* BUG: MAX_LOCKDEP_ENTRIES too low! @ 2019-06-17 16:29 syzbot 2019-11-08 3:54 ` syzbot 2019-11-15 19:55 ` syzbot 0 siblings, 2 replies; 4+ messages in thread From: syzbot @ 2019-06-17 16:29 UTC (permalink / raw) To: jack, linux-kernel, syzkaller-bugs Hello, syzbot found the following crash on: HEAD commit: f4788d37 Add linux-next specific files for 20190614 git tree: linux-next console output: https://syzkaller.appspot.com/x/log.txt?x=17f2e3f1a00000 kernel config: https://syzkaller.appspot.com/x/.config?x=daee2e11d008b604 dashboard link: https://syzkaller.appspot.com/bug?extid=cd0ec5211ac07c18c049 compiler: gcc (GCC) 9.0.0 20181231 (experimental) Unfortunately, I don't have any reproducer for this crash yet. IMPORTANT: if you fix the bug, please add the following tag to the commit: Reported-by: syzbot+cd0ec5211ac07c18c049@syzkaller.appspotmail.com BUG: MAX_LOCKDEP_ENTRIES too low! turning off the locking correctness validator. CPU: 0 PID: 25825 Comm: syz-executor.4 Not tainted 5.2.0-rc4-next-20190614 #15 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 alloc_list_entry kernel/locking/lockdep.c:1219 [inline] add_lock_to_list.isra.0.cold+0x11/0x18 kernel/locking/lockdep.c:1240 check_prev_add kernel/locking/lockdep.c:2449 [inline] check_prevs_add kernel/locking/lockdep.c:2502 [inline] validate_chain kernel/locking/lockdep.c:2892 [inline] __lock_acquire+0x2cb2/0x4af0 kernel/locking/lockdep.c:3885 lock_acquire+0x16f/0x3f0 kernel/locking/lockdep.c:4418 __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2f/0x40 kernel/locking/spinlock.c:151 vprintk_emit+0x115/0x700 kernel/printk/printk.c:1966 vprintk_default+0x28/0x30 kernel/printk/printk.c:2013 vprintk_func+0x7e/0x189 kernel/printk/printk_safe.c:386 printk+0xba/0xed kernel/printk/printk.c:2046 _udf_err+0xdc/0x110 fs/udf/super.c:2286 udf_read_tagged+0x49c/0x530 fs/udf/misc.c:212 udf_check_anchor_block+0x1ef/0x680 fs/udf/super.c:1785 udf_scan_anchors+0x1cf/0x680 fs/udf/super.c:1825 udf_find_anchor fs/udf/super.c:1882 [inline] udf_load_vrs+0x67f/0xc80 fs/udf/super.c:1947 udf_fill_super+0x7d8/0x16d1 fs/udf/super.c:2140 mount_bdev+0x304/0x3c0 fs/super.c:1346 udf_mount+0x35/0x40 fs/udf/super.c:131 legacy_get_tree+0x108/0x220 fs/fs_context.c:661 vfs_get_tree+0x8e/0x390 fs/super.c:1476 do_new_mount fs/namespace.c:2790 [inline] do_mount+0x138c/0x1c00 fs/namespace.c:3110 ksys_mount+0xdb/0x150 fs/namespace.c:3319 __do_sys_mount fs/namespace.c:3333 [inline] __se_sys_mount fs/namespace.c:3330 [inline] __x64_sys_mount+0xbe/0x150 fs/namespace.c:3330 do_syscall_64+0xfd/0x680 arch/x86/entry/common.c:301 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x4592c9 Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fb3d01d1c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00000000004592c9 RDX: 0000000020000140 RSI: 0000000020000180 RDI: 00000000200000c0 RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb3d01d26d4 R13: 00000000004c570b R14: 00000000004d9aa0 R15: 00000000ffffffff --- This bug is generated by a bot. It may contain errors. See https://goo.gl/tpsmEJ for more information about syzbot. syzbot engineers can be reached at syzkaller@googlegroups.com. syzbot will keep track of this bug report. See: https://goo.gl/tpsmEJ#status for how to communicate with syzbot. ^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: BUG: MAX_LOCKDEP_ENTRIES too low! 2019-06-17 16:29 BUG: MAX_LOCKDEP_ENTRIES too low! syzbot @ 2019-11-08 3:54 ` syzbot 2019-11-08 9:37 ` Jan Kara 2019-11-15 19:55 ` syzbot 1 sibling, 1 reply; 4+ messages in thread From: syzbot @ 2019-11-08 3:54 UTC (permalink / raw) To: davem, dev, jack, linux-kernel, netdev, pshelar, syzkaller-bugs syzbot has found a reproducer for the following crash on: HEAD commit: 99a8efbb NFC: st21nfca: fix double free git tree: net console output: https://syzkaller.appspot.com/x/log.txt?x=15ed70d8e00000 kernel config: https://syzkaller.appspot.com/x/.config?x=cbbed3e8d4eb64bf dashboard link: https://syzkaller.appspot.com/bug?extid=cd0ec5211ac07c18c049 compiler: gcc (GCC) 9.0.0 20181231 (experimental) syz repro: https://syzkaller.appspot.com/x/repro.syz?x=13cf5594e00000 C reproducer: https://syzkaller.appspot.com/x/repro.c?x=1036c762e00000 IMPORTANT: if you fix the bug, please add the following tag to the commit: Reported-by: syzbot+cd0ec5211ac07c18c049@syzkaller.appspotmail.com device 5580n entered promiscuous mode BUG: MAX_LOCKDEP_ENTRIES too low! turning off the locking correctness validator. CPU: 0 PID: 14197 Comm: syz-executor527 Not tainted 5.4.0-rc5+ #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 alloc_list_entry.cold+0x11/0x18 kernel/locking/lockdep.c:1292 add_lock_to_list kernel/locking/lockdep.c:1313 [inline] check_prev_add kernel/locking/lockdep.c:2528 [inline] check_prevs_add kernel/locking/lockdep.c:2581 [inline] validate_chain kernel/locking/lockdep.c:2971 [inline] __lock_acquire+0x2a15/0x4a00 kernel/locking/lockdep.c:3955 lock_acquire+0x190/0x410 kernel/locking/lockdep.c:4487 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:135 [inline] _raw_spin_lock_bh+0x33/0x50 kernel/locking/spinlock.c:175 spin_lock_bh include/linux/spinlock.h:343 [inline] netif_addr_lock_bh include/linux/netdevice.h:4055 [inline] dev_set_rx_mode+0x20/0x40 net/core/dev.c:7808 dev_set_promiscuity+0xbf/0xe0 net/core/dev.c:7716 internal_dev_create+0x387/0x550 net/openvswitch/vport-internal_dev.c:196 ovs_vport_add+0x150/0x500 net/openvswitch/vport.c:199 new_vport+0x1b/0x1d0 net/openvswitch/datapath.c:194 ovs_dp_cmd_new+0x5e5/0xe30 net/openvswitch/datapath.c:1644 genl_family_rcv_msg+0x74b/0xf90 net/netlink/genetlink.c:629 genl_rcv_msg+0xca/0x170 net/netlink/genetlink.c:654 netlink_rcv_skb+0x177/0x450 net/netlink/af_netlink.c:2477 genl_rcv+0x29/0x40 net/netlink/genetlink.c:665 netlink_unicast_kernel net/netlink/af_netlink.c:1302 [inline] netlink_unicast+0x531/0x710 net/netlink/af_netlink.c:1328 netlink_sendmsg+0x8a5/0xd60 net/netlink/af_netlink.c:1917 sock_sendmsg_nosec net/socket.c:637 [inline] sock_sendmsg+0xd7/0x130 net/socket.c:657 ___sys_sendmsg+0x803/0x920 net/socket.c:2311 __sys_sendmsg+0x105/0x1d0 net/socket.c:2356 __do_sys_sendmsg net/socket.c:2365 [inline] __se_sys_sendmsg net/socket.c:2363 [inline] __x64_sys_sendmsg+0x78/0xb0 net/socket.c:2363 do_syscall_64+0xfa/0x760 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x441779 Code: e8 9c ad 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 1b 0a fc ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007ffea7e5fcc8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000441779 RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 RBP: 0000000000058f66 R08: 00007ffe00000025 R09: 00007ffe00000025 R10: 0000000000000004 R11: 0000000000000246 R12: 00000000006cdbc0 R13: 0000000000000013 R14: 0000000000000000 R15: 0000000000000000 ^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: BUG: MAX_LOCKDEP_ENTRIES too low! 2019-11-08 3:54 ` syzbot @ 2019-11-08 9:37 ` Jan Kara 0 siblings, 0 replies; 4+ messages in thread From: Jan Kara @ 2019-11-08 9:37 UTC (permalink / raw) To: syzbot Cc: davem, dev, jack, linux-kernel, netdev, pshelar, syzkaller-bugs, Peter Zijlstra, Ingo Molnar I guess this is more for Peter or Ingo... On Thu 07-11-19 19:54:08, syzbot wrote: > syzbot has found a reproducer for the following crash on: > > HEAD commit: 99a8efbb NFC: st21nfca: fix double free > git tree: net > console output: https://syzkaller.appspot.com/x/log.txt?x=15ed70d8e00000 > kernel config: https://syzkaller.appspot.com/x/.config?x=cbbed3e8d4eb64bf > dashboard link: https://syzkaller.appspot.com/bug?extid=cd0ec5211ac07c18c049 > compiler: gcc (GCC) 9.0.0 20181231 (experimental) > syz repro: https://syzkaller.appspot.com/x/repro.syz?x=13cf5594e00000 > C reproducer: https://syzkaller.appspot.com/x/repro.c?x=1036c762e00000 > > IMPORTANT: if you fix the bug, please add the following tag to the commit: > Reported-by: syzbot+cd0ec5211ac07c18c049@syzkaller.appspotmail.com > > device 5580n entered promiscuous mode > BUG: MAX_LOCKDEP_ENTRIES too low! > turning off the locking correctness validator. > CPU: 0 PID: 14197 Comm: syz-executor527 Not tainted 5.4.0-rc5+ #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS > Google 01/01/2011 > Call Trace: > __dump_stack lib/dump_stack.c:77 [inline] > dump_stack+0x172/0x1f0 lib/dump_stack.c:113 > alloc_list_entry.cold+0x11/0x18 kernel/locking/lockdep.c:1292 > add_lock_to_list kernel/locking/lockdep.c:1313 [inline] > check_prev_add kernel/locking/lockdep.c:2528 [inline] > check_prevs_add kernel/locking/lockdep.c:2581 [inline] > validate_chain kernel/locking/lockdep.c:2971 [inline] > __lock_acquire+0x2a15/0x4a00 kernel/locking/lockdep.c:3955 > lock_acquire+0x190/0x410 kernel/locking/lockdep.c:4487 > __raw_spin_lock_bh include/linux/spinlock_api_smp.h:135 [inline] > _raw_spin_lock_bh+0x33/0x50 kernel/locking/spinlock.c:175 > spin_lock_bh include/linux/spinlock.h:343 [inline] > netif_addr_lock_bh include/linux/netdevice.h:4055 [inline] > dev_set_rx_mode+0x20/0x40 net/core/dev.c:7808 > dev_set_promiscuity+0xbf/0xe0 net/core/dev.c:7716 > internal_dev_create+0x387/0x550 net/openvswitch/vport-internal_dev.c:196 > ovs_vport_add+0x150/0x500 net/openvswitch/vport.c:199 > new_vport+0x1b/0x1d0 net/openvswitch/datapath.c:194 > ovs_dp_cmd_new+0x5e5/0xe30 net/openvswitch/datapath.c:1644 > genl_family_rcv_msg+0x74b/0xf90 net/netlink/genetlink.c:629 > genl_rcv_msg+0xca/0x170 net/netlink/genetlink.c:654 > netlink_rcv_skb+0x177/0x450 net/netlink/af_netlink.c:2477 > genl_rcv+0x29/0x40 net/netlink/genetlink.c:665 > netlink_unicast_kernel net/netlink/af_netlink.c:1302 [inline] > netlink_unicast+0x531/0x710 net/netlink/af_netlink.c:1328 > netlink_sendmsg+0x8a5/0xd60 net/netlink/af_netlink.c:1917 > sock_sendmsg_nosec net/socket.c:637 [inline] > sock_sendmsg+0xd7/0x130 net/socket.c:657 > ___sys_sendmsg+0x803/0x920 net/socket.c:2311 > __sys_sendmsg+0x105/0x1d0 net/socket.c:2356 > __do_sys_sendmsg net/socket.c:2365 [inline] > __se_sys_sendmsg net/socket.c:2363 [inline] > __x64_sys_sendmsg+0x78/0xb0 net/socket.c:2363 > do_syscall_64+0xfa/0x760 arch/x86/entry/common.c:290 > entry_SYSCALL_64_after_hwframe+0x49/0xbe > RIP: 0033:0x441779 > Code: e8 9c ad 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 > 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff > 0f 83 1b 0a fc ff c3 66 2e 0f 1f 84 00 00 00 00 > RSP: 002b:00007ffea7e5fcc8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e > RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000441779 > RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000003 > RBP: 0000000000058f66 R08: 00007ffe00000025 R09: 00007ffe00000025 > R10: 0000000000000004 R11: 0000000000000246 R12: 00000000006cdbc0 > R13: 0000000000000013 R14: 0000000000000000 R15: 0000000000000000 > -- Jan Kara <jack@suse.com> SUSE Labs, CR ^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: BUG: MAX_LOCKDEP_ENTRIES too low! 2019-06-17 16:29 BUG: MAX_LOCKDEP_ENTRIES too low! syzbot 2019-11-08 3:54 ` syzbot @ 2019-11-15 19:55 ` syzbot 1 sibling, 0 replies; 4+ messages in thread From: syzbot @ 2019-11-15 19:55 UTC (permalink / raw) To: a, alex.aring, allison, andrew, andy, ap420073, ast, b.a.t.m.a.n, bridge, cleech, daniel, davem, dev, dsa, edumazet, f.fainelli, fw, gbastien, gregkh, gustavo, haiyangz, idosch, info, j.vosburgh, j, jack, jack, jakub.kicinski, jhs, jiri, jiri, johan.hedberg, johannes.berg, john.hurley, jwi, kstewart, kvalo, kys, linmiaohe, linux-bluetooth, linux-hams, linux-hyperv, linux-kernel, linux-ppp, linux-wireless, linux-wpan, liuhangbin, marcel, mareklindner, mcroce syzbot has bisected this bug to: commit ab92d68fc22f9afab480153bd82a20f6e2533769 Author: Taehee Yoo <ap420073@gmail.com> Date: Mon Oct 21 18:47:51 2019 +0000 net: core: add generic lockdep keys bisection log: https://syzkaller.appspot.com/x/bisect.txt?x=1126f5c2e00000 start commit: 0e3f1ad8 Remove VirtualBox guest shared folders filesystem git tree: upstream final crash: https://syzkaller.appspot.com/x/report.txt?x=1326f5c2e00000 console output: https://syzkaller.appspot.com/x/log.txt?x=1526f5c2e00000 kernel config: https://syzkaller.appspot.com/x/.config?x=1aab6d4187ddf667 dashboard link: https://syzkaller.appspot.com/bug?extid=cd0ec5211ac07c18c049 syz repro: https://syzkaller.appspot.com/x/repro.syz?x=1171546ae00000 C reproducer: https://syzkaller.appspot.com/x/repro.c?x=133ed206e00000 Reported-by: syzbot+cd0ec5211ac07c18c049@syzkaller.appspotmail.com Fixes: ab92d68fc22f ("net: core: add generic lockdep keys") For information about bisection process see: https://goo.gl/tpsmEJ#bisection ^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2019-11-15 19:55 UTC | newest] Thread overview: 4+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2019-06-17 16:29 BUG: MAX_LOCKDEP_ENTRIES too low! syzbot 2019-11-08 3:54 ` syzbot 2019-11-08 9:37 ` Jan Kara 2019-11-15 19:55 ` syzbot
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox