lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20080224222035.M62480@visp.net.lb>
Date:	Mon, 25 Feb 2008 00:20:35 +0200
From:	"Denys Fedoryshchenko" <denys@...p.net.lb>
To:	netdev@...r.kernel.org
Subject: circular locking, mirred, 2.6.24.2

2.6.24.2 with applied patches for printk,softlockup, and patch for htb (as i 
understand, they are in 2.6.25 git and it is fixes).

I will send also to private mails QoS rules i am using.

[  118.840072] =======================================================
[  118.840158] [ INFO: possible circular locking dependency detected ]
[  118.840203] 2.6.24.2-build-0022 #7
[  118.840243] -------------------------------------------------------
[  118.840288] swapper/0 is trying to acquire lock:
[  118.840329]  (&dev->queue_lock){-+..}, at: [<c0289c11>] dev_queue_xmit
+0x177/0x302
[  118.840490]
[  118.840490] but task is already holding lock:
[  118.840567]  (&p->tcfc_lock){-+..}, at: [<f89f0066>] tcf_mirred+0x20/0x180 
[act_mirred]
[  118.840727]
[  118.840727] which lock already depends on the new lock.
[  118.840728]
[  118.840842]
[  118.840842] the existing dependency chain (in reverse order) is:
[  118.840921]
[  118.840921] -> #2 (&p->tcfc_lock){-+..}:
[  118.841075]        [<c0143624>] __lock_acquire+0xa30/0xc19
[  118.841324]        [<c0143887>] lock_acquire+0x7a/0x94
[  118.841572]        [<c02d93f5>] _spin_lock+0x2e/0x58
[  118.841820]        [<f89f0066>] tcf_mirred+0x20/0x180 [act_mirred]
[  118.842068]        [<c0297ec4>] tcf_action_exec+0x44/0x77
[  118.842344]        [<f89ba5d2>] u32_classify+0x119/0x24a [cls_u32]
[  118.842595]        [<c0295ce2>] tc_classify_compat+0x2f/0x5e
[  118.842845]        [<c0295ec3>] tc_classify+0x1a/0x80
[  118.843092]        [<f899c118>] ingress_enqueue+0x1a/0x53 [sch_ingress]
[  118.843343]        [<c0287139>] netif_receive_skb+0x296/0x44c
[  118.843592]        [<f88d1a4e>] e100_poll+0x14b/0x26a [e100]
[  118.843843]        [<c02894bc>] net_rx_action+0xbf/0x201
[  118.844091]        [<c012ac15>] __do_softirq+0x6f/0xe9
[  118.844343]        [<c01078af>] do_softirq+0x61/0xc8
[  118.844591]        [<ffffffff>] 0xffffffff
[  118.844840]
[  118.844840] -> #1 (&dev->ingress_lock){-+..}:
[  118.844993]        [<c0143624>] __lock_acquire+0xa30/0xc19
[  118.845242]        [<c0143887>] lock_acquire+0x7a/0x94
[  118.845489]        [<c02d93f5>] _spin_lock+0x2e/0x58
[  118.845737]        [<c0295387>] qdisc_lock_tree+0x1e/0x21
[  118.845984]        [<c02953b6>] dev_init_scheduler+0xb/0x53
[  118.846235]        [<c0288483>] register_netdevice+0x2a3/0x2fd
[  118.846483]        [<c028850f>] register_netdev+0x32/0x3f
[  118.846730]        [<c03ea8ee>] loopback_net_init+0x39/0x6c
[  118.846980]        [<c02858ef>] register_pernet_operations+0x13/0x15
[  118.847230]        [<c0285958>] register_pernet_device+0x1f/0x4c
[  118.847478]        [<c03ea8b3>] loopback_init+0xd/0xf
[  118.847725]        [<c03d64df>] kernel_init+0x155/0x2c6
[  118.847973]        [<c0105bab>] kernel_thread_helper+0x7/0x10
[  118.848225]        [<ffffffff>] 0xffffffff
[  118.848472]
[  118.848472] -> #0 (&dev->queue_lock){-+..}:
[  118.848626]        [<c0143514>] __lock_acquire+0x920/0xc19
[  118.848874]        [<c0143887>] lock_acquire+0x7a/0x94
[  118.849122]        [<c02d93f5>] _spin_lock+0x2e/0x58
[  118.849370]        [<c0289c11>] dev_queue_xmit+0x177/0x302
[  118.849617]        [<f89f01a5>] tcf_mirred+0x15f/0x180 [act_mirred]
[  118.849866]        [<c0297ec4>] tcf_action_exec+0x44/0x77
[  118.850114]        [<f89ba5d2>] u32_classify+0x119/0x24a [cls_u32]
[  118.850366]        [<c0295ce2>] tc_classify_compat+0x2f/0x5e
[  118.850614]        [<c0295ec3>] tc_classify+0x1a/0x80
[  118.850861]        [<f899c118>] ingress_enqueue+0x1a/0x53 [sch_ingress]
[  118.851111]        [<c0287139>] netif_receive_skb+0x296/0x44c
[  118.851360]        [<f88d1a4e>] e100_poll+0x14b/0x26a [e100]
[  118.851612]        [<c02894bc>] net_rx_action+0xbf/0x201
[  118.851859]        [<c012ac15>] __do_softirq+0x6f/0xe9
[  118.852106]        [<c01078af>] do_softirq+0x61/0xc8
[  118.852355]        [<ffffffff>] 0xffffffff
[  118.852602]
[  118.852602] other info that might help us debug this:
[  118.852603]
[  118.852716] 5 locks held by swapper/0:
[  118.852756]  #0:  (rcu_read_lock){..--}, at: [<c028944d>] net_rx_action
+0x50/0x201
[  118.852940]  #1:  (rcu_read_lock){..--}, at: [<c0286f99>] netif_receive_skb
+0xf6/0x44c
[  118.853123]  #2:  (&dev->ingress_lock){-+..}, at: [<c0287125>] 
netif_receive_skb+0x282/0x44c
[  118.853309]  #3:  (&p->tcfc_lock){-+..}, at: [<f89f0066>] tcf_mirred
+0x20/0x180 [act_mirred]
[  118.853493]  #4:  (rcu_read_lock){..--}, at: [<c0289bb7>] dev_queue_xmit
+0x11d/0x302
[  118.853677]
[  118.853677] stack backtrace:
[  118.853753] Pid: 0, comm: swapper Not tainted 2.6.24.2-build-0022 #7
[  118.853796]  [<c0105f2a>] show_trace_log_lvl+0x1a/0x2f
[  118.853865]  [<c0106843>] show_trace+0x12/0x14
[  118.853932]  [<c010713a>] dump_stack+0x6c/0x72
[  118.853999]  [<c01416f4>] print_circular_bug_tail+0x5f/0x68
[  118.854068]  [<c0143514>] __lock_acquire+0x920/0xc19
[  118.854135]  [<c0143887>] lock_acquire+0x7a/0x94
[  118.854205]  [<c02d93f5>] _spin_lock+0x2e/0x58
[  118.854272]  [<c0289c11>] dev_queue_xmit+0x177/0x302
[  118.854340]  [<f89f01a5>] tcf_mirred+0x15f/0x180 [act_mirred]
[  118.854409]  [<c0297ec4>] tcf_action_exec+0x44/0x77
[  118.854477]  [<f89ba5d2>] u32_classify+0x119/0x24a [cls_u32]
[  118.854547]  [<c0295ce2>] tc_classify_compat+0x2f/0x5e
[  118.854615]  [<c0295ec3>] tc_classify+0x1a/0x80
[  118.854682]  [<f899c118>] ingress_enqueue+0x1a/0x53 [sch_ingress]
[  118.854752]  [<c0287139>] netif_receive_skb+0x296/0x44c
[  118.854820]  [<f88d1a4e>] e100_poll+0x14b/0x26a [e100]
[  118.854890]  [<c02894bc>] net_rx_action+0xbf/0x201
[  118.854958]  [<c012ac15>] __do_softirq+0x6f/0xe9
[  118.855025]  [<c01078af>] do_softirq+0x61/0xc8


--
Denys Fedoryshchenko
Technical Manager
Virtual ISP S.A.L.

--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ