2.6.19-1.2891.fc7 -- INFO: soft-safe -> soft-unsafe lock order detected

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



[ INFO: soft-safe -> soft-unsafe lock order detected ]
2.6.19-1.2891.fc7 #1
------------------------------------------------------
cupsd/1884 [HC0[0]:SC0[1]:HE1:SE0] is trying to acquire:
(&ssec->nlbl_lock){--..}, at: [<c04cec37>]
selinux_netlbl_socket_setsid+0xbb/0x123

and this task is already holding:
(af_callback_keys + sk->sk_family#3){-.-+}, at: [<c05daa1c>]
inet_accept+0x70/0xb5
which would create a new lock dependency:
(af_callback_keys + sk->sk_family#3){-.-+} -> (&ssec->nlbl_lock){--..}

but this new dependency connects a soft-irq-safe lock:
(af_callback_keys + sk->sk_family#3){-.-+}
... which became soft-irq-safe at:
 [<c043fff1>] __lock_acquire+0x37d/0x9f8
 [<c044094d>] lock_acquire+0x56/0x6f
 [<c05fbdb6>] _read_lock_bh+0x30/0x3d
 [<c04c687e>] selinux_socket_sock_rcv_skb+0xbd/0x252
 [<c05d0645>] tcp_v4_rcv+0x37a/0x909
 [<c05b7593>] ip_local_deliver+0x185/0x22e
 [<c05b73d6>] ip_rcv+0x418/0x450
 [<c059ae9c>] netif_receive_skb+0x2db/0x35a
 [<c059c85f>] process_backlog+0x95/0xf6
 [<c059ca46>] net_rx_action+0xa1/0x1a8
 [<c042bf5a>] __do_softirq+0x6f/0xe2
 [<c04063a1>] do_softirq+0x61/0xc7
 [<ffffffff>] 0xffffffff

to a soft-irq-unsafe lock:
(&ssec->nlbl_lock){--..}
... which became soft-irq-unsafe at:
...  [<c044007d>] __lock_acquire+0x409/0x9f8
 [<c044094d>] lock_acquire+0x56/0x6f
 [<c05fbc89>] _spin_lock+0x2b/0x38
 [<c04cec37>] selinux_netlbl_socket_setsid+0xbb/0x123
 [<c04d0c92>] selinux_netlbl_socket_post_create+0x2d/0x2f
 [<c04c807b>] selinux_socket_post_create+0x156/0x15c
 [<c059213c>] __sock_create+0x179/0x1b2
 [<c05921ae>] sock_create+0x1a/0x1f
 [<c0592435>] sys_socket+0x1b/0x3c
 [<c0592cba>] sys_socketcall+0x77/0x241
 [<c0404050>] syscall_call+0x7/0xb
 [<ffffffff>] 0xffffffff

other info that might help us debug this:

3 locks held by cupsd/1884:
#0:  (sk_lock-AF_INET){--..}, at: [<c05da9dd>] inet_accept+0x31/0xb5
#1:  (af_callback_keys + sk->sk_family#3){-.-+}, at: [<c05daa1c>]
inet_accept+0x70/0xb5
#2:  (policy_rwlock){..-?}, at: [<c04cebd0>]
selinux_netlbl_socket_setsid+0x54/0x123

the soft-irq-safe lock's dependencies:
-> (af_callback_keys + sk->sk_family#3){-.-+} ops: 0 {
  initial-use  at:
                       [<c0440098>] __lock_acquire+0x424/0x9f8
                       [<c044094d>] lock_acquire+0x56/0x6f
                       [<c05fbd3b>] _write_lock_bh+0x30/0x3d
                       [<c05c1871>] tcp_close+0x24b/0x52b
                       [<c05da570>] inet_release+0x43/0x49
                       [<c0591f72>] sock_release+0x17/0x68
                       [<c05921e0>] sock_close+0x2d/0x33
                       [<c047959b>] __fput+0xbe/0x168
                       [<c047965c>] fput+0x17/0x19
                       [<c0476f5d>] filp_close+0x54/0x5c
                       [<c0477ee1>] sys_close+0x78/0xb0
                       [<c0404050>] syscall_call+0x7/0xb
                       [<ffffffff>] 0xffffffff
  hardirq-on-W at:
                       [<c0440056>] __lock_acquire+0x3e2/0x9f8
                       [<c044094d>] lock_acquire+0x56/0x6f
                       [<c05fbd3b>] _write_lock_bh+0x30/0x3d
                       [<c05c1871>] tcp_close+0x24b/0x52b
                       [<c05da570>] inet_release+0x43/0x49
                       [<c0591f72>] sock_release+0x17/0x68
                       [<c05921e0>] sock_close+0x2d/0x33
                       [<c047959b>] __fput+0xbe/0x168
                       [<c047965c>] fput+0x17/0x19
                       [<c0476f5d>] filp_close+0x54/0x5c
                       [<c0477ee1>] sys_close+0x78/0xb0
                       [<c0404050>] syscall_call+0x7/0xb
                       [<ffffffff>] 0xffffffff
  in-softirq-R at:
                       [<c043fff1>] __lock_acquire+0x37d/0x9f8
                       [<c044094d>] lock_acquire+0x56/0x6f
                       [<c05fbdb6>] _read_lock_bh+0x30/0x3d
                       [<c04c687e>] selinux_socket_sock_rcv_skb+0xbd/0x252
                       [<c05d0645>] tcp_v4_rcv+0x37a/0x909
                       [<c05b7593>] ip_local_deliver+0x185/0x22e
                       [<c05b73d6>] ip_rcv+0x418/0x450
                       [<c059ae9c>] netif_receive_skb+0x2db/0x35a
                       [<c059c85f>] process_backlog+0x95/0xf6
                       [<c059ca46>] net_rx_action+0xa1/0x1a8
                       [<c042bf5a>] __do_softirq+0x6f/0xe2
                       [<c04063a1>] do_softirq+0x61/0xc7
                       [<ffffffff>] 0xffffffff
  hardirq-on-R at:
                       [<c044001f>] __lock_acquire+0x3ab/0x9f8
                       [<c044094d>] lock_acquire+0x56/0x6f
                       [<c05fbdb6>] _read_lock_bh+0x30/0x3d
                       [<c04c687e>] selinux_socket_sock_rcv_skb+0xbd/0x252
                       [<c05d0645>] tcp_v4_rcv+0x37a/0x909
                       [<c05b7593>] ip_local_deliver+0x185/0x22e
                       [<c05b73d6>] ip_rcv+0x418/0x450
                       [<c059ae9c>] netif_receive_skb+0x2db/0x35a
                       [<c059c85f>] process_backlog+0x95/0xf6
                       [<c059ca46>] net_rx_action+0xa1/0x1a8
                       [<c042bf5a>] __do_softirq+0x6f/0xe2
                       [<c04063a1>] do_softirq+0x61/0xc7
                       [<ffffffff>] 0xffffffff
}
... key      at: [<c09f6770>] af_callback_keys+0x10/0x100

the soft-irq-unsafe lock's dependencies:
-> (&ssec->nlbl_lock){--..} ops: 0 {
  initial-use  at:
                       [<c0440098>] __lock_acquire+0x424/0x9f8
                       [<c044094d>] lock_acquire+0x56/0x6f
                       [<c05fbc89>] _spin_lock+0x2b/0x38
                       [<c04cec37>] selinux_netlbl_socket_setsid+0xbb/0x123
                       [<c04d0c92>] selinux_netlbl_socket_post_create+0x2d/0x2f
                       [<c04c807b>] selinux_socket_post_create+0x156/0x15c
                       [<c059213c>] __sock_create+0x179/0x1b2
                       [<c05921ae>] sock_create+0x1a/0x1f
                       [<c0592435>] sys_socket+0x1b/0x3c
                       [<c0592cba>] sys_socketcall+0x77/0x241
                       [<c0404050>] syscall_call+0x7/0xb
                       [<ffffffff>] 0xffffffff
  softirq-on-W at:
                       [<c044007d>] __lock_acquire+0x409/0x9f8
                       [<c044094d>] lock_acquire+0x56/0x6f
                       [<c05fbc89>] _spin_lock+0x2b/0x38
                       [<c04cec37>] selinux_netlbl_socket_setsid+0xbb/0x123
                       [<c04d0c92>] selinux_netlbl_socket_post_create+0x2d/0x2f
                       [<c04c807b>] selinux_socket_post_create+0x156/0x15c
                       [<c059213c>] __sock_create+0x179/0x1b2
                       [<c05921ae>] sock_create+0x1a/0x1f
                       [<c0592435>] sys_socket+0x1b/0x3c
                       [<c0592cba>] sys_socketcall+0x77/0x241
                       [<c0404050>] syscall_call+0x7/0xb
                       [<ffffffff>] 0xffffffff
  hardirq-on-W at:
                       [<c0440056>] __lock_acquire+0x3e2/0x9f8
                       [<c044094d>] lock_acquire+0x56/0x6f
                       [<c05fbc89>] _spin_lock+0x2b/0x38
                       [<c04cec37>] selinux_netlbl_socket_setsid+0xbb/0x123
                       [<c04d0c92>] selinux_netlbl_socket_post_create+0x2d/0x2f
                       [<c04c807b>] selinux_socket_post_create+0x156/0x15c
                       [<c059213c>] __sock_create+0x179/0x1b2
                       [<c05921ae>] sock_create+0x1a/0x1f
                       [<c0592435>] sys_socket+0x1b/0x3c
                       [<c0592cba>] sys_socketcall+0x77/0x241
                       [<c0404050>] syscall_call+0x7/0xb
                       [<ffffffff>] 0xffffffff
}
... key      at: [<c09ebb20>] __key.27522+0x0/0x8

stack backtrace:
[<c04051c1>] show_trace_log_lvl+0x1a/0x2f
[<c0405766>] show_trace+0x12/0x14
[<c04057ea>] dump_stack+0x16/0x18
[<c043fbe0>] check_usage+0x242/0x24c
[<c04404f3>] __lock_acquire+0x87f/0x9f8
[<c044094d>] lock_acquire+0x56/0x6f
[<c05fbc89>] _spin_lock+0x2b/0x38
[<c04cec37>] selinux_netlbl_socket_setsid+0xbb/0x123
[<c04d0f40>] selinux_netlbl_sock_graft+0xc7/0xcf
[<c04c4b74>] selinux_sock_graft+0x32/0x36
[<c05daa3b>] inet_accept+0x8f/0xb5
[<c0592b93>] sys_accept+0xd0/0x180
[<c0592d13>] sys_socketcall+0xd0/0x241
[<c0404050>] syscall_call+0x7/0xb

--
fedora-test-list mailing list
fedora-test-list@xxxxxxxxxx
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-test-list

[Index of Archives]     [Fedora Desktop]     [Fedora SELinux]     [Photo Sharing]     [Yosemite Forum]     [KDE Users]