lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Tue, 5 May 2020 12:10:22 -0400
From:   "Michael S. Tsirkin" <mst@...hat.com>
To:     Thomas Gleixner <tglx@...utronix.de>
Cc:     netdev@...r.kernel.org, Jason Wang <jasowang@...hat.com>
Subject: Re: [BUG] Inconsistent lock state in virtnet poll

On Tue, May 05, 2020 at 02:08:56PM +0200, Thomas Gleixner wrote:
> 
> The following lockdep splat happens reproducibly on 5.7-rc4
> 
> Thanks,
> 
>         tglx
> 
> ================================
> WARNING: inconsistent lock state
> 5.7.0-rc4+ #79 Not tainted
> --------------------------------
> inconsistent {SOFTIRQ-ON-W} -> {IN-SOFTIRQ-W} usage.
> ip/356 [HC0[0]:SC1[1]:HE1:SE0] takes:
> f3ee4cd8 (&syncp->seq#2){+.?.}-{0:0}, at: net_rx_action+0xfb/0x390
> {SOFTIRQ-ON-W} state was registered at:
>   lock_acquire+0x82/0x300
>   try_fill_recv+0x39f/0x590

Weird. Where does try_fill_recv acquire any locks?


>   virtnet_open+0xe0/0x180
>   __dev_open+0xbe/0x160
>   __dev_change_flags+0x152/0x1b0
>   dev_change_flags+0x23/0x60
>   do_setlink+0x814/0xa30
>   __rtnl_newlink+0x583/0x8e0
>   rtnl_newlink+0x36/0x60
>   rtnetlink_rcv_msg+0x139/0x470
>   netlink_rcv_skb+0x6a/0xe0
>   rtnetlink_rcv+0xd/0x10
>   netlink_unicast+0x175/0x250
>   netlink_sendmsg+0x263/0x440
>   sock_sendmsg+0x5c/0x60
>   ____sys_sendmsg+0x182/0x1d0
>   ___sys_sendmsg+0x59/0x90
>   __sys_sendmsg+0x39/0x80
>   __ia32_sys_socketcall+0x2d2/0x330
>   do_fast_syscall_32+0x82/0x340
>   entry_SYSENTER_32+0xaa/0x102
> irq event stamp: 2276
> hardirqs last  enabled at (2276): [<c18e419e>] net_rx_action+0x7e/0x390
> hardirqs last disabled at (2275): [<c18e4178>] net_rx_action+0x58/0x390
> softirqs last  enabled at (2272): [<c16f87ee>] virtnet_napi_enable+0xe/0x50
> softirqs last disabled at (2273): [<c101fb10>] call_on_stack+0x40/0x50
> 
> other info that might help us debug this:
>  Possible unsafe locking scenario:
> 
>        CPU0
>        ----
>   lock(&syncp->seq#2);
>   <Interrupt>
>     lock(&syncp->seq#2);
> 
>  *** DEADLOCK ***
> 
> 1 lock held by ip/356:
>  #0: c20a4a38 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x118/0x470
> 
> stack backtrace:
> CPU: 2 PID: 356 Comm: ip Not tainted 5.7.0-rc4+ #79
> Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
> Call Trace:
>  <SOFTIRQ>
>  dump_stack+0x6e/0x9e
>  print_usage_bug.cold+0x15a/0x162
>  mark_lock+0x58d/0x6e0
>  ? check_usage_backwards+0x180/0x180
>  __lock_acquire+0xdd7/0x24f0
>  ? select_task_rq_fair+0xbb/0xfe0
>  ? __lock_acquire+0x35f/0x24f0
>  ? __lock_acquire+0x35f/0x24f0
>  ? __lock_acquire+0x35f/0x24f0
>  lock_acquire+0x82/0x300
>  ? net_rx_action+0xfb/0x390
>  ? find_held_lock+0x24/0x80
>  ? lock_release+0x8a/0x260
>  ? virtnet_poll+0xd0/0x3d9
>  virtnet_poll+0x1d3/0x3d9
>  ? net_rx_action+0xfb/0x390
>  ? trace_hardirqs_on+0x4a/0xf0
>  net_rx_action+0xfb/0x390
>  ? __do_softirq+0x84/0x3ca
>  ? virtnet_napi_enable+0xe/0x50
>  __do_softirq+0xb1/0x3ca
>  ? virtnet_napi_enable+0xe/0x50
>  ? __irqentry_text_end+0x8/0x8
>  call_on_stack+0x40/0x50
>  </SOFTIRQ>
>  ? do_softirq.part.0+0x4e/0x50
>  ? __local_bh_enable_ip+0xd1/0xe0
>  ? virtnet_napi_enable+0x41/0x50
>  ? virtnet_open+0x7f/0x180
>  ? __dev_open+0xbe/0x160
>  ? __dev_change_flags+0x152/0x1b0
>  ? dev_change_flags+0x23/0x60
>  ? do_setlink+0x814/0xa30
>  ? __lock_acquire+0x35f/0x24f0
>  ? __nla_parse+0x1c/0x30
>  ? __rtnl_newlink+0x583/0x8e0
>  ? lock_acquire+0x82/0x300
>  ? handle_mm_fault+0x6e6/0xa10
>  ? find_held_lock+0x24/0x80
>  ? __lock_acquire+0x35f/0x24f0
>  ? lock_acquire+0x82/0x300
>  ? __lock_acquire+0x35f/0x24f0
>  ? rtnl_newlink+0x23/0x60
>  ? rcu_read_lock_sched_held+0x3f/0x70
>  ? kmem_cache_alloc_trace+0x235/0x260
>  ? rtnl_newlink+0x36/0x60
>  ? __rtnl_newlink+0x8e0/0x8e0
>  ? rtnetlink_rcv_msg+0x139/0x470
>  ? netlink_deliver_tap+0x81/0x3a0
>  ? find_held_lock+0x24/0x80
>  ? rtnl_bridge_getlink+0x240/0x240
>  ? netlink_rcv_skb+0x6a/0xe0
>  ? rtnl_bridge_getlink+0x240/0x240
>  ? rtnetlink_rcv+0xd/0x10
>  ? netlink_unicast+0x175/0x250
>  ? netlink_sendmsg+0x263/0x440
>  ? netlink_unicast+0x250/0x250
>  ? sock_sendmsg+0x5c/0x60
>  ? ____sys_sendmsg+0x182/0x1d0
>  ? ___sys_sendmsg+0x59/0x90
>  ? lock_acquire+0x82/0x300
>  ? __might_fault+0x39/0x80
>  ? __sys_sendmsg+0x39/0x80
>  ? __ia32_sys_socketcall+0x2d2/0x330
>  ? do_fast_syscall_32+0x82/0x340
>  ? entry_SYSENTER_32+0xaa/0x102

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ