lockdep warning from autofs4 when fuzzing with trinity

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,

I was fuzzing linux 3.18 (plus a minor, unrelated patch in the memory management subsystem) using trinity. I got the following lock-dep splat, which seems to originate from the autofs4 code:


[ 8890.416041] ======================================================
[ 8890.416041] [ INFO: possible circular locking dependency detected ]
[ 8890.416041] 3.18.0+ #25 Tainted: G        W     
[ 8890.416041] -------------------------------------------------------
[ 8890.416041] bash/4644 is trying to acquire lock:
[ 8890.416041]  (&sbi->pipe_mutex){+.+.+.}, at: [<ffffffff812a25fb>] autofs4_notify_daemon+0x1cb/0x340
[ 8890.416041] 
but task is already holding lock:
[ 8890.416041]  (&sig->cred_guard_mutex){+.+.+.}, at: [<ffffffff8121f1e4>] prepare_bprm_creds+0x34/0x90
[ 8890.416041] 
which lock already depends on the new lock.

[ 8890.416041] 
the existing dependency chain (in reverse order) is:
[ 8890.416041] 
-> #2 (&sig->cred_guard_mutex){+.+.+.}:
[ 8890.416041]        [<ffffffff810cc5b6>] validate_chain.isra.36+0x486/0x930
[ 8890.416041]        [<ffffffff810ced48>] __lock_acquire+0x378/0xbe0
[ 8890.416041]        [<ffffffff810cf677>] lock_acquire+0xc7/0x160
[ 8890.416041]        [<ffffffff816d15e1>] mutex_lock_interruptible_nested+0x81/0x5c0
[ 8890.416041]        [<ffffffff8128628d>] proc_pid_attr_write+0xfd/0x150
[ 8890.416041]        [<ffffffff81216e48>] __kernel_write+0x68/0x160
[ 8890.416041]        [<ffffffff81249445>] write_pipe_buf+0x85/0xb0
[ 8890.416041]        [<ffffffff81248f5e>] __splice_from_pipe+0x11e/0x190
[ 8890.416041]        [<ffffffff8124afde>] splice_from_pipe+0x5e/0x90
[ 8890.416041]        [<ffffffff8124b04d>] default_file_splice_write+0x1d/0x30
[ 8890.416041]        [<ffffffff8124b51a>] SyS_splice+0x25a/0x800
[ 8890.416041]        [<ffffffff816d65e9>] system_call_fastpath+0x12/0x17
[ 8890.416041] 
-> #1 (&pipe->mutex/1){+.+.+.}:
[ 8890.416041]        [<ffffffff810cc5b6>] validate_chain.isra.36+0x486/0x930
[ 8890.416041]        [<ffffffff810ced48>] __lock_acquire+0x378/0xbe0
[ 8890.416041]        [<ffffffff810cf677>] lock_acquire+0xc7/0x160
[ 8890.416041]        [<ffffffff816d20b1>] mutex_lock_nested+0x81/0x510
[ 8890.416041]        [<ffffffff8122022f>] pipe_write+0x3f/0x490
[ 8890.416041]        [<ffffffff81216b3e>] new_sync_write+0x8e/0xd0
[ 8890.416041]        [<ffffffff812a2613>] autofs4_notify_daemon+0x1e3/0x340
[ 8890.416041]        [<ffffffff812a2f65>] autofs4_wait+0x7f5/0xa20
[ 8890.416041]        [<ffffffff812a0ce0>] autofs4_mount_wait+0x50/0xf0
[ 8890.416041]        [<ffffffff812a1609>] autofs4_d_automount+0xe9/0x240
[ 8890.416041]        [<ffffffff81221f93>] follow_managed+0x143/0x310
[ 8890.416041]        [<ffffffff816c96e2>] lookup_slow+0x7d/0xad
[ 8890.416041]        [<ffffffff81226732>] link_path_walk+0x792/0x860
[ 8890.416041]        [<ffffffff8122740b>] path_openat+0xab/0x640
[ 8890.416041]        [<ffffffff81229a69>] do_filp_open+0x49/0xc0
[ 8890.416041]        [<ffffffff81216397>] do_sys_open+0x137/0x240
[ 8890.416041]        [<ffffffff812164be>] SyS_open+0x1e/0x20
[ 8890.416041]        [<ffffffff816d65e9>] system_call_fastpath+0x12/0x17
[ 8890.416041] 
-> #0 (&sbi->pipe_mutex){+.+.+.}:
[ 8890.416041]        [<ffffffff810cc10f>] check_prevs_add+0x9af/0x9d0
[ 8890.416041]        [<ffffffff810cc5b6>] validate_chain.isra.36+0x486/0x930
[ 8890.416041]        [<ffffffff810ced48>] __lock_acquire+0x378/0xbe0
[ 8890.416041]        [<ffffffff810cf677>] lock_acquire+0xc7/0x160
[ 8890.416041]        [<ffffffff816d20b1>] mutex_lock_nested+0x81/0x510
[ 8890.416041]        [<ffffffff812a25fb>] autofs4_notify_daemon+0x1cb/0x340
[ 8890.416041]        [<ffffffff812a2f65>] autofs4_wait+0x7f5/0xa20
[ 8890.416041]        [<ffffffff812a0ce0>] autofs4_mount_wait+0x50/0xf0
[ 8890.416041]        [<ffffffff812a1609>] autofs4_d_automount+0xe9/0x240
[ 8890.416041]        [<ffffffff81221f93>] follow_managed+0x143/0x310
[ 8890.416041]        [<ffffffff816c96e2>] lookup_slow+0x7d/0xad
[ 8890.416041]        [<ffffffff812266a7>] link_path_walk+0x707/0x860
[ 8890.416041]        [<ffffffff8122740b>] path_openat+0xab/0x640
[ 8890.416041]        [<ffffffff81229a69>] do_filp_open+0x49/0xc0
[ 8890.416041]        [<ffffffff8121e546>] do_open_exec+0x26/0xf0
[ 8890.416041]        [<ffffffff8121f458>] do_execve_common.isra.24+0x218/0x710
[ 8890.416041]        [<ffffffff8121fb99>] SyS_execve+0x29/0x30
[ 8890.416041]        [<ffffffff816d6bf9>] stub_execve+0x69/0xa0
[ 8890.416041] 
other info that might help us debug this:

[ 8890.416041] Chain exists of:
  &sbi->pipe_mutex --> &pipe->mutex/1 --> &sig->cred_guard_mutex

[ 8890.416041]  Possible unsafe locking scenario:

[ 8890.416041]        CPU0                    CPU1
[ 8890.416041]        ----                    ----
[ 8890.416041]   lock(&sig->cred_guard_mutex);
[ 8890.416041]                                lock(&pipe->mutex/1);
[ 8890.416041]                                lock(&sig->cred_guard_mutex);
[ 8890.416041]   lock(&sbi->pipe_mutex);
[ 8890.416041] 
 *** DEADLOCK ***

[ 8890.416041] 1 lock held by bash/4644:
[ 8890.416041]  #0:  (&sig->cred_guard_mutex){+.+.+.}, at: [<ffffffff8121f1e4>] prepare_bprm_creds+0x34/0x90
[ 8890.416041] 
stack backtrace:
[ 8890.416041] CPU: 1 PID: 4644 Comm: bash Tainted: G        W      3.18.0+ #25
[ 8890.416041] Hardware name: Red Hat KVM, BIOS Bochs 01/01/2007
[ 8890.416041]  0000000000000000 0000000043c40f29 ffff88004dc775b8 ffffffff816cbade
[ 8890.416041]  0000000000000000 ffffffff829fc330 ffff88004dc77608 ffffffff816c4bf0
[ 8890.416041]  ffff88000d401b70 ffff88004dc77648 ffff88004dc77608 0000000000000000
[ 8890.416041] Call Trace:
[ 8890.416041]  [<ffffffff816cbade>] dump_stack+0x4e/0x68
[ 8890.416041]  [<ffffffff816c4bf0>] print_circular_bug+0x1fb/0x20c
[ 8890.416041]  [<ffffffff810cc10f>] check_prevs_add+0x9af/0x9d0
[ 8890.416041]  [<ffffffff8105f4d7>] ? kvm_clock_read+0x27/0x40
[ 8890.416041]  [<ffffffff810cc5b6>] validate_chain.isra.36+0x486/0x930
[ 8890.416041]  [<ffffffff810ced48>] __lock_acquire+0x378/0xbe0
[ 8890.416041]  [<ffffffff810b02c6>] ? local_clock+0x16/0x30
[ 8890.416041]  [<ffffffff810cf677>] lock_acquire+0xc7/0x160
[ 8890.416041]  [<ffffffff812a25fb>] ? autofs4_notify_daemon+0x1cb/0x340
[ 8890.416041]  [<ffffffff816d20b1>] mutex_lock_nested+0x81/0x510
[ 8890.416041]  [<ffffffff812a25fb>] ? autofs4_notify_daemon+0x1cb/0x340
[ 8890.416041]  [<ffffffff812a25fb>] ? autofs4_notify_daemon+0x1cb/0x340
[ 8890.416041]  [<ffffffff810cd11d>] ? trace_hardirqs_on+0xd/0x10
[ 8890.416041]  [<ffffffff812a25fb>] autofs4_notify_daemon+0x1cb/0x340
[ 8890.416041]  [<ffffffff812a2f65>] autofs4_wait+0x7f5/0xa20
[ 8890.416041]  [<ffffffff812a28fb>] ? autofs4_wait+0x18b/0xa20
[ 8890.416041]  [<ffffffff812a15ff>] ? autofs4_d_automount+0xdf/0x240
[ 8890.416041]  [<ffffffff812a0ce0>] autofs4_mount_wait+0x50/0xf0
[ 8890.416041]  [<ffffffff812a1609>] autofs4_d_automount+0xe9/0x240
[ 8890.416041]  [<ffffffff81221f93>] follow_managed+0x143/0x310
[ 8890.416041]  [<ffffffff816c96e2>] lookup_slow+0x7d/0xad
[ 8890.416041]  [<ffffffff812266a7>] link_path_walk+0x707/0x860
[ 8890.416041]  [<ffffffff812242e5>] ? path_init+0x4b5/0x700
[ 8890.416041]  [<ffffffff8122740b>] path_openat+0xab/0x640
[ 8890.416041]  [<ffffffff8105f4d7>] ? kvm_clock_read+0x27/0x40
[ 8890.416041]  [<ffffffff81020009>] ? sched_clock+0x9/0x10
[ 8890.416041]  [<ffffffff81020009>] ? sched_clock+0x9/0x10
[ 8890.416041]  [<ffffffff810affc5>] ? sched_clock_local+0x25/0x90
[ 8890.416041]  [<ffffffff81229a69>] do_filp_open+0x49/0xc0
[ 8890.416041]  [<ffffffff8121f43c>] ? do_execve_common.isra.24+0x1fc/0x710
[ 8890.416041]  [<ffffffff8121f3f2>] ? do_execve_common.isra.24+0x1b2/0x710
[ 8890.416041]  [<ffffffff8121e546>] do_open_exec+0x26/0xf0
[ 8890.416041]  [<ffffffff8121f458>] do_execve_common.isra.24+0x218/0x710
[ 8890.416041]  [<ffffffff8121f377>] ? do_execve_common.isra.24+0x137/0x710
[ 8890.416041]  [<ffffffff8121fb99>] SyS_execve+0x29/0x30
[ 8890.416041]  [<ffffffff816d6bf9>] stub_execve+0x69/0xa0

Thanks,
--Shachar
--
To unsubscribe from this list: send the line "unsubscribe autofs" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [Linux Filesystem Development]     [Linux Ext4]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux