
[  297.394791] dump_stack (lib/dump_stack.c:52)
[  297.397459] warn_slowpath_common (kernel/panic.c:431)
[  297.400225] warn_slowpath_null (kernel/panic.c:466)
[  297.402078] shmem_evict_inode (mm/shmem.c:594 (discriminator 1))
[  297.404050] evict (fs/inode.c:550)
[  297.405639] iput (fs/inode.c:1438)
[  297.407289] __dentry_kill (fs/dcache.c:292 fs/dcache.c:477)
[  297.408206] ? dput (fs/dcache.c:509 fs/dcache.c:617)
[  297.408971] dput (fs/dcache.c:521 fs/dcache.c:617)
[  297.409731] __fput (fs/file_table.c:235)
[  297.410692] ____fput (fs/file_table.c:253)
[  297.411442] task_work_run (kernel/task_work.c:125 (discriminator 1))
[  297.412242] do_exit (kernel/exit.c:756)
[  297.412997] ? put_lock_stats.isra.12 (./arch/x86/include/asm/preempt.h:98 kernel/locking/lockdep.c:254)
[  297.413933] ? _raw_spin_unlock_irq (./arch/x86/include/asm/paravirt.h:819 include/linux/spinlock_api_smp.h:168 kernel/locking/spinlock.c:199)
[  297.414878] do_group_exit (kernel/exit.c:884)
[  297.415674] get_signal_to_deliver (kernel/signal.c:2351)
[  297.416626] ? vtime_account_user (kernel/sched/cputime.c:687)
[  297.417558] do_signal (arch/x86/kernel/signal.c:698)
[  297.418372] ? vtime_account_user (kernel/sched/cputime.c:687)
[  297.419305] ? kmemleak_no_scan (mm/kmemleak.c:1102)
[  297.420258] ? is_prefetch.isra.11 (arch/x86/mm/fault.c:158)
[  297.421144] ? context_tracking_user_exit (./arch/x86/include/asm/paravirt.h:809 (discriminator 2) kernel/context_tracking.c:184 (discriminator 2))
[  297.422120] ? __this_cpu_preempt_check (lib/smp_processor_id.c:63)
[  297.423137] ? trace_hardirqs_on_caller (kernel/locking/lockdep.c:2557 kernel/locking/lockdep.c:2599)
[  297.424139] do_notify_resume (arch/x86/kernel/signal.c:751)
[  297.424974] retint_signal (arch/x86/kernel/entry_64.S:921)


Thanks,
Sasha
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ