lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 12 Jan 2015 22:49:22 -0800 From: Michael Chan <mchan@...adcom.com> To: Peter Hurley <peter@...leysoftware.com> CC: Prashant Sreedharan <prashant@...adcom.com>, <netdev@...r.kernel.org>, Linux kernel <linux-kernel@...r.kernel.org> Subject: Re: [3.19-rc3] tg3: BUG: sleeping function called from invalid context On Mon, 2015-01-12 at 19:59 -0500, Peter Hurley wrote: > [ 17.203009] BUG: sleeping function called from invalid context at /home/peter/src/kernels/mainline/kernel/irq/manage.c:104 > [ 17.203067] in_atomic(): 1, irqs_disabled(): 0, pid: 1106, name: ip > [ 17.203092] 2 locks held by ip/1106: > [ 17.205255] #0: (rtnl_mutex){+.+.+.}, at: [<ffffffff816adf1f>] rtnetlink_rcv+0x1f/0x40 > [ 17.207445] #1: (&(&tp->lock)->rlock){+.....}, at: [<ffffffffa01073e6>] tg3_start+0xc06/0x11f0 [tg3] > [ 17.209725] CPU: 2 PID: 1106 Comm: ip Not tainted 3.19.0-rc3+wip-xeon+lockdep #rc3+wip > [ 17.211900] Hardware name: Dell Inc. Precision WorkStation T5400 /0RW203, BIOS A11 04/30/2012 > [ 17.214086] 0000000000000068 ffff8802ac823498 ffffffff817af7e8 0000000000000005 > [ 17.216265] ffffffff81a9be78 ffff8802ac8234a8 ffffffff810998a5 ffff8802ac8234d8 > [ 17.218446] ffffffff8109991a ffff8802ac8234c8 ffff8802af0aae00 ffffffffa00ed000 > [ 17.220636] Call Trace: > [ 17.222743] [<ffffffff817af7e8>] dump_stack+0x4f/0x7b > [ 17.224808] [<ffffffff810998a5>] ___might_sleep+0x105/0x140 > [ 17.226842] [<ffffffff8109991a>] __might_sleep+0x3a/0xa0 > [ 17.228869] [<ffffffffa00ed000>] ? 0xffffffffa00ed000 > [ 17.230939] [<ffffffff810d7d78>] synchronize_irq+0x38/0xa0 > [ 17.232967] [<ffffffffa00ed000>] ? 0xffffffffa00ed000 > [ 17.234991] [<ffffffffa010105f>] tg3_chip_reset+0x13f/0x9c0 [tg3] > [ 17.236988] [<ffffffffa01020ae>] tg3_reset_hw+0x7e/0x2d20 [tg3] tp->lock is held in this code path. If synchronize_irq() sleeps in wait_event(desc->wait_for_threads, ...), we'll get the warning. The synchronize_irq() call is to wait for any tg3 irq handler to finish so that it is guaranteed that next time it will see the CHIP_RESETTING flag and do nothing. Not sure if we can drop the tp->lock before we call synchronize_irq() and then take it again after synchronize_irq(). -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists