Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp450004pxx; Wed, 28 Oct 2020 08:36:34 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwAxg4uazpKv561cLL4ct0a7rZiVMCT1OiDAslkv1kJSipi3sfTa+qJrfFctDP7UbB9CPvA X-Received: by 2002:adf:e490:: with SMTP id i16mr10301134wrm.178.1603899394553; Wed, 28 Oct 2020 08:36:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603899394; cv=none; d=google.com; s=arc-20160816; b=jAE1tVqnyOGm3Sp06Nv3+k23BvW65OtBhPHo0i7ierVad45xGNe67o67eeuI/zmmFP rFCjgu/wpH0yRZmI7AxKVnQft5VPgcHqC+A6018EAXIVgwX1ZVz0T37DV9BfEbAR0vmh a6DyW85SfvfuRONKL9+TXY1TDsz1qsDbwF6vJG6bIBhyEtSyJ6uurmmGEP8EayyuaLk+ AKZeU5H74nN7Jix6yWyLgg6Nbp19HBqkGpyWxrb6dyXXBARWv4oOMY8GJC6er+vhFfb1 T73EK5JYnRckYfQNUsMXoqNEBOhWsO3jV/1YEQOu3yhjlmgpzbidegwxOx3CSRZjsZGc VYwg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=x3ore/piN751rHXz2Rg/3oPjMspLN8FC5Na+9NmHi7o=; b=bJu4byBzXTME6GIyJHPDQCwT0UeadvkO1FDeVS+JBwVP4nSY2mLt/cD7B29fs8HroV CFutvB9dAg55PgmFvy6mH0kEVHewxBBA67smEMtci/o+PIJanrgOm4E1bVD+9Eg9ilny D9TLaVOni1ThZURkzhia63UtGtoNZVKO4Y5ATvZscd6pEoXMhUKi7RblwBVnA9CslbuU FWjXogGqHlfx+UngO+cmc9yczry1kCo4bTUmqkv8drrUrQ1rd5DpnADM6DeDkB2QDCDW Ia13gr8BQhNE8MJ8c5QqNAJUOABbDhIL07HMXGTK9/XgTYGBgWVxjB8rfVqls7uctwUE Z9qw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=HefQqxja; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w17si2969573ejk.629.2020.10.28.08.36.11; Wed, 28 Oct 2020 08:36:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=HefQqxja; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1811698AbgJ0Qkq (ORCPT + 99 others); Tue, 27 Oct 2020 12:40:46 -0400 Received: from mail.kernel.org ([198.145.29.99]:40468 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1801837AbgJ0Pob (ORCPT ); Tue, 27 Oct 2020 11:44:31 -0400 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 57294223FB; Tue, 27 Oct 2020 15:43:48 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1603813428; bh=fr+6Lke2mKREuYi9GNCWd72EKLJJPIiTKDYb85KvyZA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=HefQqxja2TSQLX6zRhSMVzYnPpSoRWuUKOdgAkKEZ2Kl/V95kWMfGqwJTwyXzFx0W BIRR4NatG7QAfT5NQhPjRl5ETkzyl1QcQbSLmQLhIpdQsXqy5WQSRuW4Bd3BXFmjMS 0n/AhGPpkw7UHvVsDqkuLw0gzVKEwiAo2CoLsdUg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Corentin Labbe , Eric Biggers , Daniel Jordan , Jessica Yu , Sasha Levin Subject: [PATCH 5.9 541/757] module: statically initialize init section freeing data Date: Tue, 27 Oct 2020 14:53:11 +0100 Message-Id: <20201027135515.869037729@linuxfoundation.org> X-Mailer: git-send-email 2.29.1 In-Reply-To: <20201027135450.497324313@linuxfoundation.org> References: <20201027135450.497324313@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Daniel Jordan [ Upstream commit fdf09ab887829cd1b671e45d9549f8ec1ffda0fa ] Corentin hit the following workqueue warning when running with CRYPTO_MANAGER_EXTRA_TESTS: WARNING: CPU: 2 PID: 147 at kernel/workqueue.c:1473 __queue_work+0x3b8/0x3d0 Modules linked in: ghash_generic CPU: 2 PID: 147 Comm: modprobe Not tainted 5.6.0-rc1-next-20200214-00068-g166c9264f0b1-dirty #545 Hardware name: Pine H64 model A (DT) pc : __queue_work+0x3b8/0x3d0 Call trace: __queue_work+0x3b8/0x3d0 queue_work_on+0x6c/0x90 do_init_module+0x188/0x1f0 load_module+0x1d00/0x22b0 I wasn't able to reproduce on x86 or rpi 3b+. This is WARN_ON(!list_empty(&work->entry)) from __queue_work(), and it happens because the init_free_wq work item isn't initialized in time for a crypto test that requests the gcm module. Some crypto tests were recently moved earlier in boot as explained in commit c4741b230597 ("crypto: run initcalls for generic implementations earlier"), which went into mainline less than two weeks before the Fixes commit. Avoid the warning by statically initializing init_free_wq and the corresponding llist. Link: https://lore.kernel.org/lkml/20200217204803.GA13479@Red/ Fixes: 1a7b7d922081 ("modules: Use vmalloc special flag") Reported-by: Corentin Labbe Tested-by: Corentin Labbe Tested-on: sun50i-h6-pine-h64 Tested-on: imx8mn-ddr4-evk Tested-on: sun50i-a64-bananapi-m64 Reviewed-by: Eric Biggers Signed-off-by: Daniel Jordan Signed-off-by: Jessica Yu Signed-off-by: Sasha Levin --- kernel/module.c | 13 +++---------- 1 file changed, 3 insertions(+), 10 deletions(-) diff --git a/kernel/module.c b/kernel/module.c index 1c5cff34d9f28..8486123ffd7af 100644 --- a/kernel/module.c +++ b/kernel/module.c @@ -91,8 +91,9 @@ EXPORT_SYMBOL_GPL(module_mutex); static LIST_HEAD(modules); /* Work queue for freeing init sections in success case */ -static struct work_struct init_free_wq; -static struct llist_head init_free_list; +static void do_free_init(struct work_struct *w); +static DECLARE_WORK(init_free_wq, do_free_init); +static LLIST_HEAD(init_free_list); #ifdef CONFIG_MODULES_TREE_LOOKUP @@ -3579,14 +3580,6 @@ static void do_free_init(struct work_struct *w) } } -static int __init modules_wq_init(void) -{ - INIT_WORK(&init_free_wq, do_free_init); - init_llist_head(&init_free_list); - return 0; -} -module_init(modules_wq_init); - /* * This is where the real work happens. * -- 2.25.1