lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20171025161750.GC3294@yexl-desktop>
Date:   Thu, 26 Oct 2017 00:17:50 +0800
From:   kernel test robot <xiaolong.ye@...el.com>
To:     Eric Dumazet <edumazet@...gle.com>
Cc:     "David S. Miller" <davem@...emloft.net>,
        LKML <linux-kernel@...r.kernel.org>, netdev@...r.kernel.org,
        lkp@...org
Subject: [lkp-robot] [tcp/dccp]  a6ca7abe53: WARNING:suspicious_RCU_usage


FYI, we noticed the following commit (built with gcc-6):

commit: a6ca7abe53633d08eea1c6756cb49c9b2d4c90bf ("tcp/dccp: fix lockdep splat in inet_csk_route_req()")
https://git.kernel.org/cgit/linux/kernel/git/davem/net.git master

in testcase: iperf
with following parameters:

	runtime: 300s
	cluster: cs-localhost
	protocol: tcp

test-description: iperf is a tool for active measurements of the maximum achievable bandwidth on IP networks.
test-url: https://iperf.fr/


on test machine: qemu-system-x86_64 -enable-kvm -cpu kvm64,+ssse3 -m 1G

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):


+------------------------------------------------------------------------------+------------+------------+
|                                                                              | 3a91d29f20 | a6ca7abe53 |
+------------------------------------------------------------------------------+------------+------------+
| boot_successes                                                               | 4          | 2          |
| boot_failures                                                                | 4          | 4          |
| BUG:kernel_reboot-without-warning_in_test_stage                              | 4          |            |
| WARNING:suspicious_RCU_usage                                                 | 0          | 4          |
| net/ipv4/inet_connection_sock.c:#suspicious_rcu_dereference_protected()usage | 0          | 4          |
+------------------------------------------------------------------------------+------------+------------+



[  476.033425] WARNING: suspicious RCU usage
[  476.046189] 4.14.0-rc5-00265-ga6ca7ab #22 Not tainted
[  476.058434] -----------------------------
[  476.068549] net/ipv4/inet_connection_sock.c:547 suspicious rcu_dereference_protected() usage!
[  476.091235] 
[  476.091235] other info that might help us debug this:
[  476.091235] 
[  476.110380] 
[  476.110380] rcu_scheduler_active = 2, debug_locks = 1
[  476.126003] 4 locks held by iperf3/4672:
[  476.135343]  #0:  (sk_lock-AF_INET){+.+.}, at: [<ffffffffb1d54f01>] lock_sock+0xb/0xd
[  476.153481]  #1:  (rcu_read_lock){....}, at: [<ffffffffb1d23c0b>] rcu_lock_acquire+0x0/0x20
[  476.172571]  #2:  (rcu_read_lock){....}, at: [<ffffffffb1c49d8e>] rcu_lock_acquire+0x0/0x20
[  476.191726]  #3:  (rcu_read_lock){....}, at: [<ffffffffb1d20cf1>] rcu_read_lock+0x0/0x68
[  476.210386] 
[  476.210386] stack backtrace:
[  476.221700] CPU: 0 PID: 4672 Comm: iperf3 Not tainted 4.14.0-rc5-00265-ga6ca7ab #22
[  476.239227] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014
[  476.257892] Call Trace:
[  476.264575]  <IRQ>
[  476.270468]  dump_stack+0x82/0xb8
[  476.278802]  lockdep_rcu_suspicious+0xea/0xf3
[  476.289295]  inet_csk_route_req+0x60/0x181
[  476.299213]  ? kvm_sched_clock_read+0x9/0x12
[  476.309352]  tcp_v4_route_req+0xe/0x10
[  476.445889]  tcp_conn_request+0x3da/0x764
[  476.455738]  ? __local_bh_enable_ip+0x88/0x92
[  476.466143]  ? kvm_clock_read+0x25/0x2e
[  476.475541]  tcp_v4_conn_request+0x40/0x51
[  476.485517]  ? tcp_v4_conn_request+0x40/0x51
[  476.495693]  tcp_v6_conn_request+0x1d/0x62
[  476.505482]  tcp_rcv_state_process+0x98/0xab6
[  476.515847]  ? sk_filter_trim_cap+0x2f8/0x30a
[  476.526379]  tcp_v4_do_rcv+0x124/0x172
[  476.535393]  ? tcp_v4_do_rcv+0x124/0x172
[  476.545010]  tcp_v4_rcv+0x4a7/0x795
[  476.553826]  ip_local_deliver_finish+0x121/0x19e
[  476.564754]  ip_local_deliver+0x63/0x7f
[  476.574149]  ip_rcv_finish+0x310/0x390
[  476.583509]  ip_rcv+0x2c3/0x2f8
[  476.591646]  __netif_receive_skb_core+0x3ee/0x6e9
[  476.602634]  ? lock_acquire+0x125/0x1be
[  476.612029]  ? lock_acquire+0x145/0x1be
[  476.621459]  __netif_receive_skb+0x59/0x5e
[  476.631310]  ? __netif_receive_skb+0x59/0x5e
[  476.641775]  process_backlog+0xa9/0x150
[  476.651173]  net_rx_action+0x100/0x260
[  476.660539]  __do_softirq+0x1a7/0x40e
[  476.669644]  ? rcu_read_unlock_bh+0x3e/0x69
[  476.679596]  do_softirq_own_stack+0x2a/0x40
[  476.689678]  </IRQ>
[  476.695735]  do_softirq+0x74/0x79
[  476.704101]  __local_bh_enable_ip+0x7c/0x92
[  476.714270]  rcu_read_unlock_bh+0x67/0x69
[  476.724031]  ip_finish_output2+0x3fb/0x427
[  476.739685]  ip_finish_output+0x12c/0x13c
[  476.748563]  ? ip_finish_output+0x12c/0x13c
[  476.758511]  ip_output+0x5c/0x8c
[  476.766810]  dst_output+0x2b/0x30
[  476.773713]  ip_local_out+0x2f/0x36
[  476.781977]  ip_queue_xmit+0x2ec/0x328
[  476.791277]  tcp_transmit_skb+0x740/0x791
[  476.799766]  tcp_connect+0x624/0x6b7
[  476.808026]  tcp_v4_connect+0x463/0x4ab
[  476.817433]  __inet_stream_connect+0xb8/0x2a7
[  476.826175]  ? __local_bh_enable_ip+0x8d/0x92
[  476.835540]  ? lock_sock_nested+0x8f/0x9a
[  476.845268]  inet_stream_connect+0x39/0x4d
[  476.853434]  SYSC_connect+0x87/0xb1
[  476.861498]  ? entry_SYSCALL_64_fastpath+0x5/0xbe
[  476.872519]  ? trace_hardirqs_on_caller+0x179/0x195
[  476.883081]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  476.893774]  SyS_connect+0xe/0x10
[  476.902200]  entry_SYSCALL_64_fastpath+0x1f/0xbe
[  476.912729] RIP: 0033:0x7faa9754ff20
[  476.921286] RSP: 002b:00007ffe5ad38c38 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
[  476.937852] RAX: ffffffffffffffda RBX: ffffffffb0128e85 RCX: 00007faa9754ff20
[  476.952823] RDX: 0000000000000010 RSI: 00005625f5f0f800 RDI: 0000000000000004
[  476.968311] RBP: ffffb53882e97f98 R08: 0000000000000003 R09: 0000000000005114
[  476.983472] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000046
[  476.998442] R13: 00007ffe5ad388b2 R14: 00007ffe5ad388b0 R15: 00005625f5f0f438
[  477.013579]  ? trace_hardirqs_off_caller+0x3f/0xa1
[  479.316420] /lkp/lkp/src/tests/iperf: 18: /lkp/lkp/src/tests/iperf: cannot create /inn/result/iperf/300s-cs-localhost-tcp/vm-lkp-wsx03-1G/debian-x86_64-2016-08-31.cgz/x86_64-allyesdebian/gcc-6/a6ca7abe53633d08eea1c6756cb49c9b2d4c90bf/0/reproduce.sh: Input/output error
[  479.316514] 
[  780.487290] {
[  780.487358] 
[  780.597209] 	"start":	{
[  780.597250] 
[  780.737957] 		"connected":	[{
[  780.738084] 
[  780.954129] 				"socket":	5,
[  780.954196] 
[  781.075201] 				"local_host":	"127.0.0.1",
[  781.075269] 
[  781.231436] 				"local_port":	53606,
[  781.231503] 
[  781.474725] 				"remote_host":	"127.0.0.1",
[  781.474793] 
[  781.685930] 				"remote_port":	5201
[  781.685998] 
[  781.851007] 			}],


To reproduce:

        git clone https://github.com/intel/lkp-tests.git
        cd lkp-tests
        bin/lkp qemu -k <bzImage> job-script  # job-script is attached in this email



Thanks,
Xiaolong

View attachment "config-4.14.0-rc5-00265-ga6ca7ab" of type "text/plain" (162996 bytes)

View attachment "job-script" of type "text/plain" (6725 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (38764 bytes)

View attachment "iperf" of type "text/plain" (144107 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ