From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-8.3 required=3.0 tests=DKIMWL_WL_MED,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,USER_IN_DEF_DKIM_WL autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id C7940C38A29 for ; Sat, 18 Apr 2020 07:02:56 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id A767D221EA for ; Sat, 18 Apr 2020 07:02:56 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="eneHelWv" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725914AbgDRHCz (ORCPT ); Sat, 18 Apr 2020 03:02:55 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47506 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725849AbgDRHCz (ORCPT ); Sat, 18 Apr 2020 03:02:55 -0400 Received: from mail-qt1-x844.google.com (mail-qt1-x844.google.com [IPv6:2607:f8b0:4864:20::844]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A764AC061A0C for ; Sat, 18 Apr 2020 00:02:53 -0700 (PDT) Received: by mail-qt1-x844.google.com with SMTP id x2so4067837qtr.0 for ; Sat, 18 Apr 2020 00:02:53 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=TjXmWmuINQagYGOhB0mh8AmFnIMZ72LlgvA/kNKwdwQ=; b=eneHelWvQA1o2xZd7COnbAkMg2VijPrSKWln3C1KPWsKzKaxkBchi9lH3mm6z0mchu bs0JjsONZdn1EW5Pa5rkEnyVwrcm1Xes/rbgpL6bD1OKq7M9E+4rryt6Zw8Vo7c14dm/ 85kHXX1ylyxSOjBeELkVJa1w6RhDAf58NGAoh0pMlB6JwQWsGpHv7xZfT3vsG5wcU8PO PO4Rx84G3YCeWDVr81SGT2C0srVpxwfHmc3kp1owb9mgCLLBYC0Y6VOoawwzTCKp4JmH iZL2vDgA7Ta2F2bdfEt3J5CsDJ+Hco3D3DWELetZrFN+Ldj5y5ib+FWK5fd+pxaSWQJg ew1g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=TjXmWmuINQagYGOhB0mh8AmFnIMZ72LlgvA/kNKwdwQ=; b=hyuUzpF1IwBb99rznTG4Xu6jJZDQsMmnD7z5Rg9oYfeBhGofVo70aadj8ekCGv+a8S oo7kPjf/iAGraLE4XifI4hjpotAd5ID8MIzawaNFvEMPBmvU9z6FxiBtDRVMwyn4p6qZ b2yS7nB3pFFAV+lyUbqEvjES3fgnc797sBoIdPFo7tTzcbr9y15owikLxOo6A4G0JWkO xD9Ng6cVnwrE0nUQgArKQ2z7vkjMRU+8pOYRPBmVEq66eaOdXCW53DWrkezzcBs8UHY9 Tu/FuwbyH9Mu0RFuS7bqlwnwIRp9Yjroa5wjS4xOvHoCOwFge/y0BuNHIM6jjUGPtxJA iAmw== X-Gm-Message-State: AGi0PuZtueMOvh6anndawNVXZLJFQmCblcH7eWWFsG7lT1Q/tf8Sm2RQ tZ9l7CzkP5Kafud9KlZyDPZOM9S+5ziytCopRIfJPQ== X-Google-Smtp-Source: APiQypLsCDn+7Nx+XS+vfQdJLSgMyJ6cAip9eoqxwKIcZG7bcNNfpWA3QWLCOsdYajOXxXkuacs3h/Laq/BJ+KxyQO4= X-Received: by 2002:ac8:1b6a:: with SMTP id p39mr6720360qtk.158.1587193372377; Sat, 18 Apr 2020 00:02:52 -0700 (PDT) MIME-Version: 1.0 References: <000000000000e642a905a0cbee6e@google.com> In-Reply-To: <000000000000e642a905a0cbee6e@google.com> From: Dmitry Vyukov Date: Sat, 18 Apr 2020 09:02:41 +0200 Message-ID: Subject: Re: linux-next test error: WARNING: suspicious RCU usage in ovs_ct_exit To: syzbot , Linux-Next Mailing List , Stephen Rothwell Cc: David Miller , dev@openvswitch.org, kuba@kernel.org, LKML , netdev , Pravin B Shelar , syzkaller-bugs Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, Mar 14, 2020 at 8:57 AM syzbot wrote: > > Hello, > > syzbot found the following crash on: > > HEAD commit: 2e602db7 Add linux-next specific files for 20200313 > git tree: linux-next > console output: https://syzkaller.appspot.com/x/log.txt?x=16669919e00000 > kernel config: https://syzkaller.appspot.com/x/.config?x=cf2879fc1055b886 > dashboard link: https://syzkaller.appspot.com/bug?extid=7ef50afd3a211f879112 > compiler: gcc (GCC) 9.0.0 20181231 (experimental) > > Unfortunately, I don't have any reproducer for this crash yet. > > IMPORTANT: if you fix the bug, please add the following tag to the commit: > Reported-by: syzbot+7ef50afd3a211f879112@syzkaller.appspotmail.com +linux-next, Stephen for currently open linux-next build/boot failure > ============================= > WARNING: suspicious RCU usage > 5.6.0-rc5-next-20200313-syzkaller #0 Not tainted > ----------------------------- > net/openvswitch/conntrack.c:1898 RCU-list traversed in non-reader section!! > > other info that might help us debug this: > > > rcu_scheduler_active = 2, debug_locks = 1 > 3 locks held by kworker/u4:3/127: > #0: ffff8880a9771d28 ((wq_completion)netns){+.+.}, at: __write_once_size include/linux/compiler.h:250 [inline] > #0: ffff8880a9771d28 ((wq_completion)netns){+.+.}, at: arch_atomic64_set arch/x86/include/asm/atomic64_64.h:34 [inline] > #0: ffff8880a9771d28 ((wq_completion)netns){+.+.}, at: atomic64_set include/asm-generic/atomic-instrumented.h:856 [inline] > #0: ffff8880a9771d28 ((wq_completion)netns){+.+.}, at: atomic_long_set include/asm-generic/atomic-long.h:41 [inline] > #0: ffff8880a9771d28 ((wq_completion)netns){+.+.}, at: set_work_data kernel/workqueue.c:615 [inline] > #0: ffff8880a9771d28 ((wq_completion)netns){+.+.}, at: set_work_pool_and_clear_pending kernel/workqueue.c:642 [inline] > #0: ffff8880a9771d28 ((wq_completion)netns){+.+.}, at: process_one_work+0x82a/0x1690 kernel/workqueue.c:2237 > #1: ffffc900013a7dd0 (net_cleanup_work){+.+.}, at: process_one_work+0x85e/0x1690 kernel/workqueue.c:2241 > #2: ffffffff8a54df08 (pernet_ops_rwsem){++++}, at: cleanup_net+0x9b/0xa50 net/core/net_namespace.c:551 > > stack backtrace: > CPU: 0 PID: 127 Comm: kworker/u4:3 Not tainted 5.6.0-rc5-next-20200313-syzkaller #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 > Workqueue: netns cleanup_net > Call Trace: > __dump_stack lib/dump_stack.c:77 [inline] > dump_stack+0x188/0x20d lib/dump_stack.c:118 > ovs_ct_limit_exit net/openvswitch/conntrack.c:1898 [inline] > ovs_ct_exit+0x3db/0x558 net/openvswitch/conntrack.c:2295 > ovs_exit_net+0x1df/0xba0 net/openvswitch/datapath.c:2469 > ops_exit_list.isra.0+0xa8/0x150 net/core/net_namespace.c:172 > cleanup_net+0x511/0xa50 net/core/net_namespace.c:589 > process_one_work+0x94b/0x1690 kernel/workqueue.c:2266 > worker_thread+0x96/0xe20 kernel/workqueue.c:2412 > kthread+0x357/0x430 kernel/kthread.c:255 > ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:352 > tipc: TX() has been purged, node left! > > ============================= > WARNING: suspicious RCU usage > 5.6.0-rc5-next-20200313-syzkaller #0 Not tainted > ----------------------------- > net/ipv4/ipmr.c:1757 RCU-list traversed in non-reader section!! > > other info that might help us debug this: > > > rcu_scheduler_active = 2, debug_locks = 1 > 4 locks held by kworker/u4:3/127: > #0: ffff8880a9771d28 ((wq_completion)netns){+.+.}, at: __write_once_size include/linux/compiler.h:250 [inline] > #0: ffff8880a9771d28 ((wq_completion)netns){+.+.}, at: arch_atomic64_set arch/x86/include/asm/atomic64_64.h:34 [inline] > #0: ffff8880a9771d28 ((wq_completion)netns){+.+.}, at: atomic64_set include/asm-generic/atomic-instrumented.h:856 [inline] > #0: ffff8880a9771d28 ((wq_completion)netns){+.+.}, at: atomic_long_set include/asm-generic/atomic-long.h:41 [inline] > #0: ffff8880a9771d28 ((wq_completion)netns){+.+.}, at: set_work_data kernel/workqueue.c:615 [inline] > #0: ffff8880a9771d28 ((wq_completion)netns){+.+.}, at: set_work_pool_and_clear_pending kernel/workqueue.c:642 [inline] > #0: ffff8880a9771d28 ((wq_completion)netns){+.+.}, at: process_one_work+0x82a/0x1690 kernel/workqueue.c:2237 > #1: ffffc900013a7dd0 (net_cleanup_work){+.+.}, at: process_one_work+0x85e/0x1690 kernel/workqueue.c:2241 > #2: ffffffff8a54df08 (pernet_ops_rwsem){++++}, at: cleanup_net+0x9b/0xa50 net/core/net_namespace.c:551 > #3: ffffffff8a559c80 (rtnl_mutex){+.+.}, at: ip6gre_exit_batch_net+0x88/0x700 net/ipv6/ip6_gre.c:1602 > > stack backtrace: > CPU: 1 PID: 127 Comm: kworker/u4:3 Not tainted 5.6.0-rc5-next-20200313-syzkaller #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 > Workqueue: netns cleanup_net > Call Trace: > __dump_stack lib/dump_stack.c:77 [inline] > dump_stack+0x188/0x20d lib/dump_stack.c:118 > ipmr_device_event+0x240/0x2b0 net/ipv4/ipmr.c:1757 > notifier_call_chain+0xc0/0x230 kernel/notifier.c:83 > call_netdevice_notifiers_info net/core/dev.c:1948 [inline] > call_netdevice_notifiers_info+0xb5/0x130 net/core/dev.c:1933 > call_netdevice_notifiers_extack net/core/dev.c:1960 [inline] > call_netdevice_notifiers net/core/dev.c:1974 [inline] > rollback_registered_many+0x75c/0xe70 net/core/dev.c:8810 > unregister_netdevice_many.part.0+0x16/0x1e0 net/core/dev.c:9966 > unregister_netdevice_many+0x36/0x50 net/core/dev.c:9965 > ip6gre_exit_batch_net+0x4e8/0x700 net/ipv6/ip6_gre.c:1605 > ops_exit_list.isra.0+0x103/0x150 net/core/net_namespace.c:175 > cleanup_net+0x511/0xa50 net/core/net_namespace.c:589 > process_one_work+0x94b/0x1690 kernel/workqueue.c:2266 > worker_thread+0x96/0xe20 kernel/workqueue.c:2412 > kthread+0x357/0x430 kernel/kthread.c:255 > ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:352 > > > --- > This bug is generated by a bot. It may contain errors. > See https://goo.gl/tpsmEJ for more information about syzbot. > syzbot engineers can be reached at syzkaller@googlegroups.com. > > syzbot will keep track of this bug report. See: > https://goo.gl/tpsmEJ#status for how to communicate with syzbot. > > -- > You received this message because you are subscribed to the Google Groups "syzkaller-bugs" group. > To unsubscribe from this group and stop receiving emails from it, send an email to syzkaller-bugs+unsubscribe@googlegroups.com. > To view this discussion on the web visit https://groups.google.com/d/msgid/syzkaller-bugs/000000000000e642a905a0cbee6e%40google.com.