lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <12d2c1b4-3175-0201-7531-2d80b06d9f95@candelatech.com>
Date:   Thu, 6 Oct 2022 11:20:08 -0700
From:   Ben Greear <greearb@...delatech.com>
To:     Linux Kernel Mailing List <linux-kernel@...r.kernel.org>
Subject: Invalid wait context in serial console path, 5.19.11+

Hello,

I found this in the logs of a KASAN+LOCKDEP kernel system...
Not sure it caused any real problems...

Oct 06 19:33:13 ct523c-0b4f kernel:
Oct 06 19:33:13 ct523c-0b4f kernel: =============================
Oct 06 19:33:13 ct523c-0b4f kernel: [ BUG: Invalid wait context ]
Oct 06 19:33:13 ct523c-0b4f kernel: 5.19.11+ #8 Not tainted
Oct 06 19:33:13 ct523c-0b4f kernel: -----------------------------
Oct 06 19:33:13 ct523c-0b4f kernel: swapper/0/1 is trying to lock:
Oct 06 19:33:13 ct523c-0b4f kernel: ffffffff85232c18 (&port_lock_key){....}-{3:3}, at: serial8250_console_write+0x630/0x680
Oct 06 19:33:13 ct523c-0b4f kernel: other info that might help us debug this:
Oct 06 19:33:13 ct523c-0b4f kernel: context-{5:5}
Oct 06 19:33:13 ct523c-0b4f kernel: 3 locks held by swapper/0/1:
Oct 06 19:33:13 ct523c-0b4f kernel:  #0: ffffffff836393a0 (rcu_tasks.cbs_gbl_lock){....}-{2:2}, at: cblist_init_generic+0x22/0x2f0
Oct 06 19:33:13 ct523c-0b4f kernel:  #1: ffffffff8362c740 (console_lock){+.+.}-{0:0}, at: vprintk_emit+0xd2/0x310
Oct 06 19:33:13 ct523c-0b4f kernel:  #2: ffffffff8354c340 (console_owner){....}-{0:0}, at: console_emit_next_record.constprop.31+0x1d9/0x500
Oct 06 19:33:13 ct523c-0b4f kernel: stack backtrace:
Oct 06 19:33:13 ct523c-0b4f kernel: CPU: 0 PID: 1 Comm: swapper/0 Not tainted 5.19.11+ #8
Oct 06 19:33:13 ct523c-0b4f kernel: Hardware name: Default string Default string/SKYBAY, BIOS 5.12 02/19/2019
Oct 06 19:33:13 ct523c-0b4f kernel: Call Trace:
Oct 06 19:33:13 ct523c-0b4f kernel:  <TASK>
Oct 06 19:33:13 ct523c-0b4f kernel:  dump_stack_lvl+0x55/0x6d
Oct 06 19:33:13 ct523c-0b4f kernel:  __lock_acquire.cold.69+0xc7/0x31b
Oct 06 19:33:13 ct523c-0b4f kernel:  ? stack_trace_save+0x85/0xb0
Oct 06 19:33:13 ct523c-0b4f kernel:  ? filter_irq_stacks+0x70/0x70
Oct 06 19:33:13 ct523c-0b4f kernel:  ? lockdep_hardirqs_on_prepare+0x200/0x200
Oct 06 19:33:13 ct523c-0b4f kernel:  ? rcu_read_lock_sched_held+0x9c/0xd0
Oct 06 19:33:13 ct523c-0b4f kernel:  lock_acquire+0x155/0x3e0
Oct 06 19:33:13 ct523c-0b4f kernel:  ? serial8250_console_write+0x630/0x680
Oct 06 19:33:13 ct523c-0b4f kernel:  ? lock_release+0x400/0x400
Oct 06 19:33:13 ct523c-0b4f kernel:  _raw_spin_lock_irqsave+0x3c/0x60
Oct 06 19:33:13 ct523c-0b4f kernel:  ? serial8250_console_write+0x630/0x680
Oct 06 19:33:13 ct523c-0b4f kernel:  serial8250_console_write+0x630/0x680
Oct 06 19:33:13 ct523c-0b4f kernel:  ? serial8250_config_port+0x15f0/0x15f0
Oct 06 19:33:13 ct523c-0b4f kernel:  ? lock_release+0x400/0x400
Oct 06 19:33:13 ct523c-0b4f kernel:  ? do_raw_spin_lock+0x114/0x1d0
Oct 06 19:33:13 ct523c-0b4f kernel:  ? rwlock_bug.part.2+0x50/0x50
Oct 06 19:33:13 ct523c-0b4f kernel:  ? prb_read_valid+0x61/0x90
Oct 06 19:33:13 ct523c-0b4f kernel:  ? prb_final_commit+0x50/0x50
Oct 06 19:33:13 ct523c-0b4f kernel:  console_emit_next_record.constprop.31+0x281/0x500
Oct 06 19:33:13 ct523c-0b4f kernel:  ? info_print_ext_header.constprop.32+0x130/0x130
Oct 06 19:33:13 ct523c-0b4f kernel:  ? rcu_read_lock_sched_held+0x9c/0xd0
Oct 06 19:33:13 ct523c-0b4f kernel:  console_unlock+0x1dc/0x2d0
Oct 06 19:33:13 ct523c-0b4f kernel:  ? devkmsg_read+0x3d0/0x3d0
Oct 06 19:33:13 ct523c-0b4f kernel:  ? vprintk_emit+0xd2/0x310
Oct 06 19:33:13 ct523c-0b4f kernel:  vprintk_emit+0xdb/0x310
Oct 06 19:33:13 ct523c-0b4f kernel:  _printk+0x9a/0xc0
Oct 06 19:33:13 ct523c-0b4f kernel:  ? record_print_text.cold.35+0x11/0x11
Oct 06 19:33:13 ct523c-0b4f kernel:  ? proc_register+0x1a0/0x230
Oct 06 19:33:13 ct523c-0b4f kernel:  ? do_raw_spin_lock+0x114/0x1d0
Oct 06 19:33:13 ct523c-0b4f kernel:  cblist_init_generic.cold.26+0x24/0x32
Oct 06 19:33:13 ct523c-0b4f kernel:  ? proc_create+0x10/0x10
Oct 06 19:33:13 ct523c-0b4f kernel:  rcu_init_tasks_generic+0x1c/0x113
Oct 06 19:33:13 ct523c-0b4f kernel:  kernel_init_freeable+0x25e/0x460
Oct 06 19:33:13 ct523c-0b4f kernel:  ? lockdep_hardirqs_on_prepare+0x132/0x200
Oct 06 19:33:13 ct523c-0b4f kernel:  ? console_on_rootfs+0x4d/0x4d
Oct 06 19:33:13 ct523c-0b4f kernel:  ? mark_held_locks+0x29/0xa0
Oct 06 19:33:13 ct523c-0b4f kernel:  ? rest_init+0x1c0/0x1c0
Oct 06 19:33:13 ct523c-0b4f kernel:  kernel_init+0x13/0x130
Oct 06 19:33:13 ct523c-0b4f kernel:  ? rest_init+0x1c0/0x1c0
Oct 06 19:33:13 ct523c-0b4f kernel:  ret_from_fork+0x1f/0x30
Oct 06 19:33:13 ct523c-0b4f kernel:  </TASK>

Thanks,
Ben

-- 
Ben Greear <greearb@...delatech.com>
Candela Technologies Inc  http://www.candelatech.com

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ