All of lore.kernel.org
 help / color / mirror / Atom feed
* BUG: MAX_LOCKDEP_ENTRIES too low!
@ 2019-06-17 16:29 syzbot
  2019-11-08  3:54 ` syzbot
  2019-11-15 19:55   ` syzbot
  0 siblings, 2 replies; 5+ messages in thread
From: syzbot @ 2019-06-17 16:29 UTC (permalink / raw)
  To: jack, linux-kernel, syzkaller-bugs

Hello,

syzbot found the following crash on:

HEAD commit:    f4788d37 Add linux-next specific files for 20190614
git tree:       linux-next
console output: https://syzkaller.appspot.com/x/log.txt?x=17f2e3f1a00000
kernel config:  https://syzkaller.appspot.com/x/.config?x=daee2e11d008b604
dashboard link: https://syzkaller.appspot.com/bug?extid=cd0ec5211ac07c18c049
compiler:       gcc (GCC) 9.0.0 20181231 (experimental)

Unfortunately, I don't have any reproducer for this crash yet.

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+cd0ec5211ac07c18c049@syzkaller.appspotmail.com

BUG: MAX_LOCKDEP_ENTRIES too low!
turning off the locking correctness validator.
CPU: 0 PID: 25825 Comm: syz-executor.4 Not tainted 5.2.0-rc4-next-20190614  
#15
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS  
Google 01/01/2011
Call Trace:
  __dump_stack lib/dump_stack.c:77 [inline]
  dump_stack+0x172/0x1f0 lib/dump_stack.c:113
  alloc_list_entry kernel/locking/lockdep.c:1219 [inline]
  add_lock_to_list.isra.0.cold+0x11/0x18 kernel/locking/lockdep.c:1240
  check_prev_add kernel/locking/lockdep.c:2449 [inline]
  check_prevs_add kernel/locking/lockdep.c:2502 [inline]
  validate_chain kernel/locking/lockdep.c:2892 [inline]
  __lock_acquire+0x2cb2/0x4af0 kernel/locking/lockdep.c:3885
  lock_acquire+0x16f/0x3f0 kernel/locking/lockdep.c:4418
  __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline]
  _raw_spin_lock+0x2f/0x40 kernel/locking/spinlock.c:151
  vprintk_emit+0x115/0x700 kernel/printk/printk.c:1966
  vprintk_default+0x28/0x30 kernel/printk/printk.c:2013
  vprintk_func+0x7e/0x189 kernel/printk/printk_safe.c:386
  printk+0xba/0xed kernel/printk/printk.c:2046
  _udf_err+0xdc/0x110 fs/udf/super.c:2286
  udf_read_tagged+0x49c/0x530 fs/udf/misc.c:212
  udf_check_anchor_block+0x1ef/0x680 fs/udf/super.c:1785
  udf_scan_anchors+0x1cf/0x680 fs/udf/super.c:1825
  udf_find_anchor fs/udf/super.c:1882 [inline]
  udf_load_vrs+0x67f/0xc80 fs/udf/super.c:1947
  udf_fill_super+0x7d8/0x16d1 fs/udf/super.c:2140
  mount_bdev+0x304/0x3c0 fs/super.c:1346
  udf_mount+0x35/0x40 fs/udf/super.c:131
  legacy_get_tree+0x108/0x220 fs/fs_context.c:661
  vfs_get_tree+0x8e/0x390 fs/super.c:1476
  do_new_mount fs/namespace.c:2790 [inline]
  do_mount+0x138c/0x1c00 fs/namespace.c:3110
  ksys_mount+0xdb/0x150 fs/namespace.c:3319
  __do_sys_mount fs/namespace.c:3333 [inline]
  __se_sys_mount fs/namespace.c:3330 [inline]
  __x64_sys_mount+0xbe/0x150 fs/namespace.c:3330
  do_syscall_64+0xfd/0x680 arch/x86/entry/common.c:301
  entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x4592c9
Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7  
48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff  
ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007fb3d01d1c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00000000004592c9
RDX: 0000000020000140 RSI: 0000000020000180 RDI: 00000000200000c0
RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb3d01d26d4
R13: 00000000004c570b R14: 00000000004d9aa0 R15: 00000000ffffffff


---
This bug is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzkaller@googlegroups.com.

syzbot will keep track of this bug report. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: BUG: MAX_LOCKDEP_ENTRIES too low!
  2019-06-17 16:29 BUG: MAX_LOCKDEP_ENTRIES too low! syzbot
@ 2019-11-08  3:54 ` syzbot
  2019-11-08  9:37   ` Jan Kara
  2019-11-15 19:55   ` syzbot
  1 sibling, 1 reply; 5+ messages in thread
From: syzbot @ 2019-11-08  3:54 UTC (permalink / raw)
  To: davem, dev, jack, linux-kernel, netdev, pshelar, syzkaller-bugs

syzbot has found a reproducer for the following crash on:

HEAD commit:    99a8efbb NFC: st21nfca: fix double free
git tree:       net
console output: https://syzkaller.appspot.com/x/log.txt?x=15ed70d8e00000
kernel config:  https://syzkaller.appspot.com/x/.config?x=cbbed3e8d4eb64bf
dashboard link: https://syzkaller.appspot.com/bug?extid=cd0ec5211ac07c18c049
compiler:       gcc (GCC) 9.0.0 20181231 (experimental)
syz repro:      https://syzkaller.appspot.com/x/repro.syz?x=13cf5594e00000
C reproducer:   https://syzkaller.appspot.com/x/repro.c?x=1036c762e00000

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+cd0ec5211ac07c18c049@syzkaller.appspotmail.com

device 5580n entered promiscuous mode
BUG: MAX_LOCKDEP_ENTRIES too low!
turning off the locking correctness validator.
CPU: 0 PID: 14197 Comm: syz-executor527 Not tainted 5.4.0-rc5+ #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS  
Google 01/01/2011
Call Trace:
  __dump_stack lib/dump_stack.c:77 [inline]
  dump_stack+0x172/0x1f0 lib/dump_stack.c:113
  alloc_list_entry.cold+0x11/0x18 kernel/locking/lockdep.c:1292
  add_lock_to_list kernel/locking/lockdep.c:1313 [inline]
  check_prev_add kernel/locking/lockdep.c:2528 [inline]
  check_prevs_add kernel/locking/lockdep.c:2581 [inline]
  validate_chain kernel/locking/lockdep.c:2971 [inline]
  __lock_acquire+0x2a15/0x4a00 kernel/locking/lockdep.c:3955
  lock_acquire+0x190/0x410 kernel/locking/lockdep.c:4487
  __raw_spin_lock_bh include/linux/spinlock_api_smp.h:135 [inline]
  _raw_spin_lock_bh+0x33/0x50 kernel/locking/spinlock.c:175
  spin_lock_bh include/linux/spinlock.h:343 [inline]
  netif_addr_lock_bh include/linux/netdevice.h:4055 [inline]
  dev_set_rx_mode+0x20/0x40 net/core/dev.c:7808
  dev_set_promiscuity+0xbf/0xe0 net/core/dev.c:7716
  internal_dev_create+0x387/0x550 net/openvswitch/vport-internal_dev.c:196
  ovs_vport_add+0x150/0x500 net/openvswitch/vport.c:199
  new_vport+0x1b/0x1d0 net/openvswitch/datapath.c:194
  ovs_dp_cmd_new+0x5e5/0xe30 net/openvswitch/datapath.c:1644
  genl_family_rcv_msg+0x74b/0xf90 net/netlink/genetlink.c:629
  genl_rcv_msg+0xca/0x170 net/netlink/genetlink.c:654
  netlink_rcv_skb+0x177/0x450 net/netlink/af_netlink.c:2477
  genl_rcv+0x29/0x40 net/netlink/genetlink.c:665
  netlink_unicast_kernel net/netlink/af_netlink.c:1302 [inline]
  netlink_unicast+0x531/0x710 net/netlink/af_netlink.c:1328
  netlink_sendmsg+0x8a5/0xd60 net/netlink/af_netlink.c:1917
  sock_sendmsg_nosec net/socket.c:637 [inline]
  sock_sendmsg+0xd7/0x130 net/socket.c:657
  ___sys_sendmsg+0x803/0x920 net/socket.c:2311
  __sys_sendmsg+0x105/0x1d0 net/socket.c:2356
  __do_sys_sendmsg net/socket.c:2365 [inline]
  __se_sys_sendmsg net/socket.c:2363 [inline]
  __x64_sys_sendmsg+0x78/0xb0 net/socket.c:2363
  do_syscall_64+0xfa/0x760 arch/x86/entry/common.c:290
  entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x441779
Code: e8 9c ad 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7  
48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff  
ff 0f 83 1b 0a fc ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007ffea7e5fcc8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000441779
RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003
RBP: 0000000000058f66 R08: 00007ffe00000025 R09: 00007ffe00000025
R10: 0000000000000004 R11: 0000000000000246 R12: 00000000006cdbc0
R13: 0000000000000013 R14: 0000000000000000 R15: 0000000000000000


^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: BUG: MAX_LOCKDEP_ENTRIES too low!
  2019-11-08  3:54 ` syzbot
@ 2019-11-08  9:37   ` Jan Kara
  0 siblings, 0 replies; 5+ messages in thread
From: Jan Kara @ 2019-11-08  9:37 UTC (permalink / raw)
  To: syzbot
  Cc: davem, dev, jack, linux-kernel, netdev, pshelar, syzkaller-bugs,
	Peter Zijlstra, Ingo Molnar

I guess this is more for Peter or Ingo...

On Thu 07-11-19 19:54:08, syzbot wrote:
> syzbot has found a reproducer for the following crash on:
> 
> HEAD commit:    99a8efbb NFC: st21nfca: fix double free
> git tree:       net
> console output: https://syzkaller.appspot.com/x/log.txt?x=15ed70d8e00000
> kernel config:  https://syzkaller.appspot.com/x/.config?x=cbbed3e8d4eb64bf
> dashboard link: https://syzkaller.appspot.com/bug?extid=cd0ec5211ac07c18c049
> compiler:       gcc (GCC) 9.0.0 20181231 (experimental)
> syz repro:      https://syzkaller.appspot.com/x/repro.syz?x=13cf5594e00000
> C reproducer:   https://syzkaller.appspot.com/x/repro.c?x=1036c762e00000
> 
> IMPORTANT: if you fix the bug, please add the following tag to the commit:
> Reported-by: syzbot+cd0ec5211ac07c18c049@syzkaller.appspotmail.com
> 
> device 5580n entered promiscuous mode
> BUG: MAX_LOCKDEP_ENTRIES too low!
> turning off the locking correctness validator.
> CPU: 0 PID: 14197 Comm: syz-executor527 Not tainted 5.4.0-rc5+ #0
> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
> Google 01/01/2011
> Call Trace:
>  __dump_stack lib/dump_stack.c:77 [inline]
>  dump_stack+0x172/0x1f0 lib/dump_stack.c:113
>  alloc_list_entry.cold+0x11/0x18 kernel/locking/lockdep.c:1292
>  add_lock_to_list kernel/locking/lockdep.c:1313 [inline]
>  check_prev_add kernel/locking/lockdep.c:2528 [inline]
>  check_prevs_add kernel/locking/lockdep.c:2581 [inline]
>  validate_chain kernel/locking/lockdep.c:2971 [inline]
>  __lock_acquire+0x2a15/0x4a00 kernel/locking/lockdep.c:3955
>  lock_acquire+0x190/0x410 kernel/locking/lockdep.c:4487
>  __raw_spin_lock_bh include/linux/spinlock_api_smp.h:135 [inline]
>  _raw_spin_lock_bh+0x33/0x50 kernel/locking/spinlock.c:175
>  spin_lock_bh include/linux/spinlock.h:343 [inline]
>  netif_addr_lock_bh include/linux/netdevice.h:4055 [inline]
>  dev_set_rx_mode+0x20/0x40 net/core/dev.c:7808
>  dev_set_promiscuity+0xbf/0xe0 net/core/dev.c:7716
>  internal_dev_create+0x387/0x550 net/openvswitch/vport-internal_dev.c:196
>  ovs_vport_add+0x150/0x500 net/openvswitch/vport.c:199
>  new_vport+0x1b/0x1d0 net/openvswitch/datapath.c:194
>  ovs_dp_cmd_new+0x5e5/0xe30 net/openvswitch/datapath.c:1644
>  genl_family_rcv_msg+0x74b/0xf90 net/netlink/genetlink.c:629
>  genl_rcv_msg+0xca/0x170 net/netlink/genetlink.c:654
>  netlink_rcv_skb+0x177/0x450 net/netlink/af_netlink.c:2477
>  genl_rcv+0x29/0x40 net/netlink/genetlink.c:665
>  netlink_unicast_kernel net/netlink/af_netlink.c:1302 [inline]
>  netlink_unicast+0x531/0x710 net/netlink/af_netlink.c:1328
>  netlink_sendmsg+0x8a5/0xd60 net/netlink/af_netlink.c:1917
>  sock_sendmsg_nosec net/socket.c:637 [inline]
>  sock_sendmsg+0xd7/0x130 net/socket.c:657
>  ___sys_sendmsg+0x803/0x920 net/socket.c:2311
>  __sys_sendmsg+0x105/0x1d0 net/socket.c:2356
>  __do_sys_sendmsg net/socket.c:2365 [inline]
>  __se_sys_sendmsg net/socket.c:2363 [inline]
>  __x64_sys_sendmsg+0x78/0xb0 net/socket.c:2363
>  do_syscall_64+0xfa/0x760 arch/x86/entry/common.c:290
>  entry_SYSCALL_64_after_hwframe+0x49/0xbe
> RIP: 0033:0x441779
> Code: e8 9c ad 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7
> 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff
> 0f 83 1b 0a fc ff c3 66 2e 0f 1f 84 00 00 00 00
> RSP: 002b:00007ffea7e5fcc8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
> RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000441779
> RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003
> RBP: 0000000000058f66 R08: 00007ffe00000025 R09: 00007ffe00000025
> R10: 0000000000000004 R11: 0000000000000246 R12: 00000000006cdbc0
> R13: 0000000000000013 R14: 0000000000000000 R15: 0000000000000000
> 
-- 
Jan Kara <jack@suse.com>
SUSE Labs, CR

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: BUG: MAX_LOCKDEP_ENTRIES too low!
  2019-06-17 16:29 BUG: MAX_LOCKDEP_ENTRIES too low! syzbot
@ 2019-11-15 19:55   ` syzbot
  2019-11-15 19:55   ` syzbot
  1 sibling, 0 replies; 5+ messages in thread
From: syzbot @ 2019-11-15 19:55 UTC (permalink / raw)
  To: a, alex.aring, allison, andrew, andy, ap420073, ast, b.a.t.m.a.n,
	bridge, cleech, daniel, davem, dev, dsa, edumazet, f.fainelli,
	fw, gbastien, gregkh, gustavo, haiyangz, idosch, info,
	j.vosburgh, j, jack, jack, jakub.kicinski, jhs, jiri, jiri,
	johan.hedberg, johannes.berg, john.hurley, jwi, kstewart, kvalo,
	kys, linmiaohe, linux-bluetooth, linux-hams, linux-hyperv,
	linux-kernel, linux-ppp, linux-wireless, linux-wpan, liuhangbin,
	marcel, mareklindner, mcroce

syzbot has bisected this bug to:

commit ab92d68fc22f9afab480153bd82a20f6e2533769
Author: Taehee Yoo <ap420073@gmail.com>
Date:   Mon Oct 21 18:47:51 2019 +0000

     net: core: add generic lockdep keys

bisection log:  https://syzkaller.appspot.com/x/bisect.txt?x=1126f5c2e00000
start commit:   0e3f1ad8 Remove VirtualBox guest shared folders filesystem
git tree:       upstream
final crash:    https://syzkaller.appspot.com/x/report.txt?x=1326f5c2e00000
console output: https://syzkaller.appspot.com/x/log.txt?x=1526f5c2e00000
kernel config:  https://syzkaller.appspot.com/x/.config?x=1aab6d4187ddf667
dashboard link: https://syzkaller.appspot.com/bug?extid=cd0ec5211ac07c18c049
syz repro:      https://syzkaller.appspot.com/x/repro.syz?x=1171546ae00000
C reproducer:   https://syzkaller.appspot.com/x/repro.c?x=133ed206e00000

Reported-by: syzbot+cd0ec5211ac07c18c049@syzkaller.appspotmail.com
Fixes: ab92d68fc22f ("net: core: add generic lockdep keys")

For information about bisection process see: https://goo.gl/tpsmEJ#bisection

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: BUG: MAX_LOCKDEP_ENTRIES too low!
@ 2019-11-15 19:55   ` syzbot
  0 siblings, 0 replies; 5+ messages in thread
From: syzbot @ 2019-11-15 19:55 UTC (permalink / raw)
  To: a, alex.aring, allison, andrew, andy, ap420073, ast, b.a.t.m.a.n,
	bridge, cleech, daniel, davem, dev, dsa, edumazet, f.fainelli,
	fw, gbastien, gregkh, gustavo, haiyangz, idosch, info,
	j.vosburgh, j, jack, jack, jakub.kicinski, jhs, jiri, jiri,
	johan.hedberg, johannes.berg, john.hurley, jwi, kstewart, kvalo,
	kys, linmiaohe, linux-bluetooth, linux-hams, linux-hyperv,
	linux-kernel, linux-ppp, linux-wireless, linux-wpan, liuhangbin,
	marcel, mareklindner, mcroce

syzbot has bisected this bug to:

commit ab92d68fc22f9afab480153bd82a20f6e2533769
Author: Taehee Yoo <ap420073@gmail.com>
Date:   Mon Oct 21 18:47:51 2019 +0000

     net: core: add generic lockdep keys

bisection log:  https://syzkaller.appspot.com/x/bisect.txt?x\x1126f5c2e00000
start commit:   0e3f1ad8 Remove VirtualBox guest shared folders filesystem
git tree:       upstream
final crash:    https://syzkaller.appspot.com/x/report.txt?x\x1326f5c2e00000
console output: https://syzkaller.appspot.com/x/log.txt?x\x1526f5c2e00000
kernel config:  https://syzkaller.appspot.com/x/.config?x\x1aab6d4187ddf667
dashboard link: https://syzkaller.appspot.com/bug?extidÍ0ec5211ac07c18c049
syz repro:      https://syzkaller.appspot.com/x/repro.syz?x\x1171546ae00000
C reproducer:   https://syzkaller.appspot.com/x/repro.c?x\x133ed206e00000

Reported-by: syzbot+cd0ec5211ac07c18c049@syzkaller.appspotmail.com
Fixes: ab92d68fc22f ("net: core: add generic lockdep keys")

For information about bisection process see: https://goo.gl/tpsmEJ#bisection

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2019-11-15 19:55 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-06-17 16:29 BUG: MAX_LOCKDEP_ENTRIES too low! syzbot
2019-11-08  3:54 ` syzbot
2019-11-08  9:37   ` Jan Kara
2019-11-15 19:55 ` syzbot
2019-11-15 19:55   ` syzbot

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.