Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp1784625imm; Sun, 27 May 2018 16:18:31 -0700 (PDT) X-Google-Smtp-Source: ADUXVKLjRwhKVw5m4xujT3OXMdPAUvqQnc3gOx14lNyGH0oLiIKgXcePa0MR0tbQr5oO5h5s/Fzq X-Received: by 2002:a65:43c9:: with SMTP id n9-v6mr2558127pgp.399.1527463111336; Sun, 27 May 2018 16:18:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527463111; cv=none; d=google.com; s=arc-20160816; b=jC0vyT+n2TcFTEk/yTGe7G3cJslQt8HmAAXKiEas5XQMxaSMQcZ+WXyvhIu3yj9nBt 5t9Ylb1xWMnq6e9YPZUDV2u2C2/ft60mzqgJI0D0DJpmMC38Fzu9QyJNhe0aubSdTuFc IVACIt80KBPIxswa9DnGEeDUdiNrgbH2IyUuj5KZtafhZ5zKBrWYAqqmp2qY1BLbe2su r92GZzGR+dhWmYX5mqNdtrPw2iJlmKGD1tWnNwHZeng77NkdEepbqhux/PccGPSoAOYI TBtaAoyDISVJvwMOawEAJ+K6PNgq94Q4XEarI2ZoxfiHCQYTlWsqVUo7uZSQT8+CDRG2 Rerw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:to:subject:arc-authentication-results; bh=0FDZTezf0Q+HlnhzXq7T7ChEL9RbcQcaw5TMa0MYcLA=; b=iaKnTTcelLPuVfgzwT2+P9bJq9lYli1eWBSQUJt30iuYQnNo4Fx1xI62TjjyfOwZS8 TRLXfR/z6jSKhN1vbgfZkxy2PLbKKcXdh9ezLD5DFhIGXCX6a7CDkhXigtolxF3TzDxt M5zgM3zPfOAobE8zu7CDiFSccAB/axEAeEHIk1wVqqdZtj9Cwb4xsoAUiLUqn3TTGUi7 sfFswKCJYd5yXwGJGHYe31KHzeRYE3CnP1JRhOrWm2cNounCmal0olWOY7fWVZy0Dhgc PXR+ijypR8SjGzxDDPxeV+IYEqEaUPBd12eNm2pKwcNNLns7J0080fMJzEuVWZzcXy4K +4qw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d9-v6si22357390pgv.330.2018.05.27.16.18.15; Sun, 27 May 2018 16:18:31 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752731AbeE0XRr (ORCPT + 99 others); Sun, 27 May 2018 19:17:47 -0400 Received: from www62.your-server.de ([213.133.104.62]:51519 "EHLO www62.your-server.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752420AbeE0XRp (ORCPT ); Sun, 27 May 2018 19:17:45 -0400 Received: from [62.202.221.10] (helo=linux.home) by www62.your-server.de with esmtpsa (TLSv1.2:DHE-RSA-AES256-SHA:256) (Exim 4.85_2) (envelope-from ) id 1fN4uc-0001T4-I6; Mon, 28 May 2018 01:17:18 +0200 Subject: Re: WARNING in bpf_int_jit_compile To: syzbot , ast@kernel.org, davem@davemloft.net, hpa@zytor.com, kuznet@ms2.inr.ac.ru, linux-kernel@vger.kernel.org, mingo@redhat.com, netdev@vger.kernel.org, syzkaller-bugs@googlegroups.com, tglx@linutronix.de, x86@kernel.org, yoshfuji@linux-ipv6.org References: <000000000000d29a1c056d188355@google.com> From: Daniel Borkmann Message-ID: Date: Mon, 28 May 2018 01:17:17 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.3.0 MIME-Version: 1.0 In-Reply-To: <000000000000d29a1c056d188355@google.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit X-Authenticated-Sender: daniel@iogearbox.net X-Virus-Scanned: Clear (ClamAV 0.99.3/24609/Sun May 27 22:30:39 2018) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 05/26/2018 11:29 AM, syzbot wrote: > syzbot has found a reproducer for the following crash on: > > HEAD commit:    62d18ecfa641 Merge tag 'arm64-fixes' of git://git.kernel.o.. > git tree:       upstream > console output: https://syzkaller.appspot.com/x/log.txt?x=14c6bf57800000 > kernel config:  https://syzkaller.appspot.com/x/.config?x=982e2df1b9e60b02 > dashboard link: https://syzkaller.appspot.com/bug?extid=9e762b52dd17e616a7a5 > compiler:       gcc (GCC) 8.0.1 20180413 (experimental) > syzkaller repro:https://syzkaller.appspot.com/x/repro.syz?x=130e42b7800000 > > IMPORTANT: if you fix the bug, please add the following tag to the commit: > Reported-by: syzbot+9e762b52dd17e616a7a5@syzkaller.appspotmail.com > > RAX: ffffffffffffffda RBX: 0000000002542914 RCX: 0000000000455a09 > RDX: 0000000000000048 RSI: 0000000020000240 RDI: 0000000000000005 > RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 > R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 > R13: 0000000000000046 R14: 00000000006f4730 R15: 0000000000000023 > WARNING: CPU: 0 PID: 4752 at include/linux/filter.h:667 bpf_jit_binary_lock_ro include/linux/filter.h:667 [inline] > WARNING: CPU: 0 PID: 4752 at include/linux/filter.h:667 bpf_int_jit_compile+0xbf7/0xef7 arch/x86/net/bpf_jit_comp.c:1271 > Kernel panic - not syncing: panic_on_warn set ... > > CPU: 0 PID: 4752 Comm: syz-executor0 Not tainted 4.17.0-rc6+ #67 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 > Call Trace: >  __dump_stack lib/dump_stack.c:77 [inline] >  dump_stack+0x1b9/0x294 lib/dump_stack.c:113 >  panic+0x22f/0x4de kernel/panic.c:184 >  __warn.cold.8+0x163/0x1b3 kernel/panic.c:536 >  report_bug+0x252/0x2d0 lib/bug.c:186 >  fixup_bug arch/x86/kernel/traps.c:178 [inline] >  do_error_trap+0x1de/0x490 arch/x86/kernel/traps.c:296 >  do_invalid_op+0x1b/0x20 arch/x86/kernel/traps.c:315 >  invalid_op+0x14/0x20 arch/x86/entry/entry_64.S:992 > RIP: 0010:bpf_jit_binary_lock_ro include/linux/filter.h:667 [inline] Been looking into this last Friday already. What seems to happen here is that there's fault injection from inside set_memory_ro(), meaning it will eventually return an error there, and we throw a WARN_ON_ONCE() to bark that making the memory read-only didn't work out. I'd be in preference to notify the user on such issue rather than keeping completely silent about it so that there's awareness that read-only protections are not in place / guaranteed. > RIP: 0010:bpf_int_jit_compile+0xbf7/0xef7 arch/x86/net/bpf_jit_comp.c:1271 > RSP: 0018:ffff8801d85ff920 EFLAGS: 00010293 > RAX: ffff8801d78c40c0 RBX: 0000000000000046 RCX: ffffffff81445d89 > RDX: 0000000000000000 RSI: ffffffff81445d97 RDI: 0000000000000005 > RBP: ffff8801d85ffa40 R08: ffff8801d78c40c0 R09: 0000000000000000 > R10: 0000000000000000 R11: 0000000000000000 R12: ffffc9000194e002 > R13: ffff8801d85ffa18 R14: 00000000fffffff4 R15: 0000000000000003 >  bpf_prog_select_runtime+0x131/0x640 kernel/bpf/core.c:1541 >  bpf_prog_load+0x16c2/0x2070 kernel/bpf/syscall.c:1333 >  __do_sys_bpf kernel/bpf/syscall.c:2073 [inline] >  __se_sys_bpf kernel/bpf/syscall.c:2035 [inline] >  __x64_sys_bpf+0x389/0x4c0 kernel/bpf/syscall.c:2035 >  do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:287 >  entry_SYSCALL_64_after_hwframe+0x49/0xbe > RIP: 0033:0x455a09 > RSP: 002b:00007ffec3da2868 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 > RAX: ffffffffffffffda RBX: 0000000002542914 RCX: 0000000000455a09 > RDX: 0000000000000048 RSI: 0000000020000240 RDI: 0000000000000005 > RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 > R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 > R13: 0000000000000046 R14: 00000000006f4730 R15: 0000000000000023 > Dumping ftrace buffer: >    (ftrace buffer empty) > Kernel Offset: disabled > Rebooting in 86400 seconds.. >