Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp1855533pxv; Sat, 10 Jul 2021 17:44:52 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzdJlsjjpr7nuf6fzIvrtpIDBA3yB3SC+sScGbhwt9dTCrymok+eYSR9aD5SzQ4IbWLPrl9 X-Received: by 2002:a02:a595:: with SMTP id b21mr2893069jam.122.1625964292423; Sat, 10 Jul 2021 17:44:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1625964292; cv=none; d=google.com; s=arc-20160816; b=EYG23N6QB8A8W1Cq69nAOaHotU1XjDw3Mj+jcrh1IDi3gO6aDVZN3cZ5/N+AdLkhxA KKArxWQl/2ppcYo4u+Eg8fkAXjbK0+LBh+FzXMX8exzGBzKSV6J8aqUwDnH9zLwBlRn2 OysjcYkyYD4oSbfdWra87aDwFSFk+EzWAjYWm/gUeEeeJx4+KXnvw5zBX76ZwzVo220y ZRtS5lLsRmEansuUvzJllQeT2bVlzWZL8IJbuHoj090FWbt5kRnneG+NAl3pOUgFgZaq 6uMWue4+OXNOTmgo25hSGUwSrDTVBgJ5J8WtdNxprP1l346Sb8+pL67dMfJ+FODJRc9a MpeQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=CCLTvpG9YQP1WahKpI8lKmGKwNUyVD3yOIxyrCj9D0k=; b=uyQxJAW9A4HLEiLbqZd/6cx27UB5OwgL5GKjuL2W0v8sXGttoUDL7+KazZBL57c9v3 hjD+KDRvCCtImgpoHsCNkwmpApPrp4SXQmUPIQZhZkpIB0dxzm4Mj4iYBwPQ5FVYk1uO RxErvminP6xYF6Ig4xiryqwr7cKPe2zB3CRPmYlDrC16WWX0Vx3EhPaFPKPMWdQNYVH/ QJG1TXZWXMCOr0OBeXYyBK5eXPScuQ6lEhvmbQ0hLkF4QkDKiuejb5FNtj7oAlgp5KFe +yqMq4aXaM1awo6tjg33Rek8x1f+Q9dD8jhU1NbeRgWDnluatCzRCjjRcB/hOv1/sXz/ hRKA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id az23si12305809jab.13.2021.07.10.17.44.15; Sat, 10 Jul 2021 17:44:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230442AbhGKAjQ (ORCPT + 99 others); Sat, 10 Jul 2021 20:39:16 -0400 Received: from netrider.rowland.org ([192.131.102.5]:49441 "HELO netrider.rowland.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with SMTP id S230408AbhGKAjP (ORCPT ); Sat, 10 Jul 2021 20:39:15 -0400 Received: (qmail 281040 invoked by uid 1000); 10 Jul 2021 20:36:29 -0400 Date: Sat, 10 Jul 2021 20:36:29 -0400 From: Alan Stern To: syzbot Cc: gregkh@linuxfoundation.org, johan@kernel.org, linux-kernel@vger.kernel.org, linux-usb@vger.kernel.org, mathias.nyman@linux.intel.com, syzkaller-bugs@googlegroups.com Subject: Re: [syzbot] WARNING in do_proc_control/usb_submit_urb Message-ID: <20210711003629.GA281009@rowland.harvard.edu> References: <20210710145003.GA271154@rowland.harvard.edu> <00000000000074f06705c6ccd2a4@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <00000000000074f06705c6ccd2a4@google.com> User-Agent: Mutt/1.10.1 (2018-07-13) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, Jul 10, 2021 at 03:58:10PM -0700, syzbot wrote: > Hello, > > syzbot has tested the proposed patch but the reproducer is still triggering an issue: > BUG: sleeping function called from invalid context in lock_sock_nested This is clearly a different bug, so it looks like the patch does fix the original bug. I'll submit it after the end of the merge window. Alan Stern > BUG: sleeping function called from invalid context at net/core/sock.c:3159 > in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 8829, name: syz-executor.5 > 1 lock held by syz-executor.5/8829: > #0: ffffffff8d2ecee0 (hci_sk_list.lock){++++}-{2:2}, at: hci_sock_dev_event+0x3db/0x660 net/bluetooth/hci_sock.c:763 > Preemption disabled at: > [<0000000000000000>] 0x0 > CPU: 1 PID: 8829 Comm: syz-executor.5 Not tainted 5.13.0-next-20210707-syzkaller #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 > Call Trace: > __dump_stack lib/dump_stack.c:88 [inline] > dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:105 > ___might_sleep.cold+0x1f1/0x237 kernel/sched/core.c:9171 > lock_sock_nested+0x25/0x120 net/core/sock.c:3159 > lock_sock include/net/sock.h:1613 [inline] > hci_sock_dev_event+0x465/0x660 net/bluetooth/hci_sock.c:765 > hci_unregister_dev+0x2fd/0x1130 net/bluetooth/hci_core.c:4033 > vhci_release+0x70/0xe0 drivers/bluetooth/hci_vhci.c:340 > __fput+0x288/0x920 fs/file_table.c:280 > task_work_run+0xdd/0x1a0 kernel/task_work.c:164 > exit_task_work include/linux/task_work.h:32 [inline] > do_exit+0xbd4/0x2a60 kernel/exit.c:825 > do_group_exit+0x125/0x310 kernel/exit.c:922 > __do_sys_exit_group kernel/exit.c:933 [inline] > __se_sys_exit_group kernel/exit.c:931 [inline] > __x64_sys_exit_group+0x3a/0x50 kernel/exit.c:931 > do_syscall_x64 arch/x86/entry/common.c:50 [inline] > do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 > entry_SYSCALL_64_after_hwframe+0x44/0xae > RIP: 0033:0x4665d9 > Code: Unable to access opcode bytes at RIP 0x4665af. > RSP: 002b:00007ffd31aadb08 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 > RAX: ffffffffffffffda RBX: 00007ffd31aae2c8 RCX: 00000000004665d9 > RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000043 > RBP: 0000000000000000 R08: 0000000000000025 R09: 00007ffd31aae2c8 > R10: 00000000ffffffff R11: 0000000000000246 R12: 00000000004bef54 > R13: 0000000000000010 R14: 0000000000000000 R15: 0000000000400538 > > ====================================================== > > > Tested on: > > commit: ee268dee Add linux-next specific files for 20210707 > git tree: https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git > console output: https://syzkaller.appspot.com/x/log.txt?x=159cf1e2300000 > kernel config: https://syzkaller.appspot.com/x/.config?x=59e1e3bbc3afca75 > dashboard link: https://syzkaller.appspot.com/bug?extid=72af3105289dcb4c055b > compiler: > patch: https://syzkaller.appspot.com/x/patch.diff?x=163fd772300000