Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751485AbdFGAmR (ORCPT ); Tue, 6 Jun 2017 20:42:17 -0400 Received: from esa5.hgst.iphmx.com ([216.71.153.144]:24470 "EHLO esa5.hgst.iphmx.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750766AbdFGAmQ (ORCPT ); Tue, 6 Jun 2017 20:42:16 -0400 X-IronPort-AV: E=Sophos;i="5.39,308,1493654400"; d="scan'208";a="23347281" From: Bart Van Assche To: "jslaby@suse.com" , "andreyknvl@google.com" , "gregkh@linuxfoundation.org" , "linux-kernel@vger.kernel.org" CC: "syzkaller@googlegroups.com" , "kcc@google.com" , "dvyukov@google.com" Subject: Re: tty: possible deadlock in tty_buffer_flush Thread-Topic: tty: possible deadlock in tty_buffer_flush Thread-Index: AQHS3yZhUiLiXMyGw0Gdw6gjVCiSOaIYj34A Date: Wed, 7 Jun 2017 00:42:12 +0000 Message-ID: <1496796130.2692.26.camel@sandisk.com> References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: suse.com; dkim=none (message not signed) header.d=none;suse.com; dmarc=none action=none header.from=sandisk.com; x-originating-ip: [63.163.107.100] x-ms-publictraffictype: Email x-microsoft-exchange-diagnostics: 1;CY1PR0401MB1536;7:03QI3B45i6sBgbrMHzQoGqwTnn8k+GpJGmeldP36runVEtvz+tOMuiTHcEFkkPmzDN9F9WClVv6p8KJ8rHAaTr9nbpc1aT4/Bb/V6VSLTGi/H+1PCy0NX1jBL2MmcWBAXxYKSxxQbzKoHkXUHAUjw/bRi54ek6TKN7gHVmUmPUPTXtbomOcjuzIFQIgX9MmfxHLR7q9CvYYpMrcALxlVoK8iAUqzfEXo3BlgOtca2/a2iZKUixvfB0oO865Ru2rroppTpgj4tmCIwdO+I/UbmcGF2rxSEjIqr+E5c1kzhVonUQaPp2rnRyYiVq0HvmFP/xK+xe3N6+gWCgjhourzyA==;20:1yU9T+yCLt3hI3/LeqPxYkEmzHKxHe0pE6+CkjFjEO8/2FirygmQGJBYxNrGMv8QB0caaCEtMcbtic9I/y8P4HdcHR8xjswOCO5yOEOyXt767Ene4D9njEtO6U8FnyDZvlCTVQx+O7L3pWjO5cdBLH/puShm6AM8IWTXkA1/m5A= x-ms-traffictypediagnostic: CY1PR0401MB1536: x-ms-office365-filtering-correlation-id: 353c131d-bc5c-4cf1-cadf-08d4ad3e099a x-ms-office365-filtering-ht: Tenant x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:(22001)(2017030254075)(48565401081)(201703131423075)(201703031133081);SRVR:CY1PR0401MB1536; wdcipoutbound: EOP-TRUE x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:; x-exchange-antispam-report-cfa-test: BCL:0;PCL:0;RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(8121501046)(5005006)(93006095)(93001095)(100000703101)(100105400095)(10201501046)(3002001)(6055026)(6041248)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123560025)(20161123558100)(20161123564025)(20161123555025)(20161123562025)(6072148)(100000704101)(100105200095)(100000705101)(100105500095);SRVR:CY1PR0401MB1536;BCL:0;PCL:0;RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095);SRVR:CY1PR0401MB1536; x-forefront-prvs: 03319F6FEF x-forefront-antispam-report: SFV:NSPM;SFS:(10019020)(6009001)(39410400002)(39400400002)(39850400002)(39840400002)(39450400003)(39860400002)(377424004)(24454002)(86362001)(2201001)(66066001)(36756003)(6486002)(77096006)(229853002)(4326008)(25786009)(6506006)(103116003)(33646002)(2900100001)(72206003)(50986999)(2501003)(189998001)(3660700001)(3280700002)(478600001)(54356999)(5660300001)(76176999)(6116002)(2906002)(6246003)(3846002)(2950100002)(122556002)(8936002)(305945005)(14454004)(8676002)(7736002)(81166006)(54906002)(53936002)(6436002)(6512007)(99286003)(38730400002);DIR:OUT;SFP:1102;SCL:1;SRVR:CY1PR0401MB1536;H:CY1PR0401MB1536.namprd04.prod.outlook.com;FPR:;SPF:None;MLV:sfv;LANG:en; spamdiagnosticoutput: 1:99 spamdiagnosticmetadata: NSPM Content-Type: text/plain; charset="iso-8859-1" Content-ID: <00A1302303B0AB4BAD8ACB7DB51B8EA7@namprd04.prod.outlook.com> MIME-Version: 1.0 X-OriginatorOrg: sandisk.com X-MS-Exchange-CrossTenant-originalarrivaltime: 07 Jun 2017 00:42:12.5705 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b61c8803-16f3-4c35-9b17-6f65f441df86 X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY1PR0401MB1536 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by mail.home.local id v570gK3c019141 Content-Length: 913 Lines: 27 On Mon, 2017-05-29 at 17:19 +0200, Andrey Konovalov wrote: > I've got the following error report while fuzzing the kernel with syzkaller. > > On commit 5ed02dbb497422bf225783f46e6eadd237d23d6b (4.12-rc3). > > ====================================================== > WARNING: possible circular locking dependency detected > 4.12.0-rc3+ #369 Not tainted > ------------------------------------------------------ > kworker/u9:1/31 is trying to acquire lock: > (&buf->lock){+.+...}, at: [] > tty_buffer_flush+0xbb/0x3b0 drivers/tty/tty_buffer.c:221 > > but task is already holding lock: > (&o_tty->termios_rwsem/1){++++..}, at: [] > isig+0xa1/0x4d0 drivers/tty/n_tty.c:1100 > > which lock already depends on the new lock. Hello Andrey, I also see this warning but during regular boot (without running syzkaller). Do you perhaps have the time to bisect this? Thanks, Bart.