lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1163557533.9173.121.camel@localhost.localdomain>
Date:	Tue, 14 Nov 2006 18:25:33 -0800
From:	Daniel Walker <dwalker@...sta.com>
To:	mingo@...e.hu
Cc:	linux-kernel@...r.kernel.org
Subject: -rt patch scheduler w/ BKL


The current -rt patch changes the scheduler so that the BKL is no longer
properly reacquired. If SPINLOCK_BKL is selected it's possible for
reacquire_kernel_lock() to return without acquiring the BKL, in vanilla
linux the return value of that function is evaluated, but in -rt that
code is removed. The result is that if __schedule gets recalled on
TIF_NEED_RESCHED the BKL will be released unconditionally ..

The following error is an example of the issue with spinlock debugging.
It happens pretty quickly when using NFS root ..

BUG: spinlock wrong owner on CPU#0, hotplug/699
 lock: 803c5840, .magic: dead4ead, .owner: <none>/-1, .owner_cpu: -1
Call Trace:
 [<8033e964>] _raw_spin_unlock+0xb8/0xd0
 [<8033e964>] _raw_spin_unlock+0xb8/0xd0
 [<8033c134>] schedule+0x48/0x128
 [<8033c134>] schedule+0x48/0x128
 [<8033ba90>] __schedule+0x7fc/0xcc4
 [<803278f8>] xprt_timer+0x0/0xb0
 [<8033e3dc>] __spin_lock_irqsave+0x30/0x44
 [<802adad0>] kernel_sendmsg+0x24/0x38
 [<8033e64c>] __spin_unlock_irqrestore+0x14/0x48
 [<8032c468>] rpc_wait_bit_interruptible+0x2c/0x40
 [<8032c43c>] rpc_wait_bit_interruptible+0x0/0x40
 [<8033c134>] schedule+0x48/0x128
 [<80141324>] prepare_to_wait+0x34/0x90
 [<8032c468>] rpc_wait_bit_interruptible+0x2c/0x40
 [<8032755c>] __xprt_lock_write_next_cong+0xac/0xcc
 [<8032ba00>] rpc_sleep_on+0x40/0x60
 [<8033cf50>] __wait_on_bit+0xbc/0x128
 [<8033cf14>] __wait_on_bit+0x80/0x128
 [<80327494>] xprt_end_transmit+0x40/0x5c
 [<80327494>] xprt_end_transmit+0x40/0x5c
 [<8032c43c>] rpc_wait_bit_interruptible+0x0/0x40
 [<8033d038>] out_of_line_wait_on_bit+0x7c/0x98
 [<80324fe0>] call_transmit_status+0x30/0x48
 [<801fe370>] nfs_xdr_fhandle+0x0/0x54
 [<80141178>] wake_bit_function+0x0/0x5c
 [<8032c7b0>] __rpc_execute+0x168/0x2bc
 [<8032c6e0>] __rpc_execute+0x98/0x2bc
 [<80325374>] rpc_call_setup+0x90/0x98
 [<803254c0>] rpc_call_sync+0xf4/0x110
 [<801fa568>] nfs_wait_schedule+0x0/0x40
 [<801ffef8>] nfs_proc_getattr+0x6c/0xc4
 [<80135b94>] sigprocmask+0x180/0x220
 [<80141178>] wake_bit_function+0x0/0x5c
 [<801fa730>] __nfs_revalidate_inode+0x188/0x320
 [<8015a6ac>] __generic_file_aio_read+0x108/0x2f4
 [<80181124>] do_sync_read+0xdc/0x16c
 [<801f9478>] nfs_file_open+0x0/0x9c
 [<80204878>] nfs_sync_inode_wait+0x90/0x230
 [<801fb424>] nfs_getattr+0xd0/0xd8
 [<8017f400>] do_filp_open+0x5c/0x78
 [<8018ee88>] vfs_fstat+0x34/0x58
 [<8018ee6c>] vfs_fstat+0x18/0x58
 [<8018eecc>] sys_fstat64+0x20/0x48
 [<80181e14>] vfs_read+0x11c/0x1a0
 [<801822e4>] remote_llseek+0x94/0x18c
 [<8017bbb0>] kmem_cache_free+0x80/0xd4
 [<80182680>] sys_read+0x7c/0x110
 [<80182634>] sys_read+0x30/0x110
 [<8017f4fc>] do_sys_open+0xe0/0x138
 [<8010bcdc>] syscall_trace_entry+0x70/0x90
 [<8010bcdc>] syscall_trace_entry+0x70/0x90


So I would imagine the solution is to put back the code that is in
vanilla linux which uses a "goto" to essentially reschedule avoided this
issue. However, I have no idea why the scheduler was changed to
schedule() --> __schedule() and the BKL checks removed, which is the
reason for this email ..

So anyone have thoughts on this?

Daniel

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ