Received: by 2002:a05:7412:b10a:b0:f3:1519:9f41 with SMTP id az10csp1897574rdb; Sat, 2 Dec 2023 14:08:07 -0800 (PST) X-Google-Smtp-Source: AGHT+IFYDnE5r/Z8GoDj/ZBwcWp/4OSHBzbL3+eQSO5zMeTu9s70NpnbLxPbP5oEMVjDvx8trWsN X-Received: by 2002:a05:6808:1897:b0:3b8:b063:5d5f with SMTP id bi23-20020a056808189700b003b8b0635d5fmr2054774oib.70.1701554887156; Sat, 02 Dec 2023 14:08:07 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701554887; cv=none; d=google.com; s=arc-20160816; b=sGCQiQZy4ReY/Kt3nbKRQLteoY3MV2PxufxCAf77q7AQk6Im+JtFvxCn388YLnM4kW C4BrHSiEGbOmggeDx9ZKLEQ0pl6+t3kBJP1KuwI89vB1thxgwHo2XXlYJCdso3Fz38e+ /wPBRN/qi73xicTbbEMm4eBg4oGAluYyHj8AEEbyUd+Hlz0rFWnf31fMobDAFdiY2UFn HiMnIr+1Sl4TbfgX9J+l2ByNy/UfqdaGIsq/Z7Xm2A/h6e6CJXb394EUYYBvUba1KIbj hpgscAsIZPWkCjroERU3uER0BsDi0ZRY5He8R+5xxxQ22EEoLmpYtJJBbtEOmIi9fDkk PzdQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=o5jPL/kj4YNK4jvA7wtYsl5Us0XRJr3xNvnmCXFkX9w=; fh=lOx1MgBEqZEbmyv9qxbym9FZIIB5TCTbzUJVMBLPeZw=; b=EgMOD9Z4almEWG9syqSUyN1VdlzOikml3w6pshxZ0wnKLHlqdIdNoYVG38uqE5jcD1 CjPKKQC4dNxPc/wmavWwCpTkz6KV1rS38fALSZ9Nxjd2dn/ES3dAUDmlatjy5JIqegCM cpNgyc/VFiDFVgCX6/vEnC59sG9rxt/Zj89JcendeBGOCQIyeRvUcCeBseS/SVydcz3D DjzolTDfMUYFn0yq+IJq2w+L9ev9/x/0nUtxW0oTGAQKGQGPmWvlFw+YIIstFOIv9gfF ELJ8p1gGn75rjSM30O8CBpMIA2/1r9w0AUklLwDn7RV1UGHptFytX8jvGis7Vpo64cLk fU8w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from lipwig.vger.email (lipwig.vger.email. [23.128.96.33]) by mx.google.com with ESMTPS id a30-20020a056a001d1e00b006cbfbb70262si5423841pfx.318.2023.12.02.14.08.06 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 02 Dec 2023 14:08:07 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) client-ip=23.128.96.33; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by lipwig.vger.email (Postfix) with ESMTP id 51B878063803; Sat, 2 Dec 2023 14:08:04 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at lipwig.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229634AbjLBWHn convert rfc822-to-8bit (ORCPT + 99 others); Sat, 2 Dec 2023 17:07:43 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41414 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229450AbjLBWHm (ORCPT ); Sat, 2 Dec 2023 17:07:42 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 528BF119 for ; Sat, 2 Dec 2023 14:07:48 -0800 (PST) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 0CFD1C433C9; Sat, 2 Dec 2023 22:07:45 +0000 (UTC) Date: Sat, 2 Dec 2023 17:07:43 -0500 From: Steven Rostedt To: Yu Kuai Cc: Edward Adam Davis , syzbot+ed812ed461471ab17a0c@syzkaller.appspotmail.com, akpm@linux-foundation.org, axboe@kernel.dk, dvyukov@google.com, linux-block@vger.kernel.org, linux-kernel@vger.kernel.org, linux-trace-kernel@vger.kernel.org, mhiramat@kernel.org, pengfei.xu@intel.com, syzkaller-bugs@googlegroups.com, "yukuai (C)" Subject: Re: [PATCH next] trace/blktrace: fix task hung in blk_trace_ioctl Message-ID: <20231202170743.7557e7b5@rorschach.local.home> In-Reply-To: <5116cbb4-2c85-2459-5499-56c95bb42d16@huaweicloud.com> References: <00000000000047eb7e060b652d9a@google.com> <5116cbb4-2c85-2459-5499-56c95bb42d16@huaweicloud.com> X-Mailer: Claws Mail 3.17.8 (GTK+ 2.24.33; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8BIT X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lipwig.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (lipwig.vger.email [0.0.0.0]); Sat, 02 Dec 2023 14:08:04 -0800 (PST) On Sat, 2 Dec 2023 17:19:25 +0800 Yu Kuai wrote: > Hi, > > 在 2023/12/02 17:01, Edward Adam Davis 写道: > > The reproducer involves running test programs on multiple processors separately, > > in order to enter blkdev_ioctl() and ultimately reach blk_trace_ioctl() through > > two different paths, triggering an AA deadlock. > > > > CPU0 CPU1 > > --- --- > > mutex_lock(&q->debugfs_mutex) mutex_lock(&q->debugfs_mutex) > > mutex_lock(&q->debugfs_mutex) mutex_lock(&q->debugfs_mutex) > > > > > > The first path: > > blkdev_ioctl()-> > > blk_trace_ioctl()-> > > mutex_lock(&q->debugfs_mutex) > > > > The second path: > > blkdev_ioctl()-> > > blkdev_common_ioctl()-> > > blk_trace_ioctl()-> > > mutex_lock(&q->debugfs_mutex) > I still don't understand how this AA deadlock is triggered, does the > 'debugfs_mutex' already held before calling blk_trace_ioctl()? Right, I don't see where the mutex is taken twice. You don't need two paths for an AA lock, you only need one. > > > > > The solution I have proposed is to exit blk_trace_ioctl() to avoid AA locks if > > a task has already obtained debugfs_mutex. > > > > Fixes: 0d345996e4cb ("x86/kernel: increase kcov coverage under arch/x86/kernel folder") How does it fix the above? I don't see how the above is even related to this. -- Steve > > Reported-and-tested-by: syzbot+ed812ed461471ab17a0c@syzkaller.appspotmail.com > > Signed-off-by: Edward Adam Davis > > --- > > kernel/trace/blktrace.c | 3 ++- > > 1 file changed, 2 insertions(+), 1 deletion(-) > > > > diff --git a/kernel/trace/blktrace.c b/kernel/trace/blktrace.c