• Paolo Abeni's avatar
    mptcp: fix lockdep false positive · fec3adfd
    Paolo Abeni authored
    MattB reported a lockdep splat in the mptcp listener code cleanup:
    
     WARNING: possible circular locking dependency detected
     packetdrill/14278 is trying to acquire lock:
     ffff888017d868f0 ((work_completion)(&msk->work)){+.+.}-{0:0}, at: __flush_work (kernel/workqueue.c:3069)
    
     but task is already holding lock:
     ffff888017d84130 (sk_lock-AF_INET){+.+.}-{0:0}, at: mptcp_close (net/mptcp/protocol.c:2973)
    
     which lock already depends on the new lock.
    
     the existing dependency chain (in reverse order) is:
    
     -> #1 (sk_lock-AF_INET){+.+.}-{0:0}:
            __lock_acquire (kernel/locking/lockdep.c:5055)
            lock_acquire (kernel/locking/lockdep.c:466)
            lock_sock_nested (net/core/sock.c:3463)
            mptcp_worker (net/mptcp/protocol.c:2614)
            process_one_work (kernel/workqueue.c:2294)
            worker_thread (include/linux/list.h:292)
            kthread (kernel/kthread.c:376)
            ret_from_fork (arch/x86/entry/entry_64.S:312)
    
     -> #0 ((work_completion)(&msk->work)){+.+.}-{0:0}:
            check_prev_add (kernel/locking/lockdep.c:3098)
            validate_chain (kernel/locking/lockdep.c:3217)
            __lock_acquire (kernel/locking/lockdep.c:5055)
            lock_acquire (kernel/locking/lockdep.c:466)
            __flush_work (kernel/workqueue.c:3070)
            __cancel_work_timer (kernel/workqueue.c:3160)
            mptcp_cancel_work (net/mptcp/protocol.c:2758)
            mptcp_subflow_queue_clean (net/mptcp/subflow.c:1817)
            __mptcp_close_ssk (net/mptcp/protocol.c:2363)
            mptcp_destroy_common (net/mptcp/protocol.c:3170)
            mptcp_destroy (include/net/sock.h:1495)
            __mptcp_destroy_sock (net/mptcp/protocol.c:2886)
            __mptcp_close (net/mptcp/protocol.c:2959)
            mptcp_close (net/mptcp/protocol.c:2974)
            inet_release (net/ipv4/af_inet.c:432)
            __sock_release (net/socket.c:651)
            sock_close (net/socket.c:1367)
            __fput (fs/file_table.c:320)
            task_work_run (kernel/task_work.c:181 (discriminator 1))
            exit_to_user_mode_prepare (include/linux/resume_user_mode.h:49)
            syscall_exit_to_user_mode (kernel/entry/common.c:130)
            do_syscall_64 (arch/x86/entry/common.c:87)
            entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:120)
    
     other info that might help us debug this:
    
      Possible unsafe locking scenario:
    
            CPU0                    CPU1
            ----                    ----
       lock(sk_lock-AF_INET);
                                    lock((work_completion)(&msk->work));
                                    lock(sk_lock-AF_INET);
       lock((work_completion)(&msk->work));
    
      *** DEADLOCK ***
    
    The report is actually a false positive, since the only existing lock
    nesting is the msk socket lock acquired by the mptcp work.
    cancel_work_sync() is invoked without the relevant socket lock being
    held, but under a different (the msk listener) socket lock.
    
    We could silence the splat adding a per workqueue dynamic lockdep key,
    but that looks overkill. Instead just tell lockdep the msk socket lock
    is not held around cancel_work_sync().
    
    Closes: https://github.com/multipath-tcp/mptcp_net-next/issues/322
    Fixes: 30e51b92 ("mptcp: fix unreleased socket in accept queue")
    Reported-by: default avatarMatthieu Baerts <matthieu.baerts@tessares.net>
    Reviewed-by: default avatarMat Martineau <mathew.j.martineau@linux.intel.com>
    Signed-off-by: default avatarPaolo Abeni <pabeni@redhat.com>
    Signed-off-by: default avatarMat Martineau <mathew.j.martineau@linux.intel.com>
    Signed-off-by: default avatarJakub Kicinski <kuba@kernel.org>
    fec3adfd
subflow.c 57 KB