Re: DEBUG_LOCKS_WARN_ON(in_interrupt()) triggering in socket code

From: Jason A. Donenfeld
Date: Fri Aug 21 2015 - 05:19:08 EST


Bueller? ... Bueller?

On Thu, Aug 20, 2015 at 2:39 AM, Jason A. Donenfeld <Jason@xxxxxxxxx> wrote:
> Hi folks,
>
> In setting up a socket, there are two functions I make use of that in
> turn wind up calling static_key_slow_inc: setup_udp_tunnel_sock and
> sk_set_memalloc. These both make use of static_key_slow_inc because
> they selectively enable certain important code paths.
>
> This is all fine, except it poses some problems when calling these
> functions inside of .ndo_open. In that case, I get ugly (debug)
> warnings like this:
>
> WARNING: CPU: 1 PID: 2002 at kernel/locking/mutex.c:526
> mutex_lock_nested+0x39b/0x3b0()
> DEBUG_LOCKS_WARN_ON(in_interrupt())
> [<ffffffff81621d0e>] dump_stack+0x45/0x57
> [<ffffffff810505ca>] warn_slowpath_common+0x8a/0xc0
> [<ffffffff81050655>] warn_slowpath_fmt+0x55/0x70
> [<ffffffff8162513b>] mutex_lock_nested+0x39b/0x3b0
> [<ffffffff8113d699>] static_key_slow_inc+0x59/0xc0
> [<ffffffff8154ebc0>] udp_encap_enable+0x20/0x30
> [<ffffffff8157a885>] setup_udp_tunnel_sock+0x55/0x70
> [<ffffffff816028ac>] socket_init+0x1cc/0x3a0
> [<ffffffff81600341>] open+0x21/0x1b0
> [<ffffffff81476af0>] __dev_open+0xb0/0x110
> [<ffffffff81476e01>] __dev_change_flags+0xa1/0x160
> [<ffffffff81476ee9>] dev_change_flags+0x29/0x70
> [<ffffffff8148652a>] do_setlink+0x5da/0xa80
> [<ffffffff81487bed>] rtnl_newlink+0x50d/0x8a0
> [<ffffffff81485141>] rtnetlink_rcv_msg+0xa1/0x240
> [<ffffffff8149f1fb>] netlink_rcv_skb+0x9b/0xc0
> [<ffffffff8148508e>] rtnetlink_rcv+0x2e/0x40
> [<ffffffff8149ec3f>] netlink_unicast+0x16f/0x200
> [<ffffffff8149f009>] netlink_sendmsg+0x339/0x380
> [<ffffffff814559d9>] ___sys_sendmsg+0x2f9/0x310
> [<ffffffff814566d7>] __sys_sendmsg+0x57/0xa0
> [<ffffffff81456732>] SyS_sendmsg+0x12/0x20
> [<ffffffff816295b2>] entry_SYSCALL_64_fastpath+0x16/0x7a
>
> The reason is that the static key code makes use of mutexes. And the
> mutex debug code ensures that in_interrupt() is zero; otherwise it
> prints that warning. In this case, in_interrupt() has a value of 512.
>
> So, questions:
>
> 1. Is the best thing to do just move my socket creation routine into a
> workqueue, and avoid this issue all together?
> 2. Is it, in fact, incorrect to check for in_interrupt(), and the
> debug assertion is actually wrong?
> 3. Is it a bug that in_interrupt() is returning non-zero in relation
> to a syscall?
>
> Thanks,
> Jason
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/