Greeting, FYI, we noticed the following commit (built with clang-14): commit: d3ff51cfa9a64cdc18abe24c9821891b5122e617 ("[PATCH 1/3] mtd: core: protect access to MTD devices while in suspend") url: https://github.com/0day-ci/linux/commits/Sean-Nyekjaer/mtd-core-protect-access-to-mtd-devices-while-in-suspend/20211011-195606 base: https://git.kernel.org/cgit/linux/kernel/git/mtd/linux.git mtd/next in testcase: boot on test machine: qemu-system-i386 -enable-kvm -cpu SandyBridge -smp 2 -m 4G caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace): +----------------------------------------------+------------+------------+ | | b72841e4dc | d3ff51cfa9 | +----------------------------------------------+------------+------------+ | boot_successes | 20 | 0 | | boot_failures | 0 | 21 | | INFO:trying_to_register_non-static_key | 0 | 21 | | WARNING:at_kernel/locking/rwsem.c:#down_read | 0 | 21 | | EIP:down_read | 0 | 21 | | WARNING:at_kernel/locking/rwsem.c:#__up_read | 0 | 21 | | EIP:__up_read | 0 | 21 | +----------------------------------------------+------------+------------+ If you fix the issue, kindly add following tag Reported-by: kernel test robot [ 4.304729][ T1] ------------[ cut here ]------------ [ 4.305194][ T1] DEBUG_RWSEMS_WARN_ON(sem->magic != sem): count = 0x0, magic = 0x0, owner = 0x0, curr 0xb3690000, list not empty [ 4.306218][ T1] WARNING: CPU: 1 PID: 1 at kernel/locking/rwsem.c:1240 down_read+0xff/0x110 [ 4.306989][ T1] Modules linked in: [ 4.307318][ T1] CPU: 1 PID: 1 Comm: swapper/0 Not tainted 5.15.0-rc1-00002-gd3ff51cfa9a6 #1 [ 4.308071][ T1] EIP: down_read+0xff/0x110 [ 4.308445][ T1] Code: 9f 03 b2 ba 0f 44 d1 52 0f 44 d1 52 ff 75 f0 ff ff 75 f0 ff 00 b2 68 79 00 b2 68 79 c7 d5 5a ff c7 d5 5a ff c4 1c 0f 0b c4 1c <0f> 0b 58 ff ff ff 58 ff ff ff ff 90 90 3e ff 90 90 3e 55 89 e5 53 [ 4.310153][ T1] EAX: 00000000 EBX: b15a2702 ECX: 80000001 EDX: 00000001 [ 4.310861][ T1] ESI: f5dc0404 EDI: 00000000 EBP: b3693c98 ESP: b3693c84 [ 4.311546][ T1] DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068 EFLAGS: 00010296 [ 4.312277][ T1] CR0: 80050033 CR2: 00000000 CR3: 027d9000 CR4: 000406d0 [ 4.312919][ T1] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000 [ 4.313518][ T1] DR6: fffe0ff0 DR7: 00000400 [ 4.313926][ T1] Call Trace: [ 4.314237][ T1] mtd_start_access+0x32/0xc0 [ 4.314707][ T1] ? ledtrig_mtd_activity+0x37/0x40 [ 4.315194][ T1] mtd_read_oob+0x75/0x1e0 [ 4.315572][ T1] scan_block_fast+0x6a/0xc0 [ 4.316003][ T1] create_bbt+0x130/0x2a0 [ 4.316399][ T1] ? __kmalloc+0x146/0x1a0 [ 4.316811][ T1] ? trace_kmalloc_node+0x39/0x100 [ 4.317267][ T1] nand_create_bbt+0x1fe/0x9e0 [ 4.317685][ T1] ? ns_alloc_device+0xa4/0x18b [ 4.318107][ T1] ? ns_init+0x3b6/0x688 [ 4.318459][ T1] ? __kmalloc+0x146/0x1a0 [ 4.318858][ T1] ns_init_module+0x5f9/0x809 [ 4.319254][ T1] ? __this_cpu_preempt_check+0xf/0x11 [ 4.319719][ T1] ? debug_smp_processor_id+0x12/0x20 [ 4.320174][ T1] ? generic_onenand_driver_init+0x16/0x16 [ 4.320662][ T1] ? rcu_read_lock_sched_held+0x36/0x70 [ 4.321122][ T1] ? generic_onenand_driver_init+0x16/0x16 [ 4.321602][ T1] do_one_initcall+0x93/0x160 [ 4.321997][ T1] ? irqentry_exit+0x56/0x80 [ 4.322382][ T1] ? __this_cpu_preempt_check+0xf/0x11 [ 4.322854][ T1] ? lockdep_hardirqs_on+0x82/0x110 [ 4.323273][ T1] ? irqentry_exit+0x56/0x80 [ 4.323642][ T1] ? sysvec_call_function_single+0x30/0x30 [ 4.324124][ T1] ? trace_hardirqs_on+0x45/0x50 [ 4.324523][ T1] ? irqentry_exit+0x56/0x80 [ 4.324893][ T1] ? sysvec_apic_timer_interrupt+0x29/0x30 [ 4.325367][ T1] ? handle_exception+0x101/0x101 [ 4.325776][ T1] ? p9_client_readlink+0x9b/0xa0 [ 4.326186][ T1] ? strlen+0xd/0x20 [ 4.326508][ T1] ? next_arg+0xfb/0x110 [ 4.326877][ T1] ? parse_args+0x15c/0x330 [ 4.327244][ T1] ? __this_cpu_preempt_check+0xf/0x11 [ 4.327688][ T1] ? debug_smp_processor_id+0x12/0x20 [ 4.328155][ T1] ? generic_onenand_driver_init+0x16/0x16 [ 4.328664][ T1] do_initcall_level+0x80/0x92 [ 4.329088][ T1] ? rest_init+0x1c0/0x1c0 [ 4.329475][ T1] do_initcalls+0x41/0x62 [ 4.329838][ T1] do_basic_setup+0x17/0x19 [ 4.330214][ T1] kernel_init_freeable+0x8c/0xd1 [ 4.330657][ T1] kernel_init+0x17/0x170 [ 4.331087][ T1] ret_from_fork+0x1c/0x28 [ 4.331503][ T1] irq event stamp: 319917 [ 4.331919][ T1] hardirqs last enabled at (319917): [] __up_console_sem+0x5c/0x90 [ 4.332719][ T1] hardirqs last disabled at (319916): [] __up_console_sem+0x43/0x90 [ 4.333495][ T1] softirqs last enabled at (318956): [] bdi_register_va+0x1d1/0x1f0 [ 4.334243][ T1] softirqs last disabled at (318954): [] bdi_register_va+0xe2/0x1f0 [ 4.334994][ T1] _warn_unseeded_randomness: 5 callbacks suppressed [ 4.334997][ T1] random: get_random_bytes called from __warn+0xc3/0x140 with crng_init=0 [ 4.335006][ T1] ---[ end trace 8e9a8c821c89b3d1 ]--- To reproduce: # build kernel cd linux cp config-5.15.0-rc1-00002-gd3ff51cfa9a6 .config make HOSTCC=clang-14 CC=clang-14 ARCH=i386 olddefconfig prepare modules_prepare bzImage git clone https://github.com/intel/lkp-tests.git cd lkp-tests bin/lkp qemu -k job-script # job-script is attached in this email # if come across any failure that blocks the test, # please remove ~/.lkp and /lkp dir to run from a clean state. --- 0DAY/LKP+ Test Infrastructure Open Source Technology Center https://lists.01.org/hyperkitty/list/lkp@lists.01.org Intel Corporation Thanks, Oliver Sang