lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20141006052236.GC28732@wfg-t540p.sh.intel.com>
Date:	Mon, 6 Oct 2014 13:22:36 +0800
From:	Fengguang Wu <fengguang.wu@...el.com>
To:	"Eric W. Biederman" <ebiederm@...ssion.com>
Cc:	Dave Hansen <dave.hansen@...el.com>,
	LKML <linux-kernel@...r.kernel.org>, lkp@...org
Subject: [NFS] WARNING: CPU: 0 PID: 879 at fs/proc/generic.c:521
 remove_proc_entry+0x153/0x16b()

Hi Eric,

FYI, we noticed the below changes on commit

65b38851a17472d31fec9019fc3a55b0802dab88 ("NFS: Fix /proc/fs/nfsfs/servers and /proc/fs/nfsfs/volumes")

+--------------------------------------------------+------------+------------+
|                                                  | db181ce011 | 65b38851a1 |
+--------------------------------------------------+------------+------------+
| boot_successes                                   | 49         | 16         |
| boot_failures                                    | 7          | 1          |
| BUG:kernel_test_crashed                          | 7          |            |
| WARNING:at_fs/proc/generic.c:remove_proc_entry() | 0          | 1          |
| backtrace:cleanup_net                            | 0          | 1          |
+--------------------------------------------------+------------+------------+


[   19.275971] trinity-c0: vm86 mode not supported on 64 bit kernel
[   19.361766] VFS: Warning: trinity-c0 using old stat() call. Recompile your binary.
[   19.400863] ------------[ cut here ]------------
[   19.400878] WARNING: CPU: 0 PID: 879 at fs/proc/generic.c:521 remove_proc_entry+0x153/0x16b()
[   19.400879] remove_proc_entry: removing non-empty directory 'fs/nfsfs', leaking at least 'volumes'
[   19.400882] Modules linked in:
[   19.400886] CPU: 0 PID: 879 Comm: kworker/u2:2 Not tainted 3.17.0-rc1 #1
[   19.400887] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
[   19.400894] Workqueue: netns cleanup_net
[   19.400896]  0000000000000000 ffff8800104d3c80 ffffffff819d6c7b ffff8800104d3cc8
[   19.400898]  ffff8800104d3cb8 ffffffff810e8810 ffffffff8124ffd2 ffff8800127c2880
[   19.400899]  ffffffff81d1786c ffff8800126eae30 0000000000000005 ffff8800104d3d20
[   19.400900] Call Trace:
[   19.400905]  [<ffffffff819d6c7b>] dump_stack+0x4d/0x66
[   19.400910]  [<ffffffff810e8810>] warn_slowpath_common+0x7f/0x98
[   19.400912]  [<ffffffff8124ffd2>] ? remove_proc_entry+0x153/0x16b
[   19.400914]  [<ffffffff810e8871>] warn_slowpath_fmt+0x48/0x50
[   19.400919]  [<ffffffff8124b8dd>] ? proc_entry_rundown+0x55/0x82
[   19.400921]  [<ffffffff8124ffd2>] remove_proc_entry+0x153/0x16b
[   19.400927]  [<ffffffff81309766>] nfs_fs_proc_net_exit+0x75/0x78
[   19.400934]  [<ffffffff8130e4ac>] nfs_net_exit+0x12/0x1d
[   19.400936]  [<ffffffff818b7aa2>] ops_exit_list+0x42/0x53
[   19.400938]  [<ffffffff818b8363>] cleanup_net+0xfe/0x19e
[   19.400942]  [<ffffffff810fc6cf>] process_one_work+0x1c9/0x378
[   19.400946]  [<ffffffff810fd20e>] worker_thread+0x2c2/0x3b8
[   19.400948]  [<ffffffff810fcf4c>] ? rescuer_thread+0x25b/0x25b
[   19.400950]  [<ffffffff81100f28>] kthread+0xe4/0xec
[   19.400952]  [<ffffffff81100e44>] ? kthread_create_on_node+0x18c/0x18c
[   19.400955]  [<ffffffff819de03c>] ret_from_fork+0x7c/0xb0
[   19.400957]  [<ffffffff81100e44>] ? kthread_create_on_node+0x18c/0x18c
[   19.400958] ---[ end trace d172d68987077a95 ]---
[   19.796662] VFS: Warning: trinity-c0 using old stat() call. Recompile your binary.

Thanks,
Fengguang

View attachment ".dmesg" of type "text/plain" (35947 bytes)

_______________________________________________
LKP mailing list
LKP@...ux.intel.com

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ