lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20211014065025.GB17658@xsang-OptiPlex-9020>
Date:   Thu, 14 Oct 2021 14:50:25 +0800
From:   kernel test robot <oliver.sang@...el.com>
To:     Sean Nyekjaer <sean@...nix.com>
Cc:     0day robot <lkp@...el.com>,
        Boris Brezillon <boris.brezillon@...labora.com>,
        LKML <linux-kernel@...r.kernel.org>, lkp@...ts.01.org,
        Sean Nyekjaer <sean@...nix.com>,
        Miquel Raynal <miquel.raynal@...tlin.com>,
        Richard Weinberger <richard@....at>,
        Vignesh Raghavendra <vigneshr@...com>,
        Boris Brezillon <bbrezillon@...nel.org>,
        linux-mtd@...ts.infradead.org
Subject: [mtd]  d3ff51cfa9: WARNING:at_kernel/locking/rwsem.c:#down_read



Greeting,

FYI, we noticed the following commit (built with clang-14):

commit: d3ff51cfa9a64cdc18abe24c9821891b5122e617 ("[PATCH 1/3] mtd: core: protect access to MTD devices while in suspend")
url: https://github.com/0day-ci/linux/commits/Sean-Nyekjaer/mtd-core-protect-access-to-mtd-devices-while-in-suspend/20211011-195606
base: https://git.kernel.org/cgit/linux/kernel/git/mtd/linux.git mtd/next

in testcase: boot

on test machine: qemu-system-i386 -enable-kvm -cpu SandyBridge -smp 2 -m 4G

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):


+----------------------------------------------+------------+------------+
|                                              | b72841e4dc | d3ff51cfa9 |
+----------------------------------------------+------------+------------+
| boot_successes                               | 20         | 0          |
| boot_failures                                | 0          | 21         |
| INFO:trying_to_register_non-static_key       | 0          | 21         |
| WARNING:at_kernel/locking/rwsem.c:#down_read | 0          | 21         |
| EIP:down_read                                | 0          | 21         |
| WARNING:at_kernel/locking/rwsem.c:#__up_read | 0          | 21         |
| EIP:__up_read                                | 0          | 21         |
+----------------------------------------------+------------+------------+


If you fix the issue, kindly add following tag
Reported-by: kernel test robot <oliver.sang@...el.com>


[    4.304729][    T1] ------------[ cut here ]------------
[    4.305194][    T1] DEBUG_RWSEMS_WARN_ON(sem->magic != sem): count = 0x0, magic = 0x0, owner = 0x0, curr 0xb3690000, list not empty
[    4.306218][    T1] WARNING: CPU: 1 PID: 1 at kernel/locking/rwsem.c:1240 down_read+0xff/0x110
[    4.306989][    T1] Modules linked in:
[    4.307318][    T1] CPU: 1 PID: 1 Comm: swapper/0 Not tainted 5.15.0-rc1-00002-gd3ff51cfa9a6 #1
[    4.308071][    T1] EIP: down_read+0xff/0x110
[    4.308445][    T1] Code: 9f 03 b2 ba 0f 44 d1 52 0f 44 d1 52 ff 75 f0 ff ff 75 f0 ff 00 b2 68 79 00 b2 68 79 c7 d5 5a ff c7 d5 5a ff c4 1c 0f 0b c4 1c <0f> 0b 58 ff ff ff 58 ff ff ff ff 90 90 3e ff 90 90 3e 55 89 e5 53
[    4.310153][    T1] EAX: 00000000 EBX: b15a2702 ECX: 80000001 EDX: 00000001
[    4.310861][    T1] ESI: f5dc0404 EDI: 00000000 EBP: b3693c98 ESP: b3693c84
[    4.311546][    T1] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00010296
[    4.312277][    T1] CR0: 80050033 CR2: 00000000 CR3: 027d9000 CR4: 000406d0
[    4.312919][    T1] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[    4.313518][    T1] DR6: fffe0ff0 DR7: 00000400
[    4.313926][    T1] Call Trace:
[    4.314237][    T1]  mtd_start_access+0x32/0xc0
[    4.314707][    T1]  ? ledtrig_mtd_activity+0x37/0x40
[    4.315194][    T1]  mtd_read_oob+0x75/0x1e0
[    4.315572][    T1]  scan_block_fast+0x6a/0xc0
[    4.316003][    T1]  create_bbt+0x130/0x2a0
[    4.316399][    T1]  ? __kmalloc+0x146/0x1a0
[    4.316811][    T1]  ? trace_kmalloc_node+0x39/0x100
[    4.317267][    T1]  nand_create_bbt+0x1fe/0x9e0
[    4.317685][    T1]  ? ns_alloc_device+0xa4/0x18b
[    4.318107][    T1]  ? ns_init+0x3b6/0x688
[    4.318459][    T1]  ? __kmalloc+0x146/0x1a0
[    4.318858][    T1]  ns_init_module+0x5f9/0x809
[    4.319254][    T1]  ? __this_cpu_preempt_check+0xf/0x11
[    4.319719][    T1]  ? debug_smp_processor_id+0x12/0x20
[    4.320174][    T1]  ? generic_onenand_driver_init+0x16/0x16
[    4.320662][    T1]  ? rcu_read_lock_sched_held+0x36/0x70
[    4.321122][    T1]  ? generic_onenand_driver_init+0x16/0x16
[    4.321602][    T1]  do_one_initcall+0x93/0x160
[    4.321997][    T1]  ? irqentry_exit+0x56/0x80
[    4.322382][    T1]  ? __this_cpu_preempt_check+0xf/0x11
[    4.322854][    T1]  ? lockdep_hardirqs_on+0x82/0x110
[    4.323273][    T1]  ? irqentry_exit+0x56/0x80
[    4.323642][    T1]  ? sysvec_call_function_single+0x30/0x30
[    4.324124][    T1]  ? trace_hardirqs_on+0x45/0x50
[    4.324523][    T1]  ? irqentry_exit+0x56/0x80
[    4.324893][    T1]  ? sysvec_apic_timer_interrupt+0x29/0x30
[    4.325367][    T1]  ? handle_exception+0x101/0x101
[    4.325776][    T1]  ? p9_client_readlink+0x9b/0xa0
[    4.326186][    T1]  ? strlen+0xd/0x20
[    4.326508][    T1]  ? next_arg+0xfb/0x110
[    4.326877][    T1]  ? parse_args+0x15c/0x330
[    4.327244][    T1]  ? __this_cpu_preempt_check+0xf/0x11
[    4.327688][    T1]  ? debug_smp_processor_id+0x12/0x20
[    4.328155][    T1]  ? generic_onenand_driver_init+0x16/0x16
[    4.328664][    T1]  do_initcall_level+0x80/0x92
[    4.329088][    T1]  ? rest_init+0x1c0/0x1c0
[    4.329475][    T1]  do_initcalls+0x41/0x62
[    4.329838][    T1]  do_basic_setup+0x17/0x19
[    4.330214][    T1]  kernel_init_freeable+0x8c/0xd1
[    4.330657][    T1]  kernel_init+0x17/0x170
[    4.331087][    T1]  ret_from_fork+0x1c/0x28
[    4.331503][    T1] irq event stamp: 319917
[    4.331919][    T1] hardirqs last  enabled at (319917): [<b10e59cc>] __up_console_sem+0x5c/0x90
[    4.332719][    T1] hardirqs last disabled at (319916): [<b10e59b3>] __up_console_sem+0x43/0x90
[    4.333495][    T1] softirqs last  enabled at (318956): [<b121d2f1>] bdi_register_va+0x1d1/0x1f0
[    4.334243][    T1] softirqs last disabled at (318954): [<b121d202>] bdi_register_va+0xe2/0x1f0
[    4.334994][    T1] _warn_unseeded_randomness: 5 callbacks suppressed
[    4.334997][    T1] random: get_random_bytes called from __warn+0xc3/0x140 with crng_init=0
[    4.335006][    T1] ---[ end trace 8e9a8c821c89b3d1 ]---




To reproduce:

        # build kernel
	cd linux
	cp config-5.15.0-rc1-00002-gd3ff51cfa9a6 .config
	make HOSTCC=clang-14 CC=clang-14 ARCH=i386 olddefconfig prepare modules_prepare bzImage

        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        bin/lkp qemu -k <bzImage> job-script # job-script is attached in this email

        # if come across any failure that blocks the test,
        # please remove ~/.lkp and /lkp dir to run from a clean state.



---
0DAY/LKP+ Test Infrastructure                   Open Source Technology Center
https://lists.01.org/hyperkitty/list/lkp@lists.01.org       Intel Corporation

Thanks,
Oliver Sang


View attachment "config-5.15.0-rc1-00002-gd3ff51cfa9a6" of type "text/plain" (125536 bytes)

View attachment "job-script" of type "text/plain" (4888 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (19336 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ