lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <82bbf33e-918f-da01-95e6-9b2cc1b8b610@gmail.com>
Date:   Tue, 26 Oct 2021 01:11:07 +0300
From:   Dmitry Osipenko <digetx@...il.com>
To:     Stephen Rothwell <sfr@...b.auug.org.au>,
        Linux Next Mailing List <linux-next@...r.kernel.org>,
        Ulf Hansson <ulf.hansson@...aro.org>,
        Adrian Hunter <adrian.hunter@...el.com>,
        Jens Axboe <axboe@...nel.dk>
Cc:     Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
        linux-mmc <linux-mmc@...r.kernel.org>,
        linux-block <linux-block@...r.kernel.org>
Subject: Re: linux-next: Tree for Oct 25

Hello,

Recent -next has this new warning splat coming from MMC, please take a look.

 ------------[ cut here ]------------
 WARNING: CPU: 0 PID: 525 at kernel/sched/core.c:9477 __might_sleep+0x65/0x68
 do not call blocking ops when !TASK_RUNNING; state=2 set at [<4316eb02>] prepare_to_wait+0x2e/0xb8
 Modules linked in:
 CPU: 0 PID: 525 Comm: Xorg Tainted: G        W         5.15.0-rc6-next-20211025-00226-g89ccd6948ec3 #5
 Hardware name: NVIDIA Tegra SoC (Flattened Device Tree)
 (unwind_backtrace) from [<c01089f9>] (show_stack+0x11/0x14)
 (show_stack) from [<c0afacb9>] (dump_stack_lvl+0x2b/0x34)
 (dump_stack_lvl) from [<c011f689>] (__warn+0xa1/0xe8)
 (__warn) from [<c0af6729>] (warn_slowpath_fmt+0x65/0x7c)
 (warn_slowpath_fmt) from [<c01421b9>] (__might_sleep+0x65/0x68)
 (__might_sleep) from [<c07eb377>] (mmc_blk_rw_wait+0x2f/0x118)
 (mmc_blk_rw_wait) from [<c07eba11>] (mmc_blk_mq_issue_rq+0x219/0x71c)
 (mmc_blk_mq_issue_rq) from [<c07ec199>] (mmc_mq_queue_rq+0xf9/0x200)
 (mmc_mq_queue_rq) from [<c04ad247>] (__blk_mq_try_issue_directly+0xcb/0x100)
 (__blk_mq_try_issue_directly) from [<c04adb89>] (blk_mq_request_issue_directly+0x2d/0x48)
 (blk_mq_request_issue_directly) from [<c04adcf3>] (blk_mq_flush_plug_list+0x14f/0x1f4)
 (blk_mq_flush_plug_list) from [<c04a5313>] (blk_flush_plug+0x83/0xb8)
 (blk_flush_plug) from [<c0b013cb>] (io_schedule+0x2b/0x3c)
 (io_schedule) from [<c0b01a17>] (bit_wait_io+0xf/0x48)
 (bit_wait_io) from [<c0b01783>] (__wait_on_bit+0x3f/0x88)
 (__wait_on_bit) from [<c0b01823>] (out_of_line_wait_on_bit+0x57/0x68)
 (out_of_line_wait_on_bit) from [<c03539c1>] (ext4_read_bh+0xb1/0xb4)
 (ext4_read_bh) from [<c03146b3>] (__read_extent_tree_block+0xa7/0x134)
 (__read_extent_tree_block) from [<c031526f>] (ext4_find_extent+0x13b/0x2fc)
 (ext4_find_extent) from [<c0317da5>] (ext4_ext_map_blocks+0x4d/0x1160)
 (ext4_ext_map_blocks) from [<c03286c3>] (ext4_map_blocks+0x1bf/0x428)
 (ext4_map_blocks) from [<c03436b1>] (ext4_mpage_readpages+0x399/0x660)
 (ext4_mpage_readpages) from [<c02322d9>] (read_pages+0x51/0x18c)
 (read_pages) from [<c02324f5>] (page_cache_ra_unbounded+0xe1/0x174)
 (page_cache_ra_unbounded) from [<c02299c1>] (filemap_get_pages+0xc5/0x524)
 (filemap_get_pages) from [<c0229eff>] (filemap_read+0xdf/0x2fc)
 (filemap_read) from [<c028bae9>] (vfs_read+0x151/0x23c)
 (vfs_read) from [<c028bf4b>] (ksys_read+0x47/0x98)
 (ksys_read) from [<c01000a1>] (ret_fast_syscall+0x1/0x16)
 Exception stack(0xc593ffa8 to 0xc593fff0)
  

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ