Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp837269ybc; Sat, 23 Nov 2019 09:20:34 -0800 (PST) X-Google-Smtp-Source: APXvYqz3kX3GhGtFfTmMjWEXUDfbYjf8rBKi1kpDV6dcYpXfcQQP55GktFVykM7YhDNdVUCnC0PJ X-Received: by 2002:a05:6402:4c6:: with SMTP id n6mr8163929edw.257.1574529634444; Sat, 23 Nov 2019 09:20:34 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1574529634; cv=none; d=google.com; s=arc-20160816; b=aBTUHGJIrJ8d5UaAMRZx50G7odiYkxv7NOhgIMMfNz3j8+YCVr34Z+LMwAHhKBHH+h vYu+SZSGLr48KUOSWCJdz0rLGT84yk7Pa3pGqFS5W6ZNTY4cOMgHIf0c7W/dSK1k6TDr pyiAJgef1WhbjIlWFUW3yoIdDgHafSzwxIWRRulR82BndUSzDP8bTdBv23jFem3PUaMC oSCRuadbHSZnTOAJAQ9cGO8cYVGdyvjII8s1Wp4pUAPiZwPrUlDtgJWCAMstrb1bVFOm +YOsxH4IxynSg2ZYpRmXgapxbWaDy7T+km9Rd3hNI4GsS+pYl2qtAGpzMxu8g+P+Mhm7 q+zQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:from:subject:message-id:in-reply-to :date:mime-version; bh=r3IKtlP9avY/gx1gskcMuHnqiMKCHHlRn82dSbOu4hA=; b=tTvqbSzuHtOV/stBTVbTEyCmf/xOY+XTj+1kjAPOHYjgZ4INQ/eZLnpyiMt6zJUU7L nke5IJ1rT1k8CaI5NfTfRBh3BVl0MeBtbWIwK7xLlsl4yTl9/9M57tTYz3M94dsHg2nU eEDsue7i+PwImjEfwlXvMBVqBvna6BsyExQPAdYzxOsJPAVU4WE4eImUQn4MxzTgwpEV O+lP0KkdNaK6IUrXtqZ3nSHFTcjBN75k/cHINLErpYpjtUn4XDhNAUlHQpRpISYFYkcZ AsfdbFVJK+dgwIctItFS+nZ/O9FZSoCjxee+DCjk7pzcQknNDQI8M4uikxLwTQwfbsWR P2NA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x28si1527290edl.21.2019.11.23.09.20.11; Sat, 23 Nov 2019 09:20:34 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726944AbfKWRSU (ORCPT + 99 others); Sat, 23 Nov 2019 12:18:20 -0500 Received: from mail-io1-f72.google.com ([209.85.166.72]:55133 "EHLO mail-io1-f72.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726861AbfKWRSR (ORCPT ); Sat, 23 Nov 2019 12:18:17 -0500 Received: by mail-io1-f72.google.com with SMTP id f66so7406578ioa.21 for ; Sat, 23 Nov 2019 09:18:16 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:date:in-reply-to:message-id:subject :from:to:cc; bh=r3IKtlP9avY/gx1gskcMuHnqiMKCHHlRn82dSbOu4hA=; b=JBWMz/dFfun3vZ8SNo8UTTboAoWcdLH+rjQ5kWsEtoUelKaDqxadhplWSpm06XJmuy u5uO7z0UCqwcHfEZBwvJH7bxdMTGmwaqlhADESkn5x2BSl0A3qRBBQTzVr2LZzXALR2v W4Ji87X7hVzxxBKxXVLAH0W8Vf8tQeEmAlS7BZIStn2ImFbORt7aex127WshujiCSjU0 iWOlXeupG/VA5TYQJijKOy6hRkGZRgTa7cgxonHM7JkY9AlWqxEMEJaEgz3XHd48ud98 joUF6eR7Ttt3axiIXNKKryMTb2fOG9O9eRDV5fq8SNCN+6QvqhGQAwRHi/EbRZC2Eyi2 e2AA== X-Gm-Message-State: APjAAAUptRjQXKAuGSWKY87SaC4gBRECT3UuYsI0O9xEjb5yekjMj/q7 +2W4C3UGidZputxM/Gf29fYPFHySu+7juObKvJnxrLGctsK8 MIME-Version: 1.0 X-Received: by 2002:a05:6602:24c7:: with SMTP id h7mr3563177ioe.151.1574529496182; Sat, 23 Nov 2019 09:18:16 -0800 (PST) Date: Sat, 23 Nov 2019 09:18:16 -0800 In-Reply-To: X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <0000000000004ef701059806b7f1@google.com> Subject: Re: Re: Re: possible deadlock in mon_bin_vma_fault From: syzbot To: Alan Stern Cc: arnd@arndb.de, gregkh@linuxfoundation.org, jrdr.linux@gmail.com, keescook@chromium.org, kstewart@linuxfoundation.org, linux-kernel@vger.kernel.org, linux-usb@vger.kernel.org, stern@rowland.harvard.edu, syzkaller-bugs@googlegroups.com, tglx@linutronix.de, viro@zeniv.linux.org.uk, zaitcev@redhat.com Content-Type: text/plain; charset="UTF-8"; format=flowed; delsp=yes Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > On Fri, 22 Nov 2019, syzbot wrote: >> > #syz test: linux-4.19.y f6e27dbb1afa >> "linux-4.19.y" does not look like a valid git repo address. > Let's try again. The "git tree" value in the original bug report was > "upstream", so I'll use that even though it doesn't look like a valid > git repo address either. > Alan Stern > #syz test: upstream f6e27dbb1afa "upstream" does not look like a valid git repo address. > commit 5252eb4c8297fedbf1c5f1e67da44efe00e6ef6b > Author: Pete Zaitcev > Date: Thu Nov 21 17:24:00 2019 -0600 > usb: Fix a deadlock in usbmon between mmap and read > Signed-off-by: Pete Zaitcev > Reported-by: syzbot+56f9673bb4cdcbeb0e92@syzkaller.appspotmail.com > diff --git a/drivers/usb/mon/mon_bin.c b/drivers/usb/mon/mon_bin.c > index ac2b4fcc265f..f48a23adbc35 100644 > --- a/drivers/usb/mon/mon_bin.c > +++ b/drivers/usb/mon/mon_bin.c > @@ -1039,12 +1039,18 @@ static long mon_bin_ioctl(struct file *file, > unsigned int cmd, unsigned long arg > mutex_lock(&rp->fetch_lock); > spin_lock_irqsave(&rp->b_lock, flags); > - mon_free_buff(rp->b_vec, rp->b_size/CHUNK_SIZE); > - kfree(rp->b_vec); > - rp->b_vec = vec; > - rp->b_size = size; > - rp->b_read = rp->b_in = rp->b_out = rp->b_cnt = 0; > - rp->cnt_lost = 0; > + if (rp->mmap_active) { > + mon_free_buff(vec, size/CHUNK_SIZE); > + kfree(vec); > + ret = -EBUSY; > + } else { > + mon_free_buff(rp->b_vec, rp->b_size/CHUNK_SIZE); > + kfree(rp->b_vec); > + rp->b_vec = vec; > + rp->b_size = size; > + rp->b_read = rp->b_in = rp->b_out = rp->b_cnt = 0; > + rp->cnt_lost = 0; > + } > spin_unlock_irqrestore(&rp->b_lock, flags); > mutex_unlock(&rp->fetch_lock); > } > @@ -1216,13 +1222,21 @@ mon_bin_poll(struct file *file, struct > poll_table_struct *wait) > static void mon_bin_vma_open(struct vm_area_struct *vma) > { > struct mon_reader_bin *rp = vma->vm_private_data; > + unsigned long flags; > + > + spin_lock_irqsave(&rp->b_lock, flags); > rp->mmap_active++; > + spin_unlock_irqrestore(&rp->b_lock, flags); > } > static void mon_bin_vma_close(struct vm_area_struct *vma) > { > + unsigned long flags; > + > struct mon_reader_bin *rp = vma->vm_private_data; > + spin_lock_irqsave(&rp->b_lock, flags); > rp->mmap_active--; > + spin_unlock_irqrestore(&rp->b_lock, flags); > } > /* > @@ -1234,16 +1248,12 @@ static vm_fault_t mon_bin_vma_fault(struct > vm_fault *vmf) > unsigned long offset, chunk_idx; > struct page *pageptr; > - mutex_lock(&rp->fetch_lock); > offset = vmf->pgoff << PAGE_SHIFT; > - if (offset >= rp->b_size) { > - mutex_unlock(&rp->fetch_lock); > + if (offset >= rp->b_size) > return VM_FAULT_SIGBUS; > - } > chunk_idx = offset / CHUNK_SIZE; > pageptr = rp->b_vec[chunk_idx].pg; > get_page(pageptr); > - mutex_unlock(&rp->fetch_lock); > vmf->page = pageptr; > return 0; > }