lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 17 Jun 2014 20:36:24 -0700 (PDT)
From:	Hugh Dickins <hughd@...gle.com>
To:	Sasha Levin <sasha.levin@...cle.com>
cc:	Hugh Dickins <hughd@...gle.com>,
	"Kirill A. Shutemov" <kirill.shutemov@...ux.intel.com>,
	Konstantin Khlebnikov <koct9i@...il.com>,
	Mel Gorman <mgorman@...e.de>, Bob Liu <bob.liu@...cle.com>,
	"linux-mm@...ck.org" <linux-mm@...ck.org>,
	Christoph Lameter <cl@...two.org>,
	Andrew Morton <akpm@...ux-foundation.org>,
	LKML <linux-kernel@...r.kernel.org>,
	Dave Jones <davej@...hat.com>
Subject: Re: mm: NULL ptr deref in remove_migration_pte

On Mon, 16 Jun 2014, Sasha Levin wrote:
> On 06/10/2014 12:20 AM, Hugh Dickins wrote:
> > Although there's nothing in the backtrace to implicate it,
> > I think this crash is caused by THP: please try this patch - thanks.
> > 
> > [PATCH] mm: let mm_find_pmd fix buggy race with THP fault
...
> 
> It took some time to hit something here,

I take that to mean that you were running with the mm_find_pmd patch in,
and it seemed to take a little longer to hit the problem than before?

> but I think that the following is related:

I agree it does look like a variant of what you got before the patch;
but I still think the patch is good, and don't believe it caused this.

It looks as if these symptoms have an additional cause, which that patch
did not even attempt to address.  I've looked around, but not found what.

> 
> [  489.152166] INFO: trying to register non-static key.
> [  489.152166] the code is fine but needs lockdep annotation.
> [  489.152166] turning off the locking correctness validator.
> [  489.152166] CPU: 23 PID: 12148 Comm: trinity-c79 Not tainted 3.15.0-next-20140616-sasha-00025-g0fd1f7d-dirty #657
> [  489.152166]  ffff8804dd013000 ffff8804e15a38e8 ffffffff965140d1 0000000000000002
> [  489.152166]  ffffffff9a5ce7c0 ffff8804e15a39e8 ffffffff931ca363 ffff8804e15a3928
> [  489.152166]  0000000000000000 0000000000000000 ffff8804e4730978 0000000000000001
> [  489.152166] Call Trace:
> [  489.152166] dump_stack (lib/dump_stack.c:52)
> [  489.152166] __lock_acquire (kernel/locking/lockdep.c:743 kernel/locking/lockdep.c:3078)
> [  489.152166] ? __lock_acquire (kernel/locking/lockdep.c:3189)
> [  489.152166] ? kvm_clock_read (./arch/x86/include/asm/preempt.h:90 arch/x86/kernel/kvmclock.c:86)
> [  489.152166] lock_acquire (./arch/x86/include/asm/current.h:14 kernel/locking/lockdep.c:3602)
> [  489.152166] ? __page_check_address (include/linux/spinlock.h:303 mm/rmap.c:630)
> [  489.152166] _raw_spin_lock (include/linux/spinlock_api_smp.h:143 kernel/locking/spinlock.c:151)
> [  489.152166] ? __page_check_address (include/linux/spinlock.h:303 mm/rmap.c:630)
> [  489.152166] ? get_parent_ip (kernel/sched/core.c:2546)
> [  489.152166] __page_check_address (include/linux/spinlock.h:303 mm/rmap.c:630)
> [  489.152166] try_to_unmap_one (mm/rmap.c:1153)
> [  489.152166] ? __const_udelay (arch/x86/lib/delay.c:126)
> [  489.152166] ? __rcu_read_unlock (kernel/rcu/update.c:97)
> [  489.152166] ? page_lock_anon_vma_read (mm/rmap.c:448)
> [  489.152166] rmap_walk (mm/rmap.c:1654 mm/rmap.c:1725)
> [  489.152166] ? preempt_count_sub (kernel/sched/core.c:2602)
> [  489.152166] try_to_unmap (mm/rmap.c:1547)
> [  489.152166] ? page_remove_rmap (mm/rmap.c:1144)
> [  489.152166] ? invalid_migration_vma (mm/rmap.c:1503)
> [  489.152166] ? try_to_unmap_one (mm/rmap.c:1411)
> [  489.152166] ? anon_vma_prepare (mm/rmap.c:448)
> [  489.152166] ? invalid_mkclean_vma (mm/rmap.c:1498)
> [  489.152166] ? page_get_anon_vma (mm/rmap.c:405)
> [  489.152166] migrate_pages (mm/migrate.c:913 mm/migrate.c:959 mm/migrate.c:1146)
> [  489.152166] ? _raw_spin_unlock_irq (./arch/x86/include/asm/preempt.h:98 include/linux/spinlock_api_smp.h:169 kernel/locking/spinlock.c:199)
> [  489.152166] ? perf_trace_mm_numa_migrate_ratelimit (mm/migrate.c:1594)
> [  489.152166] migrate_misplaced_page (mm/migrate.c:1754)
> [  489.152166] __handle_mm_fault (mm/memory.c:3157 mm/memory.c:3207 mm/memory.c:3317)
> [  489.152166] handle_mm_fault (include/linux/memcontrol.h:151 mm/memory.c:3343)
> [  489.152166] ? __do_page_fault (arch/x86/mm/fault.c:1163)
> [  489.152166] __do_page_fault (arch/x86/mm/fault.c:1230)
> [  489.152166] ? vtime_account_user (kernel/sched/cputime.c:687)
> [  489.152166] ? get_parent_ip (kernel/sched/core.c:2546)
> [  489.152166] ? preempt_count_sub (kernel/sched/core.c:2602)
> [  489.152166] ? context_tracking_user_exit (kernel/context_tracking.c:184)
> [  489.152166] ? __this_cpu_preempt_check (lib/smp_processor_id.c:63)
> [  489.152166] ? trace_hardirqs_off_caller (kernel/locking/lockdep.c:2638 (discriminator 2))
> [  489.152166] trace_do_page_fault (arch/x86/mm/fault.c:1313 include/linux/jump_label.h:115 include/linux/context_tracking_state.h:27 include/linux/context_tracking.h:45 arch/x86/mm/fault.c:1314)
> [  489.152166] do_async_page_fault (arch/x86/kernel/kvm.c:264)
> [  489.152166] async_page_fault (arch/x86/kernel/entry_64.S:1322)

Originally I thought that the trace above and the trace below were
probably unrelated, there being more than five seconds between them.

But then noticed ffff8804e4730978 in the stack contents above, with
ffff8804e4730e10 the object address in the slub diagnostic below.

As Christoph points out, the slub diagnostic shows that something
has been overwriting with zeroes there.

Maybe the whole page (containing the slub-allocated page table lock
being checked by lockdep above) has been overwritten with zeroes.

>From experience a few months ago in another context, I believe that
would issue precisely the cryptic "INFO: trying to register non-static
key.  the code is fine but needs lockdep annotation." seen above.

I think I'm going to ignore this one for now, assuming it to be
some randomish slab corruption from a bad patch in linux-next.

(I do take reports on 3.XY-rcZ more seriously than reports on
linux-next; but recognize that you're trying to give advance
warning, and to cover different territory than Dave does.)

If it's reproducible on linux-next in a week or so's time,
please let me know, and I'll worry about it some more then.

Hugh

> [  494.710068] =============================================================================
> [  494.710068] BUG page->ptl (Not tainted): Redzone overwritten
> [  494.710068] -----------------------------------------------------------------------------
> [  494.710068]
> [  494.710068] INFO: 0xffff8804e4730e58-0xffff8804e4730e5f. First byte 0x0 instead of 0xbb
> [  494.710068] INFO: Slab 0xffffea001391cc00 objects=40 used=40 fp=0x          (null) flags=0x56fffff80004080
> [  494.710068] INFO: Object 0xffff8804e4730e10 @offset=3600 fp=0x          (null)
> [  494.710068]
> [  494.710068] Bytes b4 ffff8804e4730e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
> [  494.710068] Object ffff8804e4730e10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
> [  494.710068] Object ffff8804e4730e20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
> [  494.710068] Object ffff8804e4730e30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
> [  494.710068] Object ffff8804e4730e40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
> [  494.710068] Object ffff8804e4730e50: 00 00 00 00 00 00 00 00                          ........
> [  494.710068] Redzone ffff8804e4730e58: 00 00 00 00 00 00 00 00                          ........
> [  494.710068] Padding ffff8804e4730f98: 00 00 00 00 00 00 00 00                          ........
> [  494.710068] CPU: 21 PID: 12452 Comm: trinity-c128 Tainted: G    B         3.15.0-next-20140616-sasha-00025-g0fd1f7d-dirty #657
> [  494.710068]  ffff8804e4730e10 ffff88040b7d3980 ffffffff965140d1 0000000000000001
> [  494.710068]  ffff88003680bb80 ffff88040b7d39b0 ffffffff932eac11 ffff8804e4730e60
> [  494.710068]  ffff88003680bb80 00000000000000bb ffff8804e4730e10 ffff88040b7d3a00
> [  494.710068] Call Trace:
> [  494.710068] dump_stack (lib/dump_stack.c:52)
> [  494.710068] print_trailer (mm/slub.c:641)
> [  494.710068] check_bytes_and_report (mm/slub.c:680 mm/slub.c:704)
> [  494.710068] check_object (mm/slub.c:804)
> [  494.710068] ? ptlock_alloc (mm/memory.c:3826)
> [  494.742119] alloc_debug_processing (mm/slub.c:1082)
> [  494.742119] __slab_alloc (mm/slub.c:2382 (discriminator 1))
> [  494.742119] ? ptlock_alloc (mm/memory.c:3826)
> [  494.742119] ? get_parent_ip (kernel/sched/core.c:2546)
> [  494.742119] kmem_cache_alloc (mm/slub.c:2442 mm/slub.c:2484 mm/slub.c:2489)
> [  494.742119] ? ptlock_alloc (mm/memory.c:3826)
> [  494.742119] ? pte_alloc_one (arch/x86/mm/pgtable.c:28)
> [  494.742119] ? copy_huge_pmd (./arch/x86/include/asm/paravirt.h:571 ./arch/x86/include/asm/pgtable.h:168 mm/huge_memory.c:867)
> [  494.742119] ptlock_alloc (mm/memory.c:3826)
> [  494.742119] pte_alloc_one (include/linux/mm.h:1464 include/linux/mm.h:1499 arch/x86/mm/pgtable.c:30)
> [  494.742119] copy_huge_pmd (mm/huge_memory.c:858)
> [  494.742119] copy_page_range (mm/memory.c:968 mm/memory.c:998 mm/memory.c:1062)
> [  494.742119] copy_process (kernel/fork.c:460 kernel/fork.c:835 kernel/fork.c:898 kernel/fork.c:1346)
> [  494.742119] ? trace_hardirqs_off_caller (kernel/locking/lockdep.c:2619)
> [  494.742119] do_fork (kernel/fork.c:1607)
> [  494.742119] ? get_parent_ip (kernel/sched/core.c:2546)
> [  494.742119] ? context_tracking_user_exit (./arch/x86/include/asm/paravirt.h:809 (discriminator 2) kernel/context_tracking.c:184 (discriminator 2))
> [  494.742119] ? trace_hardirqs_on_caller (kernel/locking/lockdep.c:2564)
> [  494.742119] ? trace_hardirqs_on (kernel/locking/lockdep.c:2607)
> [  494.742119] SyS_clone (kernel/fork.c:1693)
> [  494.742119] stub_clone (arch/x86/kernel/entry_64.S:637)
> [  494.742119] ? tracesys (arch/x86/kernel/entry_64.S:542)
> [  494.742119] FIX page->ptl: Restoring 0xffff8804e4730e58-0xffff8804e4730e5f=0xbb
> [  494.742119]
> [  494.742119] FIX page->ptl: Marking all objects used
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ