Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp8265978ybc; Fri, 29 Nov 2019 07:53:04 -0800 (PST) X-Google-Smtp-Source: APXvYqwW0HfmZA97fmTrSPxWBGe1lyiVs5syUm7rZ3puy2Q2N467v+pSWKxpwozKvmPPW/wzzIlT X-Received: by 2002:a17:906:934c:: with SMTP id p12mr3261337ejw.68.1575042784104; Fri, 29 Nov 2019 07:53:04 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575042784; cv=none; d=google.com; s=arc-20160816; b=UwAFje5IwtISvFVsZBcCDIDW8/1NaqAUIkB6WeTAb2uzIh3NMrV8Hw3weBIk14VvUc lXFqYkADKvqd8pBzSHr5oLPz1yBhUBBJLB1fVK+sqN9t7X5lWlQX5FhqJy0RZ/FA10lF afYSTDOlW1Pa5/BauxlA5hfaBPIly5zBCZkhabOlHg9t6rzkl0JugI17XYk18u5l9lzX bsmq6sjI0qYKt6pdxSN5W1POrFT39ddcz1ogUeQS52NrfzkloGpwNB/KTWwzy65lBiOy 7wBhNNdKLYI/pCna3xNiuchtGhFOvyHzSiHRbrvMz5Sc9GFwJBJyK5bG9lcAutR4bLkY /O8Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:references :in-reply-to:subject:cc:to:from:dkim-signature; bh=zqzmkmsTqqNqAEU6sqwGU4uvEVY7myANFxGbhNa8Thk=; b=dFG6b78lwe4f7RBnPqirbHsO2xkkrVCcutpgZO22bPuxh/jj1IpuKoinxaQP5Y5vZz LvyCRDJbBp/M+L3GRr9E8vVoYPT0w9XuvsRZTj591ICSYeLCLhDKLWHOI1d5ZmtDToB4 aBATg1XZ8ypv3te7Hw7ZjAyDLolMdt/ADvJhg9ISd6wp5gq3GRaEO2iV1SDbPO7sHXD7 GK9EmOelv+LpP+QBzcQCuCM4RaX+ZF5Q55uq1NepaJ5bnX4jWOGn5XUrcCqDAB3MyylK BlZC8EnpmRrBcoTGue9S9+q33A+qexFs78i6lMIIwRWrgtpa5PtcMVcapMXDbs5QDLkN jnPA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@axtens.net header.s=google header.b=lUT1A0bJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m33si15799721edc.126.2019.11.29.07.52.39; Fri, 29 Nov 2019 07:53:04 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@axtens.net header.s=google header.b=lUT1A0bJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727010AbfK2Put (ORCPT + 99 others); Fri, 29 Nov 2019 10:50:49 -0500 Received: from mail-pg1-f195.google.com ([209.85.215.195]:34894 "EHLO mail-pg1-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726920AbfK2Put (ORCPT ); Fri, 29 Nov 2019 10:50:49 -0500 Received: by mail-pg1-f195.google.com with SMTP id l24so6076763pgk.2 for ; Fri, 29 Nov 2019 07:50:47 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=axtens.net; s=google; h=from:to:cc:subject:in-reply-to:references:date:message-id :mime-version; bh=zqzmkmsTqqNqAEU6sqwGU4uvEVY7myANFxGbhNa8Thk=; b=lUT1A0bJvuFzw968HjdP/fl9rNWARwc0PM4vYA/8yJCbJ/uaimus9hTdblQmfxlQKV Hk3pTRvXK/sBwKVtqmUD9m1Hj5DCnk2axhfyw3w3c/3Smxd9sx0XjgiViLi9GAWsZgST ImILVq57QBkrCOTfxSwjUOt8pRnJQmvRe1mYU= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:in-reply-to:references:date :message-id:mime-version; bh=zqzmkmsTqqNqAEU6sqwGU4uvEVY7myANFxGbhNa8Thk=; b=FddUWicUmO35ObGDePrVnmdIw3MDO2o2eMPV9/ffloJFJBKtRPiSnMepdD0IFyykFZ TzIIS3b337toAVrIlq5GPylbL6aVGLBl9xQAaPvz5uYWLJ8odTz8giKaBUEuu7bQGYtF T/gNmOcYDCWDeaIbs3G4hQDRtei5qqGcKg1FsPVMpk27er2Mr9kXmHljMmH5kGjbzig+ Rbw128VQZMo2fXkNewYn+Ksle0aEPgogE4maYsb9jytnyc+qhrHeWbMDbX0FC0mrwzQG dZL072WBqKYiNy6swytWBR55oAXSOPmXyAzizCOqC2iS9fUp1ZE8E0+LsfIScWEs1vXJ hphw== X-Gm-Message-State: APjAAAXbv1q4AxIv/Y9se2kcnrMrsXvweADTJ6aLuxgCdAGHuzVeSC/Z pKyPdLR5mzitEGKDzHhUW5esOw== X-Received: by 2002:aa7:93a7:: with SMTP id x7mr57797282pff.36.1575042647113; Fri, 29 Nov 2019 07:50:47 -0800 (PST) Received: from localhost (2001-44b8-111e-5c00-4092-39f5-bb9d-b59a.static.ipv6.internode.on.net. [2001:44b8:111e:5c00:4092:39f5:bb9d:b59a]) by smtp.gmail.com with ESMTPSA id a22sm1465829pfk.108.2019.11.29.07.50.45 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 29 Nov 2019 07:50:46 -0800 (PST) From: Daniel Axtens To: Qian Cai Cc: Andrey Ryabinin , Dmitry Vyukov , kasan-dev , Linux-MM , the arch/x86 maintainers , Alexander Potapenko , Andy Lutomirski , LKML , Mark Rutland , Christophe Leroy , linuxppc-dev , Vasily Gorbik , linux-xfs@vger.kernel.org, "Darrick J. Wong" Subject: Re: XFS check crash (WAS Re: [PATCH v11 1/4] kasan: support backing vmalloc space with real shadow memory) In-Reply-To: <27B18BF6-757C-4CA3-A852-1EE20D4D10A9@lca.pw> References: <20191031093909.9228-1-dja@axtens.net> <20191031093909.9228-2-dja@axtens.net> <1573835765.5937.130.camel@lca.pw> <871ru5hnfh.fsf@dja-thinkpad.axtens.net> <952ec26a-9492-6f71-bab1-c1def887e528@virtuozzo.com> <2297c356-0863-69ce-85b6-8608081295ed@virtuozzo.com> <56cf8aab-c61b-156c-f681-d2354aed22bb@virtuozzo.com> <871rtqg91q.fsf@dja-thinkpad.axtens.net> <27B18BF6-757C-4CA3-A852-1EE20D4D10A9@lca.pw> Date: Sat, 30 Nov 2019 02:50:43 +1100 Message-ID: <87y2vyel64.fsf@dja-thinkpad.axtens.net> MIME-Version: 1.0 Content-Type: text/plain Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org >>>>> >>>>> Nope, it's vm_map_ram() not being handled >>>> >>>> >>>> Another suspicious one. Related to kasan/vmalloc? >>> >>> Very likely the same as with ion: >>> >>> # git grep vm_map_ram|grep xfs >>> fs/xfs/xfs_buf.c: * vm_map_ram() will allocate auxiliary structures (e.g. >>> fs/xfs/xfs_buf.c: bp->b_addr = vm_map_ram(bp->b_pages, bp->b_page_count, >> >> Aaargh, that's an embarassing miss. >> >> It's a bit intricate because kasan_vmalloc_populate function is >> currently set up to take a vm_struct not a vmap_area, but I'll see if I >> can get something simple out this evening - I'm away for the first part >> of next week. For crashes in XFS, binder etc that implicate vm_map_ram, see: https://lore.kernel.org/linux-mm/20191129154519.30964-1-dja@axtens.net/ The easiest way I found to repro the bug is sudo modprobe i915 mock_selftest=-1 For lock warns, one that goes through the percpu alloc path, the patch is already queued in mmots. For Dmitry's latest one where there's an allocation in the purge_vmap_area_lazy path that triggers a locking warning, you'll have to wait until next week, sorry. Regards, Daniel