Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp617372imm; Tue, 5 Jun 2018 01:24:36 -0700 (PDT) X-Google-Smtp-Source: ADUXVKL6YlDzhHScQI3bOCpemfuvL2a7LDmcKwuokSOtOKQOjs9ugUTgdTsu27IG1ZC9KioqMrW8 X-Received: by 2002:a65:64d3:: with SMTP id t19-v6mr15495078pgv.148.1528187076791; Tue, 05 Jun 2018 01:24:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528187076; cv=none; d=google.com; s=arc-20160816; b=CDjwEZ3IyQq3PUDRY7rT5alk1mofUfS2dCRjrd2fzl7ShnXfQDBmGzuCGknQW6bU4f tSogN+jxeKsNTmyKbB6EFH43u+AUVJmgHvgCEPj69l7w+6DNCAv1zKmwPzBUmW6NvmPQ OoWSabeyIEbdYTGjNzBhV903TlyUxEDzvUnrVX5JmeMyx28uLnV9A4tUr/qPJEyWA9+w Gr47JPvi+IJMLUkz58o/ZooQKi2Opof2yDSe10Iw8aIx6lHVRZ8kvSukxlMbXys3wvb0 pClZdrJZ6fdKUfEeB+aVxIx5W5pHzH5qex/PMwzfKMMdg/76o61E89OBUN7kmYxmmW0m mLsQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :references:in-reply-to:mime-version:dkim-signature :arc-authentication-results; bh=gcCY+ZLXKPkdkVl1Rq+UzenjGRtdBaEslmYrm8549vE=; b=AmAsOwU8mMppjdrGH7a25RMX6Ep/66Tfxsip3vZ4B2zVTfagz5e/aUGNVXUduDVW7i jvJztQAa7I9I9eUFGEP702pudI2/PkHAH68IuFWefFMg6STtM3NDjewaSKTIH2qlV1oK Bu1+6MMKLOo8+JfTH4aDcvUD+sibRoO8WMHHITsFculkpvPDDc3aChZxGpuBfAGKLQtB Ca+L+6HXe4fYYCLbPWwnTcu6wpTf6hGA+c0emRu188dtl7atI1YKp4Y3zdZvOuGCsvEo z2Qiln+P9t2FnFtPEZ/fP6hTXG3oYCyG4SZuCgoaRR3aLkhxhGVo7XWicVejnDFSZZD3 gRyw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=Dj8Cj6CJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b9-v6si21383015pla.289.2018.06.05.01.24.21; Tue, 05 Jun 2018 01:24:36 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=Dj8Cj6CJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751644AbeFEIX4 (ORCPT + 99 others); Tue, 5 Jun 2018 04:23:56 -0400 Received: from mail-pl0-f66.google.com ([209.85.160.66]:42123 "EHLO mail-pl0-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751497AbeFEIXy (ORCPT ); Tue, 5 Jun 2018 04:23:54 -0400 Received: by mail-pl0-f66.google.com with SMTP id w17-v6so1082898pll.9 for ; Tue, 05 Jun 2018 01:23:54 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=gcCY+ZLXKPkdkVl1Rq+UzenjGRtdBaEslmYrm8549vE=; b=Dj8Cj6CJrDgGRgJgX4njggWWi9faRSDXyhf3y2t5OAdMCuK1O+2GwVGQMrAfLyDv8c PEq/I6X5M+KPHYANb38AbLkl1B5UWMvy+ti2VlQovWom+SOW4EMXY/yhXex1kn2XjkXm TJaxg0uBC6D56yrCzYxAOALeRgfkHhKWXzDGzMDtkR+KEoBIgIJpCxk9dGzy7ZQIsqVU Jdj3OJEZQiWtbus+LK0KuW0nvgmyOYM2zOqNT4VoUjPnkv82nzcWVdGTPqgGSfOTclVN ky1kUcIzCzStuEVxRV+wT8td/uBpaC/rTULUZEGZFlbFeLXIqo2/gay4rydVuCS9NG2y etSA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=gcCY+ZLXKPkdkVl1Rq+UzenjGRtdBaEslmYrm8549vE=; b=I/77TRyglnq26JXKuUVCVHqaXh5uzKOvAp/vxOgfBaCGXIPkFkg3dX7unpoFuWOVYz rTSHM5nEdnhYq3alOdF06cN4UzS75hH6pC0Wnhq5MZ3AMc3vGfpxnbflKKJT7havQ4oB P83bDIKAWXhlXiD7S2FukdIP3tF5lCqocXt7xOcURgefEqD5TsDwjXYyIFdmRvWZkU9h UeeWIB6daGlK5Iy4uoAa3Q7oOD56kKbbszzBiEpY9mVU+vYS5l6gQG2IauHshMRR/98o VO5CN4k2qYZ1UBTQxvgS783KvRXCtM9wktiA67A3S7bgVWvLKlPacwaZZ3yY15F11Wjc O9ug== X-Gm-Message-State: APt69E3KGi/zGVzufDDzafA0gfHIFpLYuJJsgkBOkJHQVvvtNUieIBMC u6IHA/R8HSUmf1QwA5XwEESPA/kqNHK50L03tAbKJA== X-Received: by 2002:a17:902:7d09:: with SMTP id z9-v6mr12052690pll.233.1528187034083; Tue, 05 Jun 2018 01:23:54 -0700 (PDT) MIME-Version: 1.0 Received: by 2002:a17:90a:d42:0:0:0:0 with HTTP; Tue, 5 Jun 2018 01:23:33 -0700 (PDT) In-Reply-To: References: <000000000000d29a1c056d188355@google.com> From: Dmitry Vyukov Date: Tue, 5 Jun 2018 10:23:33 +0200 Message-ID: Subject: Re: WARNING in bpf_int_jit_compile To: Daniel Borkmann Cc: syzbot , Alexei Starovoitov , David Miller , "H. Peter Anvin" , Alexey Kuznetsov , LKML , Ingo Molnar , netdev , syzkaller-bugs , Thomas Gleixner , "the arch/x86 maintainers" , Hideaki YOSHIFUJI Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, May 28, 2018 at 1:17 AM, Daniel Borkmann wrote: > On 05/26/2018 11:29 AM, syzbot wrote: >> syzbot has found a reproducer for the following crash on: >> >> HEAD commit: 62d18ecfa641 Merge tag 'arm64-fixes' of git://git.kernel.o.. >> git tree: upstream >> console output: https://syzkaller.appspot.com/x/log.txt?x=14c6bf57800000 >> kernel config: https://syzkaller.appspot.com/x/.config?x=982e2df1b9e60b02 >> dashboard link: https://syzkaller.appspot.com/bug?extid=9e762b52dd17e616a7a5 >> compiler: gcc (GCC) 8.0.1 20180413 (experimental) >> syzkaller repro:https://syzkaller.appspot.com/x/repro.syz?x=130e42b7800000 >> >> IMPORTANT: if you fix the bug, please add the following tag to the commit: >> Reported-by: syzbot+9e762b52dd17e616a7a5@syzkaller.appspotmail.com >> >> RAX: ffffffffffffffda RBX: 0000000002542914 RCX: 0000000000455a09 >> RDX: 0000000000000048 RSI: 0000000020000240 RDI: 0000000000000005 >> RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 >> R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 >> R13: 0000000000000046 R14: 00000000006f4730 R15: 0000000000000023 >> WARNING: CPU: 0 PID: 4752 at include/linux/filter.h:667 bpf_jit_binary_lock_ro include/linux/filter.h:667 [inline] >> WARNING: CPU: 0 PID: 4752 at include/linux/filter.h:667 bpf_int_jit_compile+0xbf7/0xef7 arch/x86/net/bpf_jit_comp.c:1271 >> Kernel panic - not syncing: panic_on_warn set ... >> >> CPU: 0 PID: 4752 Comm: syz-executor0 Not tainted 4.17.0-rc6+ #67 >> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 >> Call Trace: >> __dump_stack lib/dump_stack.c:77 [inline] >> dump_stack+0x1b9/0x294 lib/dump_stack.c:113 >> panic+0x22f/0x4de kernel/panic.c:184 >> __warn.cold.8+0x163/0x1b3 kernel/panic.c:536 >> report_bug+0x252/0x2d0 lib/bug.c:186 >> fixup_bug arch/x86/kernel/traps.c:178 [inline] >> do_error_trap+0x1de/0x490 arch/x86/kernel/traps.c:296 >> do_invalid_op+0x1b/0x20 arch/x86/kernel/traps.c:315 >> invalid_op+0x14/0x20 arch/x86/entry/entry_64.S:992 >> RIP: 0010:bpf_jit_binary_lock_ro include/linux/filter.h:667 [inline] > > Been looking into this last Friday already. What seems to happen here is that > there's fault injection from inside set_memory_ro(), meaning it will eventually > return an error there, and we throw a WARN_ON_ONCE() to bark that making the > memory read-only didn't work out. I'd be in preference to notify the user on > such issue rather than keeping completely silent about it so that there's > awareness that read-only protections are not in place / guaranteed. Hi Daniel, There is no problem with notifying user, but there is a problem with making this notification indistinguishable from kernel bugs. Also the stack trace is pointless for end user, and they may not even understand what happened and what they were notified about (not everybody is a kernel developer!). A pr_err/pr_err_once with a readable error message would be a better fit here. >> RIP: 0010:bpf_int_jit_compile+0xbf7/0xef7 arch/x86/net/bpf_jit_comp.c:1271 >> RSP: 0018:ffff8801d85ff920 EFLAGS: 00010293 >> RAX: ffff8801d78c40c0 RBX: 0000000000000046 RCX: ffffffff81445d89 >> RDX: 0000000000000000 RSI: ffffffff81445d97 RDI: 0000000000000005 >> RBP: ffff8801d85ffa40 R08: ffff8801d78c40c0 R09: 0000000000000000 >> R10: 0000000000000000 R11: 0000000000000000 R12: ffffc9000194e002 >> R13: ffff8801d85ffa18 R14: 00000000fffffff4 R15: 0000000000000003 >> bpf_prog_select_runtime+0x131/0x640 kernel/bpf/core.c:1541 >> bpf_prog_load+0x16c2/0x2070 kernel/bpf/syscall.c:1333 >> __do_sys_bpf kernel/bpf/syscall.c:2073 [inline] >> __se_sys_bpf kernel/bpf/syscall.c:2035 [inline] >> __x64_sys_bpf+0x389/0x4c0 kernel/bpf/syscall.c:2035 >> do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:287 >> entry_SYSCALL_64_after_hwframe+0x49/0xbe >> RIP: 0033:0x455a09 >> RSP: 002b:00007ffec3da2868 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 >> RAX: ffffffffffffffda RBX: 0000000002542914 RCX: 0000000000455a09 >> RDX: 0000000000000048 RSI: 0000000020000240 RDI: 0000000000000005 >> RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 >> R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 >> R13: 0000000000000046 R14: 00000000006f4730 R15: 0000000000000023 >> Dumping ftrace buffer: >> (ftrace buffer empty) >> Kernel Offset: disabled >> Rebooting in 86400 seconds.. >> > > -- > You received this message because you are subscribed to the Google Groups "syzkaller-bugs" group. > To unsubscribe from this group and stop receiving emails from it, send an email to syzkaller-bugs+unsubscribe@googlegroups.com. > To view this discussion on the web visit https://groups.google.com/d/msgid/syzkaller-bugs/cc2c87d5-0543-c340-9700-23f8676315f0%40iogearbox.net. > For more options, visit https://groups.google.com/d/optout.