lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20161017022253.GF22605@yexl-desktop>
Date:   Mon, 17 Oct 2016 10:22:53 +0800
From:   kernel test robot <xiaolong.ye@...el.com>
To:     Joel Fernandes <joelaf@...gle.com>
Cc:     linux-kernel@...r.kernel.org, linux-rt-users@...r.kernel.org,
        Joel Fernandes <joelaf@...gle.com>,
        Chris Wilson <chris@...is-wilson.co.uk>,
        Jisheng Zhang <jszhang@...vell.com>,
        John Dias <joaodias@...gle.com>,
        Andrew Morton <akpm@...ux-foundation.org>,
        "open list:MEMORY MANAGEMENT" <linux-mm@...ck.org>
Subject: [lkp] [mm]  b1f58b69ba: BUG: sleeping function called from invalid
 context at mm/vmalloc.c:667


FYI, we noticed the following commit:

https://github.com/0day-ci/linux Joel-Fernandes/mm-vmalloc-Replace-purge_lock-spinlock-with-atomic-refcount/20161015-184633
commit b1f58b69ba586afbe70d2f3931370fc1f701d1c2 ("mm: vmalloc: Replace purge_lock spinlock with atomic refcount")

in testcase: boot

on test machine: qemu-system-x86_64 -enable-kvm -smp 2 -m 512M

caused below changes:


+----------------------------------------------------------------------------+------------+------------+
|                                                                            | fe4cd888f7 | b1f58b69ba |
+----------------------------------------------------------------------------+------------+------------+
| boot_successes                                                             | 8          | 5          |
| boot_failures                                                              | 14         | 17         |
| Kernel_panic-not_syncing:VFS:Unable_to_mount_root_fs_on_unknown-block(#,#) | 2          |            |
| calltrace:prepare_namespace                                                | 2          |            |
| BUG:kernel_reboot-without-warning_in_test_stage                            | 12         | 3          |
| BUG:sleeping_function_called_from_invalid_context_at_mm/vmalloc.c          | 0          | 14         |
| invoked_oom-killer:gfp_mask=0x                                             | 0          | 1          |
| Mem-Info                                                                   | 0          | 1          |
+----------------------------------------------------------------------------+------------+------------+



[init] Using pid_max = 32768
[init] Started watchdog process, PID is 9385
[main] Main thread is alive.
[   13.986544] BUG: sleeping function called from invalid context at mm/vmalloc.c:667
[   13.988089] in_atomic(): 1, irqs_disabled(): 0, pid: 0, name: swapper/0
[   13.989281] 1 lock held by swapper/0/0:
[   13.989935]  #0: 
[   13.990281]  (
vmap_area_lock
[   13.990772] ){......}
, at: 
[   13.991264] [<ffffffff81112aec>] __purge_vmap_area_lazy+0x28e/0x306
[   13.992284] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.8.0-mm1-00158-gb1f58b6 #1
[   13.993297]  ffffffff81c03d08 ffffffff8131753a ffffffff81c0b540 ffff880014581360
[   13.994371]  ffffffff81c03d20 ffffffff8108d64c ffff880014581120 ffffffff81c03d88
[   13.995439]  ffffffff81112b31 ffffffff811124e6 ffffffff81c03db0 0000000081112723
[   13.996570] Call Trace:
[   13.996933]  [<ffffffff8131753a>] dump_stack+0x79/0x95
[   13.997631]  [<ffffffff8108d64c>] ___might_sleep+0x110/0x11f
[   13.998395]  [<ffffffff81112b31>] __purge_vmap_area_lazy+0x2d3/0x306
[   13.999242]  [<ffffffff811124e6>] ? pmd_offset+0x19/0x49
[   14.000008]  [<ffffffff81112cd4>] free_vmap_area_noflush+0x6d/0x72
[   14.000834]  [<ffffffff81113e43>] remove_vm_area+0x84/0x90
[   14.001575]  [<ffffffff81113e85>] __vunmap+0x36/0xae
[   14.002247]  [<ffffffff81113f88>] vfree+0x5f/0x62
[   14.002885]  [<ffffffff8106f177>] free_thread_stack+0x54/0xcb
[   14.003656]  [<ffffffff8106f5bd>] put_task_stack+0x2a/0x4f
[   14.004451]  [<ffffffff8108cfa1>] finish_task_switch+0x188/0x1b4
[   14.005278]  [<ffffffff816bf338>] __schedule+0x3c8/0x4a7
[   14.006014]  [<ffffffff816bf49b>] schedule+0x84/0x95
[   14.006676]  [<ffffffff816bf6d4>] schedule_preempt_disabled+0x10/0x19
[   14.007544]  [<ffffffff8109cce9>] cpu_startup_entry+0x1c7/0x1cc
[   14.008386]  [<ffffffff816ba0dc>] rest_init+0xb3/0xb9
[   14.009086]  [<ffffffff81f0bf25>] start_kernel+0x43a/0x447
[   14.009812]  [<ffffffff81f0b120>] ? early_idt_handler_array+0x120/0x120
[   14.010702]  [<ffffffff81f0b2b3>] x86_64_start_reservations+0x38/0x3a
[   14.011564]  [<ffffffff81f0b3bf>] x86_64_start_kernel+0x10a/0x117
[main] Setsockopt(1 6 16ba000 5a) on fd 7 [1:2:1]
[main] Setsockopt(1 9 16ba000 e3) on fd 9 [16:3:2]
[main] Setsockopt(1 2d 16ba000 4) on fd 10 [1:1:1]





Thanks,
Xiaolong

View attachment "config-4.8.0-mm1-00158-gb1f58b6" of type "text/plain" (107941 bytes)

View attachment "job-script" of type "text/plain" (3866 bytes)

Download attachment "dmesg.xz" of type "application/octet-stream" (13748 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ