Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp710678ybl; Fri, 9 Aug 2019 12:33:48 -0700 (PDT) X-Google-Smtp-Source: APXvYqw1YvkchMShiFU0UPCK3dQqz46ocMIyTgf3vkXHpZAyB8LMLaWJyFBoAPmh7fMC8MxfJwRX X-Received: by 2002:a17:902:f095:: with SMTP id go21mr20949716plb.58.1565379228259; Fri, 09 Aug 2019 12:33:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1565379228; cv=none; d=google.com; s=arc-20160816; b=fcqGnBMo+8QcbZgpVlZguQ1ECz9+tx0qmAVADlD97CxZLFwuRjSanRHkEXfpWDR4oA QfXUlJ2OtdlRbpoV4mvqYV5Dn6zWAYZ+989djV5OllTaeWwRkMd9QO976WVK20YF5fvA qgkJrYZO4teGr1FExs0Bq76Ms2txCoIixMnY9b0Ai64KHdnEovQ7XKKEoklmgF/BG3ds kuclKfqwams8aJMQIH6I4KweJhw+NWojk9VCrH69sOYyweB3tkjgx4O4qXVhysrALSuQ oKwvL702b7SNWvcTcaafLnXL28AIGvs1X+YTh7PP2+KEv/O8c4s2yqgjpRPoEGlKQQFF xm/A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:in-reply-to :subject:cc:to:from:date; bh=ikH8T/iPa5xBkKDlRFG5QwMAbMEQb5lNfRLtnxoHyEU=; b=e8HdjBMBBxf3Vkbegt6Xr4zOLtKp7+P1DpQ87bQ/E1omLN4NCEcozBVpi4bc0FgIjx whgnNYtNKsamDifor7QUMH719RzNBD251xkTXeMNEh5CmGHj1Ublyh4cd6vKvvixC7wC hVwDAGgBToVMpC0akWN16xeVslSIPp9s90hfcFWaXNL6m2eRUAfYX7N/elh6F2rvbW9g gPrn01/P0LknQrttvJgjvz3WwjTQTKLzjAVr8myynFmBCWKJ1kKBUGo5BqGDHjTPqwhz 75SrZ/vDasp8C29slSI/9Ck/FzGwD2odQakdYZi1yInGu2soWAHgQxLz2Tu4ByY/yo8Y MDUw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c1si49826726plr.405.2019.08.09.12.33.33; Fri, 09 Aug 2019 12:33:48 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726439AbfHITcw (ORCPT + 99 others); Fri, 9 Aug 2019 15:32:52 -0400 Received: from iolanthe.rowland.org ([192.131.102.54]:55460 "HELO iolanthe.rowland.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with SMTP id S1725980AbfHITcw (ORCPT ); Fri, 9 Aug 2019 15:32:52 -0400 Received: (qmail 5254 invoked by uid 2102); 9 Aug 2019 15:32:51 -0400 Received: from localhost (sendmail-bs@127.0.0.1) by localhost with SMTP; 9 Aug 2019 15:32:51 -0400 Date: Fri, 9 Aug 2019 15:32:51 -0400 (EDT) From: Alan Stern X-X-Sender: stern@iolanthe.rowland.org To: syzbot cc: andreyknvl@google.com, , , , , Subject: Re: possible deadlock in usb_deregister_dev In-Reply-To: <00000000000026d72f058fb33242@google.com> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 9 Aug 2019, syzbot wrote: > syzbot has found a reproducer for the following crash on: > > HEAD commit: e96407b4 usb-fuzzer: main usb gadget fuzzer driver > git tree: https://github.com/google/kasan.git usb-fuzzer > console output: https://syzkaller.appspot.com/x/log.txt?x=15bf780e600000 > kernel config: https://syzkaller.appspot.com/x/.config?x=cfa2c18fb6a8068e > dashboard link: https://syzkaller.appspot.com/bug?extid=a64a382964bf6c71a9c0 > compiler: gcc (GCC) 9.0.0 20181231 (experimental) > syz repro: https://syzkaller.appspot.com/x/repro.syz?x=16787574600000 > C reproducer: https://syzkaller.appspot.com/x/repro.c?x=136cc4d2600000 > > IMPORTANT: if you fix the bug, please add the following tag to the commit: > Reported-by: syzbot+a64a382964bf6c71a9c0@syzkaller.appspotmail.com > > usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 > usb 1-1: config 0 descriptor?? > iowarrior 1-1:0.236: IOWarrior product=0x1501, serial= interface=236 now > attached to iowarrior0 > usb 1-1: USB disconnect, device number 2 > ====================================================== > WARNING: possible circular locking dependency detected > 5.3.0-rc2+ #25 Not tainted > ------------------------------------------------------ > kworker/0:1/12 is trying to acquire lock: > 00000000cd63e8f1 (minor_rwsem){++++}, at: usb_deregister_dev > drivers/usb/core/file.c:238 [inline] > 00000000cd63e8f1 (minor_rwsem){++++}, at: usb_deregister_dev+0x61/0x270 > drivers/usb/core/file.c:230 > > but task is already holding lock: > 000000001d1989ef (iowarrior_open_disc_lock){+.+.}, at: > iowarrior_disconnect+0x45/0x2c0 drivers/usb/misc/iowarrior.c:867 > > which lock already depends on the new lock. https://syzkaller.appspot.com/bug?extid=ca52394faa436d8131df is undoubtedly a duplicate of this. Alan Stern