From patchwork Thu Dec 20 18:16:00 2012 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Eric Dumazet X-Patchwork-Id: 207695 X-Patchwork-Delegate: davem@davemloft.net Return-Path: X-Original-To: patchwork-incoming@ozlabs.org Delivered-To: patchwork-incoming@ozlabs.org Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by ozlabs.org (Postfix) with ESMTP id D3B062C00A4 for ; Fri, 21 Dec 2012 05:16:10 +1100 (EST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752075Ab2LTSQJ (ORCPT ); Thu, 20 Dec 2012 13:16:09 -0500 Received: from mail-pb0-f53.google.com ([209.85.160.53]:54156 "EHLO mail-pb0-f53.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751274Ab2LTSQG (ORCPT ); Thu, 20 Dec 2012 13:16:06 -0500 Received: by mail-pb0-f53.google.com with SMTP id jt11so2153641pbb.26 for ; Thu, 20 Dec 2012 10:16:05 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:subject:from:to:cc:in-reply-to:references:content-type :date:message-id:mime-version:x-mailer:content-transfer-encoding; bh=e6AV1ncKeCI6OpQTjDwDV7Chg13QojKW3A29phN5jek=; b=Btxte2HHL7aaAURUZBmguUebm8oTZmCpLp1EyAqu/7ebNlrt6ct7uQVvFQztCWvM9L ciLg9oVXOWebeee5sMDVhmYuK7os5LbAdD72zuT39HNCO54mhknp2eBl1kF9ZQnHjq29 UmPBtuC0kXxZhU+0jwxwexGJu/C1jaZjvx4U8QPu4n0/xyFBxYbp13JaPlhhp5W2Yr1t gyuXKc1fPZmxpmcMC8itQvWsOYoq3vSu/ZXCNg+3qnfi5uRNFbLouOyJOFknuRh149VQ TeWnu3fn3dUNuJD2kDXODZjz46oaHaJ5l7ERfKYXgrcJpWfNtV9zNhZjeHd647KPD38R O0/Q== X-Received: by 10.68.132.232 with SMTP id ox8mr31969371pbb.46.1356027365274; Thu, 20 Dec 2012 10:16:05 -0800 (PST) Received: from [172.19.250.97] ([172.19.250.97]) by mx.google.com with ESMTPS id wh8sm5409041pbc.75.2012.12.20.10.16.02 (version=SSLv3 cipher=OTHER); Thu, 20 Dec 2012 10:16:04 -0800 (PST) Subject: Re: Lockdep warning in vxlan From: Eric Dumazet To: Stephen Hemminger Cc: Yan Burman , netdev@vger.kernel.org In-Reply-To: <20121220083436.0c7fc33f@nehalam.linuxnetplumber.net> References: <50D31A00.7060905@mellanox.com> <20121220083436.0c7fc33f@nehalam.linuxnetplumber.net> Date: Thu, 20 Dec 2012 10:16:00 -0800 Message-ID: <1356027360.21834.2973.camel@edumazet-glaptop> Mime-Version: 1.0 X-Mailer: Evolution 2.28.3 Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org On Thu, 2012-12-20 at 08:34 -0800, Stephen Hemminger wrote: > On Thu, 20 Dec 2012 16:00:32 +0200 > Yan Burman wrote: > > > Hi. > > > > When working with vxlan from current net-next, I got a lockdep warning > > (below). > > It seems to happen when I have host B pinging host A and while the pings > > continue, > > I do "ip link del" on the vxlan interface on host A. The lockdep warning > > is on host A. > > Tell me if you need some more info. > > > > Looks like the case of nested ARP requests, the initial request is coming > from neigh_timer (ARP retransmit), but inside neigh_probe the lock > is dropped? Bug is from arp_solicit(), releasing the lock after arp_send() Its used to protect neigh->ha We could instead copy neigh->ha, without taking n->lock but ha_lock seqlock, using neigh_ha_snapshot() helper Yan, could you test the following patch ? Thanks --- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html diff --git a/net/ipv4/arp.c b/net/ipv4/arp.c index ce6fbdf..1169ed4 100644 --- a/net/ipv4/arp.c +++ b/net/ipv4/arp.c @@ -321,7 +321,7 @@ static void arp_error_report(struct neighbour *neigh, struct sk_buff *skb) static void arp_solicit(struct neighbour *neigh, struct sk_buff *skb) { __be32 saddr = 0; - u8 *dst_ha = NULL; + u8 dst_ha[MAX_ADDR_LEN]; struct net_device *dev = neigh->dev; __be32 target = *(__be32 *)neigh->primary_key; int probes = atomic_read(&neigh->probes); @@ -363,9 +363,9 @@ static void arp_solicit(struct neighbour *neigh, struct sk_buff *skb) if (probes < 0) { if (!(neigh->nud_state & NUD_VALID)) pr_debug("trying to ucast probe in NUD_INVALID\n"); - dst_ha = neigh->ha; - read_lock_bh(&neigh->lock); + neigh_ha_snapshot(dst_ha, neigh, dev); } else { + memset(dst_ha, 0, dev->addr_len); probes -= neigh->parms->app_probes; if (probes < 0) { #ifdef CONFIG_ARPD @@ -377,8 +377,6 @@ static void arp_solicit(struct neighbour *neigh, struct sk_buff *skb) arp_send(ARPOP_REQUEST, ETH_P_ARP, target, dev, saddr, dst_ha, dev->dev_addr, NULL); - if (dst_ha) - read_unlock_bh(&neigh->lock); } static int arp_ignore(struct in_device *in_dev, __be32 sip, __be32 tip)