lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 10 Mar 2015 01:19:04 -0300
From:	Fabio Estevam <festevam@...il.com>
To:	"David S. Miller" <davem@...emloft.net>,
	alexander.h.duyck@...hat.com
Cc:	"netdev@...r.kernel.org" <netdev@...r.kernel.org>,
	Olof Johansson <olof@...om.net>
Subject: net/ipv4/fib_trie.c:1550 suspicious rcu_dereference_check() usage

Hi,

On a imx6sl-warp board running linux-next 20150306:

root@...6sl-warp:~# reboot

The system is going down for reboot NOW!(ttymxc0) (Wed Feb 25 18:41:59 2015):
INIT: Switching to runlevel: 6
INIT: Sending processes the TERM signal
INIT: Sending processe Stopping syslogd/klogd: stopped syslogd (pid 301)
stopped klogd (pid 304)
done
Deconfiguring network interfaces... [   36.083246]
[   36.084753] ===============================
[   36.089026] [ INFO: suspicious RCU usage. ]
[   36.093217] 4.0.0-rc2-next-20150306-00003-g62c7037-dirty #2699 Not tainted
[   36.100128] -------------------------------
[   36.104316] net/ipv4/fib_trie.c:1550 suspicious
rcu_dereference_check() usage!
[   36.111559]
[   36.111559] other info that might help us debug this:
[   36.111559]
[   36.119604]
[   36.119604] rcu_scheduler_active = 1, debug_locks = 0
[   36.126139] 1 lock held by ifconfig/324:
[   36.130083]  #0:  (rtnl_mutex){+.+.+.}, at: [<805a6914>] rtnl_lock+0x18/0x20
[   36.137222]
[   36.137222] stack backtrace:
[   36.141609] CPU: 0 PID: 324 Comm: ifconfig Not tainted
4.0.0-rc2-next-20150306-00003-g62c7037-dirty #2699
[   36.151196] Hardware name: Freescale i.MX6 SoloLite (Device Tree)
[   36.157293] Backtrace:
[   36.159793] [<80011f0c>] (dump_backtrace) from [<800120a8>]
(show_stack+0x18/0x1c)
[   36.167365]  r6:0000060e r5:00000000 r4:00000000 r3:00000000
[   36.173118] [<80012090>] (show_stack) from [<807651c8>]
(dump_stack+0x88/0xa4)
[   36.180374] [<80765140>] (dump_stack) from [<80064110>]
(lockdep_rcu_suspicious+0xbc/0x11c)
[   36.188729]  r5:80913288 r4:9dff0000
[   36.192367] [<80064054>] (lockdep_rcu_suspicious) from [<8060f740>]
(fib_table_flush+0x270/0x294)
[   36.201260]  r7:80aa3680 r6:00000000 r5:00000000 r4:80aad668
[   36.206985] [<8060f4d0>] (fib_table_flush) from [<80608cb0>]
(fib_flush.constprop.10+0x34/0x64)
[   36.215702]  r10:80aa8784 r9:9dfa3000 r8:00000002 r7:80aa3680
r6:00000000 r5:00000000
[   36.223623]  r4:00000000
[   36.226178] [<80608c7c>] (fib_flush.constprop.10) from [<80608d00>]
(fib_disable_ip+0x20/0x38)
[   36.234810]  r7:9dc7fe0c r6:80aad660 r5:9e4b6000 r4:9e4b6000
[   36.240551] [<80608ce0>] (fib_disable_ip) from [<8060a0e4>]
(fib_netdev_event+0x100/0x138)
[   36.248834]  r4:00000001 r3:9e58aa00
[   36.252451] [<80609fe4>] (fib_netdev_event) from [<80048170>]
(notifier_call_chain+0x54/0x94)
[   36.260997]  r6:00000000 r5:fffffffa r4:80aa735c r3:80609fe4
[   36.266722] [<8004811c>] (notifier_call_chain) from [<800481cc>]
(__raw_notifier_call_chain+0x1c/0x24)
[   36.276048]  r10:00000000 r8:00000000 r7:00000000 r6:9e4b6000
r5:00000002 r4:9dc7fe0c
[   36.283976] [<800481b0>] (__raw_notifier_call_chain) from
[<800481f4>] (raw_notifier_call_chain+0x20/0x28)
[   36.293661] [<800481d4>] (raw_notifier_call_chain) from
[<8058f440>] (call_netdevice_notifiers_info+0x38/0x64)
[   36.303691] [<8058f408>] (call_netdevice_notifiers_info) from
[<8058f4f0>] (call_netdevice_notifiers+0x18/0x20)
[   36.313798]  r6:00000009 r5:00000001 r4:9e4b6000 r3:00000008
[   36.319541] [<8058f4d8>] (call_netdevice_notifiers) from
[<8059632c>] (__dev_notify_flags+0x40/0x98)
[   36.328682] [<805962ec>] (__dev_notify_flags) from [<805969b4>]
(dev_change_flags+0x48/0x50)
[   36.337139]  r5:00000138 r4:9e4b6000
[   36.340777] [<8059696c>] (dev_change_flags) from [<8060129c>]
(devinet_ioctl+0x690/0x788)
[   36.348976]  r8:00008914 r7:00000000 r6:7e9b6c78 r5:9e58aa0c
r4:9dfa3000 r3:00000000
[   36.356801] [<80600c0c>] (devinet_ioctl) from [<80602ee8>]
(inet_ioctl+0x1b4/0x1c8)
[   36.364477]  r10:9e222fe0 r9:7e9b6c78 r8:00000003 r7:9e222fc0
r6:7e9b6c78 r5:8010c90c
[   36.372402]  r4:00008914
[   36.374958] [<80602d34>] (inet_ioctl) from [<80579dd0>]
(sock_ioctl+0x64/0x2a4)
[   36.382298] [<80579d6c>] (sock_ioctl) from [<8010c2dc>]
(do_vfs_ioctl+0x80/0x674)
[   36.389801]  r7:7e9b6c78 r6:00000003 r5:8010c90c r4:9dc6d640
[   36.395526] [<8010c25c>] (do_vfs_ioctl) from [<8010c90c>]
(SyS_ioctl+0x3c/0x60)
[   36.402854]  r10:00000000 r9:9dc7e000 r8:00000003 r7:7e9b6c78
r6:00008914 r5:9dc6d640
[   36.410776]  r4:9dc6d640
[   36.413335] [<8010c8d0>] (SyS_ioctl) from [<8000eca0>]
(ret_fast_syscall+0x0/0x4c)
[   36.420925]  r8:8000ee64 r7:00000036 r6:00000001 r5:7e9b6e60
r4:0007e93c r3:0007e93c
ifdown: interface eth0 not configured
done.
Sending all processes the TERM signal...
Sending all processes the KILL signal...
Unmounting remote filesystems...
Deactivating swap...
Unmounting local filesystems...
Rebooting... [   46.221628] imx2-wdt 20bc000.wdog: Device shutdown:
Expect reboot!
[   46.228119] reboot: Restarting system

Olof's boot farm also reported the same on a imx6q-wandboard after a
halt command:

http://arm-soc.lixom.net/bootlogs/next/next-20150306/wandboard-arm-imx_v6_v7_defconfig.html

linux-next 20150305 does not show this problem. Haven't bisected it yet.

Regards,

Fabio Estevam
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists