[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20171107093244.tdrqz7t5nm4lsfyi@wfg-t540p.sh.intel.com>
Date: Tue, 7 Nov 2017 17:32:44 +0800
From: Fengguang Wu <fengguang.wu@...el.com>
To: x86@...nel.org
Cc: Thomas Gleixner <tglx@...utronix.de>,
Ingo Molnar <mingo@...hat.com>,
"H. Peter Anvin" <hpa@...or.com>,
Linus Torvalds <torvalds@...ux-foundation.org>,
Thiago Jung Bauermann <bauerman@...ux.vnet.ibm.com>,
linux-kernel@...r.kernel.org
Subject: [bzImage64_load] BUG: KASAN: stack-out-of-bounds in
deref_stack_reg+0xb5/0x11a
Hello,
FYI this happens in v4.14-rc8 -- it's not necessarily a new bug.
[ 1.234546] cryptomgr_test (23) used greatest stack depth: 30320 bytes left
[ 2.273711] tsc: Refined TSC clocksource calibration: 2693.503 MHz
[ 2.274425] clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x26d3451f606, max_idle_ns: 440795333933 ns
[ 7.795097] Kprobe smoke test: started
[ 7.807563] ==================================================================
[ 7.808007] BUG: KASAN: stack-out-of-bounds in deref_stack_reg+0xb5/0x11a
[ 7.808007] Read of size 8 at addr ffff8800001c7cd8 by task swapper/1
[ 7.808007]
[ 7.808007] CPU: 0 PID: 1 Comm: swapper Not tainted 4.14.0-rc8 #26
[ 7.808007] Call Trace:
[ 7.808007] <#DB>
[ 7.808007] print_address_description+0x71/0x274
[ 7.808007] ? deref_stack_reg+0xb5/0x11a
[ 7.808007] kasan_report+0x243/0x269
[ 7.808007] deref_stack_reg+0xb5/0x11a
[ 7.808007] ? __read_once_size_nocheck+0xc/0xc
[ 7.808007] ? unwind_get_return_address_ptr+0x91/0x91
[ 7.808007] ? __read_once_size_nocheck+0xc/0xc
[ 7.808007] ? unwind_get_return_address_ptr+0x91/0x91
[ 7.808007] ? bzImage64_load+0xea4/0xea5
[ 7.808007] ? bzImage64_load+0xea5/0xea5
[ 7.808007] unwind_next_frame+0xa83/0x1452
[ 7.808007] ? unwind_get_return_address_ptr+0x91/0x91
[ 7.808007] ? kernel_text_address+0x16/0x5f
[ 7.808007] ? bzImage64_load+0xea5/0xea5
[ 7.808007] __save_stack_trace+0xaf/0xbe
[ 7.808007] ? bzImage64_load+0xea5/0xea5
[ 7.808007] save_trace+0xd9/0x1d3
[ 7.808007] mark_lock+0x5f7/0xdc3
[ 7.808007] __lock_acquire+0x6b4/0x38ef
[ 7.808007] ? kretprobe_table_lock+0x1a/0x42
[ 7.808007] ? debug_show_all_locks+0x222/0x222
[ 7.808007] ? get_usage_char+0x36/0x36
[ 7.808007] ? lock_acquire+0x1a1/0x2aa
[ 7.808007] lock_acquire+0x1a1/0x2aa
[ 7.808007] ? kretprobe_table_lock+0x1a/0x42
[ 7.808007] _raw_spin_lock_irqsave+0x46/0x55
[ 7.808007] ? kretprobe_table_lock+0x1a/0x42
[ 7.808007] kretprobe_table_lock+0x1a/0x42
[ 7.808007] pre_handler_kretprobe+0x3f5/0x521
[ 7.808007] ? __unregister_kprobe_bottom+0x1eb/0x1eb
[ 7.808007] ? rcu_nmi_exit+0x70/0x98
[ 7.808007] ? paranoid_exit_no_swapgs+0x10/0x10
[ 7.808007] ? kprobe_target+0x1/0x11
[ 7.808007] kprobe_int3_handler+0x19c/0x25f
[ 7.808007] do_int3+0x61/0x142
[ 7.808007] int3+0x30/0x60
[ 7.808007] RIP: 0010:kprobe_target+0x1/0x11
[ 7.808007] RSP: 0000:ffff8800001c7cd0 EFLAGS: 00000246
[ 7.808007] RAX: 0000000000000000 RBX: 1ffff10000038f9b RCX: 0000000000000000
[ 7.808007] RDX: ffffed0000038f6f RSI: 0000000000000000 RDI: 00000000bd9f051f
[ 7.808007] RBP: ffff8800001c7cf8 R08: fffffbffffeaf26e R09: fffffbffffeaf26d
[ 7.808007] R10: ffff8800001c7c80 R11: 0000000000000001 R12: ffffffff8208b990
[ 7.808007] R13: ffffffff8208b980 R14: 0000000000000001 R15: dffffc0000000000
[ 7.808007] </#DB>
[ 7.808007] bzImage64_load+0xea5/0xea5
[ 7.808007] ? j_kprobe_target+0x33/0x33
[ 7.808007] ? up_write+0x1c/0x31
[ 7.808007] ? blocking_notifier_chain_register+0x97/0xa1
[ 7.808007] ? init_kprobes+0x410/0x43d
[ 7.808007] ? debugfs_kprobe_init+0x10c/0x10c
[ 7.808007] ? wait_for_completion_killable+0x2d/0x2d
[ 7.808007] ? gcov_persist_setup+0xb1/0xb1
[ 7.808007] ? debugfs_kprobe_init+0x10c/0x10c
[ 7.808007] ? do_one_initcall+0xfd/0x20d
[ 7.808007] ? initcall_blacklisted+0x149/0x149
[ 7.808007] ? lock_downgrade+0x4a5/0x4a5
[ 7.808007] ? kernel_init_freeable+0x252/0x2e6
[ 7.808007] ? rest_init+0x222/0x222
[ 7.808007] ? kernel_init+0xc/0xfe
[ 7.808007] ? rest_init+0x222/0x222
[ 7.808007] ? ret_from_fork+0x2a/0x40
[ 7.808007]
[ 7.808007] The buggy address belongs to the page:
[ 7.808007] page:ffffea00000071c0 count:0 mapcount:0 mapping: (null) index:0x0
[ 7.808007] flags: 0x0()
[ 7.808007] raw: 0000000000000000 0000000000000000 0000000000000000 00000000ffffffff
Attached the full dmesg and kconfig.
Thanks,
Fengguang
View attachment "dmesg-yocto-vp-25:20171106135350:x86_64-randconfig-s0-11061342:4.14.0-rc8:26" of type "text/plain" (77993 bytes)
View attachment ".config" of type "text/plain" (92490 bytes)
Powered by blists - more mailing lists