* fs: possible deadlock in do_iter_write/do_splice @ 2017-07-06 13:01 Andrey Konovalov 2017-07-06 13:18 ` Al Viro 0 siblings, 1 reply; 2+ messages in thread From: Andrey Konovalov @ 2017-07-06 13:01 UTC (permalink / raw) To: Alexander Viro, linux-fsdevel, LKML Cc: syzkaller, Dmitry Vyukov, Kostya Serebryany Hi, I've got the following error report while fuzzing the kernel with syzkaller. On commit 9b51f04424e17051a89ab32d892ca66b2a104825 (4.12+). ============================================ WARNING: possible recursive locking detected 4.12.0+ #42 Not tainted -------------------------------------------- syz-executor4/6792 is trying to acquire lock: (sb_writers#5){.+.+.+}, at: [<ffffffff818d1598>] file_start_write include/linux/fs.h:2601 [inline] (sb_writers#5){.+.+.+}, at: [<ffffffff818d1598>] do_iter_write+0x428/0x540 fs/read_write.c:928 but task is already holding lock: (sb_writers#5){.+.+.+}, at: [<ffffffff819ab890>] file_start_write include/linux/fs.h:2601 [inline] (sb_writers#5){.+.+.+}, at: [<ffffffff819ab890>] do_splice fs/splice.c:1162 [inline] (sb_writers#5){.+.+.+}, at: [<ffffffff819ab890>] SYSC_splice fs/splice.c:1418 [inline] (sb_writers#5){.+.+.+}, at: [<ffffffff819ab890>] SyS_splice+0x1170/0x16d0 fs/splice.c:1398 other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(sb_writers#5); lock(sb_writers#5); *** DEADLOCK *** May be due to missing lock nesting notation 2 locks held by syz-executor4/6792: #0: (sb_writers#5){.+.+.+}, at: [<ffffffff819ab890>] file_start_write include/linux/fs.h:2601 [inline] #0: (sb_writers#5){.+.+.+}, at: [<ffffffff819ab890>] do_splice fs/splice.c:1162 [inline] #0: (sb_writers#5){.+.+.+}, at: [<ffffffff819ab890>] SYSC_splice fs/splice.c:1418 [inline] #0: (sb_writers#5){.+.+.+}, at: [<ffffffff819ab890>] SyS_splice+0x1170/0x16d0 fs/splice.c:1398 #1: (&pipe->mutex/1){+.+.+.}, at: [<ffffffff818f1900>] pipe_lock_nested fs/pipe.c:66 [inline] #1: (&pipe->mutex/1){+.+.+.}, at: [<ffffffff818f1900>] pipe_lock fs/pipe.c:74 [inline] #1: (&pipe->mutex/1){+.+.+.}, at: [<ffffffff818f1900>] pipe_wait+0x240/0x2f0 fs/pipe.c:122 stack backtrace: CPU: 0 PID: 6792 Comm: syz-executor4 Not tainted 4.12.0+ #42 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Bochs 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x292/0x395 lib/dump_stack.c:52 print_deadlock_bug kernel/locking/lockdep.c:1743 [inline] check_deadlock kernel/locking/lockdep.c:1787 [inline] validate_chain kernel/locking/lockdep.c:2265 [inline] __lock_acquire+0xf7f/0x3690 kernel/locking/lockdep.c:3367 ? 0xffffffffa0000000 lock_acquire+0x22d/0x560 kernel/locking/lockdep.c:3855 percpu_down_read_preempt_disable include/linux/percpu-rwsem.h:35 [inline] percpu_down_read include/linux/percpu-rwsem.h:58 [inline] __sb_start_write+0x19c/0x2a0 fs/super.c:1341 file_start_write include/linux/fs.h:2601 [inline] do_iter_write+0x428/0x540 fs/read_write.c:928 vfs_iter_write+0x7c/0xb0 fs/read_write.c:944 iter_file_splice_write+0x83b/0xfa0 fs/splice.c:765 do_splice_from fs/splice.c:867 [inline] do_splice fs/splice.c:1163 [inline] SYSC_splice fs/splice.c:1418 [inline] SyS_splice+0x7f2/0x16d0 fs/splice.c:1398 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x446729 RSP: 002b:00007f5e1cd8ec08 EFLAGS: 00000292 ORIG_RAX: 0000000000000113 RAX: ffffffffffffffda RBX: 0000000000005430 RCX: 0000000000446729 RDX: 0000000000000018 RSI: 0000000000000000 RDI: 0000000000000019 RBP: 00000000ffffffff R08: 0000000000000006 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000292 R12: 0000000000000019 R13: 0000000000003be0 R14: 00000000006e5ca0 R15: 0000000000000000 ^ permalink raw reply [flat|nested] 2+ messages in thread
* Re: fs: possible deadlock in do_iter_write/do_splice 2017-07-06 13:01 fs: possible deadlock in do_iter_write/do_splice Andrey Konovalov @ 2017-07-06 13:18 ` Al Viro 0 siblings, 0 replies; 2+ messages in thread From: Al Viro @ 2017-07-06 13:18 UTC (permalink / raw) To: Andrey Konovalov Cc: linux-fsdevel, LKML, syzkaller, Dmitry Vyukov, Kostya Serebryany, Christoph Hellwig On Thu, Jul 06, 2017 at 03:01:11PM +0200, Andrey Konovalov wrote: > Hi, > > I've got the following error report while fuzzing the kernel with syzkaller. > > On commit 9b51f04424e17051a89ab32d892ca66b2a104825 (4.12+). It's "fs: implement vfs_iter_write using do_iter_write", actually. vfs_iter_write() has no business playing with file_start_write(); do_iter_write() does. commit 62473a2d6f513296e896b64ccfd7ceb7b963795e Author: Al Viro <viro@zeniv.linux.org.uk> Date: Thu Jul 6 09:15:47 2017 -0400 move file_{start,end}_write() out of do_iter_write() ... and do *not* grab it in vfs_write_iter(). Fixes: "fs: implement vfs_iter_read using do_iter_read" Signed-off-by: Al Viro <viro@zeniv.linux.org.uk> diff --git a/fs/read_write.c b/fs/read_write.c index acfd3dc63d57..be1125b30aec 100644 --- a/fs/read_write.c +++ b/fs/read_write.c @@ -931,12 +931,10 @@ static ssize_t do_iter_write(struct file *file, struct iov_iter *iter, if (ret < 0) return ret; - file_start_write(file); if (file->f_op->write_iter) ret = do_iter_readv_writev(file, iter, pos, WRITE, flags); else ret = do_loop_readv_writev(file, iter, pos, WRITE, flags); - file_end_write(file); if (ret > 0) fsnotify_modify(file); return ret; @@ -979,7 +977,9 @@ ssize_t vfs_writev(struct file *file, const struct iovec __user *vec, ret = import_iovec(WRITE, vec, vlen, ARRAY_SIZE(iovstack), &iov, &iter); if (ret >= 0) { + file_start_write(file); ret = do_iter_write(file, &iter, pos, flags); + file_end_write(file); kfree(iov); } return ret; @@ -1247,7 +1247,9 @@ static size_t compat_writev(struct file *file, ret = compat_import_iovec(WRITE, vec, vlen, UIO_FASTIOV, &iov, &iter); if (ret >= 0) { + file_start_write(file); ret = do_iter_write(file, &iter, pos, flags); + file_end_write(file); kfree(iov); } if (ret > 0) ^ permalink raw reply related [flat|nested] 2+ messages in thread
end of thread, other threads:[~2017-07-06 13:18 UTC | newest] Thread overview: 2+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2017-07-06 13:01 fs: possible deadlock in do_iter_write/do_splice Andrey Konovalov 2017-07-06 13:18 ` Al Viro
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).