lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAM_iQpU5Zxfv8vKJwkAF02bgLK=Lyv=kXC9ECmQRoA-yvK8ang@mail.gmail.com>
Date:   Thu, 29 Jun 2017 18:43:53 -0700
From:   Cong Wang <xiyou.wangcong@...il.com>
To:     Justin Piszcz <jpiszcz@...idpixels.com>
Cc:     LKML <linux-kernel@...r.kernel.org>
Subject: Re: WARNING: CPU: 3 PID: 0 at kernel/cgroup/cgroup.c:441 cgroup_get+0x4b/0x50

On Thu, Jun 29, 2017 at 12:26 AM, Justin Piszcz <jpiszcz@...idpixels.com> wrote:
> Hello,
>
> Kernel: 4.11.0
> Arch: x86_64
>
> First time I have run into a WARN in a while, .config is attached:
>
> $ cp /proc/config.gz .
>
> Snippet:
>
> [22606.516656] ------------[ cut here ]------------
> [22606.516669] WARNING: CPU: 3 PID: 0 at kernel/cgroup/cgroup.c:441
> cgroup_get+0x4b/0x50
> [22606.516672] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 4.11.0 #1
> [22606.516674] Hardware name: Supermicro X9SRL-F/X9SRL-F, BIOS 3.2
> 01/16/2015
> [22606.516676] Call Trace:
> [22606.516678]  <IRQ>
> [22606.516681]  dump_stack+0x4d/0x66
> [22606.516684]  __warn+0xbc/0xe0
> [22606.516686]  warn_slowpath_null+0x18/0x20
> [22606.516687]  cgroup_get+0x4b/0x50
> [22606.516689]  cgroup_sk_alloc+0x56/0x60

This should be fixed by:

commit a590b90d472f2c176c140576ee3ab44df7f67839
Author: Tejun Heo <tj@...nel.org>
Date:   Fri Apr 28 15:14:55 2017 -0400

    cgroup: fix spurious warnings on cgroup_is_dead() from cgroup_sk_alloc()



Thanks.


> [22606.516694]  sk_clone_lock+0x2be/0x380
> [22606.516696]  inet_csk_clone_lock+0xf/0xa0
> [22606.516698]  tcp_create_openreq_child+0x1e/0x450
> [22606.516699]  tcp_v4_syn_recv_sock+0x42/0x290
> [22606.516700]  tcp_check_req+0x398/0x520
> [22606.516701]  tcp_v4_rcv+0x51d/0xa50
> [22606.516704]  ip_local_deliver_finish+0x57/0x100
> [22606.516707]  ip_local_deliver+0x51/0xe0
> [22606.516709]  ? inet_del_offload+0x40/0x40
> [22606.516711]  ip_rcv_finish+0x1af/0x3a0
> [22606.516713]  ip_rcv+0x29c/0x380
> [22606.516714]  ? ip_local_deliver_finish+0x100/0x100
> [22606.516716]  __netif_receive_skb_core+0x39c/0x850
> [22606.516717]  ? tcp4_gro_receive+0x112/0x1b0
> [22606.516718]  __netif_receive_skb+0x13/0x60
> [22606.516719]  netif_receive_skb_internal+0x2d/0xa0
> [22606.516721]  napi_gro_receive+0x79/0xd0
> [22606.516724]  igb_poll+0x988/0xd90
> [22606.516726]  net_rx_action+0x216/0x390
> [22606.516729]  __do_softirq+0xdf/0x210
> [22606.516730]  irq_exit+0xab/0xb0
> [22606.516731]  do_IRQ+0x4a/0xc0
> [22606.516734]  common_interrupt+0x86/0x86
> [22606.516737] RIP: 0010:cpuidle_enter_state+0x153/0x200
> [22606.516738] RSP: 0018:ffffc9000007fe68 EFLAGS: 00000282 ORIG_RAX:
> ffffffffffffff91
> [22606.516739] RAX: ffff88103f2d8740 RBX: ffffe8ffffad1dd0 RCX:
> 000000000000001f
> [22606.516740] RDX: 20c49ba5e353f7cf RSI: ffff88103f2d5f58 RDI:
> 0000000000000000
> [22606.516741] RBP: ffffc9000007fe98 R08: 00000000000009ca R09:
> 0000000000000018
> [22606.516742] R10: ffffc9000007fe48 R11: 0000000000000267 R12:
> 0000148f7d64ef5d
> [22606.516742] R13: 0000000000000004 R14: ffffffff8225a018 R15:
> ffffffff82259e80
> [22606.516743]  </IRQ>
> [22606.516745]  ? cpuidle_enter_state+0x148/0x200
> [22606.516746]  cpuidle_enter+0x12/0x20
> [22606.516748]  call_cpuidle+0x1e/0x30
> [22606.516749]  do_idle+0xde/0x1a0
> [22606.516751]  cpu_startup_entry+0x6c/0x70
> [22606.516752]  start_secondary+0x13c/0x160
> [22606.516755]  start_cpu+0x14/0x14
> [22606.516757] ---[ end trace d03cbab5a14ae58a ]---
>
> Justin.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ