lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CANaxB-ykM+5h4+x5hHK2Z_APpiQLvGvc=2nBR5pGQS=msqp6ZA@mail.gmail.com>
Date:	Wed, 24 Sep 2014 14:31:06 +0400
From:	Andrey Wagin <avagin@...il.com>
To:	LKML <linux-kernel@...r.kernel.org>, Tejun Heo <tj@...nel.org>,
	Li Zefan <lizefan@...wei.com>
Subject: linux-next: cgroup_mount() falls asleep forever

Hi All,

I execute CRIU tests on linux-next. Today I found that one of tests
hangs up forever.

[root@...ux-next-test linux-next]# git describe HEAD
next-20140922
[root@...ux-next-test ~]# ps axf
...
  698 ?        Ss     0:05  \_ sshd: root@...ty
  700 ?        Ss     0:00  |   \_ bash -x
jenkins-scripts/jenkins-ct.sh jenkins.sh
  706 ?        S      0:00  |       \_ bash -c ( mount --make-rprivate
/ && umount -l  /proc && mount -t proc proc /proc/ && bash -x
jenkins.sh)
  707 ?        S      0:00  |           \_ bash -c ( mount
--make-rprivate / && umount -l  /proc && mount -t proc proc /proc/ &&
bash -x jenkins.sh)
  711 ?        S      0:00  |               \_ bash -x jenkins.sh
 2981 ?        S      0:05  |                   \_ bash -x
test/zdtm.sh -C -x .*\(maps01\|maps04\)
 6717 ?        S      0:00  |                       \_ /bin/bash
zdtm/live/static/cgroup00.hook --clean
 6719 ?        D     11:13  |                           \_ mount -t
cgroup none cgclean.cWgK71 -o none,name=zdtmtst

[root@...ux-next-test ~]# cat /proc/6719/stack
[<ffffffff8111fcb7>] msleep+0x37/0x50
[<ffffffff8114bde2>] cgroup_mount+0x712/0xa50
[<ffffffff8124d0e9>] mount_fs+0x39/0x1b0
[<ffffffff8126d76b>] vfs_kern_mount+0x6b/0x150
[<ffffffff8127075b>] do_mount+0x22b/0xc20
[<ffffffff81271492>] SyS_mount+0xa2/0x110
[<ffffffff817e3ba9>] system_call_fastpath+0x12/0x17
[<ffffffffffffffff>] 0xffffffffffffffff

Let me know which info do you need for investigation.

Steps to reproduce:

git clone https://github.com/xemul/criu.git
cd criu
make
bash test/zdtm.sh static/cgroup00

Thanks,
Andrew
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ