From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751169AbdA2MpJ (ORCPT ); Sun, 29 Jan 2017 07:45:09 -0500 Received: from mail-ua0-f175.google.com ([209.85.217.175]:33382 "EHLO mail-ua0-f175.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751036AbdA2MpH (ORCPT ); Sun, 29 Jan 2017 07:45:07 -0500 MIME-Version: 1.0 From: Dmitry Vyukov Date: Sun, 29 Jan 2017 13:44:46 +0100 Message-ID: Subject: mm: deadlock between get_online_cpus/pcpu_alloc To: Tejun Heo , Christoph Lameter , "linux-mm@kvack.org" , LKML , Thomas Gleixner , Ingo Molnar , Peter Zijlstra Cc: syzkaller Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, I've got the following deadlock report while running syzkaller fuzzer on f37208bc3c9c2f811460ef264909dfbc7f605a60: [ INFO: possible circular locking dependency detected ] 4.10.0-rc5-next-20170125 #1 Not tainted ------------------------------------------------------- syz-executor3/14255 is trying to acquire lock: (cpu_hotplug.dep_map){++++++}, at: [] get_online_cpus+0x37/0x90 kernel/cpu.c:239 but task is already holding lock: (pcpu_alloc_mutex){+.+.+.}, at: [] pcpu_alloc+0xbfe/0x1290 mm/percpu.c:897 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #2 (pcpu_alloc_mutex){+.+.+.}: [] validate_chain kernel/locking/lockdep.c:2265 [inline] [] __lock_acquire+0x2149/0x3430 kernel/locking/lockdep.c:3338 [] lock_acquire+0x2a1/0x630 kernel/locking/lockdep.c:3753 [] __mutex_lock_common kernel/locking/mutex.c:757 [inline] [] __mutex_lock+0x382/0x25c0 kernel/locking/mutex.c:894 [] mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:909 [] pcpu_alloc+0xbfe/0x1290 mm/percpu.c:897 [] __alloc_percpu+0x24/0x30 mm/percpu.c:1076 [] smpcfd_prepare_cpu+0x73/0xd0 kernel/smp.c:47 [] cpuhp_invoke_callback+0x256/0x1480 kernel/cpu.c:136 [] cpuhp_up_callbacks+0x81/0x2a0 kernel/cpu.c:425 [] _cpu_up+0x1e3/0x2a0 kernel/cpu.c:940 [] do_cpu_up+0x73/0xa0 kernel/cpu.c:970 [] cpu_up+0x18/0x20 kernel/cpu.c:978 [] smp_init+0x148/0x160 kernel/smp.c:565 [] kernel_init_freeable+0x43e/0x695 init/main.c:1026 [] kernel_init+0x13/0x180 init/main.c:955 [] ret_from_fork+0x31/0x40 arch/x86/entry/entry_64.S:430 -> #1 (cpu_hotplug.lock){+.+.+.}: [] validate_chain kernel/locking/lockdep.c:2265 [inline] [] __lock_acquire+0x2149/0x3430 kernel/locking/lockdep.c:3338 [] lock_acquire+0x2a1/0x630 kernel/locking/lockdep.c:3753 [] __mutex_lock_common kernel/locking/mutex.c:757 [inline] [] __mutex_lock+0x382/0x25c0 kernel/locking/mutex.c:894 [] mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:909 [] cpu_hotplug_begin+0x206/0x2e0 kernel/cpu.c:297 [] _cpu_up+0xca/0x2a0 kernel/cpu.c:894 [] do_cpu_up+0x73/0xa0 kernel/cpu.c:970 [] cpu_up+0x18/0x20 kernel/cpu.c:978 [] smp_init+0x148/0x160 kernel/smp.c:565 [] kernel_init_freeable+0x43e/0x695 init/main.c:1026 [] kernel_init+0x13/0x180 init/main.c:955 [] ret_from_fork+0x31/0x40 arch/x86/entry/entry_64.S:430 -> #0 (cpu_hotplug.dep_map){++++++}: [] check_prev_add kernel/locking/lockdep.c:1828 [inline] [] check_prevs_add+0xa8f/0x19f0 kernel/locking/lockdep.c:1938 [] validate_chain kernel/locking/lockdep.c:2265 [inline] [] __lock_acquire+0x2149/0x3430 kernel/locking/lockdep.c:3338 [] lock_acquire+0x2a1/0x630 kernel/locking/lockdep.c:3753 [] get_online_cpus+0x62/0x90 kernel/cpu.c:241 [] drain_all_pages.part.98+0x8c/0x8f0 mm/page_alloc.c:2371 [] drain_all_pages mm/page_alloc.c:2364 [inline] [] __alloc_pages_direct_reclaim mm/page_alloc.c:3435 [inline] [] __alloc_pages_slowpath+0x966/0x23d0 mm/page_alloc.c:3773 [] __alloc_pages_nodemask+0x8f5/0xc60 mm/page_alloc.c:3975 [] __alloc_pages include/linux/gfp.h:426 [inline] [] __alloc_pages_node include/linux/gfp.h:439 [inline] [] alloc_pages_node include/linux/gfp.h:453 [inline] [] pcpu_alloc_pages mm/percpu-vm.c:93 [inline] [] pcpu_populate_chunk+0x1e1/0x900 mm/percpu-vm.c:282 [] pcpu_alloc+0xe15/0x1290 mm/percpu.c:999 [] __alloc_percpu_gfp+0x27/0x30 mm/percpu.c:1063 [] bpf_array_alloc_percpu kernel/bpf/arraymap.c:33 [inline] [] array_map_alloc+0x543/0x700 kernel/bpf/arraymap.c:94 [] find_and_alloc_map kernel/bpf/syscall.c:37 [inline] [] map_create kernel/bpf/syscall.c:228 [inline] [] SYSC_bpf kernel/bpf/syscall.c:1040 [inline] [] SyS_bpf+0x108d/0x27c0 kernel/bpf/syscall.c:997 [] entry_SYSCALL_64_fastpath+0x1f/0xc2 other info that might help us debug this: Chain exists of: cpu_hotplug.dep_map --> cpu_hotplug.lock --> pcpu_alloc_mutex Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(pcpu_alloc_mutex); lock(cpu_hotplug.lock); lock(pcpu_alloc_mutex); lock(cpu_hotplug.dep_map); *** DEADLOCK *** 1 lock held by syz-executor3/14255: #0: (pcpu_alloc_mutex){+.+.+.}, at: [] pcpu_alloc+0xbfe/0x1290 mm/percpu.c:897 stack backtrace: CPU: 1 PID: 14255 Comm: syz-executor3 Not tainted 4.10.0-rc5-next-20170125 #1 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:15 [inline] dump_stack+0x2ee/0x3ef lib/dump_stack.c:51 print_circular_bug+0x307/0x3b0 kernel/locking/lockdep.c:1202 check_prev_add kernel/locking/lockdep.c:1828 [inline] check_prevs_add+0xa8f/0x19f0 kernel/locking/lockdep.c:1938 validate_chain kernel/locking/lockdep.c:2265 [inline] __lock_acquire+0x2149/0x3430 kernel/locking/lockdep.c:3338 lock_acquire+0x2a1/0x630 kernel/locking/lockdep.c:3753 get_online_cpus+0x62/0x90 kernel/cpu.c:241 drain_all_pages.part.98+0x8c/0x8f0 mm/page_alloc.c:2371 drain_all_pages mm/page_alloc.c:2364 [inline] __alloc_pages_direct_reclaim mm/page_alloc.c:3435 [inline] __alloc_pages_slowpath+0x966/0x23d0 mm/page_alloc.c:3773 __alloc_pages_nodemask+0x8f5/0xc60 mm/page_alloc.c:3975 __alloc_pages include/linux/gfp.h:426 [inline] __alloc_pages_node include/linux/gfp.h:439 [inline] alloc_pages_node include/linux/gfp.h:453 [inline] pcpu_alloc_pages mm/percpu-vm.c:93 [inline] pcpu_populate_chunk+0x1e1/0x900 mm/percpu-vm.c:282 pcpu_alloc+0xe15/0x1290 mm/percpu.c:999 __alloc_percpu_gfp+0x27/0x30 mm/percpu.c:1063 bpf_array_alloc_percpu kernel/bpf/arraymap.c:33 [inline] array_map_alloc+0x543/0x700 kernel/bpf/arraymap.c:94 find_and_alloc_map kernel/bpf/syscall.c:37 [inline] map_create kernel/bpf/syscall.c:228 [inline] SYSC_bpf kernel/bpf/syscall.c:1040 [inline] SyS_bpf+0x108d/0x27c0 kernel/bpf/syscall.c:997 entry_SYSCALL_64_fastpath+0x1f/0xc2 From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-vk0-f70.google.com (mail-vk0-f70.google.com [209.85.213.70]) by kanga.kvack.org (Postfix) with ESMTP id DF8C86B0274 for ; Sun, 29 Jan 2017 07:45:07 -0500 (EST) Received: by mail-vk0-f70.google.com with SMTP id r136so177915041vke.6 for ; Sun, 29 Jan 2017 04:45:07 -0800 (PST) Received: from mail-ua0-x22b.google.com (mail-ua0-x22b.google.com. [2607:f8b0:400c:c08::22b]) by mx.google.com with ESMTPS id w66si29896vkb.71.2017.01.29.04.45.06 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sun, 29 Jan 2017 04:45:06 -0800 (PST) Received: by mail-ua0-x22b.google.com with SMTP id y9so235596107uae.2 for ; Sun, 29 Jan 2017 04:45:06 -0800 (PST) MIME-Version: 1.0 From: Dmitry Vyukov Date: Sun, 29 Jan 2017 13:44:46 +0100 Message-ID: Subject: mm: deadlock between get_online_cpus/pcpu_alloc Content-Type: text/plain; charset=UTF-8 Sender: owner-linux-mm@kvack.org List-ID: To: Tejun Heo , Christoph Lameter , "linux-mm@kvack.org" , LKML , Thomas Gleixner , Ingo Molnar , Peter Zijlstra Cc: syzkaller Hello, I've got the following deadlock report while running syzkaller fuzzer on f37208bc3c9c2f811460ef264909dfbc7f605a60: [ INFO: possible circular locking dependency detected ] 4.10.0-rc5-next-20170125 #1 Not tainted ------------------------------------------------------- syz-executor3/14255 is trying to acquire lock: (cpu_hotplug.dep_map){++++++}, at: [] get_online_cpus+0x37/0x90 kernel/cpu.c:239 but task is already holding lock: (pcpu_alloc_mutex){+.+.+.}, at: [] pcpu_alloc+0xbfe/0x1290 mm/percpu.c:897 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #2 (pcpu_alloc_mutex){+.+.+.}: [] validate_chain kernel/locking/lockdep.c:2265 [inline] [] __lock_acquire+0x2149/0x3430 kernel/locking/lockdep.c:3338 [] lock_acquire+0x2a1/0x630 kernel/locking/lockdep.c:3753 [] __mutex_lock_common kernel/locking/mutex.c:757 [inline] [] __mutex_lock+0x382/0x25c0 kernel/locking/mutex.c:894 [] mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:909 [] pcpu_alloc+0xbfe/0x1290 mm/percpu.c:897 [] __alloc_percpu+0x24/0x30 mm/percpu.c:1076 [] smpcfd_prepare_cpu+0x73/0xd0 kernel/smp.c:47 [] cpuhp_invoke_callback+0x256/0x1480 kernel/cpu.c:136 [] cpuhp_up_callbacks+0x81/0x2a0 kernel/cpu.c:425 [] _cpu_up+0x1e3/0x2a0 kernel/cpu.c:940 [] do_cpu_up+0x73/0xa0 kernel/cpu.c:970 [] cpu_up+0x18/0x20 kernel/cpu.c:978 [] smp_init+0x148/0x160 kernel/smp.c:565 [] kernel_init_freeable+0x43e/0x695 init/main.c:1026 [] kernel_init+0x13/0x180 init/main.c:955 [] ret_from_fork+0x31/0x40 arch/x86/entry/entry_64.S:430 -> #1 (cpu_hotplug.lock){+.+.+.}: [] validate_chain kernel/locking/lockdep.c:2265 [inline] [] __lock_acquire+0x2149/0x3430 kernel/locking/lockdep.c:3338 [] lock_acquire+0x2a1/0x630 kernel/locking/lockdep.c:3753 [] __mutex_lock_common kernel/locking/mutex.c:757 [inline] [] __mutex_lock+0x382/0x25c0 kernel/locking/mutex.c:894 [] mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:909 [] cpu_hotplug_begin+0x206/0x2e0 kernel/cpu.c:297 [] _cpu_up+0xca/0x2a0 kernel/cpu.c:894 [] do_cpu_up+0x73/0xa0 kernel/cpu.c:970 [] cpu_up+0x18/0x20 kernel/cpu.c:978 [] smp_init+0x148/0x160 kernel/smp.c:565 [] kernel_init_freeable+0x43e/0x695 init/main.c:1026 [] kernel_init+0x13/0x180 init/main.c:955 [] ret_from_fork+0x31/0x40 arch/x86/entry/entry_64.S:430 -> #0 (cpu_hotplug.dep_map){++++++}: [] check_prev_add kernel/locking/lockdep.c:1828 [inline] [] check_prevs_add+0xa8f/0x19f0 kernel/locking/lockdep.c:1938 [] validate_chain kernel/locking/lockdep.c:2265 [inline] [] __lock_acquire+0x2149/0x3430 kernel/locking/lockdep.c:3338 [] lock_acquire+0x2a1/0x630 kernel/locking/lockdep.c:3753 [] get_online_cpus+0x62/0x90 kernel/cpu.c:241 [] drain_all_pages.part.98+0x8c/0x8f0 mm/page_alloc.c:2371 [] drain_all_pages mm/page_alloc.c:2364 [inline] [] __alloc_pages_direct_reclaim mm/page_alloc.c:3435 [inline] [] __alloc_pages_slowpath+0x966/0x23d0 mm/page_alloc.c:3773 [] __alloc_pages_nodemask+0x8f5/0xc60 mm/page_alloc.c:3975 [] __alloc_pages include/linux/gfp.h:426 [inline] [] __alloc_pages_node include/linux/gfp.h:439 [inline] [] alloc_pages_node include/linux/gfp.h:453 [inline] [] pcpu_alloc_pages mm/percpu-vm.c:93 [inline] [] pcpu_populate_chunk+0x1e1/0x900 mm/percpu-vm.c:282 [] pcpu_alloc+0xe15/0x1290 mm/percpu.c:999 [] __alloc_percpu_gfp+0x27/0x30 mm/percpu.c:1063 [] bpf_array_alloc_percpu kernel/bpf/arraymap.c:33 [inline] [] array_map_alloc+0x543/0x700 kernel/bpf/arraymap.c:94 [] find_and_alloc_map kernel/bpf/syscall.c:37 [inline] [] map_create kernel/bpf/syscall.c:228 [inline] [] SYSC_bpf kernel/bpf/syscall.c:1040 [inline] [] SyS_bpf+0x108d/0x27c0 kernel/bpf/syscall.c:997 [] entry_SYSCALL_64_fastpath+0x1f/0xc2 other info that might help us debug this: Chain exists of: cpu_hotplug.dep_map --> cpu_hotplug.lock --> pcpu_alloc_mutex Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(pcpu_alloc_mutex); lock(cpu_hotplug.lock); lock(pcpu_alloc_mutex); lock(cpu_hotplug.dep_map); *** DEADLOCK *** 1 lock held by syz-executor3/14255: #0: (pcpu_alloc_mutex){+.+.+.}, at: [] pcpu_alloc+0xbfe/0x1290 mm/percpu.c:897 stack backtrace: CPU: 1 PID: 14255 Comm: syz-executor3 Not tainted 4.10.0-rc5-next-20170125 #1 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:15 [inline] dump_stack+0x2ee/0x3ef lib/dump_stack.c:51 print_circular_bug+0x307/0x3b0 kernel/locking/lockdep.c:1202 check_prev_add kernel/locking/lockdep.c:1828 [inline] check_prevs_add+0xa8f/0x19f0 kernel/locking/lockdep.c:1938 validate_chain kernel/locking/lockdep.c:2265 [inline] __lock_acquire+0x2149/0x3430 kernel/locking/lockdep.c:3338 lock_acquire+0x2a1/0x630 kernel/locking/lockdep.c:3753 get_online_cpus+0x62/0x90 kernel/cpu.c:241 drain_all_pages.part.98+0x8c/0x8f0 mm/page_alloc.c:2371 drain_all_pages mm/page_alloc.c:2364 [inline] __alloc_pages_direct_reclaim mm/page_alloc.c:3435 [inline] __alloc_pages_slowpath+0x966/0x23d0 mm/page_alloc.c:3773 __alloc_pages_nodemask+0x8f5/0xc60 mm/page_alloc.c:3975 __alloc_pages include/linux/gfp.h:426 [inline] __alloc_pages_node include/linux/gfp.h:439 [inline] alloc_pages_node include/linux/gfp.h:453 [inline] pcpu_alloc_pages mm/percpu-vm.c:93 [inline] pcpu_populate_chunk+0x1e1/0x900 mm/percpu-vm.c:282 pcpu_alloc+0xe15/0x1290 mm/percpu.c:999 __alloc_percpu_gfp+0x27/0x30 mm/percpu.c:1063 bpf_array_alloc_percpu kernel/bpf/arraymap.c:33 [inline] array_map_alloc+0x543/0x700 kernel/bpf/arraymap.c:94 find_and_alloc_map kernel/bpf/syscall.c:37 [inline] map_create kernel/bpf/syscall.c:228 [inline] SYSC_bpf kernel/bpf/syscall.c:1040 [inline] SyS_bpf+0x108d/0x27c0 kernel/bpf/syscall.c:997 entry_SYSCALL_64_fastpath+0x1f/0xc2 -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: email@kvack.org