lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20151007092822.GB16065@arm.com> Date: Wed, 7 Oct 2015 10:28:23 +0100 From: Will Deacon <will.deacon@....com> To: Yang Shi <yang.shi@...aro.org> Cc: rostedt@...dmis.org, catalin.marinas@....com, linux-kernel@...r.kernel.org, linux-rt-users@...r.kernel.org, linux-arm-kernel@...ts.infradead.org, linaro-kernel@...ts.linaro.org Subject: Re: [v2 PATCH] arm64: convert patch_lock to raw lock On Tue, Oct 06, 2015 at 02:12:31PM -0700, Yang Shi wrote: > When running kprobe test on arm64 rt kernel, it reports the below warning: > > root@...u7:~# modprobe kprobe_example > BUG: sleeping function called from invalid context at kernel/locking/rtmutex.c:917 > in_atomic(): 0, irqs_disabled(): 128, pid: 484, name: modprobe > CPU: 0 PID: 484 Comm: modprobe Not tainted 4.1.6-rt5 #2 > Hardware name: linux,dummy-virt (DT) > Call trace: > [<ffffffc0000891b8>] dump_backtrace+0x0/0x128 > [<ffffffc000089300>] show_stack+0x20/0x30 > [<ffffffc00061dae8>] dump_stack+0x1c/0x28 > [<ffffffc0000bbad0>] ___might_sleep+0x120/0x198 > [<ffffffc0006223e8>] rt_spin_lock+0x28/0x40 > [<ffffffc000622b30>] __aarch64_insn_write+0x28/0x78 > [<ffffffc000622e48>] aarch64_insn_patch_text_nosync+0x18/0x48 > [<ffffffc000622ee8>] aarch64_insn_patch_text_cb+0x70/0xa0 > [<ffffffc000622f40>] aarch64_insn_patch_text_sync+0x28/0x48 > [<ffffffc0006236e0>] arch_arm_kprobe+0x38/0x48 > [<ffffffc00010e6f4>] arm_kprobe+0x34/0x50 > [<ffffffc000110374>] register_kprobe+0x4cc/0x5b8 > [<ffffffbffc002038>] kprobe_init+0x38/0x7c [kprobe_example] > [<ffffffc000084240>] do_one_initcall+0x90/0x1b0 > [<ffffffc00061c498>] do_init_module+0x6c/0x1cc > [<ffffffc0000fd0c0>] load_module+0x17f8/0x1db0 > [<ffffffc0000fd8cc>] SyS_finit_module+0xb4/0xc8 > > Convert patch_lock to raw lock to avoid this issue. > > Although the problem is found on rt kernel, the fix should be applicable to > mainline kernel too. > > Signed-off-by: Yang Shi <yang.shi@...aro.org> > Acked-by: Steven Rostedt <rostedt@...dmis.org> > --- > v1 -> v2: > Add Steven's Acked-by > Fix subject (remove unnecessary "make") > Fix a typo error in commit log I already queued with this Steve's Ack, so we'll just have to live with the typos. Will -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists