Received: by 2002:ab2:710b:0:b0:1ef:a325:1205 with SMTP id z11csp1333797lql; Tue, 12 Mar 2024 14:02:48 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCWy/Il3+MUjOVqxXztP2vrrTJeYHqzlxsniWC5leekdSbqCzHtLyirzQzWDZGIcHlo0Yyj6MP2PuNF8VC7PKsADJF/x5Z46X4gUNH156w== X-Google-Smtp-Source: AGHT+IFYBrBMsh3Y+HxRnI7rJqvv5CUhe30rVuLki+B/x32ynmK0EpxxbmHS1DiBZk4mCR7DXoA9 X-Received: by 2002:a05:6808:1486:b0:3c2:39c8:fc54 with SMTP id e6-20020a056808148600b003c239c8fc54mr13641937oiw.9.1710277368607; Tue, 12 Mar 2024 14:02:48 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1710277368; cv=pass; d=google.com; s=arc-20160816; b=I3V2ZLm7tgiejgdpUTr+1qwDuzJzasxrlxxvo9i/wKclQ1vYa+eblDhUFaFhjLpk1Z vJ9bORlAzlKJeFCE1JoZN0x/eFK7AOYvpVg/lUQdR9i3YpDnQUN/OERxI8A3gocG4EQL huK7UNrPvO1Hi1G+sUThVL5YwjQCxhkXPKvEYb+EM4HYpUUlE5rH8ynPpODRlbpgi2yX XdI6J1vr3YcUaU7B+IrqrSRHUrhkaaR8f24J7CHDmQJyslFsfH6CV5xBYrSnQjPmwgx0 3dthqO4RhxWydrHum2LZ7AuPMEZ+sicfu8RoInmuTB0H37hZ51TzSvpskXxoo06h2vE2 4I2w== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:date:from:dkim-signature; bh=ry2mBoH+c5gWLgzcnH2ecU7709nJqaqvy6mrJBpg2fE=; fh=ji6T14riDsIYYDMw6R89AE4emoK4VpOgmZNy7oj5pUM=; b=mGnbIcnGKLBFAEJJ9BRyXKoLD+r3QobnlawtErPIcqlCru32n/MwplzL+DUMYxsbe0 tEQW5ckliQ1ZIEHM2TS7vNoaLR2HxlIwcwxaTIIbsn1dH7i5P+/2f5yy3PTzW7eMUxvi 8daqQYtdN7Mh9oZCffK+Fwl/KEkvQz01hoB8sUBZDXAQBXPtyHkhVLueA+Y7gPRxEAHB 4DIX/tsE3bFNlsVednvY1BFxNVkRwksXPfNRcSa+nmtg93xO1Xyy/v/EapS7NyIVgL1S Hi69yXbGYQzx18XlAbXpI2KZINlNpCRwQTtYWtc8bdlYu4O5kLLp+K3VwDhbRlTwefmo 6TxQ==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=nB+7Gqo5; arc=pass (i=1 spf=pass spfdomain=gmail.com dkim=pass dkdomain=gmail.com dmarc=pass fromdomain=gmail.com); spf=pass (google.com: domain of linux-kernel+bounces-100781-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-100781-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id o7-20020ad45c87000000b00690cbb5d9f7si6449518qvh.606.2024.03.12.14.02.48 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 Mar 2024 14:02:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-100781-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=nB+7Gqo5; arc=pass (i=1 spf=pass spfdomain=gmail.com dkim=pass dkdomain=gmail.com dmarc=pass fromdomain=gmail.com); spf=pass (google.com: domain of linux-kernel+bounces-100781-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-100781-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 4774B1C20C70 for ; Tue, 12 Mar 2024 21:02:48 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 63FCC143733; Tue, 12 Mar 2024 21:02:35 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="nB+7Gqo5" Received: from mail-ej1-f47.google.com (mail-ej1-f47.google.com [209.85.218.47]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 5F4257E10A; Tue, 12 Mar 2024 21:02:31 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.218.47 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1710277354; cv=none; b=kbqSWwqvttqH/0l3yd282e8GoMxxQXQRT49BfAseTH9hXwpSGabJm30AwKGZjkmzoe2zIAEZ227HU7VfZF4q1x40wrOZfOEkQiWeFqZHOxTqR9BAw59fr6RmMJ7GDABts/xSscUkhUg7xJN0TJ5W+zIstRD+vK1UYuzCKUBNOf4= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1710277354; c=relaxed/simple; bh=0sCr4WabJZpDD15XRa8avQrNFDfqqV+pYS21qqJm4no=; h=From:Date:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=ddFnovLOAmx1luVVa9XB1pqhCnwXVvjbhXvYaVofqN0WZ94zpG0cdxgf/JZl+WbjRijSC7Y8IT4Br31BxaNN/JA/5stLVZDZLKbw6DOQFcJV+uqHRy9rh+BbnXFHG5ksatcVz96ps1IH13ZgNVktap9WiG26+of0IjczT1X4/7Y= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=nB+7Gqo5; arc=none smtp.client-ip=209.85.218.47 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Received: by mail-ej1-f47.google.com with SMTP id a640c23a62f3a-a44665605f3so844410666b.2; Tue, 12 Mar 2024 14:02:31 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1710277350; x=1710882150; darn=vger.kernel.org; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:date:from:from:to:cc:subject:date:message-id:reply-to; bh=ry2mBoH+c5gWLgzcnH2ecU7709nJqaqvy6mrJBpg2fE=; b=nB+7Gqo54G5qqECiAMJdm6FGCBEyxpFMldXfaTX9+JIZgX2Q7ztrSts0CD7MLF9+VF q9nIDP8MjofWWChBmjm1j3WDHmfFKGJukJZHymasoETiPWFUPtn8c4dDg6xjozA40uNa V/JHfx6nDzoINm9HoBItC8LIcYxRt3RFZwFHeV6MF0iWoWF3aAsyqpluepZIL5wRQF4q s+lS6cRVbIghUKkg65B7hCuoKz7GNMTKCgOuqT+fhcLM72A6IQM9jyZWrB2/8fe7w/K9 8rTKLaKu6sw9XDYzOmmLtSnLM07H7aWBzhK3SWZyIfPmTpHW7ZpHBjg90ovqRjjowZMq /9tw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1710277350; x=1710882150; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:date:from:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=ry2mBoH+c5gWLgzcnH2ecU7709nJqaqvy6mrJBpg2fE=; b=hq04Ki5SoWUL4ddm0gCPwYIkFtFKpu3VakqZYK4VAGpy+JJqbI65B9LuijSifP4HdP aFQE4D06xbzdqAcFMCnlEH9HDx4CbiHLrdwGt/3N8guHKDGcDZ//gYGz2p+mtIj8aVoO k55ZM7/wj+b5v2HL9Qm8NZ8t59PBHXVf8N0Z/JbVRYtq7pQdR5d8bbKkCzJ49DADbA7/ 81wevIGmcdkkFmqvHj3ATFpDr1uVtYZLP2Av7L3tJHUEkggVPtrWHgU11HBOiRJehe3F Re5iWun0CKF4UecWhoftME/2sE5E1dsUFu8Ip6CG6jDGszkjdXzqIHOHFryqDa9yLUNI w9tw== X-Forwarded-Encrypted: i=1; AJvYcCUCvHbEWAGM4JHp47do0wRYdRNwKCsAXjZNz4n7Zo/nzVE3N4bkqWhuRk7X4H5PTl9yP5SG1xQ1vxQZhZWXySWYVxg+wZKZxIlc5Gffj5rYiZi4RZka7R4/MTYEaekmzZbPhKQwffJuUDPcf+HUwK1Y2H+Fezlqytn8 X-Gm-Message-State: AOJu0YwcXAhjQ5ZU5DLaVdJiozqD1uAirBwPRkiBvZVOOq7cmc4czS3g TE7TUk/jqh3r9QZuMzISnerm9Z6qWVVIVld5pHz954B3FZWaOS+v X-Received: by 2002:a17:907:a642:b0:a46:4c8e:18a9 with SMTP id vu2-20020a170907a64200b00a464c8e18a9mr1490067ejc.48.1710277349373; Tue, 12 Mar 2024 14:02:29 -0700 (PDT) Received: from krava ([83.240.63.214]) by smtp.gmail.com with ESMTPSA id a10-20020a17090640ca00b00a4550e8ae70sm4218538ejk.63.2024.03.12.14.02.28 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 Mar 2024 14:02:29 -0700 (PDT) From: Jiri Olsa X-Google-Original-From: Jiri Olsa Date: Tue, 12 Mar 2024 22:02:27 +0100 To: syzbot Cc: andrii@kernel.org, ast@kernel.org, bpf@vger.kernel.org, daniel@iogearbox.net, haoluo@google.com, john.fastabend@gmail.com, kpsingh@kernel.org, linux-kernel@vger.kernel.org, martin.lau@linux.dev, netdev@vger.kernel.org, sdf@google.com, song@kernel.org, syzkaller-bugs@googlegroups.com, yonghong.song@linux.dev Subject: Re: [syzbot] [bpf?] possible deadlock in __bpf_ringbuf_reserve Message-ID: References: <0000000000004aa700061379547e@google.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <0000000000004aa700061379547e@google.com> On Tue, Mar 12, 2024 at 09:41:26AM -0700, syzbot wrote: > Hello, > > syzbot found the following issue on: > > HEAD commit: df4793505abd Merge tag 'net-6.8-rc8' of git://git.kernel.o.. > git tree: bpf > console+strace: https://syzkaller.appspot.com/x/log.txt?x=11fd0092180000 > kernel config: https://syzkaller.appspot.com/x/.config?x=c11c5c676adb61f0 > dashboard link: https://syzkaller.appspot.com/bug?extid=850aaf14624dc0c6d366 > compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 > syz repro: https://syzkaller.appspot.com/x/repro.syz?x=1509c4ae180000 > C reproducer: https://syzkaller.appspot.com/x/repro.c?x=10babc01180000 > > Downloadable assets: > disk image: https://storage.googleapis.com/syzbot-assets/d2e80ee1112b/disk-df479350.raw.xz > vmlinux: https://storage.googleapis.com/syzbot-assets/b35ea54cd190/vmlinux-df479350.xz > kernel image: https://storage.googleapis.com/syzbot-assets/59f69d999ad2/bzImage-df479350.xz > > IMPORTANT: if you fix the issue, please add the following tag to the commit: > Reported-by: syzbot+850aaf14624dc0c6d366@syzkaller.appspotmail.com > > ============================================ > WARNING: possible recursive locking detected > 6.8.0-rc7-syzkaller-gdf4793505abd #0 Not tainted > -------------------------------------------- > strace-static-x/5063 is trying to acquire lock: > ffffc900096f10d8 (&rb->spinlock){-.-.}-{2:2}, at: __bpf_ringbuf_reserve+0x211/0x4f0 kernel/bpf/ringbuf.c:424 > > but task is already holding lock: > ffffc900098410d8 (&rb->spinlock){-.-.}-{2:2}, at: __bpf_ringbuf_reserve+0x211/0x4f0 kernel/bpf/ringbuf.c:424 > > other info that might help us debug this: > Possible unsafe locking scenario: > > CPU0 > ---- > lock(&rb->spinlock); > lock(&rb->spinlock); > > *** DEADLOCK *** > > May be due to missing lock nesting notation > > 4 locks held by strace-static-x/5063: > #0: ffff88807857e068 (&pipe->mutex/1){+.+.}-{3:3}, at: __pipe_lock fs/pipe.c:103 [inline] > #0: ffff88807857e068 (&pipe->mutex/1){+.+.}-{3:3}, at: pipe_write+0x1cc/0x1a40 fs/pipe.c:465 > #1: ffffffff8e130be0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:298 [inline] > #1: ffffffff8e130be0 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:750 [inline] > #1: ffffffff8e130be0 (rcu_read_lock){....}-{1:2}, at: __bpf_trace_run kernel/trace/bpf_trace.c:2380 [inline] > #1: ffffffff8e130be0 (rcu_read_lock){....}-{1:2}, at: bpf_trace_run2+0x114/0x420 kernel/trace/bpf_trace.c:2420 > #2: ffffc900098410d8 (&rb->spinlock){-.-.}-{2:2}, at: __bpf_ringbuf_reserve+0x211/0x4f0 kernel/bpf/ringbuf.c:424 > #3: ffffffff8e130be0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:298 [inline] > #3: ffffffff8e130be0 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:750 [inline] > #3: ffffffff8e130be0 (rcu_read_lock){....}-{1:2}, at: __bpf_trace_run kernel/trace/bpf_trace.c:2380 [inline] > #3: ffffffff8e130be0 (rcu_read_lock){....}-{1:2}, at: bpf_trace_run2+0x114/0x420 kernel/trace/bpf_trace.c:2420 > > stack backtrace: > CPU: 0 PID: 5063 Comm: strace-static-x Not tainted 6.8.0-rc7-syzkaller-gdf4793505abd #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 > Call Trace: > > __dump_stack lib/dump_stack.c:88 [inline] > dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106 > check_deadlock kernel/locking/lockdep.c:3062 [inline] > validate_chain+0x15c0/0x58e0 kernel/locking/lockdep.c:3856 > __lock_acquire+0x1345/0x1fd0 kernel/locking/lockdep.c:5137 > lock_acquire+0x1e3/0x530 kernel/locking/lockdep.c:5754 > __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] > _raw_spin_lock_irqsave+0xd5/0x120 kernel/locking/spinlock.c:162 > __bpf_ringbuf_reserve+0x211/0x4f0 kernel/bpf/ringbuf.c:424 > ____bpf_ringbuf_reserve kernel/bpf/ringbuf.c:459 [inline] > bpf_ringbuf_reserve+0x5c/0x70 kernel/bpf/ringbuf.c:451 > bpf_prog_9efe54833449f08e+0x2d/0x47 > bpf_dispatcher_nop_func include/linux/bpf.h:1231 [inline] > __bpf_prog_run include/linux/filter.h:651 [inline] > bpf_prog_run include/linux/filter.h:658 [inline] > __bpf_trace_run kernel/trace/bpf_trace.c:2381 [inline] hum, scratching my head how this could passed through the prog->active check, will try to reproduce jirka > bpf_trace_run2+0x204/0x420 kernel/trace/bpf_trace.c:2420 > __traceiter_contention_end+0x7b/0xb0 include/trace/events/lock.h:122 > trace_contention_end+0xf6/0x120 include/trace/events/lock.h:122 > __pv_queued_spin_lock_slowpath+0x939/0xc60 kernel/locking/qspinlock.c:560 > pv_queued_spin_lock_slowpath arch/x86/include/asm/paravirt.h:584 [inline] > queued_spin_lock_slowpath+0x42/0x50 arch/x86/include/asm/qspinlock.h:51 > queued_spin_lock include/asm-generic/qspinlock.h:114 [inline] > do_raw_spin_lock+0x271/0x370 kernel/locking/spinlock_debug.c:116 > __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:111 [inline] > _raw_spin_lock_irqsave+0xe1/0x120 kernel/locking/spinlock.c:162 > __bpf_ringbuf_reserve+0x211/0x4f0 kernel/bpf/ringbuf.c:424 > ____bpf_ringbuf_reserve kernel/bpf/ringbuf.c:459 [inline] > bpf_ringbuf_reserve+0x5c/0x70 kernel/bpf/ringbuf.c:451 > bpf_prog_9efe54833449f08e+0x2d/0x47 > bpf_dispatcher_nop_func include/linux/bpf.h:1231 [inline] > __bpf_prog_run include/linux/filter.h:651 [inline] > bpf_prog_run include/linux/filter.h:658 [inline] > __bpf_trace_run kernel/trace/bpf_trace.c:2381 [inline] > bpf_trace_run2+0x204/0x420 kernel/trace/bpf_trace.c:2420 > __traceiter_contention_end+0x7b/0xb0 include/trace/events/lock.h:122 > trace_contention_end+0xd7/0x100 include/trace/events/lock.h:122 > __mutex_lock_common kernel/locking/mutex.c:617 [inline] > __mutex_lock+0x2e4/0xd70 kernel/locking/mutex.c:752 > __pipe_lock fs/pipe.c:103 [inline] > pipe_write+0x1cc/0x1a40 fs/pipe.c:465 > call_write_iter include/linux/fs.h:2087 [inline] > new_sync_write fs/read_write.c:497 [inline] > vfs_write+0xa81/0xcb0 fs/read_write.c:590 > ksys_write+0x1a0/0x2c0 fs/read_write.c:643 > do_syscall_64+0xf9/0x240 > entry_SYSCALL_64_after_hwframe+0x6f/0x77 > RIP: 0033:0x4e8593 > Code: c7 c2 a8 ff ff ff f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 64 8b 04 25 18 00 00 00 85 c0 75 14 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 55 c3 0f 1f 40 00 48 83 ec 28 48 89 54 24 18 > RSP: 002b:00007ffeda768928 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 > RAX: ffffffffffffffda RBX: 0000000000000012 RCX: 00000000004e8593 > RDX: 0000000000000012 RSI: 0000000000817140 RDI: 0000000000000002 > RBP: 0000000000817140 R08: 0000000000000010 R09: 0000000000000090 > R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000012 > R13: 000000000063f460 R14: 0000000000000012 R15: 0000000000000001 > > > > --- > This report is generated by a bot. It may contain errors. > See https://goo.gl/tpsmEJ for more information about syzbot. > syzbot engineers can be reached at syzkaller@googlegroups.com. > > syzbot will keep track of this issue. See: > https://goo.gl/tpsmEJ#status for how to communicate with syzbot. > > If the report is already addressed, let syzbot know by replying with: > #syz fix: exact-commit-title > > If you want syzbot to run the reproducer, reply with: > #syz test: git://repo/address.git branch-or-commit-hash > If you attach or paste a git patch, syzbot will apply it before testing. > > If you want to overwrite report's subsystems, reply with: > #syz set subsystems: new-subsystem > (See the list of subsystem names on the web dashboard) > > If the report is a duplicate of another one, reply with: > #syz dup: exact-subject-of-another-report > > If you want to undo deduplication, reply with: > #syz undup