lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20190411193906.GA12232@hirez.programming.kicks-ass.net>
Date:   Thu, 11 Apr 2019 21:39:06 +0200
From:   Peter Zijlstra <peterz@...radead.org>
To:     kernel test robot <lkp@...el.com>
Cc:     LKP <lkp@...org>, linux-kernel@...r.kernel.org, linux-mm@...ck.org,
        linux-arch@...r.kernel.org, Ingo Molnar <mingo@...nel.org>,
        Thomas Gleixner <tglx@...utronix.de>,
        Will Deacon <will.deacon@....com>
Subject: Re: 1808d65b55 ("asm-generic/tlb: Remove arch_tlb*_mmu()"):  BUG:
 KASAN: stack-out-of-bounds in __change_page_attr_set_clr

On Wed, Apr 10, 2019 at 10:55:00PM +0800, kernel test robot wrote:
> Greetings,
> 
> 0day kernel testing robot got the below dmesg and the first bad commit is
> 
> https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git core/mm
> 
> commit 1808d65b55e4489770dd4f76fb0dff5b81eb9b11
> Author:     Peter Zijlstra <peterz@...radead.org>
> AuthorDate: Thu Sep 20 10:50:11 2018 +0200
> Commit:     Ingo Molnar <mingo@...nel.org>
> CommitDate: Wed Apr 3 10:32:58 2019 +0200
> 
>     asm-generic/tlb: Remove arch_tlb*_mmu()
>     
>     Now that all architectures are converted to the generic code, remove
>     the arch hooks.
>     
>     No change in behavior intended.
>     
>     Signed-off-by: Peter Zijlstra (Intel) <peterz@...radead.org>
>     Acked-by: Will Deacon <will.deacon@....com>
>     Cc: Andrew Morton <akpm@...ux-foundation.org>
>     Cc: Andy Lutomirski <luto@...nel.org>
>     Cc: Borislav Petkov <bp@...en8.de>
>     Cc: Dave Hansen <dave.hansen@...ux.intel.com>
>     Cc: H. Peter Anvin <hpa@...or.com>
>     Cc: Linus Torvalds <torvalds@...ux-foundation.org>
>     Cc: Peter Zijlstra <peterz@...radead.org>
>     Cc: Rik van Riel <riel@...riel.com>
>     Cc: Thomas Gleixner <tglx@...utronix.de>
>     Signed-off-by: Ingo Molnar <mingo@...nel.org>
> 
> 9de7d833e3  s390/tlb: Convert to generic mmu_gather
> 1808d65b55  asm-generic/tlb: Remove arch_tlb*_mmu()
> 6455959819  ia64/tlb: Eradicate tlb_migrate_finish() callback
> 31437a258f  Merge branch 'perf/urgent'
> +------------------------------------------------------------+------------+------------+------------+------------+
> |                                                            | 9de7d833e3 | 1808d65b55 | 6455959819 | 31437a258f |
> +------------------------------------------------------------+------------+------------+------------+------------+
> | boot_successes                                             | 0          | 0          | 0          | 0          |
> | boot_failures                                              | 44         | 11         | 11         | 11         |
> | BUG:KASAN:stack-out-of-bounds_in__unwind_start             | 44         |            |            |            |
> | BUG:KASAN:stack-out-of-bounds_in__change_page_attr_set_clr | 0          | 11         | 11         | 11         |
> +------------------------------------------------------------+------------+------------+------------+------------+
> 
> [   13.977997] rodata_test: all tests were successful
> [   13.979792] x86/mm: Checking user space page tables
> [   14.011779] x86/mm: Checked W+X mappings: passed, no W+X pages found.
> [   14.013022] Run /init as init process
> [   14.015154] ==================================================================
> [   14.016489] BUG: KASAN: stack-out-of-bounds in __change_page_attr_set_clr+0xa8/0x4df
> [   14.017853] Read of size 8 at addr ffff8880191ef8b0 by task init/1
> [   14.018976] 
> [   14.019259] CPU: 0 PID: 1 Comm: init Not tainted 5.1.0-rc3-00029-g1808d65 #3
> [   14.020509] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014
> [   14.022028] Call Trace:
> [   14.022471]  print_address_description+0x9d/0x26b
> [   14.023295]  ? __change_page_attr_set_clr+0xa8/0x4df
> [   14.024161]  ? __change_page_attr_set_clr+0xa8/0x4df
> [   14.025031]  kasan_report+0x145/0x18a
> [   14.025667]  ? __change_page_attr_set_clr+0xa8/0x4df
> [   14.026542]  __change_page_attr_set_clr+0xa8/0x4df
> [   14.027433]  ? __change_page_attr+0xad0/0xad0
> [   14.028260]  ? kasan_unpoison_shadow+0xf/0x2e
> [   14.029062]  ? preempt_latency_start+0x22/0x68
> [   14.029962]  ? get_page_from_freelist+0xf37/0x1281
> [   14.030796]  ? native_flush_tlb_one_user+0x54/0x95
> [   14.031602]  ? trace_tlb_flush+0x1f/0x106
> [   14.032352]  ? flush_tlb_func_common+0x26a/0x289
> [   14.033322]  ? trace_irq_enable_rcuidle+0x21/0xf5
> [   14.034109]  __kernel_map_pages+0x148/0x1b1
> [   14.034777]  ? set_pages_rw+0x94/0x94
> [   14.035408]  ? flush_tlb_mm_range+0x161/0x1ae
> [   14.036134]  ? atomic_read+0xe/0x3f
> [   14.036715]  ? page_expected_state+0x46/0x81
> [   14.037442]  free_unref_page_prepare+0xe1/0x192
> [   14.038201]  free_unref_page_list+0xd3/0x319
> [   14.038960]  release_pages+0x5d1/0x612
> [   14.039581]  ? __put_compound_page+0x91/0x91
> [   14.040346]  ? tlb_flush_mmu_tlbonly+0x107/0x1c5
> [   14.041193]  ? preempt_latency_start+0x22/0x68
> [   14.041922]  ? free_swap_cache+0x51/0xd5
> [   14.042566]  tlb_flush_mmu_free+0x31/0xca
> [   14.043254]  tlb_finish_mmu+0xf6/0x1b5
> [   14.043883]  shift_arg_pages+0x280/0x30b
> [   14.044535]  ? __register_binfmt+0x18d/0x18d
> [   14.045259]  ? trace_irq_enable_rcuidle+0x21/0xf5
> [   14.046029]  ? ___might_sleep+0xac/0x33e
> [   14.046666]  setup_arg_pages+0x46a/0x56e
> [   14.047347]  ? shift_arg_pages+0x30b/0x30b
> [   14.048208]  load_elf_binary+0x888/0x20dd
> [   14.048872]  ? _raw_read_unlock+0x14/0x24
> [   14.049532]  ? ima_bprm_check+0x18c/0x1c2
> [   14.050199]  ? elf_map+0x1e8/0x1e8
> [   14.050756]  ? ima_file_mmap+0xf3/0xf3
> [   14.051583]  search_binary_handler+0x154/0x511
> [   14.052323]  __do_execve_file+0x10b5/0x15e9
> [   14.053004]  ? open_exec+0x3a/0x3a
> [   14.053564]  ? memcpy+0x34/0x46
> [   14.054095]  ? rest_init+0xdd/0xdd
> [   14.054669]  kernel_init+0x66/0x10d
> [   14.055262]  ? rest_init+0xdd/0xdd
> [   14.055833]  ret_from_fork+0x3a/0x50
> [   14.056516] 
> [   14.056769] The buggy address belongs to the page:
> [   14.057552] page:ffff88801de82c48 count:0 mapcount:0 mapping:0000000000000000 index:0x0
> [   14.058923] flags: 0x680000000000()
> [   14.059495] raw: 0000680000000000 ffff88801de82c50 ffff88801de82c50 0000000000000000

I think this bisect is bad. If you look at your own logs this patch
merely changes the failure, but doesn't make it go away.

Before this patch (in fact, before tip/core/mm entirely) the errror
reads like the below, which suggests there is memory corruption
somewhere, and the fingered patch just makes it trigger differently.

It would be very good to find the source of this corruption, but I'm
fairly certain it is not here.

[   10.273617] rodata_test: all tests were successful
[   10.275015] x86/mm: Checking user space page tables
[   10.295444] x86/mm: Checked W+X mappings: passed, no W+X pages found.
[   10.296334] Run /init as init process
[   10.301465] ==================================================================
[   10.302460] BUG: KASAN: stack-out-of-bounds in __unwind_start+0x7e/0x4fe
[   10.303355] Write of size 88 at addr ffff8880191efa28 by task init/1
[   10.304241]
[   10.304455] CPU: 0 PID: 1 Comm: init Not tainted 5.1.0-rc4-00288-ga131d61b43e0-dirty #10
[   10.305542] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1 04/01/2014
[   10.306641] Call Trace:
[   10.306990]  print_address_description+0x9d/0x26b
[   10.307654]  ? __unwind_start+0x7e/0x4fe
[   10.308222]  ? __unwind_start+0x7e/0x4fe
[   10.308755]  __kasan_report+0x145/0x18a
[   10.309266]  ? __unwind_start+0x7e/0x4fe
[   10.309823]  kasan_report+0xe/0x12
[   10.310273]  memset+0x1f/0x31
[   10.310703]  __unwind_start+0x7e/0x4fe
[   10.311223]  ? unwind_next_frame+0x10a9/0x10a9
[   10.311839]  ? native_flush_tlb_one_user+0x54/0x95
[   10.312504]  ? kasan_unpoison_shadow+0xf/0x2e
[   10.313090]  __save_stack_trace+0x65/0xe7
[   10.313667]  ? trace_irq_enable_rcuidle+0x21/0xf5
[   10.314284]  ? tracer_hardirqs_on+0xb/0x1b
[   10.314830]  ? trace_hardirqs_on+0x2c/0x37
[   10.315369]  save_stack+0x32/0xa3
[   10.315842]  ? __put_compound_page+0x91/0x91
[   10.316458]  ? preempt_latency_start+0x22/0x68
[   10.317052]  ? free_swap_cache+0x51/0xd5
[   10.317586]  ? tlb_flush_mmu_free+0x31/0xca
[   10.318140]  ? arch_tlb_finish_mmu+0x8c/0x112
[   10.318759]  ? tlb_finish_mmu+0xc7/0xd6
[   10.319298]  ? unmap_region+0x275/0x2b9
[   10.319835]  ? special_mapping_fault+0x26d/0x26d
[   10.320448]  ? trace_irq_disable_rcuidle+0x21/0xf5
[   10.321085]  __kasan_slab_free+0xd3/0xf4
[   10.321623]  ? remove_vma+0xdf/0xe7
[   10.322105]  kmem_cache_free+0x4e/0xca
[   10.322600]  remove_vma+0xdf/0xe7
[   10.323038]  __do_munmap+0x72c/0x75e
[   10.323514]  __vm_munmap+0xd0/0x135
[   10.323980]  ? __x64_sys_brk+0x40e/0x40e
[   10.324496]  ? trace_irq_disable_rcuidle+0x21/0xf5
[   10.325160]  __x64_sys_munmap+0x6a/0x6f
[   10.325670]  do_syscall_64+0x3f0/0x462
[   10.326162]  ? syscall_return_slowpath+0x154/0x154
[   10.326810]  ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe
[   10.327485]  ? trace_irq_disable_rcuidle+0x21/0xf5
[   10.328153]  ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe
[   10.328873]  ? trace_hardirqs_off_caller+0x3e/0x40
[   10.329505]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[   10.330162]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[   10.330830] RIP: 0033:0x7efc4d707457
[   10.331306] Code: f0 ff ff 73 01 c3 48 8d 0d 5a be 20 00 31 d2 48 29 c2 89 11 48 83 c8 ff eb eb 90 90 90 90 90 90 90 90 90 b8 0b 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8d 0d 2d be 20 00 31 d2 48 29 c2 89
[   10.333711] RSP: 002b:00007fff973da398 EFLAGS: 00000203 ORIG_RAX: 000000000000000b
[   10.334728] RAX: ffffffffffffffda RBX: 00007efc4d9132c8 RCX: 00007efc4d707457
[   10.335670] RDX: 0000000000000000 RSI: 0000000000001d67 RDI: 00007efc4d90d000
[   10.336596] RBP: 00007fff973da4f0 R08: 0000000000000007 R09: 00000000ffffffff
[   10.337512] R10: 0000000000000000 R11: 0000000000000203 R12: 000000073dd74283
[   10.338457] R13: 000000073db1ab4f R14: 00007efc4d909700 R15: 00007efc4d9132c8
[   10.339373]
[   10.339585] The buggy address belongs to the page:
[   10.340224] page:ffff88801de82c48 count:0 mapcount:0 mapping:0000000000000000 index:0x0
[   10.341338] flags: 0x680000000000()
[   10.341832] raw: 0000680000000000 ffff88801de82c50 ffff88801de82c50 0000000000000000
[   10.342846] raw: 0000000000000000 0000000000000000 00000000ffffffff
[   10.343679] page dumped because: kasan: bad access detected
[   10.344415]
[   10.344629] Memory state around the buggy address:
[   10.345254]  ffff8880191ef900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.346245]  ffff8880191ef980: 00 00 f1 f1 f1 f1 00 f2 f2 f2 00 00 00 00 00 00
[   10.347217] >ffff8880191efa00: 00 00 00 00 00 f2 f2 f2 00 00 00 00 00 00 00 00
[   10.348152]                                   ^
[   10.348755]  ffff8880191efa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.349698]  ffff8880191efb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.350650] ==================================================================

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ