Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp518003pxx; Wed, 28 Oct 2020 10:08:10 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy8bSKKE3Mzj0DxFlQcrOCYIa0b19R3nPaDTK6WbW0ep4lr6kxDNO61GcxSzCbYz1aavRYa X-Received: by 2002:a17:906:39ce:: with SMTP id i14mr73823eje.170.1603904890185; Wed, 28 Oct 2020 10:08:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603904890; cv=none; d=google.com; s=arc-20160816; b=kPFHxvxc759Hl2dSUTPHVC9yvbVq1pP/x5PLO+xt6DctyqAgsu4+/1Rhj6YQ7CYN4X nhN7ml95i5BjxA8Li9qVTxa6uKvo6aQCuXLIDMb4UWkhJ/jOMf79vXjYakDiCUl/96EO p6H5LTZd27tCPh2M9gpU+jWI8vlHj0JR6qOjuBzjF8Dla1tMosw8ZAhotem9FASWHi1v jMunE+X2pP1Y6uqhtMjk1OZQ7v5TU6NaooNQxubG+6XPWQe0DsB8ltP2tzqeKYGiwNAH bUCx/C7JgjAmbFWWcDUwmV5Z/u9RsQ7fxDy/SxyDGR5aOwwFMJDJlJskR3cIR+aGniq8 nbVw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=YiC6ZM56gQlb3q4fPDSR+9Jy5sNaHcmEsecRV+3pnrk=; b=BR3+QBLCgwfrDDQuTN9hJ7p7zXyC2argE3Qv2i1qhR4lV58KVDRnQuA259ZGde8Z3M R++q+t1ES/EZti+SMpnxKJjQ9FM1lpL9rW8YhoD4yNYSojpItcH3Lun4H/j1reQRFyYf 65RRk2TOJYcvC74EX8RNFSR3tCqJr+0zUkK8cQZKyewbJAgTS9R/lIpgvN5zS1e5JIV1 MayXLoRCfRJphEOqQy2xlKY7cT+bNr0yPBKLWtp8gSIsONKSWtTTZnZX3ErUxyTcqcfc w6VKG4QXFA3syDe1/W1RNcvUZ4bP/zR2s3W8Z/X5hpPIdWCGuZXWxoJkvkvRppN4XacY pJbQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=lxjitohT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j6si24427edq.236.2020.10.28.10.07.32; Wed, 28 Oct 2020 10:08:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=lxjitohT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1820133AbgJ0RdG (ORCPT + 99 others); Tue, 27 Oct 2020 13:33:06 -0400 Received: from mail.kernel.org ([198.145.29.99]:40214 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1761993AbgJ0Oky (ORCPT ); Tue, 27 Oct 2020 10:40:54 -0400 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 704E922258; Tue, 27 Oct 2020 14:40:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1603809654; bh=imcWqHJhG0da0/94JatFcVSufvzDh/GcsjAX7lt7Cog=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=lxjitohTI7JHoWFqeNAY5G5O2jZ3ex8aaL+O/bKNe3GJgjQHOBnP9siSW+vb6rqsv AD39yV2wCFZwKfFEXKnRrVN+1Gvhx7aUNxLtNzRIPkx9vUj/RLfW1SrsLaw9O6bEUE NPipmkfHaHLh5B3azVC3aAYdeLIvsTE3o0tEnFKs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Corentin Labbe , Eric Biggers , Daniel Jordan , Jessica Yu , Sasha Levin Subject: [PATCH 5.4 272/408] module: statically initialize init section freeing data Date: Tue, 27 Oct 2020 14:53:30 +0100 Message-Id: <20201027135507.666147736@linuxfoundation.org> X-Mailer: git-send-email 2.29.1 In-Reply-To: <20201027135455.027547757@linuxfoundation.org> References: <20201027135455.027547757@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Daniel Jordan [ Upstream commit fdf09ab887829cd1b671e45d9549f8ec1ffda0fa ] Corentin hit the following workqueue warning when running with CRYPTO_MANAGER_EXTRA_TESTS: WARNING: CPU: 2 PID: 147 at kernel/workqueue.c:1473 __queue_work+0x3b8/0x3d0 Modules linked in: ghash_generic CPU: 2 PID: 147 Comm: modprobe Not tainted 5.6.0-rc1-next-20200214-00068-g166c9264f0b1-dirty #545 Hardware name: Pine H64 model A (DT) pc : __queue_work+0x3b8/0x3d0 Call trace: __queue_work+0x3b8/0x3d0 queue_work_on+0x6c/0x90 do_init_module+0x188/0x1f0 load_module+0x1d00/0x22b0 I wasn't able to reproduce on x86 or rpi 3b+. This is WARN_ON(!list_empty(&work->entry)) from __queue_work(), and it happens because the init_free_wq work item isn't initialized in time for a crypto test that requests the gcm module. Some crypto tests were recently moved earlier in boot as explained in commit c4741b230597 ("crypto: run initcalls for generic implementations earlier"), which went into mainline less than two weeks before the Fixes commit. Avoid the warning by statically initializing init_free_wq and the corresponding llist. Link: https://lore.kernel.org/lkml/20200217204803.GA13479@Red/ Fixes: 1a7b7d922081 ("modules: Use vmalloc special flag") Reported-by: Corentin Labbe Tested-by: Corentin Labbe Tested-on: sun50i-h6-pine-h64 Tested-on: imx8mn-ddr4-evk Tested-on: sun50i-a64-bananapi-m64 Reviewed-by: Eric Biggers Signed-off-by: Daniel Jordan Signed-off-by: Jessica Yu Signed-off-by: Sasha Levin --- kernel/module.c | 13 +++---------- 1 file changed, 3 insertions(+), 10 deletions(-) diff --git a/kernel/module.c b/kernel/module.c index 819c5d3b4c295..45513909b01d5 100644 --- a/kernel/module.c +++ b/kernel/module.c @@ -88,8 +88,9 @@ EXPORT_SYMBOL_GPL(module_mutex); static LIST_HEAD(modules); /* Work queue for freeing init sections in success case */ -static struct work_struct init_free_wq; -static struct llist_head init_free_list; +static void do_free_init(struct work_struct *w); +static DECLARE_WORK(init_free_wq, do_free_init); +static LLIST_HEAD(init_free_list); #ifdef CONFIG_MODULES_TREE_LOOKUP @@ -3563,14 +3564,6 @@ static void do_free_init(struct work_struct *w) } } -static int __init modules_wq_init(void) -{ - INIT_WORK(&init_free_wq, do_free_init); - init_llist_head(&init_free_list); - return 0; -} -module_init(modules_wq_init); - /* * This is where the real work happens. * -- 2.25.1