Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp3465204ybb; Tue, 31 Mar 2020 05:58:26 -0700 (PDT) X-Google-Smtp-Source: ADFU+vuRkJ+qq24x9AsR1Bc6+pLYmJwAVw4O6ZBNJZbEU1eOOQUEoPAj4hZWylDYBmzsUKYU6deQ X-Received: by 2002:aca:b308:: with SMTP id c8mr1975198oif.131.1585659505905; Tue, 31 Mar 2020 05:58:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585659505; cv=none; d=google.com; s=arc-20160816; b=z9gCsiOOVMRsiyJlS8KNSO01aeIt/qA5xHZbod50nFWVwFzS09g1AX4DH4rUYqjCgH ARvbUYr4pg0jyXda8qQ9qJJRAFz59RiI3jButkeh9ColK1jKpR0mM189Iy69n4UF2WDZ B3VVruLDrbAThWFn0lahREVMH1HpTA5Uoxa0nAb3CFOMnf2cc9sjk5sSfrp+R0WAVZzm aMcvRuyJjlEoD7xNIMjib+vfT16e1OzTGaXWjDXwiQZaHkHI47447PzAsaTZsVDokwat o+c/na2svS1vPzhcHVy6okVQQpTrigOMDNFVI/CggFjldhEcbseWARU1VxBcRcbQ543Y Dzyg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=YnQ6n4z7dqsVMXT9rKZXxIInLsfWtapicwNMD80Iq9c=; b=UJbGVAl3NU6Zj9RsV1D241VzRlwNjSSlniO8Q2jgRWjKals+Ib7EstUyFsUgW86Vyo fBdFu4mJ0lyUCv9DA487daX1GueUAngK99VSc143IjWURWQZeesttOw1Brsvo/udKTxM tlnxaRxv5/YX6W+sBg17GEFbeHXjvZs02fkVLmCpot37h/c5urHXlVrB9jjABJnvsWlS WpTx6DViGKtINJKaOsIYSjRHZtTWXKohYA4FugsMculQkBqDIEVNov9Q/5iBowE+lLri bteiw3fA0U8S1W6FEEjeEk0pDamkoNrz2HfavkT+fmev0YkcYrYnCEHWkOHrJjO19J4N dCVA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ffwll.ch header.s=google header.b=ZTALGM4k; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b187si7417871oif.221.2020.03.31.05.58.07; Tue, 31 Mar 2020 05:58:25 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@ffwll.ch header.s=google header.b=ZTALGM4k; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730778AbgCaM5k (ORCPT + 99 others); Tue, 31 Mar 2020 08:57:40 -0400 Received: from mail-oi1-f194.google.com ([209.85.167.194]:45929 "EHLO mail-oi1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730710AbgCaM5k (ORCPT ); Tue, 31 Mar 2020 08:57:40 -0400 Received: by mail-oi1-f194.google.com with SMTP id l22so18745589oii.12 for ; Tue, 31 Mar 2020 05:57:39 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ffwll.ch; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=YnQ6n4z7dqsVMXT9rKZXxIInLsfWtapicwNMD80Iq9c=; b=ZTALGM4kwm+Kf2As9s7ZQeXAd+Z+9DWdqrVknruP4/FP5WEGyO35AmH72B7mORbwG9 YShZbF4yuhIqZCTOVaykFDQXdCpzEaPdi8b/7om6SoBPcD9TwjgNldde95OPkcsqF2KJ Ffis3yvcWOItscPvwMy3aHTbj/sdwkjV4alq8= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=YnQ6n4z7dqsVMXT9rKZXxIInLsfWtapicwNMD80Iq9c=; b=Yp7X7jdXIuD6SV5z8ux2KsTij4iHpJe/I1iZMBSR0k9lpR0dwXkZkRglsgYCt65uHV WW8glU2Sf0rkhNhpwNPx3EweINKLsjg3ATpOrUBk89YFxLUZk6JlUMt6/eo1k9ZjDfth frpiZ7HX5Kxa0WpIdqqTaJXw0WuXUymOKuzeP1iCqSxk6KF9yPQQ6Y8SEmVSR4zqcqgR xTXchlmPdqSuFNLjIM/oedfWCanbdHGymv0pQgVrLNuMtDDMf+Y0el17u3J52ruo+AiF XYyp0l0nFKi98YXUPkK8ocjDI+DGbfUUr+n4O3U5eOH5gxNKyqoAVgftmsAkNy8aBbfI /NEQ== X-Gm-Message-State: ANhLgQ0/YL0LylEB9jyj+PTxFi/g3LJQb9fGGySOIw2GKFYxSUYULGUo 8W7PjfCCBi55F5y6TNyvKbdBqoYm/fzDouh5f5fpQA== X-Received: by 2002:aca:c45:: with SMTP id i5mr1796256oiy.101.1585659459332; Tue, 31 Mar 2020 05:57:39 -0700 (PDT) MIME-Version: 1.0 References: <000000000000ec257905a21f7415@google.com> <20200331095737.GO20730@hirez.programming.kicks-ass.net> <7641fb29-20ec-0963-d04c-bfbf49fd3ebc@samsung.com> In-Reply-To: From: Daniel Vetter Date: Tue, 31 Mar 2020 14:57:28 +0200 Message-ID: Subject: Re: INFO: trying to register non-static key in try_to_wake_up To: Bartlomiej Zolnierkiewicz Cc: Dmitry Vyukov , Linux Fbdev development list , Peter Zijlstra , syzbot , "the arch/x86 maintainers" , syzkaller-bugs , LKML , DRI , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , Thomas Gleixner Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Mar 31, 2020 at 2:50 PM Daniel Vetter wrote: > > On Tue, Mar 31, 2020 at 2:18 PM Bartlomiej Zolnierkiewicz > wrote: > > > > > > On 3/31/20 12:18 PM, Dmitry Vyukov wrote: > > > On Tue, Mar 31, 2020 at 11:57 AM Peter Zijlstra wrote: > > >> > > >> On Mon, Mar 30, 2020 at 10:01:12PM -0700, syzbot wrote: > > >>> Hello, > > >>> > > >>> syzbot found the following crash on: > > >>> > > >>> HEAD commit: 9420e8ad Merge tag 'for-linus' of git://git.kernel.org/pub.. > > >>> git tree: upstream > > >>> console output: https://protect2.fireeye.com/url?k=0756a78d-5a9a6c49-07572cc2-0cc47a314e9a-e4dc8b657d340686&u=https://syzkaller.appspot.com/x/log.txt?x=1206ed4be00000 > > >>> kernel config: https://protect2.fireeye.com/url?k=43211072-1eeddbb6-43209b3d-0cc47a314e9a-3bd45a19932c37c8&u=https://syzkaller.appspot.com/x/.config?x=27392dd2975fd692 > > >>> dashboard link: https://protect2.fireeye.com/url?k=bf7a6153-e2b6aa97-bf7bea1c-0cc47a314e9a-c64073ee605efb7b&u=https://syzkaller.appspot.com/bug?extid=e84d7ebd1361da13c356 > > >>> compiler: gcc (GCC) 9.0.0 20181231 (experimental) > > >>> > > >>> Unfortunately, I don't have any reproducer for this crash yet. > > >>> > > >>> IMPORTANT: if you fix the bug, please add the following tag to the commit: > > >>> Reported-by: syzbot+e84d7ebd1361da13c356@syzkaller.appspotmail.com > > >>> > > >>> INFO: trying to register non-static key. > > >>> the code is fine but needs lockdep annotation. > > >>> turning off the locking correctness validator. > > >>> CPU: 1 PID: 1014 Comm: syz-executor.0 Not tainted 5.6.0-rc7-syzkaller #0 > > >>> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 > > >>> Call Trace: > > >>> > > >>> __dump_stack lib/dump_stack.c:77 [inline] > > >>> dump_stack+0x188/0x20d lib/dump_stack.c:118 > > >>> assign_lock_key kernel/locking/lockdep.c:880 [inline] > > >>> register_lock_class+0x14c4/0x1540 kernel/locking/lockdep.c:1189 > > >>> __lock_acquire+0xfc/0x3ca0 kernel/locking/lockdep.c:3836 > > >>> lock_acquire+0x197/0x420 kernel/locking/lockdep.c:4484 > > >>> __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] > > >>> _raw_spin_lock_irqsave+0x8c/0xbf kernel/locking/spinlock.c:159 > > >>> try_to_wake_up+0x9f/0x17c0 kernel/sched/core.c:2547 > > >> > > >> That's p->pi_lock, which gets initialized in rt_mutex_init_task() in > > >> copy_process(). This should be impossible. Very odd. > > > > > > The stack mentions fbdev, which is a red flag at the moment. There are > > > a dozen of bad bugs in fbdev and around. Just few days ago Andy > > > pointed to another "impossible" crash "general protection fault in > > > do_syscall_64" which is related to dri: > > > https://protect2.fireeye.com/url?k=0cb8ad06-517466c2-0cb92649-0cc47a314e9a-a20c11191483c65b&u=https://syzkaller.appspot.com/bug?id=0ec7b2602b1ff40f0d34f38baa4ba1640727c3d9 > > > https://protect2.fireeye.com/url?k=614292e3-3c8e5927-614319ac-0cc47a314e9a-aeda6d72c01a7b0e&u=https://groups.google.com/forum/#!msg/syzkaller-bugs/ePqhfYx0-8M/Q_Urt97iAAAJ > > > > > > There are probably more random manifestations of these bugs already, > > > and I guess we will be getting more. > > > > > > +fbdev maintainers > > > > Thank you for the report. > > > > fbdev is in the maintenance mode and no new features or drivers are > > being added so syzbot reports are not for a new bugs (regressions) and > > are not a priority (at least to me). > > Yup same here, I've seen a pile of syzbot reports for fbdev (and also > vt, or combinations of them since fbdev is linked to vt through fbcon) > fly by. But I really don't have to deal with these, my recommendation > to anyone who cares about security are: > - Don't enable vt > - Don't enable fbdev > > All that code has been developed long ago, in a much more innocent > time. If someone wants to fix this you'd not just need to fix all the > syzbot stuff, but also ramp up a full testsuite for all the ioctl, and > all the corner-cases. Plus also fix some of the horrendous locking in > there, probably. > > Multi-year effort, easily. > > Regressions I'll obviously try to handle, but none of these are. It's > just syzbot has become smarter at hitting bugs in fbdev and vt > subsystems (or maybe the hw the virtual machines emulate has become > more varied, some of the reports are for fun stuff like vgacon ...). Forgot to mention: Just yesterday I did merge an fbcon overflow bugfix: commit b139f8b00db4a8ea75a4174346eafa48041aa489 (HEAD -> drm-misc-next-fixes, drm-misc/for-linux-next, drm-misc/drm-misc-next-fixes) Author: Qiujun Huang Date: Sun Mar 29 16:56:47 2020 +0800 fbcon: fix null-ptr-deref in fbcon_switch There's also a pending patch in the vt subsystem to catch overflow for unicode fonts on consoles, that's reviewed and waiting for Greg to pick it up. -Daniel > Cheers, Daniel > > > I have only resources to review/merge pending fbdev patches from time > > to time so any help in fixing these syzbot reports is welcomed (there > > have been a few fbdev related syzbot reports recently). > > > > Also please note that fbdev is maintained through drm-misc tree so > > patches can also be handled by other drm-misc maintainers in case I'm > > not available / busy with other things. > > > > Best regards, > > -- > > Bartlomiej Zolnierkiewicz > > Samsung R&D Institute Poland > > Samsung Electronics > > > > >>> wake_up_worker kernel/workqueue.c:836 [inline] > > >>> insert_work+0x2ad/0x3a0 kernel/workqueue.c:1337 > > >>> __queue_work+0x50d/0x1280 kernel/workqueue.c:1488 > > >>> call_timer_fn+0x195/0x760 kernel/time/timer.c:1404 > > >>> expire_timers kernel/time/timer.c:1444 [inline] > > >>> __run_timers kernel/time/timer.c:1773 [inline] > > >>> __run_timers kernel/time/timer.c:1740 [inline] > > >>> run_timer_softirq+0x412/0x1600 kernel/time/timer.c:1786 > > >>> __do_softirq+0x26c/0x99d kernel/softirq.c:292 > > >>> invoke_softirq kernel/softirq.c:373 [inline] > > >>> irq_exit+0x192/0x1d0 kernel/softirq.c:413 > > >>> exiting_irq arch/x86/include/asm/apic.h:546 [inline] > > >>> smp_apic_timer_interrupt+0x19e/0x600 arch/x86/kernel/apic/apic.c:1146 > > >>> apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:829 > > >>> > > _______________________________________________ > > dri-devel mailing list > > dri-devel@lists.freedesktop.org > > https://lists.freedesktop.org/mailman/listinfo/dri-devel > > > > -- > Daniel Vetter > Software Engineer, Intel Corporation > +41 (0) 79 365 57 48 - http://blog.ffwll.ch -- Daniel Vetter Software Engineer, Intel Corporation +41 (0) 79 365 57 48 - http://blog.ffwll.ch