lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20160407024740.GD1904@yexl-desktop>
Date:	Thu, 7 Apr 2016 10:47:40 +0800
From:	kernel test robot <xiaolong.ye@...el.com>
To:	Bastien Philbert <bastienphilbert@...il.com>
Cc:	0day robot <fengguang.wu@...el.com>,
	LKML <linux-kernel@...r.kernel.org>, lkp@...org
Subject: [lkp] [ipv6] 29405a159b: BUG: sleeping function called from invalid
 context at kernel/locking/mutex.c:97

FYI, we noticed below warning "BUG: sleeping function called from invalid context at kernel/locking/mutex.c:97" showed on

https://github.com/0day-ci/linux Bastien-Philbert/ipv6-icmp-Add-protection-from-concurrent-users-in-the-function-icmpv6_echo_reply/20160406-053153
commit 29405a159bb1653c5a7c55f86f27418714989322 ("ipv6: icmp: Add protection from concurrent users in the function icmpv6_echo_reply")



[   20.950078] br-lan: port 1(eth0) entered blocking state
[   20.951317] br-lan: port 1(eth0) entered forwarding state
[   20.953639] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
[   22.739879] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:97
[   22.742217] in_atomic(): 1, irqs_disabled(): 0, pid: 854, name: odhcpd
[   22.743557] CPU: 0 PID: 854 Comm: odhcpd Not tainted 4.6.0-rc1-00194-g29405a1 #1
[   22.745471] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Debian-1.8.2-1 04/01/2014
[   22.747570]  c8e74d80 c8e74d80 cb409dc0 c13d29a1 cb409dd0 c105b8f2 c8e74d80 00000000
[   22.750436]  cb409dec c105b96c 00000000 c247c860 c7ddac00 c247d6c0 c7ddae90 cb409df8
[   22.753098]  c1efdfc7 c7d5dcc0 cb409e00 c1ccc35d cb409e80 c1d9c30e 80000000 cb409e2c
[   22.755641] Call Trace:
[   22.756495]  [<c13d29a1>] dump_stack+0x16/0x25
[   22.757642]  [<c105b8f2>] ___might_sleep+0xc2/0x110
[   22.758914]  [<c105b96c>] __might_sleep+0x2c/0x80
[   22.760163]  [<c1efdfc7>] mutex_lock+0x17/0x30
[   22.761378]  [<c1ccc35d>] rtnl_lock+0xd/0x10
[   22.762556]  [<c1d9c30e>] icmpv6_rcv+0x67e/0x7c0
[   22.763768]  [<c1d801de>] ip6_input_finish+0xee/0x3e0
[   22.764927]  [<c1cef830>] ? nf_iterate+0x50/0x90
[   22.766031]  [<c1d80a26>] ip6_input+0x76/0x80
[   22.767114]  [<c1d800f0>] ? ip6_rcv_finish+0xa0/0xa0
[   22.768260]  [<c1d8007c>] ip6_rcv_finish+0x2c/0xa0
[   22.769405]  [<c1d80877>] ipv6_rcv+0x3a7/0x4e0
[   22.770611]  [<c1d80050>] ? ip6_make_skb+0x180/0x180
[   22.771910]  [<c1cb793c>] __netif_receive_skb_core+0x34c/0x7a0
[   22.773321]  [<c1073957>] ? internal_add_timer+0x27/0x60
[   22.774644]  [<c1059f2f>] ? wake_up_process+0xf/0x20
[   22.775861]  [<c104f2d1>] ? insert_work+0x61/0xa0
[   22.776977]  [<c1073957>] ? internal_add_timer+0x27/0x60
[   22.778172]  [<c1cb7da6>] __netif_receive_skb+0x16/0x60
[   22.779346]  [<c1cb82d9>] process_backlog+0x69/0xd0
[   22.780491]  [<c1cbba6a>] net_rx_action+0x18a/0x270
[   22.781713]  [<c1041880>] __do_softirq+0xb0/0x1a0
[   22.782938]  [<c10417d0>] ? __local_bh_enable_ip+0x80/0x80
[   22.784217]  [<c101607e>] do_softirq_own_stack+0x1e/0x30
[   22.785406]  <IRQ>  [<c10416f5>] do_softirq+0x35/0x40
[   22.786721]  [<c10417c6>] __local_bh_enable_ip+0x76/0x80
[   22.787910]  [<c1d7ca65>] ip6_finish_output2+0x185/0x510
[   22.789111]  [<c135e092>] ? selinux_ipv6_postroute+0x12/0x20
[   22.790493]  [<c1cef842>] ? nf_iterate+0x62/0x90
[   22.791729]  [<c1d7f48a>] ip6_finish_output+0x9a/0xf0
[   22.793030]  [<c1d7f48a>] ? ip6_finish_output+0x9a/0xf0
[   22.794345]  [<c1d7f56b>] ip6_output+0x8b/0x100
[   22.795561]  [<c1d7f3f0>] ? ip6_fragment+0xaa0/0xaa0
[   22.796712]  [<c1dba4ee>] ip6_local_out+0x2e/0x40
[   22.797833]  [<c1d7fda7>] ip6_send_skb+0x17/0xa0
[   22.798949]  [<c1d7fe6e>] ip6_push_pending_frames+0x3e/0x60
[   22.800196]  [<c1d9a7df>] rawv6_sendmsg+0xb4f/0xd50
[   22.801354]  [<c105b96c>] ? __might_sleep+0x2c/0x80
[   22.802649]  [<c105b96c>] ? __might_sleep+0x2c/0x80
[   22.803920]  [<c13df5a2>] ? _copy_from_user+0x52/0x60
[   22.805224]  [<c1d4edd0>] inet_sendmsg+0x20/0x60
[   22.806475]  [<c1ca4e2d>] sock_sendmsg+0x2d/0x40
[   22.807682]  [<c1ca5259>] ___sys_sendmsg+0x239/0x250
[   22.808830]  [<c1ca46f0>] ? ___sys_recvmsg+0xc0/0x140
[   22.809990]  [<c1ca4728>] ? ___sys_recvmsg+0xf8/0x140
[   22.811176]  [<c1ca4000>] ? init_once+0x10/0x10
[   22.812282]  [<c1ca4031>] ? sock_recvmsg+0x31/0x40
[   22.813456]  [<c135baab>] ? cred_has_capability+0x4b/0xd0
[   22.814794]  [<c1ca4820>] ? SYSC_bind+0xb0/0xd0
[   22.816017]  [<c105b96c>] ? __might_sleep+0x2c/0x80
[   22.817295]  [<c1ca602d>] __sys_sendmsg+0x2d/0x60
[   22.818530]  [<c1ca6cb6>] SYSC_socketcall+0x7f6/0x9a0
[   22.819790]  [<c13df2f8>] ? __copy_to_user_ll+0x8/0x10
[   22.820970]  [<c101d789>] ? save_fsave_header+0x39/0xa0
[   22.822184]  [<c105b96c>] ? __might_sleep+0x2c/0x80
[   22.823324]  [<c1046ff1>] ? recalc_sigpending+0x11/0x40
[   22.824500]  [<c105b96c>] ? __might_sleep+0x2c/0x80
[   22.825717]  [<c101cae1>] ? fpu__restore+0x61/0x140
[   22.840003]  [<c1ca6f2e>] SyS_socketcall+0xe/0x10
[   22.841188]  [<c100123f>] do_int80_syscall_32+0x3f/0xa0
[   22.842375]  [<c1eff6a1>] entry_INT80_32+0x31/0x31
[   29.059961] sock: process `trinity-main' is using obsolete setsockopt SO_BSDCOMPAT
[   29.099148] irda_setsockopt: not allowed to set MAXSDUSIZE for this socket type!


FYI, raw QEMU command line is:

	qemu-system-i386 -enable-kvm -kernel /pkg/linux/i386-randconfig-sb0-04060654/gcc-5/29405a159bb1653c5a7c55f86f27418714989322/vmlinuz-4.6.0-rc1-00194-g29405a1 -append 'root=/dev/ram0 user=lkp job=/lkp/scheduled/vm-lkp-wsx03-openwrt-i386-15/bisect_boot-1-openwrt-i386.cgz-i386-randconfig-sb0-04060654-29405a159bb1653c5a7c55f86f27418714989322-20160406-96797-1rryijw-0.yaml ARCH=i386 kconfig=i386-randconfig-sb0-04060654 branch=linux-devel/devel-spot-201604060629 commit=29405a159bb1653c5a7c55f86f27418714989322 BOOT_IMAGE=/pkg/linux/i386-randconfig-sb0-04060654/gcc-5/29405a159bb1653c5a7c55f86f27418714989322/vmlinuz-4.6.0-rc1-00194-g29405a1 max_uptime=600 RESULT_ROOT=/result/boot/1/vm-lkp-wsx03-openwrt-i386/openwrt-i386.cgz/i386-randconfig-sb0-04060654/gcc-5/29405a159bb1653c5a7c55f86f27418714989322/0 LKP_SERVER=inn earlyprintk=ttyS0,115200 systemd.log_level=err debug apic=debug sysrq_always_enabled rcupdate.rcu_cpu_stall_timeout=100 panic=-1 softlockup_panic=1 nmi_watchdog=panic oops=panic load_ramdisk=2 prompt_ramdisk=0 console=ttyS0,115200 console=tty0 vga=normal rw ip=::::vm-lkp-wsx03-openwrt-i386-15::dhcp drbd.minor_count=8'  -initrd /fs/sdc1/initrd-vm-lkp-wsx03-openwrt-i386-15 -m 192 -smp 1 -device e1000,netdev=net0 -netdev user,id=net0 -boot order=nc -no-reboot -watchdog i6300esb -rtc base=localtime -drive file=/fs/sdc1/disk0-vm-lkp-wsx03-openwrt-i386-15,media=disk,if=virtio -drive file=/fs/sdc1/disk1-vm-lkp-wsx03-openwrt-i386-15,media=disk,if=virtio -pidfile /dev/shm/kboot/pid-vm-lkp-wsx03-openwrt-i386-15 -serial file:/dev/shm/kboot/serial-vm-lkp-wsx03-openwrt-i386-15 -daemonize -display none -monitor null 





Thanks,
Xiaolong Ye

View attachment "config-4.6.0-rc1-00194-g29405a1" of type "text/plain" (107104 bytes)

Download attachment "dmesg.xz" of type "application/octet-stream" (17364 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ