lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:   Fri, 30 Jul 2021 14:56:24 +0200
From:   Bruno Goncalves <bgoncalv@...hat.com>
To:     netdev@...r.kernel.org
Cc:     CKI Project <cki-project@...hat.com>
Subject: BUG: MAX_LOCKDEP_ENTRIES too low! during network test

Hello,

We've hit the call trace below twice during our tests of kernel
5.14.0-rc2. We hit it during CKI test [1], in both cases it was
testing on ppc64le, more logs on [2].

[14100.944491] BUG: MAX_LOCKDEP_ENTRIES too low!
[14100.944651] turning off the locking correctness validator.
[14100.944739] CPU: 121 PID: 430464 Comm: socket Tainted: G
OE     5.14.0-rc2 #1
[14100.944764] Call Trace:
[14100.944775] [c00000003a92f4f0] [c00000000097d4f4]
dump_stack_lvl+0x98/0xe0 (unreliable)
[14100.944979] [c00000003a92f530] [c0000000002076d8]
add_lock_to_list.constprop.0+0x218/0x230
[14100.945007] [c00000003a92f5a0] [c00000000020e1bc]
__lock_acquire+0x1d6c/0x2850
[14100.945033] [c00000003a92f6d0] [c00000000020f80c] lock_acquire+0x11c/0x450
[14100.945057] [c00000003a92f7d0] [c0000000011f0cdc]
_raw_spin_lock_irqsave+0x6c/0xc0
[14100.945084] [c00000003a92f810] [c00000000095f42c]
percpu_counter_add_batch+0x5c/0x120
[14100.945109] [c00000003a92f850] [c000000000fb9534]
tcp_v4_destroy_sock+0x1d4/0x3b0
[14100.945136] [c00000003a92f8a0] [c000000000f89c5c]
inet_csk_destroy_sock+0x8c/0x1f0
[14100.945162] [c00000003a92f8d0] [c000000000f9762c] __tcp_close+0x50c/0x680
[14100.945185] [c00000003a92f930] [c000000000f977e4] tcp_close+0x44/0x100
[14100.945329] [c00000003a92f960] [c000000000fed488] inet_release+0x78/0xf0
[14100.945387] [c00000003a92f990] [c000000000e24f40] __sock_release+0x70/0x150
[14100.945412] [c00000003a92fa10] [c000000000e25048] sock_close+0x28/0x40
[14100.945434] [c00000003a92fa30] [c0000000005877f8] __fput+0xd8/0x360
[14100.945457] [c00000003a92fa80] [c0000000001944f4] task_work_run+0xb4/0x120
[14100.945478] [c00000003a92fad0] [c000000000163408] do_exit+0x4e8/0xdd0
[14100.945500] [c00000003a92fb90] [c000000000163dc0] do_group_exit+0x60/0xd0
[14100.945523] [c00000003a92fbd0] [c000000000179d38] get_signal+0x238/0xc00
[14100.945546] [c00000003a92fcb0] [c0000000000229f4]
do_notify_resume+0x114/0x4b0
[14100.945572] [c00000003a92fd70] [c00000000002dc64]
interrupt_exit_user_prepare_main+0x2e4/0x370
[14100.945600] [c00000003a92fde0] [c00000000002e0a4]
syscall_exit_prepare+0xc4/0x1c0
[14100.945625] [c00000003a92fe10] [c00000000000c770]
system_call_common+0x100/0x258
[14100.945651] --- interrupt: c00 at 0x7fffa8a59904
[14100.945670] NIP:  00007fffa8a59904 LR: 0000000010001e44 CTR: 0000000000000000
[14100.945692] REGS: c00000003a92fe80 TRAP: 0c00   Tainted: G
 OE      (5.14.0-rc2)
[14100.945715] MSR:  900000000000f033 <SF,HV,EE,PR,FP,ME,IR,DR,RI,LE>
CR: 38002842  XER: 00000000
[14100.945908] IRQMASK: 0
               GPR00: 0000000000000146 00007fffd5d1a870
00007fffa8b56f00 0000000000000061
               GPR04: 0000000000000007 0000000000000000
00007fffa8b50018 000000019f9f6bb0
               GPR08: 0000000000000007 0000000000000000
0000000000000000 0000000000000000
               GPR12: 0000000000000000 00007fffa8c0a360
0000000000000000 0000000000000000
               GPR16: 0000000000000000 0000000000000000
0000000000000000 0000000000000000
               GPR20: 0000000000000000 0000000000000000
0000000000000000 0000000000000000
               GPR24: 0000000010001978 00007fffd5d1ad68
000000001001fd08 00007fffa8bfeb68
               GPR28: 00007fffd5d1b038 00007fffd5d1ad48
0000000000000003 00007fffd5d1a870
[14100.946264] NIP [00007fffa8a59904] 0x7fffa8a59904
[14100.946289] LR [0000000010001e44] 0x10001e44
[14100.946306] --- interrupt: c00


[1] https://gitlab.com/cki-project/kernel-tests/-/tree/main/networking/route/pmtu
[2] https://arr-cki-prod-datawarehouse-public.s3.amazonaws.com/index.html?prefix=datawarehouse-public/2021/07/25/342571554/build_ppc64le_redhat%3A1450600800/tests/Networking_route_pmtu/

Thank you,
Bruno

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ