lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 20 Mar 2015 16:37:12 +0800 From: Huang Ying <ying.huang@...el.com> To: Marcelo Ricardo Leitner <marcelo.leitner@...il.com> Cc: "David S. Miller" <davem@...emloft.net>, LKML <linux-kernel@...r.kernel.org>, LKP ML <lkp@...org> Subject: [LKP] [ipv4,ipv6] baf606d9c9b: INFO: possible circular locking dependency detected ] FYI, we noticed the below changes on git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git master commit baf606d9c9b12517e47e0d1370e8aa9f7323f210 ("ipv4,ipv6: grab rtnl before locking the socket") +----------------------------------------------------+------------+------------+ | | fdf9ef8999 | baf606d9c9 | +----------------------------------------------------+------------+------------+ | boot_successes | 26 | 12 | | boot_failures | 1 | 19 | | BUG:kernel_test_crashed | 1 | | | INFO:possible_circular_locking_dependency_detected | 0 | 19 | | backtrace:sock_common_setsockopt | 0 | 19 | | backtrace:SyS_setsockopt | 0 | 19 | | page_allocation_failure:order:#,mode | 0 | 2 | | backtrace:vmalloc | 0 | 2 | | backtrace:SyS_init_module | 0 | 2 | +----------------------------------------------------+------------+------------+ [ 19.815737] [ 19.816009] ====================================================== [ 19.816645] [ INFO: possible circular locking dependency detected ] [ 19.816665] 4.0.0-rc4-01766-gdccfae9 #6 Not tainted [ 19.816665] ------------------------------------------------------- [ 19.816665] trinity-main/3132 is trying to acquire lock: [ 19.816665] (rtnl_mutex){+.+.+.}, at: [<ffffffff81a552b4>] rtnl_lock+0x17/0x19 [ 19.816665] [ 19.816665] but task is already holding lock: [ 19.816665] (sk_lock-AF_INET6){+.+.+.}, at: [<ffffffff81b0f396>] do_ipv6_setsockopt+0xc3/0xd98 [ 19.816665] [ 19.816665] which lock already depends on the new lock. [ 19.816665] [ 19.816665] [ 19.816665] the existing dependency chain (in reverse order) is: [ 19.816665] -> #1 (sk_lock-AF_INET6){+.+.+.}: [ 19.816665] [<ffffffff810c2c4d>] lock_acquire+0xb2/0x132 [ 19.816665] [<ffffffff81a358be>] lock_sock_nested+0x7d/0x9b [ 19.816665] [<ffffffff81b0f396>] do_ipv6_setsockopt+0xc3/0xd98 [ 19.816665] [<ffffffff81b100bc>] ipv6_setsockopt+0x51/0x9c [ 19.816665] [<ffffffff81aa81c1>] tcp_setsockopt+0x20/0x2e [ 19.816665] [<ffffffff81a345a0>] sock_common_setsockopt+0x14/0x16 [ 19.816665] [<ffffffff81a33ad0>] SyS_setsockopt+0x78/0x99 [ 19.816665] [<ffffffff81b91289>] system_call_fastpath+0x12/0x17 [ 19.816665] -> #0 (rtnl_mutex){+.+.+.}: [ 19.816665] [<ffffffff810c1ea4>] __lock_acquire+0x13f0/0x1a86 [ 19.816665] [<ffffffff810c2c4d>] lock_acquire+0xb2/0x132 [ 19.816665] [<ffffffff81b8d97b>] mutex_lock_nested+0x6b/0x38d [ 19.816665] [<ffffffff81a552b4>] rtnl_lock+0x17/0x19 [ 19.816665] [<ffffffff81afc5c6>] ipv6_sock_ac_drop+0x28/0xc4 [ 19.816665] [<ffffffff81b0fc30>] do_ipv6_setsockopt+0x95d/0xd98 [ 19.816665] [<ffffffff81b100bc>] ipv6_setsockopt+0x51/0x9c [ 19.816665] [<ffffffff81b160af>] rawv6_setsockopt+0x7c/0x91 [ 19.816665] [<ffffffff81a345a0>] sock_common_setsockopt+0x14/0x16 [ 19.816665] [<ffffffff81a33ad0>] SyS_setsockopt+0x78/0x99 [ 19.816665] [<ffffffff81b91289>] system_call_fastpath+0x12/0x17 [ 19.816665] [ 19.816665] other info that might help us debug this: [ 19.816665] [ 19.816665] Possible unsafe locking scenario: [ 19.816665] [ 19.816665] CPU0 CPU1 [ 19.816665] ---- ---- [ 19.816665] lock(sk_lock-AF_INET6); [ 19.816665] lock(rtnl_mutex); [ 19.816665] lock(sk_lock-AF_INET6); [ 19.816665] lock(rtnl_mutex); [ 19.816665] [ 19.816665] *** DEADLOCK *** [ 19.816665] [ 19.816665] 1 lock held by trinity-main/3132: [ 19.816665] #0: (sk_lock-AF_INET6){+.+.+.}, at: [<ffffffff81b0f396>] do_ipv6_setsockopt+0xc3/0xd98 [ 19.816665] [ 19.816665] stack backtrace: [ 19.816665] CPU: 1 PID: 3132 Comm: trinity-main Not tainted 4.0.0-rc4-01766-gdccfae9 #6 [ 19.816665] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.7.5-20140531_083030-gandalf 04/01/2014 [ 19.816665] ffffffff82e878c0 ffff880009e7ba78 ffffffff81b82dcf ffffffff810d0bdb [ 19.816665] ffffffff82e45300 ffff880009e7bac8 ffffffff81b7e2ba ffff880009e7bab8 [ 19.816665] ffff880009e74b60 ffff880009e753f0 ffff880009e74b60 ffff880009e753f0 [ 19.816665] Call Trace: [ 19.816665] [<ffffffff81b82dcf>] dump_stack+0x4c/0x65 [ 19.816665] [<ffffffff810d0bdb>] ? console_unlock+0x398/0x3c7 [ 19.816665] [<ffffffff81b7e2ba>] print_circular_bug+0x2b1/0x2c2 [ 19.816665] [<ffffffff810c1ea4>] __lock_acquire+0x13f0/0x1a86 [ 19.816665] [<ffffffff810aba93>] ? sched_clock_local+0x11/0x78 [ 19.816665] [<ffffffff810c2c4d>] lock_acquire+0xb2/0x132 [ 19.816665] [<ffffffff81a552b4>] ? rtnl_lock+0x17/0x19 [ 19.816665] [<ffffffff81a552b4>] ? rtnl_lock+0x17/0x19 [ 19.816665] [<ffffffff81b8d97b>] mutex_lock_nested+0x6b/0x38d [ 19.816665] [<ffffffff81a552b4>] ? rtnl_lock+0x17/0x19 [ 19.816665] [<ffffffff810c2e64>] ? lock_release_non_nested+0x197/0x2d9 [ 19.816665] [<ffffffff81173752>] ? might_fault+0x58/0xb5 [ 19.816665] [<ffffffff81a552b4>] rtnl_lock+0x17/0x19 [ 19.816665] [<ffffffff81afc5c6>] ipv6_sock_ac_drop+0x28/0xc4 [ 19.816665] [<ffffffff81b0fc30>] do_ipv6_setsockopt+0x95d/0xd98 [ 19.816665] [<ffffffff81071c71>] ? kvm_clock_read+0x25/0x2e [ 19.816665] [<ffffffff81045a03>] ? sched_clock+0x9/0xd [ 19.816665] [<ffffffff810aba93>] ? sched_clock_local+0x11/0x78 [ 19.816665] [<ffffffff810abd27>] ? sched_clock_cpu+0x9a/0xaf [ 19.816665] [<ffffffff81a35ec4>] ? release_sock+0x173/0x1b1 [ 19.816665] [<ffffffff81086678>] ? __local_bh_enable_ip+0xa8/0xb4 [ 19.816665] [<ffffffff810c07cc>] ? trace_hardirqs_on_caller+0x191/0x1ad [ 19.816665] [<ffffffff81a35ec4>] ? release_sock+0x173/0x1b1 [ 19.816665] [<ffffffff810c07f5>] ? trace_hardirqs_on+0xd/0xf [ 19.816665] [<ffffffff81086678>] ? __local_bh_enable_ip+0xa8/0xb4 [ 19.816665] [<ffffffff81b100bc>] ipv6_setsockopt+0x51/0x9c [ 19.816665] [<ffffffff81b160af>] rawv6_setsockopt+0x7c/0x91 [ 19.816665] [<ffffffff811bce12>] ? __fdget+0x13/0x15 [ 19.816665] [<ffffffff81a345a0>] sock_common_setsockopt+0x14/0x16 [ 19.816665] [<ffffffff81a33ad0>] SyS_setsockopt+0x78/0x99 [ 19.816665] [<ffffffff81b91289>] system_call_fastpath+0x12/0x17 [ 62.401064] rcu-torture: rtc: ffffffff83417640 ver: 1 tfle: 0 rta: 1 rtaf: 0 rtf: 0 rtmbe: 0 rtbke: 0 rtbre: 0 rtbf: 0 rtb: 0 nt: 1 onoff: 0/0:0/0 -1,0:-1,0 0:0 (HZ=1000) barrier: 0/0:0 cbflood: 1 [ 62.404218] rcu-torture: Reader Pipe: 2 0 0 0 0 0 0 0 0 0 0 [ 62.405846] rcu-torture: Reader Batch: 2 0 0 0 0 0 0 0 0 0 0 Thanks, Ying Huang View attachment "config-4.0.0-rc3-00948-gbaf606d" of type "text/plain" (102707 bytes) View attachment ".dmesg" of type "text/plain" (44068 bytes) _______________________________________________ LKP mailing list LKP@...ux.intel.com
Powered by blists - more mailing lists