Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp3179798yba; Mon, 8 Apr 2019 12:53:31 -0700 (PDT) X-Google-Smtp-Source: APXvYqw0PAmIdWUujwK6VHHpAnxOtLKA8tXTmU5DH9KRV/UESth7pE+2lLOQVDF1btmZbvCgROPj X-Received: by 2002:a62:e10e:: with SMTP id q14mr31217657pfh.161.1554753211236; Mon, 08 Apr 2019 12:53:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554753211; cv=none; d=google.com; s=arc-20160816; b=cPRlW7xe+SlDq8rAXaOq/hQ5LHMt8yhHunsQfbAUYCa4pelyOEt+kSfoKGMgF0RuHA cMQ7WyMAVAseJ678i0y9LnAiDT1tPstUrn6oJ2bDYmaII9PnNoO/lFU0hGBztFWdZz7W 6vH3fCo4YpL1y9DjEQmifwHj7b8tiTN+1Fmm2od3w8rf+TgygLQEe3lzXuFez+rvQkDw mCYzlECCjFiQeceNCkr0Q3mEIIHuGGGFs1gGExtDmQ7hXmpJ/Pha3ukb1IV6EoKrdF/k 8NE9frangCyCjqcjyqTYL8yuFfUCJ6BpW2p0QNfvoBRdWnlQPahgKGfsVMUQrrYMW9i8 pebQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:thread-index:thread-topic :content-transfer-encoding:mime-version:subject:references :in-reply-to:message-id:cc:to:from:date:dkim-signature:dkim-filter; bh=jeEHbiH78qagoBvCKU8uF6ytOzzq+kI41sYLsbJgK8E=; b=EgEPeijUwteoVjmamPQ6eyHLzZhkTkf5MkLs2sSmscETZJNMUcx2wb+t+EsHbKjSwv 6P9FmbhPORwA8GyQb847tD5DhldxmsCmU0r/s4DAVj1JoiULQYQX4X9SlQs8ersfHRfi 9yzSQXJ4EzXl/1FEAID8RXLAu/ImacV99/5IHnGYLm0xZHPhO4LHVn6GPhskjKbDX9MQ f2f7gmM/e5OKF1PSgJ04rw2538KI+6HIM0UfK6Lq+VD4PurXHgDJV9uTwHHoAVOetuVx ZLjBvRPRJXFFEverLVwAHp2oGV3/RlXhvHobfMwY88oemniZE53eGNzLQS9Pu4UgwUKy UNuw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@efficios.com header.s=default header.b=WExNF+FL; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=efficios.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b12si26705142pgl.264.2019.04.08.12.53.14; Mon, 08 Apr 2019 12:53:31 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@efficios.com header.s=default header.b=WExNF+FL; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=efficios.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726728AbfDHTrI (ORCPT + 99 others); Mon, 8 Apr 2019 15:47:08 -0400 Received: from mail.efficios.com ([167.114.142.138]:37816 "EHLO mail.efficios.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726558AbfDHTrH (ORCPT ); Mon, 8 Apr 2019 15:47:07 -0400 Received: from localhost (ip6-localhost [IPv6:::1]) by mail.efficios.com (Postfix) with ESMTP id B66011D43F2; Mon, 8 Apr 2019 15:47:05 -0400 (EDT) Received: from mail.efficios.com ([IPv6:::1]) by localhost (mail02.efficios.com [IPv6:::1]) (amavisd-new, port 10032) with ESMTP id zG4gnCyhd6y7; Mon, 8 Apr 2019 15:47:05 -0400 (EDT) Received: from localhost (ip6-localhost [IPv6:::1]) by mail.efficios.com (Postfix) with ESMTP id DFF6E1D43EB; Mon, 8 Apr 2019 15:47:04 -0400 (EDT) DKIM-Filter: OpenDKIM Filter v2.10.3 mail.efficios.com DFF6E1D43EB DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=efficios.com; s=default; t=1554752824; bh=jeEHbiH78qagoBvCKU8uF6ytOzzq+kI41sYLsbJgK8E=; h=Date:From:To:Message-ID:MIME-Version; b=WExNF+FL3h1y/cFepRVh7oEjNbPI/2iodqjknFwP8+/BGfCNDTgBryIAHi96Gy+fr 7Om5Yk2kxeVrCyBlaRN0UD8vUa85TfxBXZJUxVzQ5LXcj3XHgqw7u+/guWxgR7vZf2 25z0lRC1o350tbYr7gMTSRNHPXQd5L1/wLjZgmj7jWKf+QKnIXirqzjKrZQhcOT3IL QaaifWjxG01EzUSngbCy2/b4fP5Sdli++ba4UoVC5j+fgGcuFzob8g1zIZuCZT0bqn CUaMvrQ8SIUSOPdvjpwBvVeqvSuDAnbcBlN3+OsPbRgvLaC0CpKQPo/Dne53kQd5v6 rK5mUSvIErN8A== X-Virus-Scanned: amavisd-new at efficios.com Received: from mail.efficios.com ([IPv6:::1]) by localhost (mail02.efficios.com [IPv6:::1]) (amavisd-new, port 10026) with ESMTP id aLTDbYUCw-3g; Mon, 8 Apr 2019 15:47:04 -0400 (EDT) Received: from mail02.efficios.com (mail02.efficios.com [167.114.142.138]) by mail.efficios.com (Postfix) with ESMTP id BF4F21D43E4; Mon, 8 Apr 2019 15:47:04 -0400 (EDT) Date: Mon, 8 Apr 2019 15:47:04 -0400 (EDT) From: Mathieu Desnoyers To: "Joel Fernandes, Google" Cc: paulmck , Rong Chen , linux-kernel , LKP Message-ID: <1892400867.1780.1554752824625.JavaMail.zimbra@efficios.com> In-Reply-To: <20190408193514.GD133872@google.com> References: <20190408135610.GN11264@shao2-debian> <20190408143037.GL14111@linux.ibm.com> <20190408145750.GO11264@shao2-debian> <20190408152112.GM14111@linux.ibm.com> <118257214.1376.1554743216233.JavaMail.zimbra@efficios.com> <20190408171041.GQ14111@linux.ibm.com> <1930819602.1467.1554744349263.JavaMail.zimbra@efficios.com> <20190408193514.GD133872@google.com> Subject: Re: [srcu] a365bb5f6e: leaking_addresses.proc.___srcu_struct_ptrs. MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-Originating-IP: [167.114.142.138] X-Mailer: Zimbra 8.8.12_GA_3794 (ZimbraWebClient - FF66 (Linux)/8.8.12_GA_3794) Thread-Topic: a365bb5f6e: leaking_addresses.proc.___srcu_struct_ptrs. Thread-Index: xmC21vosaN7I661F0NdLfhCo8NvtOA== Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org ----- On Apr 8, 2019, at 3:35 PM, Joel Fernandes, Google joel@joelfernandes.org wrote: > On Mon, Apr 08, 2019 at 01:25:49PM -0400, Mathieu Desnoyers wrote: >> ----- On Apr 8, 2019, at 1:10 PM, paulmck paulmck@linux.ibm.com wrote: >> >> > On Mon, Apr 08, 2019 at 01:06:56PM -0400, Mathieu Desnoyers wrote: >> >> ----- On Apr 8, 2019, at 11:21 AM, paulmck paulmck@linux.ibm.com wrote: >> >> >> >> > On Mon, Apr 08, 2019 at 10:57:50PM +0800, Rong Chen wrote: >> >> >> On Mon, Apr 08, 2019 at 07:30:37AM -0700, Paul E. McKenney wrote: >> >> >> > On Mon, Apr 08, 2019 at 09:56:10PM +0800, kernel test robot wrote: >> >> >> > > FYI, we noticed the following commit (built with gcc-7): >> >> >> > > >> >> >> > > commit: a365bb5f6eafb220a1448674054b05c250829313 ("srcu: Allocate per-CPU data >> >> >> > > for DEFINE_SRCU() in modules") >> >> >> > > https://git.kernel.org/cgit/linux/kernel/git/paulmck/linux-rcu.git >> >> >> > > tmp.2019.04.07a >> >> >> > > >> >> >> > > in testcase: leaking_addresses >> >> >> > > with following parameters: >> >> >> > > >> >> >> > > >> >> >> > > >> >> >> > > >> >> >> > > on test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 2G >> >> >> > > >> >> >> > > caused below changes (please refer to attached dmesg/kmsg for entire >> >> >> > > log/backtrace): >> >> >> > > >> >> >> > > >> >> >> > > +-------------------------------------------------+------------+------------+ >> >> >> > > | | a44a55abae | a365bb5f6e | >> >> >> > > +-------------------------------------------------+------------+------------+ >> >> >> > > | boot_successes | 0 | 3 | >> >> >> > > | boot_failures | 4 | 6 | >> >> >> > > | BUG:kernel_reboot-without-warning_in_test_stage | 4 | 6 | >> >> >> > > | leaking_addresses.proc.___srcu_struct_ptrs. | 0 | 6 | >> >> >> > > +-------------------------------------------------+------------+------------+ >> >> >> > >> >> >> > Please help me out here. Without this commit, the kernel never succeeds >> >> >> > in booting, but with it the kernel sometimes succeeds in booting? Or am >> >> >> > I misinterpreting the above table? >> >> >> > >> >> >> > Thanx, Paul >> >> >> >> >> >> Hi Paul, >> >> >> >> >> >> The message "kernel_reboot-without-warning_in_test_stage" is from 0day, >> >> >> leaking addresses generated many dmesgs, so 0day thought some bootings may >> >> >> failed. >> >> > >> >> [...] >> >> >> > >> >> >> > > [1 .rodata.cst16.POLY] 0xffffffffc0498360 >> >> >> > > [1 .rodata.cst32.byteshift_table] 0xffffffffc03f50f0 >> >> >> > > [19 __bug_table] 0xffffffffc02be184 >> >> >> > > [2 __tracepoints_ptrs] 0xffffffffc02f1cd0 >> >> >> > > [15 .smp_locks] 0xffffffffc042b2cc >> >> >> > > [1 .rodata.cst16.enc] 0xffffffffc0498420 >> >> >> > > [11 __ksymtab_gpl] 0xffffffffc042b028 >> >> >> > > [8 __ex_table] 0xffffffffc04f13f4 >> >> >> > > [1 .init.rodata] 0xffffffffc0316000 >> >> >> > > [36 .note.gnu.build-id] 0xffffffffc03ed000 >> >> >> > > [1 .rodata.cst16.dec] 0xffffffffc0498410 >> >> >> > > [16 .parainstructions] 0xffffffffc03ed940 >> >> >> > > [8 .text..refcount] 0xffffffffc04e2aaa >> >> >> > > [36 .gnu.linkonce.this_module] 0xffffffffc03f12c0 >> >> >> > > [2 __bpf_raw_tp_map] 0xffffffffc03054a0 >> >> >> > > [30 .orc_unwind_ip] 0xffffffffc03ee9f9 >> >> >> > > [8 .altinstr_replacement] 0xffffffffc0497372 >> >> >> > > [26 .rodata.str1.8] 0xffffffffc03ed1f0 >> >> >> > > [11 __verbose] 0xffffffffc05c9398 >> >> >> > > [1 .rodata.cst16.TWOONE] 0xffffffffc0498380 >> >> >> > > [1 uevent] KEY=402000000 3803078f800d001 feffffdfffefffff fffffffffffffffe >> >> >> > > [1 .rodata.cst16.ONE] 0xffffffffc04983e0 >> >> >> > > [8 .altinstructions] 0xffffffffc0498430 >> >> >> > > [36 modules] crct10dif_pclmul 16384 1 - Live 0xffffffffc03f4000 >> >> >> > > [1 ___srcu_struct_ptrs] 0xffffffffc03840d0 >> >> >> > > >> >> >> >> This list of "leaked" memory seems to include the __tracepoint_ptrs >> >> as well. So at least you seem to have the same behavior as the tracepoint >> >> code, which was your source of inspiration for this implementation, >> >> which is a good start. >> >> >> >> So the remaining question is: is this memory allocated for module sections >> >> really leaked for each module, or is it an issue with memory allocation >> >> tracking ? >> > > > It looks to me like this has nothing to do with memory allocation. This is > the leaking_addresses.pl script isn't it? It basically finds out if > any /proc filesystem entries or dmesg lines have kernel addresses which could > be "leaking" into userspace. I have no idea which filesystem entries leak > these addresses. > > This commit that introduced the script is: > > commit 136fc5c41f349296db1910677bb7402b0eeff376 > Author: Tobin C. Harding > Date: Mon Nov 6 16:19:27 2017 +1100 > > scripts: add leaking_addresses.pl > > Currently we are leaking addresses from the kernel to user space. This > script is an attempt to find some of those leakages. Script parses > `dmesg` output and /proc and /sys files for hex strings that look like > kernel addresses. Then I suspect we have a likely culprit here: root@thinkos:/sys# cat /sys/module/*/sections/__tracepoints_ptrs 0xffffffffc07865c0 0xffffffffc0bad3e8 0xffffffffc0b19808 0xffffffffc0847b80 0xffffffffc0ea7078 0xffffffffc07cb260 0xffffffffc0f32038 0xffffffffc055cc68 0xffffffffc10b1970 0xffffffffc0a209f0 0xffffffffc0612a00 0xffffffffc041df40 0xffffffffc0abe6a8 0xffffffffc09fb688 0xffffffffc0ce8c58 0xffffffffc08b7660 0xffffffffc092bd28 0xffffffffc04ccc90 Which seems to be a "feature" from module.c. Thanks, Mathieu > > thanks, > > - Joel -- Mathieu Desnoyers EfficiOS Inc. http://www.efficios.com