Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp3460200ybb; Tue, 31 Mar 2020 05:51:30 -0700 (PDT) X-Google-Smtp-Source: ADFU+vuy5x2dxw+5aAgnMPrWxWHkwwTYPDxLpbr4L1UE0J6gFatGM2b0bJbZ5YN1Risbl3rnMa7W X-Received: by 2002:a05:6830:168c:: with SMTP id k12mr12499195otr.366.1585659089884; Tue, 31 Mar 2020 05:51:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585659089; cv=none; d=google.com; s=arc-20160816; b=tZRqqNMLvaqSA3xBNKc6Me4mrJGTXy1JfPQ30/mwky3Ppv9W0HpWpgRf1ARDlGNmuz 68UnYv6+MalA4cx1ho/UiGHSF8nAR/Wx8VnWdf1i9jIv52usDTFr30zoSkFsoH6HbQkK +XEgjce3Y9uZMxhhEvpRlTCErSv8QCTYObO3EKPHPLHtVYyjKyEY5tcw1+gsopv4ArHu qsIr5/uJGu8IKnHBXm6OUHP0qp+hTFePiBLHSnUqnC6Xuo6CnxqTQVPTUiTLsqFxK9BD dXc7EwhOHsonoFFVvAo5TmnZW/gUlh4bk55hT8EJZq3sQB2fuXgRcP5zA4YX+aCE8g7n fWJA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=EwtnO+JF9Vc3fNCLAYs4IJCcT9B3WrdtLw3QriS152M=; b=en9JiVap/UphoBH/hJ33N3m6kqJqMpXs6uCxG6ID6wakGwIn1f62wcgj5DPGq1Zuuc RM8MqnddDLLdYbz39kJXa4hR8454ALz0QPaa7tOu47wtFHHxq2y0daXWdKnfVP9gh0kK alw8kKCVfKl5ePzSIDKrfs9CrsLhtKpWOa7BaEOuTahPCdS+ol4OZWYkfovpUf4wnIkR IG9PcelBl4EUP0jhyz34a27vDRD3ZyKCIrmGnX1smj+7bxfCYGj6tt4eVjwM3Vp/92Al n3XQyDNpclZAMN0Z2KSIp2q/dEqVtZzkCS05+VY3EOB4MNbmBLRQ10TGJ0wPlp9fYqMb 5fKg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ffwll.ch header.s=google header.b=eGh2FpXo; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x6si8365312oto.92.2020.03.31.05.51.13; Tue, 31 Mar 2020 05:51:29 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@ffwll.ch header.s=google header.b=eGh2FpXo; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730617AbgCaMun (ORCPT + 99 others); Tue, 31 Mar 2020 08:50:43 -0400 Received: from mail-ot1-f66.google.com ([209.85.210.66]:44882 "EHLO mail-ot1-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729483AbgCaMum (ORCPT ); Tue, 31 Mar 2020 08:50:42 -0400 Received: by mail-ot1-f66.google.com with SMTP id a49so21798668otc.11 for ; Tue, 31 Mar 2020 05:50:41 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ffwll.ch; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=EwtnO+JF9Vc3fNCLAYs4IJCcT9B3WrdtLw3QriS152M=; b=eGh2FpXooYsO6Tr7dZSPdwKsx+BcovFSi95ZTzB7mVxdhlLG5vbYSGjvKqbBHBFQ29 KQ36B8iNHChkDOchistuaLyU/gv8e1GMrwFqRTw395zbAlI4eXxHLkiDGe4b8g+CmQHb uEkhg1dJK7jC8NxCAd3ZZxk6sGoe6nul499xU= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=EwtnO+JF9Vc3fNCLAYs4IJCcT9B3WrdtLw3QriS152M=; b=kPgyZzLDg/jZxQwVsBPIzgKH4rz0WI3s2X6F8Q+OWV2mXvECmjYjX3M3MYnWCuBWXh nCoyr4ZuYbehXWM43Qf+nZFIhUdVzBu/z44UXn2mUAQuQ+mGeUES92IAZhYhOFcSVXLB sUkgNfF4ePq0NgEZNzdEokbeLApzx4UAzt+uL+dmZ24KJggIICwVELtCVkLiPba8YFUH xIy7B1INbl6vLaoXXeUBKLFYkQHCX+ilmLOubm+iNigQXxqMEg1UtNpZ917CPyJWHK7r Dj67y7zSNnWtPDJpIXIPjDeGw+yM44dUJ1QgjiIIQY5BurZ8hSA14UniMB0UNQNMAJEk kBjA== X-Gm-Message-State: ANhLgQ2PIRmJt0eNMNFTpYy82cKXoWzL68mASew9c3GeYTWabTbQaz3t 44og3Cp24gzJy/jLXyM0KRrjdnVoFwVgbe/+T+q/UQ== X-Received: by 2002:a9d:6e8f:: with SMTP id a15mr8737399otr.188.1585659041180; Tue, 31 Mar 2020 05:50:41 -0700 (PDT) MIME-Version: 1.0 References: <000000000000ec257905a21f7415@google.com> <20200331095737.GO20730@hirez.programming.kicks-ass.net> <7641fb29-20ec-0963-d04c-bfbf49fd3ebc@samsung.com> In-Reply-To: <7641fb29-20ec-0963-d04c-bfbf49fd3ebc@samsung.com> From: Daniel Vetter Date: Tue, 31 Mar 2020 14:50:30 +0200 Message-ID: Subject: Re: INFO: trying to register non-static key in try_to_wake_up To: Bartlomiej Zolnierkiewicz Cc: Dmitry Vyukov , Linux Fbdev development list , Peter Zijlstra , syzbot , "the arch/x86 maintainers" , syzkaller-bugs , LKML , DRI , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , Thomas Gleixner Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Mar 31, 2020 at 2:18 PM Bartlomiej Zolnierkiewicz wrote: > > > On 3/31/20 12:18 PM, Dmitry Vyukov wrote: > > On Tue, Mar 31, 2020 at 11:57 AM Peter Zijlstra wrote: > >> > >> On Mon, Mar 30, 2020 at 10:01:12PM -0700, syzbot wrote: > >>> Hello, > >>> > >>> syzbot found the following crash on: > >>> > >>> HEAD commit: 9420e8ad Merge tag 'for-linus' of git://git.kernel.org/pub.. > >>> git tree: upstream > >>> console output: https://protect2.fireeye.com/url?k=0756a78d-5a9a6c49-07572cc2-0cc47a314e9a-e4dc8b657d340686&u=https://syzkaller.appspot.com/x/log.txt?x=1206ed4be00000 > >>> kernel config: https://protect2.fireeye.com/url?k=43211072-1eeddbb6-43209b3d-0cc47a314e9a-3bd45a19932c37c8&u=https://syzkaller.appspot.com/x/.config?x=27392dd2975fd692 > >>> dashboard link: https://protect2.fireeye.com/url?k=bf7a6153-e2b6aa97-bf7bea1c-0cc47a314e9a-c64073ee605efb7b&u=https://syzkaller.appspot.com/bug?extid=e84d7ebd1361da13c356 > >>> compiler: gcc (GCC) 9.0.0 20181231 (experimental) > >>> > >>> Unfortunately, I don't have any reproducer for this crash yet. > >>> > >>> IMPORTANT: if you fix the bug, please add the following tag to the commit: > >>> Reported-by: syzbot+e84d7ebd1361da13c356@syzkaller.appspotmail.com > >>> > >>> INFO: trying to register non-static key. > >>> the code is fine but needs lockdep annotation. > >>> turning off the locking correctness validator. > >>> CPU: 1 PID: 1014 Comm: syz-executor.0 Not tainted 5.6.0-rc7-syzkaller #0 > >>> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 > >>> Call Trace: > >>> > >>> __dump_stack lib/dump_stack.c:77 [inline] > >>> dump_stack+0x188/0x20d lib/dump_stack.c:118 > >>> assign_lock_key kernel/locking/lockdep.c:880 [inline] > >>> register_lock_class+0x14c4/0x1540 kernel/locking/lockdep.c:1189 > >>> __lock_acquire+0xfc/0x3ca0 kernel/locking/lockdep.c:3836 > >>> lock_acquire+0x197/0x420 kernel/locking/lockdep.c:4484 > >>> __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] > >>> _raw_spin_lock_irqsave+0x8c/0xbf kernel/locking/spinlock.c:159 > >>> try_to_wake_up+0x9f/0x17c0 kernel/sched/core.c:2547 > >> > >> That's p->pi_lock, which gets initialized in rt_mutex_init_task() in > >> copy_process(). This should be impossible. Very odd. > > > > The stack mentions fbdev, which is a red flag at the moment. There are > > a dozen of bad bugs in fbdev and around. Just few days ago Andy > > pointed to another "impossible" crash "general protection fault in > > do_syscall_64" which is related to dri: > > https://protect2.fireeye.com/url?k=0cb8ad06-517466c2-0cb92649-0cc47a314e9a-a20c11191483c65b&u=https://syzkaller.appspot.com/bug?id=0ec7b2602b1ff40f0d34f38baa4ba1640727c3d9 > > https://protect2.fireeye.com/url?k=614292e3-3c8e5927-614319ac-0cc47a314e9a-aeda6d72c01a7b0e&u=https://groups.google.com/forum/#!msg/syzkaller-bugs/ePqhfYx0-8M/Q_Urt97iAAAJ > > > > There are probably more random manifestations of these bugs already, > > and I guess we will be getting more. > > > > +fbdev maintainers > > Thank you for the report. > > fbdev is in the maintenance mode and no new features or drivers are > being added so syzbot reports are not for a new bugs (regressions) and > are not a priority (at least to me). Yup same here, I've seen a pile of syzbot reports for fbdev (and also vt, or combinations of them since fbdev is linked to vt through fbcon) fly by. But I really don't have to deal with these, my recommendation to anyone who cares about security are: - Don't enable vt - Don't enable fbdev All that code has been developed long ago, in a much more innocent time. If someone wants to fix this you'd not just need to fix all the syzbot stuff, but also ramp up a full testsuite for all the ioctl, and all the corner-cases. Plus also fix some of the horrendous locking in there, probably. Multi-year effort, easily. Regressions I'll obviously try to handle, but none of these are. It's just syzbot has become smarter at hitting bugs in fbdev and vt subsystems (or maybe the hw the virtual machines emulate has become more varied, some of the reports are for fun stuff like vgacon ...). Cheers, Daniel > I have only resources to review/merge pending fbdev patches from time > to time so any help in fixing these syzbot reports is welcomed (there > have been a few fbdev related syzbot reports recently). > > Also please note that fbdev is maintained through drm-misc tree so > patches can also be handled by other drm-misc maintainers in case I'm > not available / busy with other things. > > Best regards, > -- > Bartlomiej Zolnierkiewicz > Samsung R&D Institute Poland > Samsung Electronics > > >>> wake_up_worker kernel/workqueue.c:836 [inline] > >>> insert_work+0x2ad/0x3a0 kernel/workqueue.c:1337 > >>> __queue_work+0x50d/0x1280 kernel/workqueue.c:1488 > >>> call_timer_fn+0x195/0x760 kernel/time/timer.c:1404 > >>> expire_timers kernel/time/timer.c:1444 [inline] > >>> __run_timers kernel/time/timer.c:1773 [inline] > >>> __run_timers kernel/time/timer.c:1740 [inline] > >>> run_timer_softirq+0x412/0x1600 kernel/time/timer.c:1786 > >>> __do_softirq+0x26c/0x99d kernel/softirq.c:292 > >>> invoke_softirq kernel/softirq.c:373 [inline] > >>> irq_exit+0x192/0x1d0 kernel/softirq.c:413 > >>> exiting_irq arch/x86/include/asm/apic.h:546 [inline] > >>> smp_apic_timer_interrupt+0x19e/0x600 arch/x86/kernel/apic/apic.c:1146 > >>> apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:829 > >>> > _______________________________________________ > dri-devel mailing list > dri-devel@lists.freedesktop.org > https://lists.freedesktop.org/mailman/listinfo/dri-devel -- Daniel Vetter Software Engineer, Intel Corporation +41 (0) 79 365 57 48 - http://blog.ffwll.ch