lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <14717.1480441140@turing-police.cc.vt.edu>
Date:   Tue, 29 Nov 2016 12:39:00 -0500
From:   Valdis Kletnieks <Valdis.Kletnieks@...edu>
To:     linux-kernel@...r.kernel.org
Subject: linux-next 20161129 - lockdep: kernel/sched/core.c:7747 Illegal context switch in RCU-bh read-side critical section!

May or may not be related to the BUG I just reported - the first hit
on that one was right after this in the log....

[    2.740391] ===============================
[    2.740433] suspicious RCU usage. ]
[    2.740463] 4.9.0-rc7-next-20161129-dirty #361 Not tainted
[    2.740464] -------------------------------
[    2.740499] kernel/sched/core.c:7747 Illegal context switch in RCU-bh read-side critical section!
[    2.740567]
               other info that might help us debug this:

[    2.740628]
               rcu_scheduler_active = 1, debug_locks = 1
[    2.740679] 3 locks held by systemd/1:
[    2.740680]  #0:
[    2.740681]  (
[    2.740682] rtnl_mutex
[    2.740683] ){+.+.+.}
[    2.740684] , at:
[    2.740689] [<ffffffffa9d0036b>] rtnetlink_rcv+0x1b/0x40
[    2.740690]  #1:
[    2.740691]  (
[    2.740692] rcu_read_lock_bh
[    2.740693] ){......}
[    2.740694] , at:
[    2.740698] [<ffffffffa9ea56ef>] ipv6_add_addr+0x9f/0xab0
[    2.740699]  #2:
[    2.740700]  (
[    2.740701] addrconf_hash_lock
[    2.740702] ){+.....}
[    2.740702] , at:
[    2.740705] [<ffffffffa9ea5822>] ipv6_add_addr+0x1d2/0xab0
[    2.740706]
               stack backtrace:
[    2.740708] CPU: 2 PID: 1 Comm: systemd Not tainted 4.9.0-rc7-next-20161129-dirty #361
[    2.740709] Hardware name: Dell Inc. Latitude E6530/07Y85M, BIOS A17 08/19/2015
[    2.740711] Call Trace:
[    2.740716]  dump_stack+0x7b/0xd1
[    2.740719]  lockdep_rcu_suspicious+0xc5/0x100
[    2.740722]  ___might_sleep+0x240/0x300
[    2.740725]  __alloc_pages_nodemask+0x13f/0x730
[    2.740729]  cache_alloc_refill+0x184/0x12e0
[    2.740732]  kmem_cache_alloc+0xef/0x4f0
[    2.740734]  dst_alloc+0x5f/0xf0
[    2.740739]  __ip6_dst_alloc+0x36/0xd0
[    2.740744]  ip6_dst_alloc+0x19/0x150
[    2.740748]  addrconf_dst_alloc+0x78/0x1c0
[    2.740753]  ipv6_add_addr+0x2d9/0xab0
[    2.740757]  ? ipv6_add_addr+0x9f/0xab0
[    2.740762]  ? trace_hardirqs_on_caller+0x1ab/0x2c0
[    2.740767]  add_addr+0x36/0x110
[    2.740772]  addrconf_notify+0x8c4/0x1230
[    2.740776]  ? fib_add_ifaddr+0x110/0x1b0
[    2.740780]  raw_notifier_call_chain+0x66/0xd0
[    2.740784]  call_netdevice_notifiers_info+0x73/0x90
[    2.740787]  __dev_notify_flags+0x8f/0xf0
[    2.740790]  ? __dev_change_flags+0xc3/0x1b0
[    2.740792]  dev_change_flags+0x62/0x90
[    2.740795]  do_setlink+0x3b5/0x1860
[    2.740799]  ? avc_has_perm_noaudit+0x1d9/0x330
[    2.740801]  ? preempt_count_sub+0x4a/0x90
[    2.740805]  ? avc_has_perm_noaudit+0x59/0x330
[    2.740808]  ? nla_parse+0x143/0x1c0
[    2.740811]  rtnl_setlink+0x118/0x1a0
[    2.740816]  ? do_setlink+0x1860/0x1860
[    2.740819]  rtnetlink_rcv_msg+0xfa/0x630
[    2.740822]  ? mutex_lock_nested+0x109/0x9f0
[    2.740824]  ? rtnetlink_rcv+0x1b/0x40
[    2.740827]  ? netlink_deliver_tap+0x5/0x4e0
[    2.740830]  ? rtnl_newlink+0xbe0/0xbe0
[    2.740832]  netlink_rcv_skb+0x87/0xc0
[    2.740834]  rtnetlink_rcv+0x2a/0x40
[    2.740836]  netlink_unicast+0x1e7/0x300
[    2.740839]  netlink_sendmsg+0x402/0x670
[    2.740842]  sock_sendmsg+0x5b/0xd0
[    2.740845]  SYSC_sendto+0x156/0x1f0
[    2.740848]  ? netlink_getsockopt+0x2f9/0x3d0
[    2.740850]  ? entry_SYSCALL_64_fastpath+0x5/0xad
[    2.740853]  ? trace_hardirqs_on_caller+0x1ab/0x2c0
[    2.740856]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[    2.740859]  SyS_sendto+0xe/0x10
[    2.740864]  entry_SYSCALL_64_fastpath+0x18/0xad
[    2.740866] RIP: 0033:0x7fc497fffa73
[    2.740985] RSP: 002b:00007ffdfa702568 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
[    2.740987] RAX: ffffffffffffffda RBX: 0000000000000046 RCX: 00007fc497fffa73
[    2.740989] RDX: 0000000000000020 RSI: 0000560eb87f9680 RDI: 0000000000000004
[    2.740990] RBP: 00007ffdfa702628 R08: 00007ffdfa702570 R09: 0000000000000010
[    2.740992] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffdfa7029f8
[    2.740993] R13: 00007ffdfa7026f8 R14: 0000000000000001 R15: 00000000002414e3
[    2.740996] BUG: sleeping function called from invalid context at mm/page_alloc.c:3775
[    2.741062] in_atomic(): 1, irqs_disabled(): 1, pid: 1, name: systemd
[    2.741112] 3 locks held by systemd/1:
[    2.741113]  #0:
[    2.741114]  (
[    2.741115] rtnl_mutex
[    2.741116] ){+.+.+.}
[    2.741117] , at:
[    2.741119] [<ffffffffa9d0036b>] rtnetlink_rcv+0x1b/0x40
[    2.741120]  #1:
[    2.741121]  (
[    2.741122] rcu_read_lock_bh
[    2.741123] ){......}
[    2.741123] , at:
[    2.741126] [<ffffffffa9ea56ef>] ipv6_add_addr+0x9f/0xab0
[    2.741127]  #2:
[    2.741128]  (
[    2.741129] addrconf_hash_lock
[    2.741130] ){+.....}
[    2.741131] , at:
[    2.741133] [<ffffffffa9ea5822>] ipv6_add_addr+0x1d2/0xab0
[    2.741134] irq event stamp: 1862459
[    2.741135] hardirqs last  enabled at (1862458):
[    2.741137] [<ffffffffa939ec13>] kmem_cache_alloc_trace+0x2d3/0x4f0
[    2.741138] hardirqs last disabled at (1862459):
[    2.741140] [<ffffffffa939e4dc>] kmem_cache_alloc+0x8c/0x4f0
[    2.741141] softirqs last  enabled at (1862454):
[    2.741144] [<ffffffffa9ee667b>] ipv6_mc_up+0x5b/0x80
[    2.741145] softirqs last disabled at (1862456):
[    2.741147] [<ffffffffa9ea56ef>] ipv6_add_addr+0x9f/0xab0
[    2.741149] CPU: 2 PID: 1 Comm: systemd Not tainted 4.9.0-rc7-next-20161129-dirty #361
[    2.741150] Hardware name: Dell Inc. Latitude E6530/07Y85M, BIOS A17 08/19/2015
[    2.741151] Call Trace:
[    2.741154]  dump_stack+0x7b/0xd1
[    2.741157]  ___might_sleep+0x194/0x300
[    2.741159]  __alloc_pages_nodemask+0x13f/0x730
[    2.741162]  cache_alloc_refill+0x184/0x12e0
[    2.741165]  kmem_cache_alloc+0xef/0x4f0
[    2.741168]  dst_alloc+0x5f/0xf0
[    2.741171]  __ip6_dst_alloc+0x36/0xd0
[    2.741174]  ip6_dst_alloc+0x19/0x150
[    2.741176]  addrconf_dst_alloc+0x78/0x1c0
[    2.741179]  ipv6_add_addr+0x2d9/0xab0
[    2.741181]  ? ipv6_add_addr+0x9f/0xab0
[    2.741183]  ? trace_hardirqs_on_caller+0x1ab/0x2c0
[    2.741187]  add_addr+0x36/0x110
[    2.741190]  addrconf_notify+0x8c4/0x1230
[    2.741192]  ? fib_add_ifaddr+0x110/0x1b0
[    2.741195]  raw_notifier_call_chain+0x66/0xd0
[    2.741199]  call_netdevice_notifiers_info+0x73/0x90
[    2.741201]  __dev_notify_flags+0x8f/0xf0
[    2.741204]  ? __dev_change_flags+0xc3/0x1b0
[    2.741207]  dev_change_flags+0x62/0x90
[    2.741209]  do_setlink+0x3b5/0x1860
[    2.741212]  ? avc_has_perm_noaudit+0x1d9/0x330
[    2.741214]  ? preempt_count_sub+0x4a/0x90
[    2.741217]  ? avc_has_perm_noaudit+0x59/0x330
[    2.741221]  ? nla_parse+0x143/0x1c0
[    2.741223]  rtnl_setlink+0x118/0x1a0
[    2.741228]  ? do_setlink+0x1860/0x1860
[    2.741231]  rtnetlink_rcv_msg+0xfa/0x630
[    2.741233]  ? mutex_lock_nested+0x109/0x9f0
[    2.741235]  ? rtnetlink_rcv+0x1b/0x40
[    2.741237]  ? netlink_deliver_tap+0x5/0x4e0
[    2.741240]  ? rtnl_newlink+0xbe0/0xbe0
[    2.741242]  netlink_rcv_skb+0x87/0xc0
[    2.741245]  rtnetlink_rcv+0x2a/0x40
[    2.741247]  netlink_unicast+0x1e7/0x300
[    2.741249]  netlink_sendmsg+0x402/0x670
[    2.741252]  sock_sendmsg+0x5b/0xd0
[    2.741255]  SYSC_sendto+0x156/0x1f0
[    2.741257]  ? netlink_getsockopt+0x2f9/0x3d0
[    2.741260]  ? entry_SYSCALL_64_fastpath+0x5/0xad
[    2.741262]  ? trace_hardirqs_on_caller+0x1ab/0x2c0
[    2.741264]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[    2.741267]  SyS_sendto+0xe/0x10
[    2.741269]  entry_SYSCALL_64_fastpath+0x18/0xad
[    2.741271] RIP: 0033:0x7fc497fffa73
[    2.741273] RSP: 002b:00007ffdfa702568 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
[    2.741275] RAX: ffffffffffffffda RBX: 0000000000000046 RCX: 00007fc497fffa73
[    2.741277] RDX: 0000000000000020 RSI: 0000560eb87f9680 RDI: 0000000000000004
[    2.741278] RBP: 00007ffdfa702628 R08: 00007ffdfa702570 R09: 0000000000000010
[    2.741279] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffdfa7029f8
[    2.741281] R13: 00007ffdfa7026f8 R14: 0000000000000001 R15: 00000000002414e3


Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ