lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Sat, 19 Dec 2020 23:35:09 +0800
From:   kernel test robot <oliver.sang@...el.com>
To:     John Stultz <john.stultz@...aro.org>
Cc:     0day robot <lkp@...el.com>, Sumit Semwal <sumit.semwal@...aro.org>,
        Liam Mark <lmark@...eaurora.org>,
        Chris Goldsworthy <cgoldswo@...eaurora.org>,
        Laura Abbott <labbott@...nel.org>,
        Brian Starkey <Brian.Starkey@....com>,
        Hridya Valsaraju <hridya@...gle.com>,
        Suren Baghdasaryan <surenb@...gle.com>,
        Sandeep Patil <sspatil@...gle.com>,
        Daniel Mentz <danielmentz@...gle.com>,
        Ørjan Eide <orjan.eide@....com>,
        Robin Murphy <robin.murphy@....com>,
        Ezequiel Garcia <ezequiel@...labora.com>,
        Simon Ser <contact@...rsion.fr>,
        James Jones <jajones@...dia.com>,
        LKML <linux-kernel@...r.kernel.org>, lkp@...ts.01.org,
        John Stultz <john.stultz@...aro.org>,
        linux-media@...r.kernel.org, dri-devel@...ts.freedesktop.org
Subject: [dma]  adc430f226: WARNING:at_kernel/sched/core.c:#__might_sleep


Greeting,

FYI, we noticed the following commit (built with gcc-9):

commit: adc430f226136c02a382fe6dff29a6382059ce0c ("dma-buf: system_heap: Add deferred freeing to the system heap")
url: https://github.com/0day-ci/linux/commits/John-Stultz/dma-buf-heaps-Add-deferred-free-helper-library-code/20201218-071112


in testcase: locktorture
version: 
with following parameters:

	runtime: 300s
	test: cpuhotplug

test-description: This torture test consists of creating a number of kernel threads which acquire the lock and hold it for specific amount of time, thus simulating different critical region behaviors.
test-url: https://www.kernel.org/doc/Documentation/locking/locktorture.txt


on test machine: qemu-system-i386 -enable-kvm -cpu SandyBridge -smp 2 -m 8G

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):


+-------------------------------------------------------+------------+------------+
|                                                       | 51e229fb2d | adc430f226 |
+-------------------------------------------------------+------------+------------+
| boot_successes                                        | 19         | 0          |
| boot_failures                                         | 9          | 4          |
| invoked_oom-killer:gfp_mask=0x                        | 1          |            |
| Mem-Info                                              | 1          |            |
| EIP:__put_user_nocheck_4                              | 1          |            |
| kernel_BUG_at_kernel/sched/core.c                     | 8          | 4          |
| invalid_opcode:#[##]                                  | 8          | 4          |
| EIP:sched_cpu_dying                                   | 8          | 4          |
| Kernel_panic-not_syncing:Fatal_exception              | 8          | 4          |
| WARNING:possible_circular_locking_dependency_detected | 8          | 4          |
| WARNING:at_kernel/sched/core.c:#__might_sleep         | 0          | 4          |
| EIP:__might_sleep                                     | 0          | 4          |
+-------------------------------------------------------+------------+------------+


If you fix the issue, kindly add following tag
Reported-by: kernel test robot <oliver.sang@...el.com>


[  107.814818] WARNING: CPU: 0 PID: 130 at kernel/sched/core.c:7858 __might_sleep+0x6c/0x80
[  107.816258] mtdoops: mtd device (mtddev=name/number) must be supplied
[  107.818504] Modules linked in:
[  107.818520] CPU: 0 PID: 130 Comm: dmabuf-deferred Not tainted 5.10.0-next-20201217-00003-gadc430f22613 #1
[  107.818536] EIP: __might_sleep+0x6c/0x80
[  107.821708] L440GX flash mapping: failed to find PIIX4 ISA bridge, cannot continue
[  107.823070] Code: 32 db 01 8b 73 0c 8b 83 e0 17 00 00 89 44 24 0c 8b 9b e0 17 00 00 89 5c 24 08 89 74 24 04 c7 04 24 38 92 cb da e8 c9 a5 b5 00 <0f> 0b 8b 4d ec 8b 55 f0 8b 45 f4 eb b0 8d b4 26 00 00 00 00 55 89
[  107.827562] SBC-GXx flash: IO:0x258-0x259 MEM:0xdc000-0xdffff
[  107.828850] EAX: 00000069 EBX: d96a0ed1 ECX: 00000000 EDX: 00000000
[  107.836825] scx200_docflash: NatSemi SCx200 DOCCS Flash Driver
[  107.839849] ESI: 00000001 EDI: c11e4200 EBP: c11b3eec ESP: c11b3ec8
[  107.839857] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00010296
[  107.839867] CR0: 80050033 CR2: 00000000 CR3: 1b540000 CR4: 00040690
[  107.839889] Call Trace:
[  107.842656] slram: not enough parameters.
[  107.844946]  ? prepare_to_wait_event+0x51/0x140
[  107.855521] mtd mtd0: GPIO lookup for consumer wp
[  107.855658]  ? prepare_to_wait_event+0x51/0x140
[  107.856828] mtd mtd0: using lookup tables for GPIO lookup
[  107.856842] mtd mtd0: No GPIO consumer wp found
[  107.858676]  __mutex_lock+0x21/0x820
[  107.858693]  ? lockdep_hardirqs_on_prepare+0xda/0x180
[  107.858706]  ? _raw_spin_unlock_irqrestore+0x35/0x40
[  107.874413]  ? prepare_to_wait_event+0x7d/0x140
[  107.876397]  ? trace_hardirqs_on+0x22/0xe0
[  107.878110]  ? prepare_to_wait_event+0x7d/0x140
[  107.880095]  mutex_lock_nested+0x20/0x40
[  107.881791]  ? deferred_free_thread+0x75/0xc0
[  107.883801]  deferred_free_thread+0x75/0xc0
[  107.885686]  ? do_wait_intr_irq+0xa0/0xa0
[  107.887498]  kthread+0x107/0x120
[  107.889019]  ? freelist_shrink_count+0x40/0x40
[  107.890980]  ? kthread_create_worker_on_cpu+0x20/0x20
[  107.893128]  ret_from_fork+0x19/0x24
[  107.894780] irq event stamp: 339
[  107.896256] hardirqs last  enabled at (349): [<d96bfb75>] console_unlock+0x3f5/0x5a0
[  107.899642] hardirqs last disabled at (358): [<d96bfb66>] console_unlock+0x3e6/0x5a0
[  107.903036] softirqs last  enabled at (336): [<da2d79d5>] __do_softirq+0x295/0x435
[  107.906066] softirqs last disabled at (331): [<d96232bd>] do_softirq_own_stack+0x1d/0x40
[  107.908613] random: get_random_bytes called from init_oops_id+0x37/0x40 with crng_init=0
[  107.908624] ---[ end trace 4d9142d8a53ac308 ]---


To reproduce:

        # build kernel
	cd linux
	cp config-5.10.0-next-20201217-00003-gadc430f22613 .config
	make HOSTCC=gcc-9 CC=gcc-9 ARCH=i386 olddefconfig prepare modules_prepare bzImage modules
	make HOSTCC=gcc-9 CC=gcc-9 ARCH=i386 INSTALL_MOD_PATH=<mod-install-dir> modules_install
	cd <mod-install-dir>
	find lib/ | cpio -o -H newc --quiet | gzip > modules.cgz


        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        bin/lkp qemu -k <bzImage> -m modules.cgz job-script # job-script is attached in this email



Thanks,
Oliver Sang


View attachment "config-5.10.0-next-20201217-00003-gadc430f22613" of type "text/plain" (155566 bytes)

View attachment "job-script" of type "text/plain" (4662 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (20348 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ