lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <8431ea39-7ace-a601-419a-dca74e1db287@gmail.com>
Date:   Mon, 20 Sep 2021 10:10:55 -0700
From:   Eric Dumazet <eric.dumazet@...il.com>
To:     Tetsuo Handa <penguin-kernel@...ove.SAKURA.ne.jp>,
        syzbot <syzbot+f5608de5d89cc0d998c7@...kaller.appspotmail.com>,
        axboe@...nel.dk, linux-block@...r.kernel.org,
        linux-kernel@...r.kernel.org, syzkaller-bugs@...glegroups.com
Subject: Re: [syzbot] possible deadlock in bd_register_pending_holders



On 9/10/21 9:57 AM, Tetsuo Handa wrote:
> Since commit dfbb3409b27fa42b in axboe/linux-block.git#block-5.15 breaks
> "sb_writers#$N => &p->lock => major_names_lock" dependency chain,
> I think that this dependency chain should be no longer possible.
> 
> #syz fix: block: genhd: don't call blkdev_show() with major_names_lock held
> 
> On 2021/09/10 23:42, syzbot wrote:
>> Hello,
>>
>> syzbot found the following issue on:
>>
>> HEAD commit:    27151f177827 Merge tag 'perf-tools-for-v5.15-2021-09-04' o..
>> git tree:       upstream
>> console output: https://syzkaller.appspot.com/x/log.txt?x=104612b3300000
>> kernel config:  https://syzkaller.appspot.com/x/.config?x=ac2f9cc43f6b17e4
>> dashboard link: https://syzkaller.appspot.com/bug?extid=f5608de5d89cc0d998c7
>> compiler:       gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.1
>>
>> Unfortunately, I don't have any reproducer for this issue yet.
>>
>> IMPORTANT: if you fix the issue, please add the following tag to the commit:
>> Reported-by: syzbot+f5608de5d89cc0d998c7@...kaller.appspotmail.com

Note that current kernels (which include dfbb3409b27fa42b)
still hit this :

[    3.197383] ======================================================
[    3.204253] WARNING: possible circular locking dependency detected
[    3.211116] 5.15.0-dbx-DEV #16 Not tainted
[    3.215907] ------------------------------------------------------
[    3.222770] kinit/1 is trying to acquire lock:
[    3.227900] ffffa09bc8971230 (&mddev->open_mutex){+.+.}-{3:3}, at: md_open+0xf3/0x150
[    3.237803] 
               but task is already holding lock:
[    3.245020] ffffa09bcf003f18 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_get_by_dev+0xa2/0x580
[    3.254663] 
               which lock already depends on the new lock.

[    3.264916] 
               the existing dependency chain (in reverse order) is:
[    3.273772] 
               -> #1 (&disk->open_mutex){+.+.}-{3:3}:
[    3.281422]        lock_acquire+0xb3/0x1e0
[    3.286213]        __mutex_lock_common+0xe0/0xde0
[    3.291619]        mutex_lock_nested+0x20/0x30
[    3.296749]        bd_register_pending_holders+0x2c/0x130
[    3.302839]        device_add_disk+0x1c0/0x3a0
[    3.307969]        md_alloc+0x3ed/0x550
[    3.312493]        md_probe+0x35/0x40
[    3.316843]        blk_request_module+0x6b/0xd0
[    3.322058]        blkdev_get_no_open+0x33/0xb0
[    3.327275]        blkdev_get_by_dev+0x69/0x580
[    3.332501]        blkdev_open+0x61/0x90
[    3.337118]        do_dentry_open+0x281/0x3a0
[    3.342170]        vfs_open+0x2d/0x30
[    3.346529]        path_openat+0xb93/0xf30
[    3.351345]        do_filp_open+0xc7/0x170
[    3.356127]        do_sys_openat2+0x91/0x170
[    3.361085]        __x64_sys_open+0x7c/0xa0
[    3.365963]        do_syscall_64+0x44/0xa0
[    3.370762]        entry_SYSCALL_64_after_hwframe+0x44/0xae
[    3.377034] 
               -> #0 (&mddev->open_mutex){+.+.}-{3:3}:
[    3.384770]        validate_chain+0xacb/0x2e60
[    3.389900]        __lock_acquire+0x91e/0xf00
[    3.394950]        lock_acquire+0xb3/0x1e0
[    3.399734]        __mutex_lock_common+0xe0/0xde0
[    3.405131]        mutex_lock_interruptible_nested+0x20/0x30
[    3.411482]        md_open+0xf3/0x150
[    3.415840]        blkdev_get_by_dev+0x1b2/0x580
[    3.421153]        blkdev_open+0x61/0x90
[    3.425771]        do_dentry_open+0x281/0x3a0
[    3.430821]        vfs_open+0x2d/0x30
[    3.435180]        path_openat+0xb93/0xf30
[    3.439980]        do_filp_open+0xc7/0x170
[    3.444762]        do_sys_openat2+0x91/0x170
[    3.449720]        __x64_sys_open+0x7c/0xa0
[    3.454597]        do_syscall_64+0x44/0xa0
[    3.459391]        entry_SYSCALL_64_after_hwframe+0x44/0xae
[    3.465654] 
               other info that might help us debug this:

[    3.475721]  Possible unsafe locking scenario:

[    3.483017]        CPU0                    CPU1
[    3.488241]        ----                    ----
[    3.493457]   lock(&disk->open_mutex);
[    3.497900]                                lock(&mddev->open_mutex);
[    3.504955]                                lock(&disk->open_mutex);
[    3.511912]   lock(&mddev->open_mutex);
[    3.516434] 
                *** DEADLOCK ***

[    3.524424] 1 lock held by kinit/1:
[    3.527289] tsc: Refined TSC clocksource calibration: 2599.997 MHz
[    3.528600]  #0: ffffa09bcf003f18 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_get_by_dev+0xa2/0x580
[    3.535499] clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x257a391c223, max_idle_ns: 440795220104 ns
[    3.545202] 
               stack backtrace:
[    3.545204] CPU: 17 PID: 1 Comm: kinit Not tainted 5.15.0-dbx-DEV #16
[    3.545208] Hardware name: Intel RML,PCH/Ibis_QC_18, BIOS 2.48.0 10/02/2019
[    3.576394] Call Trace:
[    3.579540]  dump_stack_lvl+0x6c/0x9a
[    3.583898]  dump_stack+0x10/0x12
[    3.587908]  print_circular_bug+0x2cb/0x2d0
[    3.592786]  check_noncircular+0x139/0x140
[    3.597579]  validate_chain+0xacb/0x2e60
[    3.602199]  ? add_lock_to_list+0xdd/0x110
[    3.606987]  ? validate_chain+0x8ee/0x2e60
[    3.611781]  __lock_acquire+0x91e/0xf00
[    3.616311]  lock_acquire+0xb3/0x1e0
[    3.620581]  ? md_open+0xf3/0x150
[    3.624596]  __mutex_lock_common+0xe0/0xde0
[    3.629471]  ? md_open+0xf3/0x150
[    3.633482]  ? md_open+0xf3/0x150
[    3.637493]  ? md_open+0xa0/0x150
[    3.641507]  ? lock_release+0xc5/0x260
[    3.645953]  mutex_lock_interruptible_nested+0x20/0x30
[    3.651784]  md_open+0xf3/0x150
[    3.655623]  blkdev_get_by_dev+0x1b2/0x580
[    3.660417]  blkdev_open+0x61/0x90
[    3.664511]  do_dentry_open+0x281/0x3a0
[    3.669044]  vfs_open+0x2d/0x30
[    3.672881]  path_openat+0xb93/0xf30
[    3.677157]  ? __lock_acquire+0x91e/0xf00
[    3.681858]  ? lock_is_held_type+0x9b/0x130
[    3.686737]  do_filp_open+0xc7/0x170
[    3.691015]  do_sys_openat2+0x91/0x170
[    3.695463]  __x64_sys_open+0x7c/0xa0
[    3.699821]  do_syscall_64+0x44/0xa0
[    3.704091]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[    3.709835] RIP: 0033:0x20fe89
[    3.713587] Code: 48 89 77 38 c3 89 f0 48 8b 1f 48 8b 67 08 48 8b 6f 10 4c 8b 67 18 4c 8b 6f 20 4c 8b 77 28 4c 8b 7f 30 ff 67 38 49 89 ca 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 f7
 d8 89 05 5e 36 00 00 48 83 c8 ff c3
[    3.733022] RSP: 002b:00007ffebd54c5d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002
[    3.741279] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000020fe89
[    3.749102] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000020076f
[    3.756920] RBP: 00007ffebd54cbc0 R08: 0000000000000042 R09: 000000000000006d
[    3.764746] R10: 000000000020fe89 R11: 0000000000000246 R12: 0000000000000000

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ