lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Mon, 04 Jul 2016 01:11:06 +0800
From:	kernel test robot <xiaolong.ye@...el.com>
To:	Topi Miettinen <toiwoton@...il.com>
Cc:	lkp@...org, LKML <linux-kernel@...r.kernel.org>,
	0day robot <fengguang.wu@...el.com>
Subject: [capabilities]  796b00c375: BUG: sleeping function called from
 invalid context at mm/slab.h:388



FYI, we noticed the following commit:

https://github.com/0day-ci/linux Topi-Miettinen/capabilities-audit-capability-use/20160703-231120
commit 796b00c375dc1789dc8d0e5b542c2f1fa4096354 ("capabilities: add capability cgroup controller")

in testcase: boot

on test machine: 2 threads qemu-system-x86_64 -enable-kvm with 360M memory

caused below changes:


+----------------------------------------------------------------+------------+------------+
|                                                                | 1f22cd881c | 796b00c375 |
+----------------------------------------------------------------+------------+------------+
| boot_successes                                                 | 35         | 0          |
| boot_failures                                                  | 0          | 10         |
| BUG:sleeping_function_called_from_invalid_context_at_mm/slab.h | 0          | 10         |
| backtrace:do_mount                                             | 0          | 10         |
| backtrace:SyS_mount                                            | 0          | 10         |
+----------------------------------------------------------------+------------+------------+



[    3.899578] Write protecting the kernel read-only data: 14336k
[    3.901580] Freeing unused kernel memory: 896K (ffff880001920000 - ffff880001a00000)
[    3.904541] Freeing unused kernel memory: 176K (ffff880001dd4000 - ffff880001e00000)
[    3.922306] BUG: sleeping function called from invalid context at mm/slab.h:388
[    3.925015] in_atomic(): 1, irqs_disabled(): 0, pid: 1, name: init
[    3.926587] CPU: 0 PID: 1 Comm: init Not tainted 4.7.0-rc3-00022-g796b00c3 #1
[    3.928283] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Debian-1.8.2-1 04/01/2014
[    3.930762]  0000000000000000 ffff88001259fbd8 ffffffff8143301a ffff8800125c0000
[    3.933409]  0000000000000184 ffff88001259fbf0 ffffffff810a3878 ffffffff81cb8da3
[    3.936499]  ffff88001259fc18 ffffffff810a3909 00000000024000c0 00000000024000c0
[    3.941668] Call Trace:
[    3.942659]  [<ffffffff8143301a>] dump_stack+0x63/0x89
[    3.944043]  [<ffffffff810a3878>] ___might_sleep+0xd8/0x120
[    3.945484]  [<ffffffff810a3909>] __might_sleep+0x49/0x80
[    3.946902]  [<ffffffff811dd251>] kmem_cache_alloc_node+0x201/0x220
[    3.948441]  [<ffffffff8143ca5b>] ? number+0x2cb/0x300
[    3.949830]  [<ffffffff817c612c>] ? __alloc_skb+0x4c/0x1c0
[    3.951256]  [<ffffffff817c612c>] __alloc_skb+0x4c/0x1c0
[    3.965980]  [<ffffffff8111e376>] audit_log_start+0x216/0x480
[    3.967490]  [<ffffffff8111f049>] audit_log_cap_use+0x39/0x100
[    3.968978]  [<ffffffff81086efb>] ns_capable+0x3b/0x60
[    3.970361]  [<ffffffff817f6c3b>] net_current_may_mount+0x2b/0x30
[    3.971892]  [<ffffffff81436416>] kobj_ns_current_may_mount+0x46/0x50
[    3.986368]  [<ffffffff8127fcc9>] sysfs_mount+0x29/0xb0
[    3.987759]  [<ffffffff81203278>] mount_fs+0x38/0x170
[    3.989116]  [<ffffffff8119e525>] ? __alloc_percpu+0x15/0x20
[    3.990568]  [<ffffffff81220314>] vfs_kern_mount+0x64/0x110
[    3.992176]  [<ffffffff81222981>] do_mount+0x221/0xd50
[    3.993909]  [<ffffffff810a3909>] ? __might_sleep+0x49/0x80
[    3.995649]  [<ffffffff81198ef3>] ? memdup_user+0x53/0x80
[    3.997257]  [<ffffffff812237a4>] SyS_mount+0x94/0xd0
[    3.998640]  [<ffffffff819178f2>] entry_SYSCALL_64_fastpath+0x1a/0xa4
[    4.015143] random: init urandom read with 5 bits of entropy available


FYI, raw QEMU command line is:

	qemu-system-x86_64 -enable-kvm -kernel /pkg/linux/x86_64-rhel/gcc-4.9/796b00c375dc1789dc8d0e5b542c2f1fa4096354/vmlinuz-4.7.0-rc3-00022-g796b00c3 -append 'root=/dev/ram0 user=lkp job=/lkp/scheduled/vm-vp-quantal-x86_64-27/rand_boot-1-quantal-core-x86_64.cgz-x86_64-rhel-796b00c375dc1789dc8d0e5b542c2f1fa4096354-20160704-2907-1ebopg0-0.yaml ARCH=x86_64 kconfig=x86_64-rhel branch=linux-devel/devel-catchup-201607032324 commit=796b00c375dc1789dc8d0e5b542c2f1fa4096354 BOOT_IMAGE=/pkg/linux/x86_64-rhel/gcc-4.9/796b00c375dc1789dc8d0e5b542c2f1fa4096354/vmlinuz-4.7.0-rc3-00022-g796b00c3 max_uptime=600 RESULT_ROOT=/result/boot/1/vm-vp-quantal-x86_64/quantal-core-x86_64.cgz/x86_64-rhel/gcc-4.9/796b00c375dc1789dc8d0e5b542c2f1fa4096354/0 LKP_SERVER=inn earlyprintk=ttyS0,115200 systemd.log_level=err debug apic=debug sysrq_always_enabled rcupdate.rcu_cpu_stall_timeout=100 panic=-1 softlockup_panic=1 nmi_watchdog=panic oops=panic load_ramdisk=2 prompt_ramdisk=0 console=ttyS0,115200 console=tty0 vga=normal rw ip=::::vm-vp-quantal-x86_64-27::dhcp drbd.minor_count=8'  -initrd /fs/sde1/initrd-vm-vp-quantal-x86_64-27 -m 360 -smp 2 -device e1000,netdev=net0 -netdev user,id=net0 -boot order=nc -no-reboot -watchdog i6300esb -rtc base=localtime -pidfile /dev/shm/kboot/pid-vm-vp-quantal-x86_64-27 -serial file:/dev/shm/kboot/serial-vm-vp-quantal-x86_64-27 -daemonize -display none -monitor null 





Thanks,
Kernel Test Robot

View attachment "config-4.7.0-rc3-00022-g796b00c3" of type "text/plain" (150917 bytes)

Download attachment "dmesg.xz" of type "application/octet-stream" (11048 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ