syzbot


linux-next test error: WARNING: suspicious RCU usage in ovs_ct_exit

Status: fixed on 2020/06/18 13:57
Subsystems: openvswitch
[Documentation on labels]
Reported-by: syzbot+7ef50afd3a211f879112@syzkaller.appspotmail.com
Fix commit: 27de77cec985 net: openvswitch: ovs_ct_exit to be done under ovs_lock
First crash: 1476d, last: 1438d
Discussions (4)
Title Replies (including bot) Last reply
[PATCH 5.6 000/167] 5.6.8-rc1 review 176 (176) 2020/04/30 06:41
[PATCH 5.4 000/168] 5.4.36-rc1 review 173 (173) 2020/04/29 14:05
[PATCH] net: openvswitch: ovs_ct_exit to be done under ovs_lock 3 (3) 2020/04/20 18:00
linux-next test error: WARNING: suspicious RCU usage in ovs_ct_exit 2 (3) 2020/04/20 01:59

Sample crash report:
=============================
WARNING: suspicious RCU usage
5.7.0-rc2-next-20200420-syzkaller #0 Not tainted
-----------------------------
net/openvswitch/conntrack.c:1898 RCU-list traversed in non-reader section!!

other info that might help us debug this:


rcu_scheduler_active = 2, debug_locks = 1
3 locks held by kworker/u4:0/7:
 #0: ffff8880a9772138 ((wq_completion)netns){+.+.}-{0:0}, at: __write_once_size include/linux/compiler.h:250 [inline]
 #0: ffff8880a9772138 ((wq_completion)netns){+.+.}-{0:0}, at: arch_atomic64_set arch/x86/include/asm/atomic64_64.h:34 [inline]
 #0: ffff8880a9772138 ((wq_completion)netns){+.+.}-{0:0}, at: atomic64_set include/asm-generic/atomic-instrumented.h:856 [inline]
 #0: ffff8880a9772138 ((wq_completion)netns){+.+.}-{0:0}, at: atomic_long_set include/asm-generic/atomic-long.h:41 [inline]
 #0: ffff8880a9772138 ((wq_completion)netns){+.+.}-{0:0}, at: set_work_data kernel/workqueue.c:615 [inline]
 #0: ffff8880a9772138 ((wq_completion)netns){+.+.}-{0:0}, at: set_work_pool_and_clear_pending kernel/workqueue.c:642 [inline]
 #0: ffff8880a9772138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x844/0x16a0 kernel/workqueue.c:2239
 #1: ffffc90000cdfdc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x878/0x16a0 kernel/workqueue.c:2243
 #2: ffffffff8a5a26f0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x9b/0xa50 net/core/net_namespace.c:565

stack backtrace:
CPU: 1 PID: 7 Comm: kworker/u4:0 Not tainted 5.7.0-rc2-next-20200420-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Workqueue: netns cleanup_net
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x188/0x20d lib/dump_stack.c:118
 ovs_ct_limit_exit net/openvswitch/conntrack.c:1898 [inline]
 ovs_ct_exit+0x3db/0x558 net/openvswitch/conntrack.c:2295
 ovs_exit_net+0x1df/0xba0 net/openvswitch/datapath.c:2469
 ops_exit_list.isra.0+0xa8/0x150 net/core/net_namespace.c:186
 cleanup_net+0x511/0xa50 net/core/net_namespace.c:603
 process_one_work+0x965/0x16a0 kernel/workqueue.c:2268
 worker_thread+0x96/0xe20 kernel/workqueue.c:2414
 kthread+0x38b/0x470 kernel/kthread.c:274
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:352
tipc: TX() has been purged, node left!

=============================
WARNING: suspicious RCU usage
5.7.0-rc2-next-20200420-syzkaller #0 Not tainted
-----------------------------
net/ipv4/ipmr.c:1757 RCU-list traversed in non-reader section!!

other info that might help us debug this:


rcu_scheduler_active = 2, debug_locks = 1
4 locks held by kworker/u4:0/7:
 #0: ffff8880a9772138 ((wq_completion)netns){+.+.}-{0:0}, at: __write_once_size include/linux/compiler.h:250 [inline]
 #0: ffff8880a9772138 ((wq_completion)netns){+.+.}-{0:0}, at: arch_atomic64_set arch/x86/include/asm/atomic64_64.h:34 [inline]
 #0: ffff8880a9772138 ((wq_completion)netns){+.+.}-{0:0}, at: atomic64_set include/asm-generic/atomic-instrumented.h:856 [inline]
 #0: ffff8880a9772138 ((wq_completion)netns){+.+.}-{0:0}, at: atomic_long_set include/asm-generic/atomic-long.h:41 [inline]
 #0: ffff8880a9772138 ((wq_completion)netns){+.+.}-{0:0}, at: set_work_data kernel/workqueue.c:615 [inline]
 #0: ffff8880a9772138 ((wq_completion)netns){+.+.}-{0:0}, at: set_work_pool_and_clear_pending kernel/workqueue.c:642 [inline]
 #0: ffff8880a9772138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x844/0x16a0 kernel/workqueue.c:2239
 #1: ffffc90000cdfdc0 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x878/0x16a0 kernel/workqueue.c:2243
 #2: ffffffff8a5a26f0 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x9b/0xa50 net/core/net_namespace.c:565
 #3: ffffffff8a5ae668 (rtnl_mutex){+.+.}-{3:3}, at: ip6gre_exit_batch_net+0x88/0x700 net/ipv6/ip6_gre.c:1602

stack backtrace:
CPU: 1 PID: 7 Comm: kworker/u4:0 Not tainted 5.7.0-rc2-next-20200420-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Workqueue: netns cleanup_net
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x188/0x20d lib/dump_stack.c:118
 ipmr_device_event+0x240/0x2b0 net/ipv4/ipmr.c:1757
 notifier_call_chain+0xc0/0x230 kernel/notifier.c:83
 call_netdevice_notifiers_info net/core/dev.c:1948 [inline]
 call_netdevice_notifiers_info+0xb5/0x130 net/core/dev.c:1933
 call_netdevice_notifiers_extack net/core/dev.c:1960 [inline]
 call_netdevice_notifiers net/core/dev.c:1974 [inline]
 rollback_registered_many+0x75c/0xe70 net/core/dev.c:8828
 unregister_netdevice_many.part.0+0x16/0x1e0 net/core/dev.c:9988
 unregister_netdevice_many+0x36/0x50 net/core/dev.c:9987
 ip6gre_exit_batch_net+0x4e8/0x700 net/ipv6/ip6_gre.c:1605
 ops_exit_list.isra.0+0x103/0x150 net/core/net_namespace.c:189
 cleanup_net+0x511/0xa50 net/core/net_namespace.c:603
 process_one_work+0x965/0x16a0 kernel/workqueue.c:2268
 worker_thread+0x96/0xe20 kernel/workqueue.c:2414
 kthread+0x38b/0x470 kernel/kthread.c:274
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:352

Crashes (132):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2020/04/20 23:37 linux-next 6735c84f78e4 98a9f9e6 .config console log report ci-upstream-linux-next-kasan-gce-root
2020/04/20 11:34 linux-next 6735c84f78e4 347a5dc3 .config console log report ci-upstream-linux-next-kasan-gce-root
2020/04/20 04:54 linux-next 6735c84f78e4 9f7c6d12 .config console log report ci-upstream-linux-next-kasan-gce-root
2020/04/19 23:31 linux-next ea16390b6f2d 9f7c6d12 .config console log report ci-upstream-linux-next-kasan-gce-root
2020/04/19 11:28 linux-next ea16390b6f2d 6dfd45e1 .config console log report ci-upstream-linux-next-kasan-gce-root
2020/04/18 13:06 linux-next ea16390b6f2d 365fba24 .config console log report ci-upstream-linux-next-kasan-gce-root
2020/04/17 19:24 linux-next ea16390b6f2d 435c6d53 .config console log report ci-upstream-linux-next-kasan-gce-root
2020/04/17 05:15 linux-next ea16390b6f2d c743fcb3 .config console log report ci-upstream-linux-next-kasan-gce-root
2020/04/16 06:34 linux-next a3ca59b9af21 3f3c5574 .config console log report ci-upstream-linux-next-kasan-gce-root
2020/04/16 06:34 linux-next a3ca59b9af21 3f3c5574 .config console log report ci-upstream-linux-next-kasan-gce-root
2020/04/03 10:25 linux-next 606b5dac8e15 5ed396e6 .config console log report ci-upstream-linux-next-kasan-gce-root
2020/04/03 06:43 linux-next 606b5dac8e15 a34e2c33 .config console log report ci-upstream-linux-next-kasan-gce-root
2020/04/02 09:55 linux-next 17f166b56b25 a34e2c33 .config console log report ci-upstream-linux-next-kasan-gce-root
2020/04/01 07:41 linux-next 8274500e2b67 a34e2c33 .config console log report ci-upstream-linux-next-kasan-gce-root
2020/04/01 01:14 linux-next 3eb7cccdb3ae a34e2c33 .config console log report ci-upstream-linux-next-kasan-gce-root
2020/03/31 11:22 linux-next 3eb7cccdb3ae c8d1cc20 .config console log report ci-upstream-linux-next-kasan-gce-root
2020/03/30 12:14 linux-next 27a8b6c16291 c8d1cc20 .config console log report ci-upstream-linux-next-kasan-gce-root
2020/03/30 12:14 linux-next 27a8b6c16291 c8d1cc20 .config console log report ci-upstream-linux-next-kasan-gce-root
2020/03/29 00:04 linux-next 975f7a88c64d 05736b29 .config console log report ci-upstream-linux-next-kasan-gce-root
2020/03/28 11:04 linux-next 975f7a88c64d f1ebdfba .config console log report ci-upstream-linux-next-kasan-gce-root
2020/03/27 17:16 linux-next 975f7a88c64d 831e9a81 .config console log report ci-upstream-linux-next-kasan-gce-root
2020/03/27 08:29 linux-next 975f7a88c64d 7d95711b .config console log report ci-upstream-linux-next-kasan-gce-root
2020/03/27 05:20 linux-next 89295c59c1f0 7d95711b .config console log report ci-upstream-linux-next-kasan-gce-root
2020/03/26 15:09 linux-next 89295c59c1f0 6d25c5a0 .config console log report ci-upstream-linux-next-kasan-gce-root
2020/03/26 11:26 linux-next 89295c59c1f0 e8e6c7d2 .config console log report ci-upstream-linux-next-kasan-gce-root
2020/03/26 01:56 linux-next bfd7a2485023 e8e6c7d2 .config console log report ci-upstream-linux-next-kasan-gce-root
2020/03/25 11:50 linux-next bfd7a2485023 41f049cc .config console log report ci-upstream-linux-next-kasan-gce-root
2020/03/25 09:20 linux-next bfd7a2485023 41f049cc .config console log report ci-upstream-linux-next-kasan-gce-root
2020/03/25 04:14 linux-next f15e8108f625 41f049cc .config console log report ci-upstream-linux-next-kasan-gce-root
2020/03/25 04:14 linux-next f15e8108f625 41f049cc .config console log report ci-upstream-linux-next-kasan-gce-root
2020/03/24 16:06 linux-next f15e8108f625 68660b21 .config console log report ci-upstream-linux-next-kasan-gce-root
2020/03/24 16:06 linux-next f15e8108f625 68660b21 .config console log report ci-upstream-linux-next-kasan-gce-root
2020/03/24 16:06 linux-next f15e8108f625 68660b21 .config console log report ci-upstream-linux-next-kasan-gce-root
2020/03/24 08:42 linux-next f15e8108f625 33e14df3 .config console log report ci-upstream-linux-next-kasan-gce-root
2020/03/24 08:42 linux-next f15e8108f625 33e14df3 .config console log report ci-upstream-linux-next-kasan-gce-root
2020/03/24 08:42 linux-next f15e8108f625 33e14df3 .config console log report ci-upstream-linux-next-kasan-gce-root
2020/03/24 03:59 linux-next 5149100c3aeb 33e14df3 .config console log report ci-upstream-linux-next-kasan-gce-root
2020/03/24 03:59 linux-next 5149100c3aeb 33e14df3 .config console log report ci-upstream-linux-next-kasan-gce-root
2020/03/24 03:59 linux-next 5149100c3aeb 33e14df3 .config console log report ci-upstream-linux-next-kasan-gce-root
2020/03/23 15:44 linux-next 5149100c3aeb 84f999d6 .config console log report ci-upstream-linux-next-kasan-gce-root
2020/03/23 15:44 linux-next 5149100c3aeb 84f999d6 .config console log report ci-upstream-linux-next-kasan-gce-root
2020/03/23 15:43 linux-next 5149100c3aeb 84f999d6 .config console log report ci-upstream-linux-next-kasan-gce-root
2020/03/23 10:49 linux-next 5149100c3aeb 78267cec .config console log report ci-upstream-linux-next-kasan-gce-root
2020/03/23 10:49 linux-next 5149100c3aeb 78267cec .config console log report ci-upstream-linux-next-kasan-gce-root
2020/03/14 02:18 linux-next 2e602db72994 749688d2 .config console log report ci-upstream-linux-next-kasan-gce-root
* Struck through repros no longer work on HEAD.