From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.3 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,USER_AGENT_SANE_1 autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 041B7C5DF60 for ; Fri, 8 Nov 2019 09:38:01 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id D46F0214DA for ; Fri, 8 Nov 2019 09:38:00 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731423AbfKHJh7 (ORCPT ); Fri, 8 Nov 2019 04:37:59 -0500 Received: from mx2.suse.de ([195.135.220.15]:39422 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1730005AbfKHJh7 (ORCPT ); Fri, 8 Nov 2019 04:37:59 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id E19B8AC79; Fri, 8 Nov 2019 09:37:56 +0000 (UTC) Received: by quack2.suse.cz (Postfix, from userid 1000) id 27B4A1E4331; Fri, 8 Nov 2019 10:37:56 +0100 (CET) Date: Fri, 8 Nov 2019 10:37:56 +0100 From: Jan Kara To: syzbot Cc: davem@davemloft.net, dev@openvswitch.org, jack@suse.com, linux-kernel@vger.kernel.org, netdev@vger.kernel.org, pshelar@ovn.org, syzkaller-bugs@googlegroups.com, Peter Zijlstra , Ingo Molnar Subject: Re: BUG: MAX_LOCKDEP_ENTRIES too low! Message-ID: <20191108093756.GC20863@quack2.suse.cz> References: <000000000000ec7273058b877e1f@google.com> <000000000000e676b00596cdbbde@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <000000000000e676b00596cdbbde@google.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org I guess this is more for Peter or Ingo... On Thu 07-11-19 19:54:08, syzbot wrote: > syzbot has found a reproducer for the following crash on: > > HEAD commit: 99a8efbb NFC: st21nfca: fix double free > git tree: net > console output: https://syzkaller.appspot.com/x/log.txt?x=15ed70d8e00000 > kernel config: https://syzkaller.appspot.com/x/.config?x=cbbed3e8d4eb64bf > dashboard link: https://syzkaller.appspot.com/bug?extid=cd0ec5211ac07c18c049 > compiler: gcc (GCC) 9.0.0 20181231 (experimental) > syz repro: https://syzkaller.appspot.com/x/repro.syz?x=13cf5594e00000 > C reproducer: https://syzkaller.appspot.com/x/repro.c?x=1036c762e00000 > > IMPORTANT: if you fix the bug, please add the following tag to the commit: > Reported-by: syzbot+cd0ec5211ac07c18c049@syzkaller.appspotmail.com > > device 5580n entered promiscuous mode > BUG: MAX_LOCKDEP_ENTRIES too low! > turning off the locking correctness validator. > CPU: 0 PID: 14197 Comm: syz-executor527 Not tainted 5.4.0-rc5+ #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS > Google 01/01/2011 > Call Trace: > __dump_stack lib/dump_stack.c:77 [inline] > dump_stack+0x172/0x1f0 lib/dump_stack.c:113 > alloc_list_entry.cold+0x11/0x18 kernel/locking/lockdep.c:1292 > add_lock_to_list kernel/locking/lockdep.c:1313 [inline] > check_prev_add kernel/locking/lockdep.c:2528 [inline] > check_prevs_add kernel/locking/lockdep.c:2581 [inline] > validate_chain kernel/locking/lockdep.c:2971 [inline] > __lock_acquire+0x2a15/0x4a00 kernel/locking/lockdep.c:3955 > lock_acquire+0x190/0x410 kernel/locking/lockdep.c:4487 > __raw_spin_lock_bh include/linux/spinlock_api_smp.h:135 [inline] > _raw_spin_lock_bh+0x33/0x50 kernel/locking/spinlock.c:175 > spin_lock_bh include/linux/spinlock.h:343 [inline] > netif_addr_lock_bh include/linux/netdevice.h:4055 [inline] > dev_set_rx_mode+0x20/0x40 net/core/dev.c:7808 > dev_set_promiscuity+0xbf/0xe0 net/core/dev.c:7716 > internal_dev_create+0x387/0x550 net/openvswitch/vport-internal_dev.c:196 > ovs_vport_add+0x150/0x500 net/openvswitch/vport.c:199 > new_vport+0x1b/0x1d0 net/openvswitch/datapath.c:194 > ovs_dp_cmd_new+0x5e5/0xe30 net/openvswitch/datapath.c:1644 > genl_family_rcv_msg+0x74b/0xf90 net/netlink/genetlink.c:629 > genl_rcv_msg+0xca/0x170 net/netlink/genetlink.c:654 > netlink_rcv_skb+0x177/0x450 net/netlink/af_netlink.c:2477 > genl_rcv+0x29/0x40 net/netlink/genetlink.c:665 > netlink_unicast_kernel net/netlink/af_netlink.c:1302 [inline] > netlink_unicast+0x531/0x710 net/netlink/af_netlink.c:1328 > netlink_sendmsg+0x8a5/0xd60 net/netlink/af_netlink.c:1917 > sock_sendmsg_nosec net/socket.c:637 [inline] > sock_sendmsg+0xd7/0x130 net/socket.c:657 > ___sys_sendmsg+0x803/0x920 net/socket.c:2311 > __sys_sendmsg+0x105/0x1d0 net/socket.c:2356 > __do_sys_sendmsg net/socket.c:2365 [inline] > __se_sys_sendmsg net/socket.c:2363 [inline] > __x64_sys_sendmsg+0x78/0xb0 net/socket.c:2363 > do_syscall_64+0xfa/0x760 arch/x86/entry/common.c:290 > entry_SYSCALL_64_after_hwframe+0x49/0xbe > RIP: 0033:0x441779 > Code: e8 9c ad 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 > 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff > 0f 83 1b 0a fc ff c3 66 2e 0f 1f 84 00 00 00 00 > RSP: 002b:00007ffea7e5fcc8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e > RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000441779 > RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 > RBP: 0000000000058f66 R08: 00007ffe00000025 R09: 00007ffe00000025 > R10: 0000000000000004 R11: 0000000000000246 R12: 00000000006cdbc0 > R13: 0000000000000013 R14: 0000000000000000 R15: 0000000000000000 > -- Jan Kara SUSE Labs, CR