Regression on linux-next (next-20250721)
Borah, Chaitanya Kumar
chaitanya.kumar.borah at intel.com
Mon Jul 28 16:53:06 UTC 2025
Hello John,
Hope you are doing well. I am Chaitanya from the linux graphics team in
Intel.
This mail is regarding a regression we are seeing in our CI runs[1] on
linux-next repository.
Since the version next-20250721 [2], we are seeing the following regression
`````````````````````````````````````````````````````````````````````````````````
<3>[ 10.781401] INFO: trying to register non-static key.
<3>[ 10.781411] The code is fine but needs lockdep annotation, or maybe
<3>[ 10.781414] you didn't initialize this object before use?
<3>[ 10.781416] turning off the locking correctness validator.
<4>[ 10.781420] CPU: 1 UID: 0 PID: 745 Comm: rsyslogd Not tainted
6.16.0-rc7-next-20250721-next-20250721-g979875200256+ #1 PREEMPT(voluntary)
<4>[ 10.781422] Hardware name: Intel Corporation Arrow Lake Client
Platform/ARL-H Lp5x T4 RVP, BIOS MTLPFWI1.R00.5204.D80.2505151204 05/15/2025
<4>[ 10.781423] Call Trace:
<4>[ 10.781424] <TASK>
<4>[ 10.781425] dump_stack_lvl+0x91/0xf0
<4>[ 10.781430] dump_stack+0x10/0x20
<4>[ 10.781431] register_lock_class+0x491/0x4a0
<4>[ 10.781434] ? prepend_path+0x330/0x510
<4>[ 10.781438] ? prepend_path+0x8f/0x510
<4>[ 10.781440] __lock_acquire+0xa8/0x2650
<4>[ 10.781444] lock_acquire+0xc4/0x2e0
<4>[ 10.781445] ? update_file_ctx+0x1e/0x110
<4>[ 10.781450] _raw_spin_lock+0x2f/0x60
<4>[ 10.781452] ? update_file_ctx+0x1e/0x110
<4>[ 10.781453] update_file_ctx+0x1e/0x110
<4>[ 10.781455] aa_file_perm+0x68f/0x7f0
<4>[ 10.781457] common_file_perm+0x88/0x150
<4>[ 10.781460] apparmor_mmap_file+0x5f/0x80
<4>[ 10.781462] security_mmap_file+0x1b0/0x490
<4>[ 10.781465] vm_mmap_pgoff+0x5d/0x220
<4>[ 10.781468] ksys_mmap_pgoff+0x17a/0x250
<4>[ 10.781471] __x64_sys_mmap+0x33/0x70
<4>[ 10.781474] x64_sys_call+0x1eda/0x2680
<4>[ 10.781477] do_syscall_64+0x93/0xa20
<4>[ 10.781480] ? irqentry_exit+0x77/0xb0
<4>[ 10.781482] ? exc_page_fault+0xbd/0x2c0
<4>[ 10.781484] entry_SYSCALL_64_after_hwframe+0x76/0x7e
`````````````````````````````````````````````````````````````````````````````````
Details log can be found in [3].
After bisecting the tree, the following patch [4] seems to be the first
"bad" commit
`````````````````````````````````````````````````````````````````````````````````````````````````````````
commit 88fec3526e84123997ecebd6bb6778eb4ce779b7
Author: John Johansen john.johansen at canonical.com
Date: Thu Jun 19 22:11:52 2025 -0700
apparmor: make sure unix socket labeling is correctly updated.
`````````````````````````````````````````````````````````````````````````````````````````````````````````
We also verified that if we revert the patch the issue is not seen.
Could you please check why the patch causes this regression and provide
a fix if necessary?
Thank you.
Regards
Chaitanya
[1]
https://intel-gfx-ci.01.org/tree/linux-next/combined-alt.html?
[2]
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?h=next-20250721
[3]
https://intel-gfx-ci.01.org/tree/linux-next/next-20250721/bat-arlh-2/boot0.txt
[4]
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?h=next-20250721&id=88fec3526e84123997ecebd6bb6778eb4ce779b7
More information about the Intel-gfx
mailing list