lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20170113222659.GA105338@inn.lkp.intel.com>
Date:   Sat, 14 Jan 2017 06:26:59 +0800
From:   kernel test robot <xiaolong.ye@...el.com>
To:     Christoph Hellwig <hch@....de>
Cc:     Tejun Heo <tj@...nel.org>, LKML <linux-kernel@...r.kernel.org>,
        Stephen Rothwell <sfr@...b.auug.org.au>, lkp@...org
Subject: [libata]  a234f7395c:
 BUG:sleeping_function_called_from_invalid_context_at_mm/slab.h


FYI, we noticed the following commit:

commit: a234f7395c9301a5048cb2daa4c86f15c6f02de8 ("libata: switch to dynamic allocation instead of ata_scsi_rbuf")
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master

in testcase: netperf
with following parameters:

	ip: ipv4
	runtime: 300s
	nr_threads: 1
	cluster: cs-localhost
	send_size: 10K
	test: SCTP_STREAM_MANY
	cpufreq_governor: performance

test-description: Netperf is a benchmark that can be use to measure various aspect of networking performance.
test-url: http://www.netperf.org/netperf/


on test machine: 4 threads Intel(R) Core(TM) i3-3220 CPU @ 3.30GHz with 8G memory

caused below changes:


+------------------------------------------------------------------+------------+------------+
|                                                                  | a0c0b0e945 | a234f7395c |
+------------------------------------------------------------------+------------+------------+
| boot_successes                                                   | 5          | 0          |
| boot_failures                                                    | 4          | 14         |
| invoked_oom-killer:gfp_mask=0x                                   | 4          |            |
| Mem-Info                                                         | 4          |            |
| Kernel_panic-not_syncing:Out_of_memory_and_no_killable_processes | 4          |            |
| BUG:sleeping_function_called_from_invalid_context_at_mm/slab.h   | 0          | 12         |
| BUG:kernel_hang_in_test_stage                                    | 0          | 2          |
+------------------------------------------------------------------+------------+------------+



[    8.283374] ata1.00: ACPI cmd f5/00:00:00:00:00:00 (SECURITY FREEZE LOCK) filtered out
[    8.283506] ata1.00: ACPI cmd b1/c1:00:00:00:00:00 (DEVICE CONFIGURATION OVERLAY) filtered out
[    8.284298] ata1.00: configured for UDMA/133
[    8.284469] BUG: sleeping function called from invalid context at mm/slab.h:408
[    8.284614] in_atomic(): 1, irqs_disabled(): 1, pid: 5, name: kworker/u8:0
[    8.284730] CPU: 3 PID: 5 Comm: kworker/u8:0 Not tainted 4.10.0-rc2-00228-ga234f73 #1
[    8.284864] Hardware name: Hewlett-Packard p6-1451cx/2ADA, BIOS 8.15 02/05/2013
[    8.284992] Workqueue: events_unbound async_run_entry_fn
[    8.285082] Call Trace:
[    8.285131]  dump_stack+0x63/0x8a
[    8.285191]  ___might_sleep+0xd3/0x120
[    8.285257]  __might_sleep+0x4a/0x80


To reproduce:

        git clone git://git.kernel.org/pub/scm/linux/kernel/git/wfg/lkp-tests.git
        cd lkp-tests
        bin/lkp install job.yaml  # job file is attached in this email
        bin/lkp run     job.yaml



Thanks,
Kernel Test Robot

View attachment "config-4.10.0-rc2-00228-ga234f73" of type "text/plain" (155604 bytes)

View attachment "job-script" of type "text/plain" (7174 bytes)

Download attachment "dmesg.xz" of type "application/octet-stream" (17864 bytes)

View attachment "netperf" of type "text/plain" (640 bytes)

View attachment "job.yaml" of type "text/plain" (4765 bytes)

View attachment "reproduce" of type "text/plain" (204 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ