lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <alpine.LFD.2.02.1206121535180.3086@ionos>
Date:	Tue, 12 Jun 2012 15:40:13 +0200 (CEST)
From:	Thomas Gleixner <tglx@...utronix.de>
To:	Sasha Levin <levinsasha928@...il.com>
cc:	Ingo Molnar <mingo@...e.hu>, Peter Zijlstra <peterz@...radead.org>,
	paulmck <paulmck@...ux.vnet.ibm.com>,
	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
	Dave Jones <davej@...hat.com>
Subject: Re: rcu,sched: spinlock recursion on 3.5-rc2

On Tue, 12 Jun 2012, Sasha Levin wrote:

> Hey all,
> 
> I've got the following splat while fuzzing with trinity in a KVM tools guest on 3.5-rc2:
> 
> [ 8110.274070] BUG: spinlock recursion on CPU#0, rcu_torture_rea/2658
> [ 8110.275014]  lock: 0xffff88000d9d6140, .magic: dead4ead, .owner: rcu_torture_rea/2658, .owner_cpu: 0
> [ 8110.275014] Pid: 2658, comm: rcu_torture_rea Tainted: G        W    3.5.0-rc2-sasha-00019-gbd68491 #376
> [ 8110.275014] Call Trace:
> [ 8110.275014]  [<ffffffff8197de38>] spin_dump+0x78/0xc0
> [ 8110.275014]  [<ffffffff8197deab>] spin_bug+0x2b/0x40
> [ 8110.275014]  [<ffffffff8197dfee>] do_raw_spin_lock+0x4e/0x140
> [ 8110.275014]  [<ffffffff837c0b2b>] _raw_spin_lock+0x5b/0x70
> [ 8110.275014]  [<ffffffff8111d051>] ? rt_mutex_setprio+0x81/0x2c0
> [ 8110.275014]  [<ffffffff8111d051>] rt_mutex_setprio+0x81/0x2c0
> [ 8110.275014]  [<ffffffff81155160>] __rt_mutex_adjust_prio+0x20/0x30
> [ 8110.275014]  [<ffffffff837c0164>] rt_mutex_slowunlock+0x104/0x130
> [ 8110.275014]  [<ffffffff837c0199>] rt_mutex_unlock+0x9/0x10
> [ 8110.275014]  [<ffffffff81193e30>] rcu_read_unlock_special+0x350/0x400
> [ 8110.275014]  [<ffffffff8114841a>] ? get_lock_stats+0x2a/0x60
> [ 8110.275014]  [<ffffffff811941aa>] rcu_preempt_note_context_switch+0x22a/0x300
> [ 8110.275014]  [<ffffffff837bf8ca>] __schedule+0x76a/0x880
> [ 8110.275014]  [<ffffffff837c1c74>] ? retint_restore_args+0x13/0x13
> [ 8110.275014]  [<ffffffff8118dc20>] ? rcu_torture_read_unlock+0x40/0x60
> [ 8110.275014]  [<ffffffff837bff64>] preempt_schedule_irq+0x94/0xd0
> [ 8110.275014]  [<ffffffff837c1da6>] retint_kernel+0x26/0x30
> [ 8110.275014]  [<ffffffff81193ae1>] ? rcu_read_unlock_special+0x1/0x400
> [ 8110.275014]  [<ffffffff81193f2d>] ? __rcu_read_unlock+0x4d/0xa0
> [ 8110.275014]  [<ffffffff8118dc3d>] rcu_torture_read_unlock+0x5d/0x60
> [ 8110.275014]  [<ffffffff8118dedd>] rcu_torture_reader+0x29d/0x380
> [ 8110.275014]  [<ffffffff8118ca50>] ? T.865+0x50/0x50
> [ 8110.275014]  [<ffffffff8118dc40>] ? rcu_torture_read_unlock+0x60/0x60
> [ 8110.275014]  [<ffffffff81106e32>] kthread+0xb2/0xc0
> [ 8110.275014]  [<ffffffff837c39f4>] kernel_thread_helper+0x4/0x10
> [ 8110.275014]  [<ffffffff837c1c74>] ? retint_restore_args+0x13/0x13
> [ 8110.275014]  [<ffffffff81106d80>] ? __init_kthread_worker+0x70/0x70
> [ 8110.275014]  [<ffffffff837c39f0>] ? gs_change+0x13/0x13

Ok, that's nasty.

The torture thread got preempted. rcu_preempt_note_context_switch()
tries to unlock the boosting rt mutex.

Though rcu_preempt_note_context_switch() is called with rq lock
held. So it's not a surprise that the code will dead lock.

My brain hurts already from looking, so Paul to the rescue!

Thanks,

	tglx


--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ