lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20170418072505.GE3899@wtj.duckdns.org>
Date:   Tue, 18 Apr 2017 16:25:05 +0900
From:   Tejun Heo <tj@...nel.org>
To:     André Przywara <andre.przywara@....com>
Cc:     Icenowy Zheng <icenowy@...c.xyz>,
        Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
        Adam Borowski <kilobyte@...band.pl>,
        "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Subject: Re: sun50i-a64-pinctrl WARN_ON drivers/base/dd.c:349

Hello,

On Mon, Apr 03, 2017 at 12:48:16AM +0100, André Przywara wrote:
> So I see this problem easily now - on every boot - with an unpatched
> 4.11-rc3 kernel and the (arm64) defconfig on a Pine64 or BananaPi M64.
> I enabled devres.log and see that pinctrl probes early, but apparently
> gets deferred, pretty late actually (after 43 ADDs).
> 
> Now what sticks out from the sequence (see the attached log) is that
> there are two un-matches ADDs with a devm_kmalloc of size 0:
> sun50i-a64-pinctrl 1c20800.pinctrl: DEVRES ADD ffff80007bd84200
> devm_kzalloc_release (0 bytes)
> sun50i-a64-pinctrl 1c20800.pinctrl: DEVRES ADD ffff80007bd84100
> devm_kzalloc_release (0 bytes)
> 
> While all the other ADDs have a matching REL, those two have not. I
> guess it's due to the size being 0. Does that ring a bell?

AFAICS, 0 size allocs should be fine.

> Or is due to the fact that these two ADDs are after the RELs have
> already started, so at a point where the driver is already cleaned up?

But this sounds problematic to me.  So, these zero length allocations
are happening after release of the device is initiated?  Where are
they coming from?

Thanks.

-- 
tejun

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ