lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:   Fri, 8 Oct 2021 14:21:16 +0800
From:   kernel test robot <oliver.sang@...el.com>
To:     Sebastian Andrzej Siewior <bigeasy@...utronix.de>
Cc:     0day robot <lkp@...el.com>, Peter Zijlstra <peterz@...radead.org>,
        LKML <linux-kernel@...r.kernel.org>, lkp@...ts.01.org,
        intel-gfx@...ts.freedesktop.org, dri-devel@...ts.freedesktop.org,
        Jani Nikula <jani.nikula@...ux.intel.com>,
        Joonas Lahtinen <joonas.lahtinen@...ux.intel.com>,
        Rodrigo Vivi <rodrigo.vivi@...el.com>,
        David Airlie <airlied@...ux.ie>,
        Daniel Vetter <daniel@...ll.ch>,
        Thomas Gleixner <tglx@...utronix.de>,
        Sebastian Andrzej Siewior <bigeasy@...utronix.de>
Subject: [drm/i915]  511e5fb0c3: WARNING:suspicious_RCU_usage



Greeting,

FYI, we noticed the following commit (built with gcc-9):

commit: 511e5fb0c3ab42d4897dcc5c0fbd1765e8a3d622 ("[PATCH 8/8] drm/i915: Don't disable interrupts and pretend a lock as been acquired in __timeline_mark_lock().")
url: https://github.com/0day-ci/linux/commits/Sebastian-Andrzej-Siewior/drm-i915-PREEMPT_RT-related-fixups/20211005-230411
base: git://anongit.freedesktop.org/drm-intel for-linux-next

in testcase: kernel-selftests
version: kernel-selftests-x86_64-c8c9111a-1_20210929
with following parameters:

	group: x86
	ucode: 0xde

test-description: The kernel contains a set of "self tests" under the tools/testing/selftests/ directory. These are intended to be small unit tests to exercise individual code paths in the kernel.
test-url: https://www.kernel.org/doc/Documentation/kselftest.txt


on test machine: 4 threads 1 sockets Intel(R) Core(TM) i7-7567U CPU @ 3.50GHz with 32G memory

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):



If you fix the issue, kindly add following tag
Reported-by: kernel test robot <oliver.sang@...el.com>



kern  :warn  : [   22.629411] =============================
kern  :warn  : [   22.629781] WARNING: suspicious RCU usage
kern  :warn  : [   22.630161] 5.15.0-rc1-00267-g511e5fb0c3ab #1 Not tainted
kern  :warn  : [   22.630629] -----------------------------
kern  :warn  : [   22.630987] drivers/gpu/drm/i915/i915_request.h:612 suspicious rcu_dereference_protected() usage!
kern  :warn  : [   22.631697]
                              other info that might help us debug this:

kern  :warn  : [   22.632455]
                              rcu_scheduler_active = 2, debug_locks = 1
kern  :warn  : [   22.633068] 2 locks held by systemd-udevd/220:
kern  :warn  : [   22.633456]  #0: ffff8881012e7248 (&dev->mutex){....}-{3:3}, at: __driver_attach+0x93/0x180
kern  :warn  : [   22.634148]  #1: ffff8881032a21e0 (wakeref.mutex#3){+.+.}-{3:3}, at: __intel_wakeref_put_last+0x1b/0x80 [i915]
kern  :warn  : [   22.635067]
                              stack backtrace:
kern  :warn  : [   22.635515] CPU: 0 PID: 220 Comm: systemd-udevd Not tainted 5.15.0-rc1-00267-g511e5fb0c3ab #1
kern  :warn  : [   22.636184] Hardware name: Intel Corporation NUC7i7BNH/NUC7i7BNB, BIOS BNKBL357.86A.0067.2018.0814.1500 08/14/2018
kern  :warn  : [   22.636982] Call Trace:
kern  :warn  : [   22.637225]  dump_stack_lvl+0x45/0x59
kern  :warn  : [   22.637556]  __i915_request_commit+0x158/0x1c0 [i915]
kern  :warn  : [   22.638103]  __engine_park+0x98/0x280 [i915]
kern  :warn  : [   22.638575]  ? mutex_trylock+0x141/0x180
kern  :warn  : [   22.638921]  ? __intel_wakeref_put_last+0x1b/0x80 [i915]
kern  :warn  : [   22.639467]  ____intel_wakeref_put_last+0x1e/0x80 [i915]
kern  :warn  : [   22.640025]  intel_gt_resume+0x244/0x2c0 [i915]
kern  :warn  : [   22.640521]  intel_gt_init+0x146/0x300 [i915]
kern  :warn  : [   22.640999]  i915_gem_init+0x129/0x1c0 [i915]
kern  :warn  : [   22.641490]  i915_driver_probe+0x1b5/0x440 [i915]
kern  :warn  : [   22.641997]  i915_pci_probe+0x54/0x140 [i915]
kern  :warn  : [   22.642471]  local_pci_probe+0x45/0x80
kern  :info  : [   22.642479] raid6: sse2x2   gen() 10681 MB/s
kern  :warn  : [   22.642823]  pci_device_probe+0x16b/0x200
kern  :warn  : [   22.643532]  ? sysfs_do_create_link_sd+0x69/0x100
kern  :warn  : [   22.643994]  really_probe+0xc0/0x380
kern  :warn  : [   22.644370]  __driver_probe_device+0xfe/0x180
kern  :warn  : [   22.644758]  driver_probe_device+0x1e/0xc0
kern  :warn  : [   22.645127]  __driver_attach+0x9e/0x180
kern  :warn  : [   22.645473]  ? __device_attach_driver+0x100/0x100
kern  :warn  : [   22.645880]  ? __device_attach_driver+0x100/0x100
kern  :warn  : [   22.646283]  bus_for_each_dev+0x7b/0xc0
kern  :warn  : [   22.646630]  bus_add_driver+0x150/0x200
kern  :warn  : [   22.646972]  driver_register+0x6c/0xc0
kern  :warn  : [   22.647306]  i915_init+0x37/0xf4 [i915]
kern  :warn  : [   22.647745]  ? 0xffffffffc0800000
kern  :warn  : [   22.648068]  do_one_initcall+0x5b/0x340
kern  :warn  : [   22.648406]  ? do_init_module+0x23/0x280
kern  :warn  : [   22.648754]  ? kmem_cache_alloc_trace+0x520/0x600
kern  :warn  : [   22.649153]  ? lock_is_held_type+0xd5/0x140
kern  :warn  : [   22.649521]  do_init_module+0x5c/0x280
kern  :warn  : [   22.649855]  load_module+0x11b7/0x1540
kern  :warn  : [   22.650214]  ? __do_sys_finit_module+0xae/0x140
kern  :warn  : [   22.650599]  __do_sys_finit_module+0xae/0x140
kern  :warn  : [   22.650991]  do_syscall_64+0x5c/0x80
kern  :warn  : [   22.651313]  ? lockdep_hardirqs_on+0x79/0x100
kern  :warn  : [   22.651688]  ? do_syscall_64+0x69/0x80
kern  :warn  : [   22.652019]  ? do_syscall_64+0x69/0x80
kern  :warn  : [   22.652351]  ? lockdep_hardirqs_on+0x79/0x100
kern  :warn  : [   22.652724]  ? do_syscall_64+0x69/0x80
kern  :warn  : [   22.653055]  ? asm_exc_page_fault+0x8/0x30
kern  :warn  : [   22.653414]  ? lockdep_hardirqs_on+0x79/0x100
kern  :warn  : [   22.653789]  entry_SYSCALL_64_after_hwframe+0x44/0xae
kern  :warn  : [   22.654213] RIP: 0033:0x7f29cde5cf59
kern  :warn  : [   22.654534] Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 07 6f 0c 00 f7 d8 64 89 01 48
kern  :warn  : [   22.655914] RSP: 002b:00007ffe23342518 EFLAGS: 00000246 ORIG_RAX: 0000000000000139
kern  :warn  : [   22.656516] RAX: ffffffffffffffda RBX: 0000561851c9c110 RCX: 00007f29cde5cf59
kern  :warn  : [   22.657083] RDX: 0000000000000000 RSI: 00007f29cdd61cad RDI: 0000000000000010
kern  :warn  : [   22.657649] RBP: 00007f29cdd61cad R08: 0000000000000000 R09: 0000000000000000
kern  :warn  : [   22.658220] R10: 0000000000000010 R11: 0000000000000246 R12: 0000000000000000
kern  :warn  : [   22.658787] R13: 0000561851c93f00 R14: 0000000000020000 R15: 0000561851c9c110
 



To reproduce:

        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        sudo bin/lkp install job.yaml           # job file is attached in this email
        bin/lkp split-job --compatible job.yaml # generate the yaml file for lkp run
        sudo bin/lkp run generated-yaml-file

        # if come across any failure that blocks the test,
        # please remove ~/.lkp and /lkp dir to run from a clean state.



---
0DAY/LKP+ Test Infrastructure                   Open Source Technology Center
https://lists.01.org/hyperkitty/list/lkp@lists.01.org       Intel Corporation

Thanks,
Oliver Sang


View attachment "config-5.15.0-rc1-00267-g511e5fb0c3ab" of type "text/plain" (176418 bytes)

View attachment "job-script" of type "text/plain" (5925 bytes)

Download attachment "kmsg.xz" of type "application/x-xz" (38804 bytes)

View attachment "kernel-selftests" of type "text/plain" (141324 bytes)

View attachment "job.yaml" of type "text/plain" (4807 bytes)

View attachment "reproduce" of type "text/plain" (146 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ