lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <yt9dsfz7xm6e.fsf@linux.ibm.com>
Date:   Wed, 18 Aug 2021 09:10:49 +0200
From:   Sven Schnelle <svens@...ux.ibm.com>
To:     Josef Bacik <josef@...icpanda.com>
Cc:     Jens Axboe <axboe@...nel.dk>, linux-block@...r.kernel.org,
        nbd@...er.debian.org, linux-kernel@...r.kernel.org
Subject: WARNING: possible circular locking dependency detected in nbd

Hi,

i'm seeing the lockdep splat below in CI. I think this is because
nbd_open is called with disk->open_mutex held, and acquires
nbd_index_mutex. However, nbd_put() first takes the nbd_index_lock,
and calls del_gendisk, which locks disk->open_mutex, so the order is
reversed.

WARNING: possible circular locking dependency detected
5.14.0-20210816.rc5.git0.04a03f7da6c2.300.fc34.s390x+debug #1 Not tainted
------------------------------------------------------
modprobe/17864 is trying to acquire lock:
00000001dea24d28 (&disk->open_mutex){+.+.}-{3:3}, at: del_gendisk+0x64/0x210

but task is already holding lock:
000003ff805fd6e8 (nbd_index_mutex){+.+.}-{3:3}, at: refcount_dec_and_mutex_lock+0x7e/0x110

which lock already depends on the new lock.

the existing dependency chain (in reverse order) is:
-> #1 (nbd_index_mutex){+.+.}-{3:3}:
       validate_chain+0x9ca/0xde8
       __lock_acquire+0x64c/0xc40
       lock_acquire.part.0+0xec/0x258
       lock_acquire+0xb0/0x200
       __mutex_lock+0xa2/0x8d8
       mutex_lock_nested+0x32/0x40
       nbd_open+0x30/0x248 [nbd]
       blkdev_get_whole+0x38/0x128
       blkdev_get_by_dev+0xcc/0x400
       blkdev_open+0x7a/0xd8
       do_dentry_open+0x19e/0x390
       do_open+0x2e0/0x458
       path_openat+0xec/0x2a8
       do_filp_open+0x90/0x130
       do_sys_openat2+0xa8/0x168
       do_sys_open+0x62/0x90
       __do_syscall+0x1c2/0x1f0
       system_call+0x78/0xa0

-> #0 (&disk->open_mutex){+.+.}-{3:3}:
       check_noncircular+0x168/0x188
       check_prev_add+0xe0/0xed8
       validate_chain+0x9ca/0xde8
       __lock_acquire+0x64c/0xc40
       lock_acquire.part.0+0xec/0x258
       lock_acquire+0xb0/0x200
       __mutex_lock+0xa2/0x8d8
       mutex_lock_nested+0x32/0x40
       del_gendisk+0x64/0x210
       nbd_put.part.0+0x46/0x98 [nbd]
       nbd_cleanup+0xde/0x118 [nbd]
       __do_sys_delete_module+0x19a/0x2a8
       __do_syscall+0x1c2/0x1f0
       system_call+0x78/0xa0

other info that might help us debug this:

 Possible unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(nbd_index_mutex);
                               lock(&disk->open_mutex);
                               lock(nbd_index_mutex);
  lock(&disk->open_mutex);

 *** DEADLOCK ***

1 lock held by modprobe/17864:
 #0: 000003ff805fd6e8 (nbd_index_mutex){+.+.}-{3:3}, at: refcount_dec_and_mutex_lock+0x7e/0x110

stack backtrace:
CPU: 1 PID: 17864 Comm: modprobe Not tainted 5.14.0-20210816.rc5.git0.04a03f7da6c2.300.fc34.s390x+debug #1
Hardware name: IBM 8561 T01 703 (LPAR)
Call Trace:
 [<000000008f735098>] show_stack+0x90/0xf8 
 [<000000008f746d56>] dump_stack_lvl+0x8e/0xc8 
 [<000000008eb3a3b0>] check_noncircular+0x168/0x188 
 [<000000008eb3b470>] check_prev_add+0xe0/0xed8 
 [<000000008eb3cc32>] validate_chain+0x9ca/0xde8 
 [<000000008eb3fc2c>] __lock_acquire+0x64c/0xc40 
 [<000000008eb3e834>] lock_acquire.part.0+0xec/0x258 
 [<000000008eb3ea50>] lock_acquire+0xb0/0x200 
 [<000000008f75591a>] __mutex_lock+0xa2/0x8d8 
 [<000000008f756182>] mutex_lock_nested+0x32/0x40 
 [<000000008f2538cc>] del_gendisk+0x64/0x210 
 [<000003ff805f4936>] nbd_put.part.0+0x46/0x98 [nbd] 
 [<000003ff805f965e>] nbd_cleanup+0xde/0x118 [nbd] 
 [<000000008eba7a52>] __do_sys_delete_module+0x19a/0x2a8 
 [<000000008f74a67a>] __do_syscall+0x1c2/0x1f0 
 [<000000008f75cf38>] system_call+0x78/0xa0 
INFO: lockdep is turned off.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ