lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-id: <1421746712.6847.5.camel@AMDC1943>
Date:	Tue, 20 Jan 2015 10:38:32 +0100
From:	Krzysztof Kozlowski <k.kozlowski@...sung.com>
To:	Joonsoo Kim <iamjoonsoo.kim@....com>, linux-mm@...ck.org,
	linux-kernel@...r.kernel.org
Cc:	Christoph Lameter <cl@...ux.com>,
	Jesper Dangaard Brouer <brouer@...hat.com>,
	Pekka Enberg <penberg@...nel.org>,
	David Rientjes <rientjes@...gle.com>,
	Andrew Mo rton <akpm@...ux-foundation.org>,
	BartlomiejZolnierkiewicz <b.zolnierkie@...sung.com>,
	KyungminPark <kyungmin.park@...sung.com>,
	Marek Szyprowski <m.szyprowski@...sung.com>
Subject: Bisected BUG: using smp_processor_id() in preemptible

Hi,


Since next-20150119 booting of Exynos4 based boards is nearly impossible
because of continuous BUG on messages. The system finally boots... but
console log is polluted with:

[    9.700828] BUG: using smp_processor_id() in preemptible [00000000] code: udevd/1656
[    9.708525] caller is kfree+0x8c/0x198
[    9.712229] CPU: 2 PID: 1656 Comm: udevd Tainted: G        W      3.19.0-rc4-00279-gd2dc80750ee0 #1630
[    9.721501] Hardware name: SAMSUNG EXYNOS (Flattened Device Tree)
[    9.727602] [<c0014980>] (unwind_backtrace) from [<c0011904>] (show_stack+0x10/0x14)
[    9.735324] [<c0011904>] (show_stack) from [<c0585bbc>] (dump_stack+0x70/0xbc)
[    9.742525] [<c0585bbc>] (dump_stack) from [<c01e79e0>] (check_preemption_disabled+0xf8/0x128)
[    9.751114] [<c01e79e0>] (check_preemption_disabled) from [<c00c501c>] (kfree+0x8c/0x198)
[    9.759265] [<c00c501c>] (kfree) from [<c0299b7c>] (uevent_show+0x38/0x104)
[    9.766210] [<c0299b7c>] (uevent_show) from [<c0299fb8>] (dev_attr_show+0x1c/0x48)
[    9.773763] [<c0299fb8>] (dev_attr_show) from [<c0122424>] (sysfs_kf_seq_show+0x8c/0x10c)
[    9.781920] [<c0122424>] (sysfs_kf_seq_show) from [<c0120f90>] (kernfs_seq_show+0x24/0x28)
[    9.790172] [<c0120f90>] (kernfs_seq_show) from [<c00e93b0>] (seq_read+0x1ac/0x480)
[    9.797806] [<c00e93b0>] (seq_read) from [<c00cacf4>] (__vfs_read+0x18/0x4c)
[    9.804833] [<c00cacf4>] (__vfs_read) from [<c00cada4>] (vfs_read+0x7c/0x100)
[    9.811950] [<c00cada4>] (vfs_read) from [<c00cae68>] (SyS_read+0x40/0x8c)
[    9.818810] [<c00cae68>] (SyS_read) from [<c000f160>] (ret_fast_syscall+0x0/0x30)

I bisected this to:

d2dc80750ee05ceb03c9b13b0531a782116d1ade
Author: Joonsoo Kim <iamjoonsoo.kim@....com>
Date:   Sat Jan 17 11:23:23 2015 +1100
mm/slub: optimize alloc/free fastpath by removing preemption on/off

Full dmesg and config attached.

Any ideas?


Best regards,
Krzysztof


View attachment "config-bug-smp-preemptible" of type "text/plain" (87159 bytes)

View attachment "dmesg-bug-smp-preemptible" of type "text/plain" (184103 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ