From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S934327AbdKBTHK (ORCPT ); Thu, 2 Nov 2017 15:07:10 -0400 Received: from Chamillionaire.breakpoint.cc ([146.0.238.67]:60606 "EHLO Chamillionaire.breakpoint.cc" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932571AbdKBTHJ (ORCPT ); Thu, 2 Nov 2017 15:07:09 -0400 Date: Thu, 2 Nov 2017 20:06:31 +0100 From: Florian Westphal To: Cong Wang Cc: syzbot , David Miller , Alexey Kuznetsov , LKML , Linux Kernel Network Developers , syzkaller-bugs@googlegroups.com, Hideaki YOSHIFUJI Subject: Re: suspicious RCU usage at ./include/linux/inetdevice.h:LINE Message-ID: <20171102190631.GD9424@breakpoint.cc> References: <001a114a958cf58255055cfdccb2@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Cong Wang wrote: > > CPU: 0 PID: 23859 Comm: syz-executor2 Not tainted 4.14.0-rc5+ #140 > > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS > > Google 01/01/2011 > > Call Trace: > > __dump_stack lib/dump_stack.c:16 [inline] > > dump_stack+0x194/0x257 lib/dump_stack.c:52 > > lockdep_rcu_suspicious+0x123/0x170 kernel/locking/lockdep.c:4665 > > __in_dev_get_rtnl include/linux/inetdevice.h:230 [inline] > > fib_dump_info+0x1136/0x13d0 net/ipv4/fib_semantics.c:1377 > > inet_rtm_getroute+0xf97/0x2d70 net/ipv4/route.c:2785 > > This is introduced by: > > commit 394f51abb3d04f33fb798f04b16ae6b0491ea4ec > Author: Florian Westphal > Date: Tue Aug 15 16:34:44 2017 +0200 > > ipv4: route: set ipv4 RTM_GETROUTE to not use rtnl > > Signed-off-by: Florian Westphal > Signed-off-by: David S. Miller > > Looks like we need a wrapper for rcu_dereference_protected(dev->ip_ptr). Yes, thats the alternative to https://patchwork.ozlabs.org/patch/833401/ which switches to _rcu version.