Received: by 10.213.65.68 with SMTP id h4csp3734387imn; Tue, 10 Apr 2018 03:59:52 -0700 (PDT) X-Google-Smtp-Source: AIpwx49FKkMQabxlrlhl8WUyLzibAzNKx7Imlgdb6BpNbLZ4PnZAN2V82b8NmsS1WPUN6RJjnjNM X-Received: by 10.99.121.134 with SMTP id u128mr27448790pgc.360.1523357992528; Tue, 10 Apr 2018 03:59:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523357992; cv=none; d=google.com; s=arc-20160816; b=xyvZ/UuJ1g+z7Z2Jsrai5F3EdP/LR6zWJZla+lzn4e9OrKfOIneB+e9Fg4MRnhikip GUks94+qf1RA+CN54NIuOLHPvJxT+A+3pwjVN66k2HtfXOlp1y/p67Ib7vuQt4tBw5o2 GEGbvoEfw/I8G66GPhn6x7jwxNxOhkH2+ZthX7hUAXROLBmEELWGc4br7n8YM922eaCa gjppAZEjNmXFCzANWfkj6WAD6vd1By0ekuRAbcCTRcFNYXz/mn1E36LY2IzWPs9IRCmW Qjn8zoKkdWyFfeufrGH6euOE4Lm8piAb9SDbsFky2wslfFISnsl0r8bx5jjgph3g0imT QoVw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:arc-authentication-results; bh=M+kLssmQELdXqQwkaPq+Z1wSCBRl+esqApEGx88Co0I=; b=zOzHG9U1A/aW+9V7X0JI/pTE3DdsL/DFxiZBa46VhDDRcbNGUTOixwikH7R4tNsCQ2 VgESaep0zImsM5+GEkMH3ejzD0OOCI/XVdyMmfVF7vbyopRPDWJywFALRPz31ND+Um0p 2D7neBsZZxzFNlA0G4nCBJHAkK6SIZP9pnqUjFvdbKySMu8dQhHUOYaSYpKkXS4YLsL6 US6hc2gmFQrxct2kA4JTCGzwSH18DP/vBiMrRI+hXpY89kaML0KH31Z1cGqjzMWiPB64 b2zQm90CscItn7w+ofZYb8K2DSlIQzbLUuTHT25j5bAxpDEVMIF2M8HCddZWPpNhjDVj MXUQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h64si1654188pgc.731.2018.04.10.03.59.15; Tue, 10 Apr 2018 03:59:52 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752790AbeDJKzR (ORCPT + 99 others); Tue, 10 Apr 2018 06:55:17 -0400 Received: from www262.sakura.ne.jp ([202.181.97.72]:30787 "EHLO www262.sakura.ne.jp" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751737AbeDJKzP (ORCPT ); Tue, 10 Apr 2018 06:55:15 -0400 Received: from fsav401.sakura.ne.jp (fsav401.sakura.ne.jp [133.242.250.100]) by www262.sakura.ne.jp (8.14.5/8.14.5) with ESMTP id w3AAtE6N024349; Tue, 10 Apr 2018 19:55:14 +0900 (JST) (envelope-from penguin-kernel@I-love.SAKURA.ne.jp) Received: from www262.sakura.ne.jp (202.181.97.72) by fsav401.sakura.ne.jp (F-Secure/fsigk_smtp/530/fsav401.sakura.ne.jp); Tue, 10 Apr 2018 19:55:14 +0900 (JST) X-Virus-Status: clean(F-Secure/fsigk_smtp/530/fsav401.sakura.ne.jp) Received: from [192.168.1.8] (softbank126099184120.bbtec.net [126.99.184.120]) (authenticated bits=0) by www262.sakura.ne.jp (8.14.5/8.14.5) with ESMTP id w3AAtE6Y024345 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 10 Apr 2018 19:55:14 +0900 (JST) (envelope-from penguin-kernel@I-love.SAKURA.ne.jp) Subject: Re: INFO: task hung in __blkdev_get To: Jens Axboe Cc: Dmitry Vyukov , Ming Lei , mingo@redhat.com, peterz@infradead.org, syzbot , linux-kernel@vger.kernel.org, syzkaller-bugs@googlegroups.com, Omar Sandoval References: <652eab47-81b5-3249-3c78-427eeec45fbc@I-love.SAKURA.ne.jp> <2e093801-6d71-6747-42df-52f191811ad0@I-love.SAKURA.ne.jp> <87bdec75-3c59-6587-2436-1470263ab11f@kernel.dk> From: Tetsuo Handa Message-ID: <59a08949-7e2f-42ff-edda-f24a6c624551@I-love.SAKURA.ne.jp> Date: Tue, 10 Apr 2018 19:55:11 +0900 User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.7.0 MIME-Version: 1.0 In-Reply-To: <87bdec75-3c59-6587-2436-1470263ab11f@kernel.dk> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello. Since syzbot is reporting so many hung up bug which involves /dev/loopX , is it possible to "temporarily" apply below patch for testing under syzbot ( after "block/loop: fix deadlock after loop_set_status" and "loop: fix LOOP_GET_STATUS lock imbalance" in linux-block.git#for-linus are merged into linux.git )? I haven't got a smoking gun by lockdep, but I noticed that [upstream] INFO: task hung in lo_open (2) https://syzkaller.appspot.com/bug?id=1f93b57f496d969efb9fb24167f6f9de5ee068fd contained "lo->lo_ctl_mutex => bdev->bd_mutex" locking order 2 locks held by syz-executor6/15084: #0: (&lo->lo_ctl_mutex/1){+.+.}, at: [<00000000cc154b8d>] lo_ioctl+0x8b/0x1b70 drivers/block/loop.c:1355 #1: (&bdev->bd_mutex){+.+.}, at: [<0000000058b7c5b5>] blkdev_reread_part+0x1e/0x40 block/ioctl.c:192 while commit f028f3b2f987ebc6 ("loop: fix circular locking in loop_clr_fd()") says that * Calling fput holding lo_ctl_mutex triggers a circular * lock dependency possibility warning as fput can take * bd_mutex which is usually taken before lo_ctl_mutex. which implies that the locking order should be "bdev->bd_mutex => lo->lo_ctl_mutex" and also says that use of "_nested" version might mask some other real bugs which could be the bug syzbot is frequently reporting as hung tasks... diff --git a/drivers/block/loop.c b/drivers/block/loop.c index 264abaa..5559b15 100644 --- a/drivers/block/loop.c +++ b/drivers/block/loop.c @@ -1360,7 +1360,7 @@ static int lo_ioctl(struct block_device *bdev, fmode_t mode, struct loop_device *lo = bdev->bd_disk->private_data; int err; - err = mutex_lock_killable_nested(&lo->lo_ctl_mutex, 1); + err = mutex_lock_killable(&lo->lo_ctl_mutex); if (err) goto out_unlocked;