lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <E1ScqB9-0004Ay-P8@tytso-glaptop.cam.corp.google.com>
Date:	Thu, 07 Jun 2012 23:48:03 -0400
From:	"Theodore Ts'o" <tytso@....edu>
To:	Jan Kara <jack@...e.cz>
cc:	linux-ext4@...r.kernel.org
Subject: Circular locking bug found in xfstests

I found this while testing 3.5-rc1 with a two ext4 bug fix patches
(b22b1f178f from the ext4 tree) that will be shortly pushed to Linus.

The two bug fixes are unrelated to the quota system; and I don't recall
seeing anything like this when I was testing 3.4-rcX based kernels.  I
could try bisecting it, but I thought I'd ask if you could see something
obvious.

Cheers,

						- Ted

219	[  938.212950] 
[  938.213365] ======================================================
[  938.214690] [ INFO: possible circular locking dependency detected ]
[  938.215853] 3.5.0-rc1-00002-gb22b1f1 #124 Not tainted
[  938.216005] -------------------------------------------------------
[  938.216005] quotaon/27560 is trying to acquire lock:
[  938.216005]  (&sb->s_type->i_mutex_key#7){+.+.+.}, at: [<c0249bbd>] vfs_load_quota_inode+0x15b/0x3f2
[  938.216005] 
[  938.216005] but task is already holding lock:
[  938.216005]  (&s->s_dquot.dqonoff_mutex){+.+...}, at: [<c0249b80>] vfs_load_quota_inode+0x11e/0x3f2
[  938.216005] 
[  938.216005] which lock already depends on the new lock.
[  938.216005] 
[  938.216005] 
[  938.216005] the existing dependency chain (in reverse order) is:
[  938.216005] 
[  938.216005] -> #2 (&s->s_dquot.dqonoff_mutex){+.+...}:
[  938.216005]        [<c019b4ff>] lock_acquire+0x99/0xbd
[  938.216005]        [<c06ea154>] __mutex_lock_common+0x30/0x316
[  938.216005]        [<c06ea4e8>] mutex_lock_nested+0x26/0x2f
[  938.216005]        [<c024a03e>] dquot_resume+0x39/0xe8
[  938.216005]        [<c028d631>] ext4_remount+0x358/0x429
[  938.216005]        [<c0210aef>] do_remount_sb+0xae/0x120
[  938.216005]        [<c0225af0>] do_mount+0x236/0x691
[  938.216005]        [<c0225fb1>] sys_mount+0x66/0x95
[  938.216005]        [<c06ec7d5>] syscall_call+0x7/0xb
[  938.216005] 
[  938.216005] -> #1 (&type->s_umount_key#18){+++++.}:
[  938.216005]        [<c019b4ff>] lock_acquire+0x99/0xbd
[  938.216005]        [<c06ea99f>] down_read+0x28/0x65
[  938.216005]        [<c022bf3a>] writeback_inodes_sb_if_idle+0x2c/0x47
[  938.216005]        [<c02757bc>] ext4_nonda_switch+0xf4/0x105
[  938.216005]        [<c027abfa>] ext4_da_write_begin+0x3c/0x194
[  938.216005]        [<c01df8e6>] generic_file_buffered_write+0xd1/0x1db
[  938.216005]        [<c01e0a29>] __generic_file_aio_write+0x25e/0x28f
[  938.216005]        [<c01e0ac4>] generic_file_aio_write+0x6a/0xba
[  938.216005]        [<c02734ba>] ext4_file_write+0x1dc/0x22a
[  938.216005]        [<c020edb3>] do_sync_write+0x92/0xcd
[  938.216005]        [<c020f702>] vfs_write+0x85/0xe3
[  938.216005]        [<c020f801>] sys_write+0x40/0x65
[  938.216005]        [<c06ec7d5>] syscall_call+0x7/0xb
[  938.216005] 
[  938.216005] -> #0 (&sb->s_type->i_mutex_key#7){+.+.+.}:
[  938.216005]        [<c019b1fa>] __lock_acquire+0x982/0xbee
[  938.216005]        [<c019b4ff>] lock_acquire+0x99/0xbd
[  938.216005]        [<c06ea154>] __mutex_lock_common+0x30/0x316
[  938.216005]        [<c06ea4e8>] mutex_lock_nested+0x26/0x2f
[  938.216005]        [<c0249bbd>] vfs_load_quota_inode+0x15b/0x3f2
[  938.216005]        [<c0249ffd>] dquot_quota_on+0x41/0x49
[  938.216005]        [<c028bfed>] ext4_quota_on+0x12e/0x13b
[  938.216005]        [<c024cbd1>] do_quotactl+0x1b8/0x3a0
[  938.216005]        [<c024cefb>] sys_quotactl+0x142/0x17b
[  938.216005]        [<c06ec7d5>] syscall_call+0x7/0xb
[  938.216005] 
[  938.216005] other info that might help us debug this:
[  938.216005] 
[  938.216005] Chain exists of:
[  938.216005]   &sb->s_type->i_mutex_key#7 --> &type->s_umount_key#18 --> &s->s_dquot.dqonoff_mutex
[  938.216005] 
[  938.216005]  Possible unsafe locking scenario:
[  938.216005] 
[  938.216005]        CPU0                    CPU1
[  938.216005]        ----                    ----
[  938.216005]   lock(&s->s_dquot.dqonoff_mutex);
[  938.216005]                                lock(&type->s_umount_key#18);
[  938.216005]                                lock(&s->s_dquot.dqonoff_mutex);
[  938.216005]   lock(&sb->s_type->i_mutex_key#7);
[  938.216005] 
[  938.216005]  *** DEADLOCK ***
[  938.216005] 
[  938.216005] 2 locks held by quotaon/27560:
[  938.216005]  #0:  (&type->s_umount_key#18){+++++.}, at: [<c0210d0a>] get_super+0x50/0x93
[  938.216005]  #1:  (&s->s_dquot.dqonoff_mutex){+.+...}, at: [<c0249b80>] vfs_load_quota_inode+0x11e/0x3f2
[  938.216005] 
[  938.216005] stack backtrace:
[  938.216005] Pid: 27560, comm: quotaon Not tainted 3.5.0-rc1-00002-gb22b1f1 #124
[  938.216005] Call Trace:
[  938.216005]  [<c0199164>] print_circular_bug+0x194/0x1a1
[  938.216005]  [<c019b1fa>] __lock_acquire+0x982/0xbee
[  938.216005]  [<c01dfe69>] ? find_get_pages+0xee/0xf8
[  938.216005]  [<c019b4ff>] lock_acquire+0x99/0xbd
[  938.216005]  [<c0249bbd>] ? vfs_load_quota_inode+0x15b/0x3f2
[  938.216005]  [<c06ea154>] __mutex_lock_common+0x30/0x316
[  938.216005]  [<c0249bbd>] ? vfs_load_quota_inode+0x15b/0x3f2
[  938.216005]  [<c06ea4e8>] mutex_lock_nested+0x26/0x2f
[  938.216005]  [<c0249bbd>] ? vfs_load_quota_inode+0x15b/0x3f2
[  938.216005]  [<c0249bbd>] vfs_load_quota_inode+0x15b/0x3f2
[  938.216005]  [<c0249ffd>] dquot_quota_on+0x41/0x49
[  938.216005]  [<c028bfed>] ext4_quota_on+0x12e/0x13b
[  938.216005]  [<c024cbd1>] do_quotactl+0x1b8/0x3a0
[  938.216005]  [<c028bebf>] ? ext4_msg+0x3c/0x3c
[  938.216005]  [<c06ea9d5>] ? down_read+0x5e/0x65
[  938.216005]  [<c0210d0a>] ? get_super+0x50/0x93
[  938.216005]  [<c0210f82>] ? get_super_thawed+0x25/0xa9
[  938.216005]  [<c024cefb>] sys_quotactl+0x142/0x17b
[  938.216005]  [<c06ec7d5>] syscall_call+0x7/0xb
--
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ