Received: by 10.213.65.68 with SMTP id h4csp1602228imn; Mon, 26 Mar 2018 10:40:13 -0700 (PDT) X-Google-Smtp-Source: AG47ELsl9NrbQIGVJ7vGKd7UUpgQPNj4nz799OZYS5aeyOJyYn4tfKQiRr2kk+Kx2eiqRarfzFMa X-Received: by 2002:a17:902:2c83:: with SMTP id n3-v6mr30433205plb.140.1522086013531; Mon, 26 Mar 2018 10:40:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1522086013; cv=none; d=google.com; s=arc-20160816; b=dTMUvbxts0fgep7S9ZOYds9kjGOxsI+zzLchKYGBKndfrnzPLnMGYKlL0L8DUsoLj3 8LfKxqBy2D3VL+663kqBuswgkc60HOLo4jtux1hEEI1+nzUqIN0RozrZSds0PUIfcRzT SMKTPkFmFSGMSXtBQ0kS8kz8skmacxfb5iK6trGPcOYOj/d3W4RwJL7aii9ydnImca3S Onsbk+7W6E59c7SqcTbpUQ6LvoGGbdMsS7DoBaMUwOmUEuTmVFCGawtauYZ9DOHlvy85 1T2Y7QeBljwJMUkvEqyv6VnnKSlM1/q/MG1r5IvH4fb6QYzWaX/83CdinGbxbsnZV7qj X08g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=1ZtZLRi/wIMqMAkUQfUTgFyw+Rc6yk+2slY1RCLNksU=; b=b+MqxoEIIdQE0rCMMnDh8yMotU7B/cqYevrUND7FCwH6n2Di7/JOwDZSeA1hKcq/o2 BVn5g2Bira/6LsSAWx/tYc/Inqx0jAMD5OGKInFr1cvM3kL3ni7ffSZH54R9P0LlQAiY sW+ldqEHcJewnB8iWwdx6oX5m5hVistHFv63LE/D38ZYlu05+/lkMazdQX6eWKNcjySP krzzNdKtQzc0mK3AaCY5y7QfEicxm+GjCyRjTsQApUSB8pP34sc4Sq9aR2yWBUKt47ve Z92akXnkD/VmakanpZx0xyO8SIcLAygmG3VdwvIyWCVtcJ/3+P4u67MluNOrZfvjSt2+ IHaw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u91-v6si15293773plb.698.2018.03.26.10.39.57; Mon, 26 Mar 2018 10:40:13 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752635AbeCZRjB (ORCPT + 99 others); Mon, 26 Mar 2018 13:39:01 -0400 Received: from zimbra.alphalink.fr ([217.15.80.77]:54183 "EHLO zimbra.alphalink.fr" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751684AbeCZRi7 (ORCPT ); Mon, 26 Mar 2018 13:38:59 -0400 Received: from localhost (localhost [127.0.0.1]) by mail-2-cbv2.admin.alphalink.fr (Postfix) with ESMTP id 9E6D42B52005; Mon, 26 Mar 2018 19:38:57 +0200 (CEST) Received: from zimbra.alphalink.fr ([127.0.0.1]) by localhost (mail-2-cbv2.admin.alphalink.fr [127.0.0.1]) (amavisd-new, port 10032) with ESMTP id hQvdW7m9VATu; Mon, 26 Mar 2018 19:38:55 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by mail-2-cbv2.admin.alphalink.fr (Postfix) with ESMTP id 9ADBD2B52057; Mon, 26 Mar 2018 19:38:55 +0200 (CEST) X-Virus-Scanned: amavisd-new at mail-2-cbv2.admin.alphalink.fr Received: from zimbra.alphalink.fr ([127.0.0.1]) by localhost (mail-2-cbv2.admin.alphalink.fr [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id qTYbgpNLheRR; Mon, 26 Mar 2018 19:38:55 +0200 (CEST) Received: from c-dev-0.admin.alphalink.fr (94-84-15-217.reverse.alphalink.fr [217.15.84.94]) by mail-2-cbv2.admin.alphalink.fr (Postfix) with ESMTP id 5FB922B52005; Mon, 26 Mar 2018 19:38:55 +0200 (CEST) Received: by c-dev-0.admin.alphalink.fr (Postfix, from userid 1000) id 356B360228; Mon, 26 Mar 2018 19:38:55 +0200 (CEST) Date: Mon, 26 Mar 2018 19:38:55 +0200 From: Guillaume Nault To: Joel Fernandes Cc: Thomas Gleixner , Paul McKenney , LKML , Todd Poynor , "open list:BPF (Safe dynamic programs and tools)" , Ben Hutchings , Greg Kroah-Hartman Subject: Re: syzbot rcu/debugobjects warning Message-ID: <20180326173855.GP1351@alphalink.fr> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, Mar 24, 2018 at 11:29:42PM -0700, Joel Fernandes wrote: > On Fri, Mar 23, 2018 at 1:41 PM, Thomas Gleixner wrote: > > On Fri, 23 Mar 2018, Joel Fernandes wrote: > >> On Fri, Mar 23, 2018 at 2:11 AM, Thomas Gleixner wrote: > >> > On Thu, 22 Mar 2018, Joel Fernandes wrote: > >> Sorry. Here is the raw crash log: https://pastebin.com/raw/puvh0cXE > >> (The kernel logs are toward the end with the above). > > > > And that is interesting: > > > > [ 150.629667] [ 150.631700] [] dump_stack+0xc1/0x128 > > [ 150.637051] [] ? __debug_object_init+0x526/0xc40 > > [ 150.643431] [] panic+0x1bc/0x3a8 > > [ 150.648416] [] ? percpu_up_read_preempt_enable.constprop.53+0xd7/0xd7 > > [ 150.656611] [] ? load_image_and_restore+0xf9/0xf9 > > [ 150.663070] [] ? vprintk_default+0x1d/0x30 > > [ 150.668925] [] ? __warn+0x1a9/0x1e0 > > [ 150.674170] [] ? __debug_object_init+0x526/0xc40 > > [ 150.680543] [] __warn+0x1c4/0x1e0 > > [ 150.685614] [] warn_slowpath_null+0x2c/0x40 > > [ 150.691972] [] __debug_object_init+0x526/0xc40 > > [ 150.698174] [] ? debug_object_fixup+0x30/0x30 > > [ 150.704283] [] debug_object_init_on_stack+0x19/0x20 > > [ 150.710917] [] __wait_rcu_gp+0x93/0x1b0 > > [ 150.716508] [] synchronize_rcu.part.65+0x101/0x110 > > [ 150.723054] [] ? rcu_pm_notify+0xc0/0xc0 > > [ 150.728735] [] ? __call_rcu.constprop.72+0x910/0x910 > > [ 150.735459] [] ? __lock_is_held+0xa1/0xf0 > > [ 150.741223] [] synchronize_rcu+0x27/0x90 > > > > So this calls synchronize_rcu from a rcu callback. That's a nono. This is > > on the back of an interrupt in softirq context and __wait_rcu_gp() can > > sleep, which is obviously a bad idea in softirq context.... > > > > Cc'ed netdev .... > > > > And that also explains the debug object splat because this is not running > > on the task stack. It's running on the softirq stack .... > > > > [ 150.746908] [] __l2tp_session_unhash+0x3d5/0x550 > > [ 150.753281] [] ? __l2tp_session_unhash+0x1bf/0x550 > > [ 150.759828] [] ? __local_bh_enable_ip+0x6a/0xd0 > > [ 150.766123] [] ? l2tp_udp_encap_recv+0xd90/0xd90 > > [ 150.772497] [] l2tp_tunnel_closeall+0x1e7/0x3a0 > > [ 150.778782] [] l2tp_tunnel_destruct+0x30e/0x5a0 > > [ 150.785067] [] ? l2tp_tunnel_destruct+0x1aa/0x5a0 > > [ 150.791537] [] ? l2tp_tunnel_del_work+0x460/0x460 > > [ 150.797997] [] __sk_destruct+0x53/0x570 > > [ 150.803588] [] rcu_process_callbacks+0x898/0x1300 > > [ 150.810048] [] ? rcu_process_callbacks+0x977/0x1300 > > [ 150.816684] [] ? __sk_dst_check+0x240/0x240 > > [ 150.822625] [] __do_softirq+0x206/0x951 > > [ 150.828223] [] irq_exit+0x165/0x190 > > [ 150.833557] [] smp_apic_timer_interrupt+0x7b/0xa0 > > [ 150.840018] [] apic_timer_interrupt+0xa0/0xb0 > > [ 150.846132] [ 150.848166] [] ? native_safe_halt+0x6/0x10 > > [ 150.854036] [] ? trace_hardirqs_on+0xd/0x10 > > [ 150.859973] [] default_idle+0x55/0x360 > > [ 150.865478] [] arch_cpu_idle+0xa/0x10 > > [ 150.870896] [] default_idle_call+0x36/0x60 > > [ 150.876751] [] cpu_startup_entry+0x2b0/0x380 > > [ 150.882787] [] ? cpu_in_idle+0x20/0x20 > > [ 150.888291] [] ? clockevents_register_device+0x123/0x200 > > [ 150.895358] [] start_secondary+0x303/0x3e0 > > [ 150.901209] [] ? set_cpu_sibling_map+0x11f0/0x11f0 > > Thomas, thanks a lot. It appears this issue will not happen on > mainline since from commit 765924e362d1 (subject "l2tp: don't close > sessions in l2tp_tunnel_destruct()"), l2tp_tunnel_closeall is no > longer called from l2tp_tunnel_destruct. From that commit message it > seems one of the motivations is to solve scheduling from atomic issue. > I agree that this patch should fix the above splat. > However for this change to be applied to android-4.9 and/or 4.9 > stable, it depends on several other l2p patches and they aren't > straight forward cherry-picks from mainline (and I don't have much > background with this driver). > > v3.16.56 stable seems to be further along with l2tp than v4.9.89, in > that it atleast has more of the upstream patches adapted for it, that > the above patch depends on. Since this also related to stable, I am > CC'ing Greg kh and Ben. > I generally review l2tp patches proposed for -stable trees (although not in time). If a patch has been ported to 3.16.y and is missing in another tree, then it should be safe to port it there too. > Here are some of the commits in 3.16 stable that I couldn't find > applied to v4.9 stable. The above fix quotes the below patches as > dependencies so they would need to be stable backported. Also CC'ing > Guillaume since he authored the above mentioned fix. > > 0c15ddabbcf l2tp: don't register sessions in l2tp_session_create() > a3c5d5b70f4e l2tp: fix race condition in l2tp_tunnel_delete > 5b216e8dcda2 l2tp: prevent creation of sessions on terminated tunnels > 76ff5e22f1e0 l2tp: hold tunnel while looking up sessions in l2tp_netlink > ceb8f6b23a38 l2tp: define parameters of l2tp_session_get*() as "const" > 0295d020b63f l2tp: initialise session's refcount before making it reachable > 29a77518927e l2tp: take reference on sessions being dumped > b301c9b7782f l2tp: take a reference on sessions used in genetlink handlers > Yes, I think it'd make sense to port these patches.