Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755911AbYHGXqj (ORCPT ); Thu, 7 Aug 2008 19:46:39 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1753249AbYHGXq2 (ORCPT ); Thu, 7 Aug 2008 19:46:28 -0400 Received: from ik-out-1112.google.com ([66.249.90.180]:62959 "EHLO ik-out-1112.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752834AbYHGXq1 (ORCPT ); Thu, 7 Aug 2008 19:46:27 -0400 DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=date:from:to:subject:message-id:mime-version:content-type :content-disposition:user-agent; b=bjBgaorgETN2KuZMLGOevoV0y5bKx2Azp/a3h+f9LiYL/shVx0xVfzVxCTMMq8rthJ az2iizfpBa59kJpiIfHGzz37k6eRVI/3604zzxzJJYyWl/qpvr/U7FB1aXnpBE8m1nEl CPZBpRK9yFnVWHAVnicWeXT71Il35HTdB02dc= Date: Fri, 8 Aug 2008 02:46:14 +0300 From: "Michael S. Tsirkin" To: LKML , davem@davemloft.net, yoshfuji@linux-ipv6.org, netdev@vger.kernel.org Subject: possible recursive locking in udp4_lib_rcv Message-ID: <20080807234613.GA9598@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.15+20070412 (2007-04-11) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 4379 Lines: 85 Hi! I noticed the following warnings when running on 2.6.27-rc2 with lockdep checker enabled: [ 2912.004106] Initializing XFRM netlink socket [ 2922.009629] [ 2922.009632] ============================================= [ 2922.009640] [ INFO: possible recursive locking detected ] [ 2922.009643] 2.6.27-rc2-mst-suspend #32 [ 2922.009645] --------------------------------------------- [ 2922.009648] Xorg/5958 is trying to acquire lock: [ 2922.009650] (slock-AF_INET/1){-+..}, at: [] __udp4_lib_rcv+0x34a/0x920 [ 2922.009660] [ 2922.009661] but task is already holding lock: [ 2922.009663] (slock-AF_INET/1){-+..}, at: [] __udp4_lib_rcv+0x34a/0x920 [ 2922.009669] [ 2922.009669] other info that might help us debug this: [ 2922.009672] 4 locks held by Xorg/5958: [ 2922.009674] #0: (rcu_read_lock){..--}, at: [] netif_receive_skb+0x66/0x390 [ 2922.009681] #1: (rcu_read_lock){..--}, at: [] ip_local_deliver_finish+0x30/0x1f0 [ 2922.009688] #2: (slock-AF_INET/1){-+..}, at: [] __udp4_lib_rcv+0x34a/0x920 [ 2922.009694] #3: (rcu_read_lock){..--}, at: [] ip_local_deliver_finish+0x30/0x1f0 [ 2922.009700] 2922.009701] stack backtrace: [ 2922.009704] Pid: 5958, comm: Xorg Not tainted 2.6.27-rc2-mst-suspend #32 [ 2922.009707] [] __lock_acquire+0xee6/0x1130 [ 2922.009713] [] lock_acquire+0x61/0x80 [ 2922.009717] [] ? __udp4_lib_rcv+0x34a/0x920 [ 2922.009721] [] _spin_lock_nested+0x2a/0x40 [ 2922.009726] [] ? __udp4_lib_rcv+0x34a/0x920 [ 2922.009731] [] __udp4_lib_rcv+0x34a/0x920 [ 2922.009738] [] ? ipv4_confirm+0x0/0xe0 [nf_conntrack_ipv4] [ 2922.009746] [] ? nf_iterate+0x59/0x80 [ 2922.009751] [] udp_rcv+0x12/0x20 [ 2922.009755] [] ip_local_deliver_finish+0xaa/0x1f0 [ 2922.009758] [] ? ip_local_deliver_finish+0x30/0x1f0 [ 2922.009763] [] ip_local_deliver+0x30/0xa0 [ 2922.009766] [] ? ip_local_deliver_finish+0x0/0x1f0 [ 2922.009770] [] xfrm4_transport_finish+0x6b/0xf0 [ 2922.009776] [] ? xfrm4_rcv_encap_finish+0x0/0x60 [ 2922.009780] [] xfrm_input+0x22d/0x360 [ 2922.009784] [] xfrm4_rcv_encap+0x23/0x30 [ 2922.009788] [] xfrm4_udp_encap_rcv+0x16b/0x1a0 [ 2922.009792] [] udp_queue_rcv_skb+0x174/0x2c0 [ 2922.009795] [] ? _spin_lock_nested+0x31/0x40 [ 2922.009800] [] __udp4_lib_rcv+0x77e/0x920 [ 2922.009805] [] ? ipv4_confirm+0x0/0xe0 [nf_conntrack_ipv4] [ 2922.009811] [] ? nf_iterate+0x59/0x80 [ 2922.009816] [] udp_rcv+0x12/0x20 [ 2922.009819] [] ip_local_deliver_finish+0xaa/0x1f0 [ 2922.009822] [] ? ip_local_deliver_finish+0x30/0x1f0 [ 2922.009827] [] ip_local_deliver+0x30/0xa0 [ 2922.009830] [] ? ip_local_deliver_finish+0x0/0x1f0 [ 2922.009834] [] ip_rcv_finish+0xfe/0x350 [ 2922.009838] [] ? nf_hook_slow+0xd9/0x100 [ 2922.009842] [] ? ip_rcv_finish+0x0/0x350 [ 2922.009846] [] ip_rcv+0x1a6/0x290 [ 2922.009849] [] ? ip_rcv_finish+0x0/0x350 [ 2922.009853] [] ? ip_rcv+0x0/0x290 [ 2922.009857] [] netif_receive_skb+0x228/0x390 [ 2922.009860] [] ? netif_receive_skb+0x66/0x390 [ 2922.009865] [] ? packet_rcv_spkt+0x0/0x110 [af_packet] [ 2922.009872] [] process_backlog+0x7c/0xe0 [ 2922.009876] [] net_rx_action+0xa7/0x150 [ 2922.009879] [] __do_softirq+0x87/0x100 [ 2922.009883] [] do_softirq+0x57/0x60 [ 2922.009887] [] irq_exit+0x77/0x90 [ 2922.009890] [] do_IRQ+0x45/0x80 [ 2922.009894] [] ? trace_hardirqs_on_caller+0xc4/0x150 [ 2922.009899] [] common_interrupt+0x28/0x30 [ 2922.009903] ======================= [ 2922.277171] PPP generic driver version 2.4.2 (I'm not sure what I did, something related to ipsec and/or ppp). I have not seen this with v2.6.26 or earlier. Any idea whether this is a real bug or lockdep false positive? -- MST -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/