lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <57d0ed74./RdHPAg3uO0deEfh%xiaolong.ye@intel.com>
Date:   Thu, 08 Sep 2016 12:47:48 +0800
From:   kernel test robot <xiaolong.ye@...el.com>
To:     Oleg Nesterov <oleg@...hat.com>
Cc:     lkp@...org, linux-kernel@...r.kernel.org,
        Neil Brown <neilb@...e.de>,
        Linus Torvalds <torvalds@...ux-foundation.org>,
        Johannes Weiner <hannes@...xchg.org>,
        Bart Van Assche <bvanassche@....org>,
        Al Viro <viro@...IV.linux.org.uk>,
        Peter Zijlstra <peterz@...radead.org>,
        Ingo Molnar <mingo@...nel.org>
Subject: [sched/wait]  02ae2b22bd: WARNING: CPU: 0 PID: 958 at
 kernel/sched/core.c:7610 __might_sleep+0x6e/0x90

FYI, we noticed the following commit:

https://github.com/0day-ci/linux Oleg-Nesterov/sched-wait-fix-and-then-kill-abort_exclusive_wait/20160907-145024
commit 02ae2b22bd2a42c4e4054563b139a541ba67a43e ("sched/wait: avoid abort_exclusive_wait() in ___wait_event()")

in testcase: boot

on test machine: qemu-system-x86_64 -enable-kvm -m 320M

caused below changes:


+-----------------------------------------------+------------+------------+
|                                               | 9272868493 | 02ae2b22bd |
+-----------------------------------------------+------------+------------+
| boot_successes                                | 16         | 1          |
| boot_failures                                 | 0          | 15         |
| WARNING:at_kernel/sched/core.c:#__might_sleep | 0          | 15         |
+-----------------------------------------------+------------+------------+



[   30.775242] kill 958 cat /proc/kmsg 
[   30.775242] wait for background monitors: 959 962 oom-killer nfs-hang
[   32.078512] ------------[ cut here ]------------
[   32.080657] WARNING: CPU: 0 PID: 958 at kernel/sched/core.c:7610 __might_sleep+0x6e/0x90
[   32.084787] do not call blocking ops when !TASK_RUNNING; state=1 set at [<ffffffff81107e0d>] prepare_to_wait_event+0xad/0x120
[   32.091287] Modules linked in:
[   32.094001] CPU: 0 PID: 958 Comm: cat Not tainted 4.8.0-rc5-00035-g02ae2b2 #1
[   32.094017] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Debian-1.8.2-1 04/01/2014
[   32.094017]  0000000000000000 ffff880009497be8 ffffffff813c9947 ffffffff810e993e
[   32.094017]  ffff880009497c48 ffff880009497c48 0000000000000000 ffff880009497c38
[   32.094017]  ffffffff810c18e7 ffff880009497c08 00001dba8110ea1d ffff880009497c28
[   32.094017] Call Trace:
[   32.094017]  [<ffffffff813c9947>] dump_stack+0xc4/0x12d
[   32.094017]  [<ffffffff810e993e>] ? __might_sleep+0x6e/0x90
[   32.094017]  [<ffffffff810c18e7>] __warn+0xe7/0x110
[   32.094017]  [<ffffffff810c19b4>] warn_slowpath_fmt+0x44/0x50
[   32.094017]  [<ffffffff81107e0d>] ? prepare_to_wait_event+0xad/0x120
[   32.094017]  [<ffffffff81107e0d>] ? prepare_to_wait_event+0xad/0x120
[   32.094017]  [<ffffffff810e993e>] __might_sleep+0x6e/0x90
[   32.094017]  [<ffffffff810d3613>] get_signal+0x63/0x3c0
[   32.094017]  [<ffffffff81498de6>] ? tty_write+0x2c6/0x2f0
[   32.094017]  [<ffffffff8126d565>] ? kmsg_read+0x55/0x70
[   32.094017]  [<ffffffff81016d60>] do_signal+0x20/0x100
[   32.094017]  [<ffffffff8135e1c9>] ? security_file_permission+0x99/0xb0
[   32.094017]  [<ffffffff81002344>] ? exit_to_usermode_loop+0x44/0xd0
[   32.094017]  [<ffffffff8110e9b3>] ? trace_hardirqs_on_caller+0x193/0x1f0
[   32.094017]  [<ffffffff81002372>] exit_to_usermode_loop+0x72/0xd0
[   32.094017]  [<ffffffff81002dca>] do_int80_syscall_32+0x1fa/0x230
[   32.094017]  [<ffffffff8177d9bd>] ? entry_INT80_compat+0x3d/0x50
[   32.094017]  [<ffffffff8177d9b8>] entry_INT80_compat+0x38/0x50
[   32.225846] ---[ end trace 8f84425f8176b010 ]---
[   32.225846] ---[ end trace 8f84425f8176b010 ]---






Thanks,
Kernel Test Robot

View attachment "config-4.8.0-rc5-00035-g02ae2b2" of type "text/plain" (116830 bytes)

Download attachment "dmesg.xz" of type "application/octet-stream" (11400 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ