Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp1876511imm; Thu, 11 Oct 2018 01:00:45 -0700 (PDT) X-Google-Smtp-Source: ACcGV61+2f7alR/odLcYNhXOp4jpvR6yjdvGCVwRK9XMVbICkLO7sjdd/drRWY9Od4b7qp71mNQk X-Received: by 2002:a62:5e02:: with SMTP id s2-v6mr556862pfb.146.1539244845273; Thu, 11 Oct 2018 01:00:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539244845; cv=none; d=google.com; s=arc-20160816; b=k55khRv6k43PC6Ve5wvfzlKZ9b+iLGVNHU+WXwZD8eo6JGx5Eg3P3S7tsVmkCBu4yK QWHOWZ/7EN+tDwpaS5A0SypRygS8DoEUM3GfaPqq8Izoqb7DTPzCKfxZovEA3S51NUY4 9k/+iwZBRUzUpkdaq+JbHxDMmM40Pm1IeXdt/0I8B/qGjrfWw9Nt8/TtSln6CLmezScG iEKZJGZG3GOVGIx68kiTpxTi53ceO+1a3FsGsYJjFDcLlmsgZhvs6whyzIic19j+XYUT f/0DHHKnBYgnqEMMBHiriDgaxWrL8k7o7UD0M1afu1h6bO3mdDp5VZLGhMiKSkIzC/n1 HGUg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:to:subject:message-id:date:from :references:in-reply-to:mime-version:dkim-signature; bh=IS+Qe1yflYjxnUGUxVEesbSqF9cTj5GBtrEheCKgRQ0=; b=0r060lJDJ/wpgePeQjrt+/j+rop01vA3KgOvV6so1UH+pHPadTCb4ZxAQgFHWT2Fe5 pmdMxG6HQvCtLGfxgIFO8kliuSnO9Zo8xap/7Zjkzycf9idPkxOY0MFamVmcAZBtVxA7 G9ciCr0IS9KWwEMwJULK1nbIfK84IY5tsLeFKL+jNPnwbustaanEziOaTFYzmX5W/I3X ioRttXpjqiAP/w3f1MwJ7HH9KAL4F5Et0ZXqRVToIRiMjcETdFWRrxqYW11STXkr77VO HWDZYkV8qZmtHZ1FK6UfMqfLD+tqV/0EMoyGXl1mfv//CpPn9CC7vPhEWbwRvyqCCVIH 3X7Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=hzPsHIJB; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o5-v6si26143674plk.95.2018.10.11.01.00.30; Thu, 11 Oct 2018 01:00:45 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=hzPsHIJB; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728064AbeJKP0P (ORCPT + 99 others); Thu, 11 Oct 2018 11:26:15 -0400 Received: from mail-it1-f194.google.com ([209.85.166.194]:54997 "EHLO mail-it1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727846AbeJKP0P (ORCPT ); Thu, 11 Oct 2018 11:26:15 -0400 Received: by mail-it1-f194.google.com with SMTP id l191-v6so12124532ita.4 for ; Thu, 11 Oct 2018 01:00:08 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to; bh=IS+Qe1yflYjxnUGUxVEesbSqF9cTj5GBtrEheCKgRQ0=; b=hzPsHIJB+rCWbuYyTNW7i9SxSTnMtAL2bTfufvTHUVuAJoSf+G0Yvk666p0m9ucuaB ImPNa4L2+1VdEINlrG5XLtOfpcSUCDhKDw8loHGNZynzUHRlDZjSXS3XoDT6uWXm4MY4 yyU0jl2LBMfrrILOjX+Z6DHyGJPNscCuTshjmo/Dr0GSN2dxBkKGVU79oOZP30tCcp9p Xzbzsb42mNky7+fQGYj0vDBSU+a8RT0xzj9gOAIij7l5ZebqSoGurw+C3Mgp9DP2RsEf rbAcMjVuM3teJBDrD4u0Hz7a+qMSUHl6DezL0eMkEDFQSAtKH524tAQ/o72ZG7EuUkv6 tAyg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to; bh=IS+Qe1yflYjxnUGUxVEesbSqF9cTj5GBtrEheCKgRQ0=; b=btdb32fXkofUhjuhxY6mc/yH4rK666c+GW1607ydDKohxgBNoQUn0MVaeNGaGiUFTp +qryIEvgHlYZLaiE7Y0lR6KWFbDQVw4eSP9raaCBxOLh+rQAynudibEWT4OB6EsT/N/d AXQr7Mk+7Oh/OJktjS6zSVPrQu9PvPeRevGqAXLXraxsPpA4NuR/8t7DWeDyqdTucqAy DM3Cw5a825GeUM5bvggxbk/R0lqMGlNyZb0I9XZKPST28Ikv713YaHOyU9Y7u04oVEKo x46yAQDVYNUo/499qfPAmR87qRPkeV27Rz9v3/5E8DZJH0ilJZsvM1OucfAjoT173YFz ksZQ== X-Gm-Message-State: ABuFfohEfTyPUHRv9Dh6TtZM4H2LfPHRpCyVfosnSoX8dpf/NiG+goyt df/YAdLCfrjqT4zvioGLtONoYNIMmk2eTleDxiXjRw== X-Received: by 2002:a02:9716:: with SMTP id x22-v6mr401480jai.82.1539244807442; Thu, 11 Oct 2018 01:00:07 -0700 (PDT) MIME-Version: 1.0 Received: by 2002:a02:1003:0:0:0:0:0 with HTTP; Thu, 11 Oct 2018 00:59:46 -0700 (PDT) In-Reply-To: References: From: Dmitry Vyukov Date: Thu, 11 Oct 2018 09:59:46 +0200 Message-ID: Subject: Re: net/tipc: recursive locking in tipc_link_reset To: Jon Maloy , David Miller , Ying Xue , netdev , tipc-discussion@lists.sourceforge.net, LKML Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Oct 11, 2018 at 9:55 AM, Dmitry Vyukov wrote: > Hi, > > I am getting the following error while booting the latest kernel on > bb2d8f2f61047cbde08b78ec03e4ebdb01ee5434 (Oct 10). Config is attached. > > Since this happens during boot, this makes LOCKDEP completely > unusable, does not allow to discover any other locking issues and > masks all new bugs being introduced into kernel. > Please fix asap. > Thanks -parthasarathy.bhuvaragan address as it gives me bounces but this is highly likely due to: commit 3f32d0be6c16b902b687453c962d17eea5b8ea19 Author: Parthasarathy Bhuvaragan Date: Tue Sep 25 22:09:10 2018 +0200 tipc: lock wakeup & inputq at tipc_link_reset() > WARNING: possible recursive locking detected > 4.19.0-rc7+ #14 Not tainted > -------------------------------------------- > swapper/0/1 is trying to acquire lock: > 00000000dcfc0fc8 (&(&list->lock)->rlock#4){+...}, at: spin_lock_bh > include/linux/spinlock.h:334 [inline] > 00000000dcfc0fc8 (&(&list->lock)->rlock#4){+...}, at: > tipc_link_reset+0x125/0xdf0 net/tipc/link.c:850 > > but task is already holding lock: > 00000000cbb9b036 (&(&list->lock)->rlock#4){+...}, at: spin_lock_bh > include/linux/spinlock.h:334 [inline] > 00000000cbb9b036 (&(&list->lock)->rlock#4){+...}, at: > tipc_link_reset+0xfa/0xdf0 net/tipc/link.c:849 > > other info that might help us debug this: > Possible unsafe locking scenario: > > CPU0 > ---- > lock(&(&list->lock)->rlock#4); > lock(&(&list->lock)->rlock#4); > > *** DEADLOCK *** > > May be due to missing lock nesting notation > > 2 locks held by swapper/0/1: > #0: 00000000f7539d34 (pernet_ops_rwsem){+.+.}, at: > register_pernet_subsys+0x19/0x40 net/core/net_namespace.c:1051 > #1: 00000000cbb9b036 (&(&list->lock)->rlock#4){+...}, at: > spin_lock_bh include/linux/spinlock.h:334 [inline] > #1: 00000000cbb9b036 (&(&list->lock)->rlock#4){+...}, at: > tipc_link_reset+0xfa/0xdf0 net/tipc/link.c:849 > > stack backtrace: > CPU: 0 PID: 1 Comm: swapper/0 Not tainted 4.19.0-rc7+ #14 > Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014 > Call Trace: > __dump_stack lib/dump_stack.c:77 [inline] > dump_stack+0x1af/0x295 lib/dump_stack.c:113 > print_deadlock_bug kernel/locking/lockdep.c:1759 [inline] > check_deadlock kernel/locking/lockdep.c:1803 [inline] > validate_chain kernel/locking/lockdep.c:2399 [inline] > __lock_acquire+0xf1e/0x3c60 kernel/locking/lockdep.c:3411 > lock_acquire+0x1db/0x520 kernel/locking/lockdep.c:3900 > __raw_spin_lock_bh include/linux/spinlock_api_smp.h:135 [inline] > _raw_spin_lock_bh+0x31/0x40 kernel/locking/spinlock.c:168 > spin_lock_bh include/linux/spinlock.h:334 [inline] > tipc_link_reset+0x125/0xdf0 net/tipc/link.c:850 > tipc_link_bc_create+0xb5/0x1f0 net/tipc/link.c:526 > tipc_bcast_init+0x59b/0xab0 net/tipc/bcast.c:521 > tipc_init_net+0x472/0x610 net/tipc/core.c:82 > ops_init+0xf7/0x520 net/core/net_namespace.c:129 > __register_pernet_operations net/core/net_namespace.c:940 [inline] > register_pernet_operations+0x453/0xac0 net/core/net_namespace.c:1011 > register_pernet_subsys+0x28/0x40 net/core/net_namespace.c:1052 > tipc_init+0x83/0x104 net/tipc/core.c:140 > do_one_initcall+0x109/0x70a init/main.c:885 > do_initcall_level init/main.c:953 [inline] > do_initcalls init/main.c:961 [inline] > do_basic_setup init/main.c:979 [inline] > kernel_init_freeable+0x4bd/0x57f init/main.c:1144 > kernel_init+0x13/0x180 init/main.c:1063 > ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:413