Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp3142441ybl; Mon, 19 Aug 2019 12:58:44 -0700 (PDT) X-Google-Smtp-Source: APXvYqxb/Y8e2+ZRcgAUxsVKK2eVSmVm0Yj36ED5R3SbVg7PW4GZF/xlJ5SPMMHUn0BcSp/2w98H X-Received: by 2002:a05:6a00:8e:: with SMTP id c14mr25317859pfj.241.1566244724871; Mon, 19 Aug 2019 12:58:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566244724; cv=none; d=google.com; s=arc-20160816; b=MkZwxoUQQ8isqYZX9o8ubSriap194C3rWpfKLkeP55VYxrg2kRIv8jysknzFNoKUWJ qm7yr0u0JKZSdxc/t+aMTGRPmGvnuGVIMWdQKPCzkzh2ahk2UjLlxap6rw3oJYapS3GW 0uuThUv9szOcGNRYCsttTtL6eQY2kRCFwmS4qnXo4ls+Az4IynolwWJfKjSBBuz6x7qx 3mVjyh5Nv+YhiJrNQxo3KFK0Y4eqtfgCudGSy0uhZESlT01BqSz4+LDh+gCtBA1vVVTb ZHMr2rZgWyLvybTzf+DYUxvuZAh2l3gBA22bsDoZO0ejoXe3f6sdgp3ZKfBGJMkSKY6X HTAw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=qzvMhbV69umzpjc4Qdh/FvlBexfYrFPY7lN5wgWWeks=; b=bt4tlxQ81wgaIqz0FCJKg2HcFejmlGZc6i4MTSJx2eK4vsVcUqCca4h9Nuq8EvSRVg TMMdGEmYYIB7lC6mB9Po9vL/kW9SPq9blCfzw4b7ry3q+lsLAqgnidQeAwLOt6P0cN3y B9Y0uyH8pbPGYRLjbtxogv4vEbcaw7yVkJX7voclS98/o0ZeEmv1/77kOwf/zM2PhSnp boVgLiyX6cb7CXsiq+PUDPjFKomn+VP6GG32NWdvAVR0l/0IY2/MYoQfA3ftAjqlM4uf c6Hg/pAWLqKpWBqogjwyPd0yRMbgA3UOKKfVsyHXR4TAU4PBzgifEnaLYDCQK3poI29n iDaQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y7si8729315pgp.409.2019.08.19.12.58.29; Mon, 19 Aug 2019 12:58:44 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728255AbfHST5Z (ORCPT + 99 others); Mon, 19 Aug 2019 15:57:25 -0400 Received: from mail.kernel.org ([198.145.29.99]:52748 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727925AbfHST5Z (ORCPT ); Mon, 19 Aug 2019 15:57:25 -0400 Received: from oasis.local.home (rrcs-76-79-140-27.west.biz.rr.com [76.79.140.27]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4430B2087E; Mon, 19 Aug 2019 19:57:24 +0000 (UTC) Date: Mon, 19 Aug 2019 15:57:21 -0400 From: Steven Rostedt To: Juri Lelli Cc: tglx@linutronix.de, bigeasy@linutronix.de, linux-rt-users@vger.kernel.org, linux-kernel@vger.kernel.org, williams@redhat.com Subject: Re: [RT PATCH v2] net/xfrm/xfrm_ipcomp: Protect scratch buffer with local_lock Message-ID: <20190819155721.05c878f8@oasis.local.home> In-Reply-To: <20190819122731.6600-1-juri.lelli@redhat.com> References: <20190819122731.6600-1-juri.lelli@redhat.com> X-Mailer: Claws Mail 3.17.3 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 19 Aug 2019 14:27:31 +0200 Juri Lelli wrote: > The following BUG has been reported while running ipsec tests. Thanks! I'm still in the process of backporting patches to fix some bugs that showed up with the latest merge of upstream stable. I'll add this to the queue to add. -- Steve > > BUG: scheduling while atomic: irq/78-eno3-rx-/12023/0x00000002 > Modules linked in: ipcomp xfrm_ipcomp ... > Preemption disabled at: > [] ipcomp_input+0xd0/0x9a0 [xfrm_ipcomp] > CPU: 1 PID: 12023 Comm: irq/78-eno3-rx- Kdump: loaded Not tainted [...] #1 > Hardware name: [...] > Call Trace: > dump_stack+0x5c/0x80 > ? ipcomp_input+0xd0/0x9a0 [xfrm_ipcomp] > __schedule_bug.cold.81+0x44/0x51 > __schedule+0x5bf/0x6a0 > schedule+0x39/0xd0 > rt_spin_lock_slowlock_locked+0x10e/0x2b0 > rt_spin_lock_slowlock+0x50/0x80 > get_page_from_freelist+0x609/0x1560 > ? zlib_updatewindow+0x5a/0xd0 > __alloc_pages_nodemask+0xd9/0x280 > ipcomp_input+0x299/0x9a0 [xfrm_ipcomp] > xfrm_input+0x5e3/0x960 > xfrm4_ipcomp_rcv+0x34/0x50 > ip_local_deliver_finish+0x22d/0x250 > ip_local_deliver+0x6d/0x110 > ? ip_rcv_finish+0xac/0x480 > ip_rcv+0x28e/0x3f9 > ? packet_rcv+0x43/0x4c0 > __netif_receive_skb_core+0xb7c/0xd10 > ? inet_gro_receive+0x8e/0x2f0 > netif_receive_skb_internal+0x4a/0x160 > napi_gro_receive+0xee/0x110 > tg3_rx+0x2a8/0x810 [tg3] > tg3_poll_work+0x3b3/0x830 [tg3] > tg3_poll_msix+0x3b/0x170 [tg3] > net_rx_action+0x1ff/0x470 > ? __switch_to_asm+0x41/0x70 > do_current_softirqs+0x223/0x3e0 > ? irq_thread_check_affinity+0x20/0x20 > __local_bh_enable+0x51/0x60 > irq_forced_thread_fn+0x5e/0x80 > ? irq_finalize_oneshot.part.45+0xf0/0xf0 > irq_thread+0x13d/0x1a0 > ? wake_threads_waitq+0x30/0x30 > kthread+0x112/0x130 > ? kthread_create_worker_on_cpu+0x70/0x70 > ret_from_fork+0x35/0x40 >