lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Mon, 11 Jul 2016 21:33:00 +0800
From:	kernel test robot <xiaolong.ye@...el.com>
To:	Topi Miettinen <toiwoton@...il.com>
Cc:	lkp@...org, LKML <linux-kernel@...r.kernel.org>,
	0day robot <fengguang.wu@...el.com>
Subject: [capabilities]  c24bf954b5: BUG: sleeping function called from
 invalid context at mm/slab.h:388



FYI, we noticed the following commit:

https://github.com/0day-ci/linux Topi-Miettinen/capabilities-audit-capability-use/20160711-191824
commit c24bf954b59269134ee89584ca466fafd5e98c38 ("capabilities: audit capability use")

in testcase: boot

on test machine: 1 threads qemu-system-x86_64 -enable-kvm -cpu SandyBridge with 320M memory

caused below changes:


+----------------------------------------------------------------+------------+------------+
|                                                                | 86b2efbe3a | c24bf954b5 |
+----------------------------------------------------------------+------------+------------+
| boot_successes                                                 | 6          | 0          |
| boot_failures                                                  | 0          | 6          |
| BUG:sleeping_function_called_from_invalid_context_at_mm/slab.h | 0          | 6          |
| backtrace:do_mount                                             | 0          | 6          |
| backtrace:SyS_mount                                            | 0          | 6          |
| backtrace:do_vfs_ioctl                                         | 0          | 3          |
| backtrace:SyS_ioctl                                            | 0          | 3          |
+----------------------------------------------------------------+------------+------------+



/etc/rcS.d/S00fbsetup: line 3: /sbin/modprobe: not found

Please wait: booting...
[   12.389597] BUG: sleeping function called from invalid context at mm/slab.h:388
[   12.393131] in_atomic(): 1, irqs_disabled(): 0, pid: 197, name: mount
[   12.396239] 1 lock held by mount/197:
[   12.398865]  #0:  (kobj_ns_type_lock){......}, at: [<ffffffff81401a1c>] kobj_ns_current_may_mount+0x14/0x3f
[   12.403931] CPU: 0 PID: 197 Comm: mount Not tainted 4.6.0-00005-gc24bf95 #30
[   12.407077] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Debian-1.8.2-1 04/01/2014
[   12.416595]  0000000000000000 ffff88000f2dbbc8 ffffffff813ff1e2 ffff88000f2c1800
[   12.419941]  ffffffff81b94b37 ffff88000f2dbbe0 ffffffff8109b377 ffffffff8221b4dc
[   12.426308]  ffff88000f2dbc08 ffffffff8109b3ea 0000000002400040 ffff880000090700
[   12.429626] Call Trace:
[   12.430060]  [<ffffffff813ff1e2>] dump_stack+0x61/0x7e
[   12.431964]  [<ffffffff81b94b37>] ? __alloc_skb+0x46/0x195
[   12.434910]  [<ffffffff8109b377>] ___might_sleep+0x119/0x11c
[   12.437859]  [<ffffffff8109b3ea>] __might_sleep+0x70/0x77
[   12.441585]  [<ffffffff81149664>] kmem_cache_alloc+0x3d/0x14d
[   12.444557]  [<ffffffff81b94b37>] __alloc_skb+0x46/0x195
[   12.447490]  [<ffffffff810e42b3>] audit_log_start+0x32c/0x403
[   12.450549]  [<ffffffff8103a2c9>] ? kvm_clock_read+0x25/0x37
[   12.453522]  [<ffffffff8103a2ef>] ? kvm_sched_clock_read+0x9/0x12
[   12.460176]  [<ffffffff810e5b0d>] audit_log+0x25/0x66
[   12.461014]  [<ffffffff810ea804>] audit_log_cap_use+0x6a/0x6c
[   12.461914]  [<ffffffff81080312>] ns_capable+0x49/0x5b
[   12.462761]  [<ffffffff81bbb9a8>] net_current_may_mount+0x29/0x2b
[   12.463740]  [<ffffffff81401a31>] kobj_ns_current_may_mount+0x29/0x3f
[   12.464783]  [<ffffffff811bb488>] sysfs_mount+0x58/0x94
[   12.465643]  [<ffffffff810a863b>] ? __init_waitqueue_head+0x36/0x49
[   12.466640]  [<ffffffff811662ee>] mount_fs+0xf/0x88
[   12.485502]  [<ffffffff8117e696>] vfs_kern_mount+0x64/0x131
[   12.486441]  [<ffffffff811805e9>] do_mount+0xa4b/0xb51
[   12.487227]  [<ffffffff81117631>] ? strndup_user+0x3a/0x4e
[   12.488172]  [<ffffffff811808f3>] SyS_mount+0x72/0x9a
[   12.488968]  [<ffffffff81d069b6>] entry_SYSCALL_64_fastpath+0x1e/0xad
[   12.490504] mount (197) used greatest stack depth: 13752 bytes left


FYI, raw QEMU command line is:

	qemu-system-x86_64 -enable-kvm -cpu SandyBridge -kernel /pkg/linux/x86_64-acpi-redef/gcc-6/c24bf954b59269134ee89584ca466fafd5e98c38/vmlinuz-4.6.0-00005-gc24bf95 -append 'root=/dev/ram0 user=lkp job=/lkp/scheduled/vm-kbuild-yocto-x86_64-59/rand_boot-1-yocto-minimal-x86_64.cgz-x86_64-acpi-redef-c24bf954b59269134ee89584ca466fafd5e98c38-20160711-16957-ywrj60-0.yaml ARCH=x86_64 kconfig=x86_64-acpi-redef branch=linux-devel/devel-catchup-201607111920 commit=c24bf954b59269134ee89584ca466fafd5e98c38 BOOT_IMAGE=/pkg/linux/x86_64-acpi-redef/gcc-6/c24bf954b59269134ee89584ca466fafd5e98c38/vmlinuz-4.6.0-00005-gc24bf95 max_uptime=600 RESULT_ROOT=/result/boot/1/vm-kbuild-yocto-x86_64/yocto-minimal-x86_64.cgz/x86_64-acpi-redef/gcc-6/c24bf954b59269134ee89584ca466fafd5e98c38/0 LKP_SERVER=inn earlyprintk=ttyS0,115200 systemd.log_level=err debug apic=debug sysrq_always_enabled rcupdate.rcu_cpu_stall_timeout=100 panic=-1 softlockup_panic=1 nmi_watchdog=panic oops=panic load_ramdisk=2 prompt_ramdisk=0 console=ttyS0,115200 console=tty0 vga=normal rw ip=::::vm-kbuild-yocto-x86_64-59::dhcp drbd.minor_count=8'  -initrd /fs/sdg1/initrd-vm-kbuild-yocto-x86_64-59 -m 320 -smp 1 -device e1000,netdev=net0 -netdev user,id=net0 -boot order=nc -no-reboot -watchdog i6300esb -rtc base=localtime -drive file=/fs/sdg1/disk0-vm-kbuild-yocto-x86_64-59,media=disk,if=virtio -pidfile /dev/shm/kboot/pid-vm-kbuild-yocto-x86_64-59 -serial file:/dev/shm/kboot/serial-vm-kbuild-yocto-x86_64-59 -daemonize -display none -monitor null 





Thanks,
Kernel Test Robot

View attachment "config-4.6.0-00005-gc24bf95" of type "text/plain" (117649 bytes)

Download attachment "dmesg.xz" of type "application/octet-stream" (13988 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ