Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp1662885ybl; Thu, 5 Dec 2019 05:11:29 -0800 (PST) X-Google-Smtp-Source: APXvYqx+o18oz4wr5yWXHn8BC1aXg4Yu6SbcWeqU6SESwsfcK9TRCkiJzZpEan1YcTrMsC5pr+wA X-Received: by 2002:a9d:7f12:: with SMTP id j18mr6672041otq.17.1575551489494; Thu, 05 Dec 2019 05:11:29 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575551489; cv=none; d=google.com; s=arc-20160816; b=mK/DMsgWW9XZSUWdoT1MDoNfUsDUic+P2QvWG72HzrdNAxrv1VX5czFCHpZf76IcXX Ch2Q7EKDg7+XfMyAs3eOelWNIRzNRFqbJXbpBbKoxpOvFRYzcCUFTeUXCHMapbOJK5Dl Y407BpMBbwn7qdeaJSJI3dRUZP+3qbjjlF2U+L2C9lfML9c16p1NMCNG5G0++jEVqrGf euG/Vr+ddB0/yJYQ59vqRW2UuQLrEDwQ5+R+VH2UZlhyQrt01tWWFUDa6dw2KdXtl6pl kh2Pd46B3tavK+Pg8Zq1Zvd067W3EtRurS870T1IDFI2Bo+N7bo8lioBYcZshh3AcYnx D0Iw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:references :in-reply-to:subject:cc:to:from:dkim-signature; bh=1shdlwho7hLS2xdM5LPSjSImPuutbJXwb9rmf439njs=; b=zTYW01kaV6cNnxZ+HlA/1/DoFLbh9FWJjRkDpCSA2gev0uQJTY6yAErnx+hYdEyWkQ F+ffwUgZRqtPHbOe3+GNq4bDGHmhUTMD/dKHo9S+y09xVsSwKZE/Wb4RnxvniZL05RHe EHuTDQRHgg8Qsi8mYCSWjzcxLhzM1QuyhbEegQXUgytlosyUcvhGmgIinXuV3VBsbTsJ lV0+rDxZ5k/L9/xgSIN8BfeOnm88b2TrMIguinlK2jJBEVKvXogRYQQdEeENBbMyS4gL +Id+6xuLEiDtoEKvIRzg5o4sYq/z+Q0H7Zi9pijUKDW+dHqoZJUIOR59+zEXCQLKFPG0 5/IQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@axtens.net header.s=google header.b="c/vG+WSN"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 5si2357975ott.186.2019.12.05.05.11.16; Thu, 05 Dec 2019 05:11:29 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@axtens.net header.s=google header.b="c/vG+WSN"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729423AbfLENKr (ORCPT + 99 others); Thu, 5 Dec 2019 08:10:47 -0500 Received: from mail-pl1-f193.google.com ([209.85.214.193]:34288 "EHLO mail-pl1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729109AbfLENKr (ORCPT ); Thu, 5 Dec 2019 08:10:47 -0500 Received: by mail-pl1-f193.google.com with SMTP id h13so1255138plr.1 for ; Thu, 05 Dec 2019 05:10:46 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=axtens.net; s=google; h=from:to:cc:subject:in-reply-to:references:date:message-id :mime-version; bh=1shdlwho7hLS2xdM5LPSjSImPuutbJXwb9rmf439njs=; b=c/vG+WSN5e13KT0FhfKYEO9V2+SoAlvMYYBXfly2hPl+4hcYpbQZyv05fhQYtADcFO NJyEzNgzEakfx3VX18fAMLW8NR5wtr2UfnW6dus3lULbfYarpMlQkwCYhsshxi9J7PYo oDgA/iBpVxG+67lKdv0W4LAbcZBEUvZxqeOlQ= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:in-reply-to:references:date :message-id:mime-version; bh=1shdlwho7hLS2xdM5LPSjSImPuutbJXwb9rmf439njs=; b=l+OKgDo5zhInzOP+U8EBcvseIzDEzh9R0fYEupeF5qUBNlszmgd1mU6OkhAJAOQgz3 hU37qya8Nk8sxtzvTHqPQSoU4Hkl3cHug6c+07ALwYX91F1uaSC8ljgpBVkvA5fyjJLS brUR+Aulf2X3EwP+8PV/qEDJxKXgSxbTFfpyBPgqjYtRmwwFq5lacPTAxFL9hikzSa9p 5tLeauPex7mYORq14iNKJG0JZv1SifxMXGFNGxKfqpf8vG0Ng1hpyzIYtVb/c/tMA7Z/ PUQsEW5YTROjLBtuwjrakZA+DKn9RowsXVVc93r+ZWxcckh/ZomHnKApXOgy4Kecl4Dt Y5bg== X-Gm-Message-State: APjAAAUJuQw075vIDvinpcf2Sex9Qss6CvZ/lz6rYVK3vfi5n2a6lAnA lV0TYzwMFzA3RJA8sO5dNDD+iA== X-Received: by 2002:a17:90a:7784:: with SMTP id v4mr9361713pjk.74.1575551446465; Thu, 05 Dec 2019 05:10:46 -0800 (PST) Received: from localhost (2001-44b8-1113-6700-7daa-d2ea-7edb-cfe8.static.ipv6.internode.on.net. [2001:44b8:1113:6700:7daa:d2ea:7edb:cfe8]) by smtp.gmail.com with ESMTPSA id z64sm12695976pfz.23.2019.12.05.05.10.44 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 05 Dec 2019 05:10:45 -0800 (PST) From: Daniel Axtens To: Daniel Borkmann Cc: Dmitry Vyukov , syzbot , kasan-dev , Andrii Nakryiko , Alexei Starovoitov , bpf , Martin KaFai Lau , LKML , netdev , Song Liu , syzkaller-bugs , Yonghong Song , Andrey Ryabinin Subject: Re: BUG: unable to handle kernel paging request in pcpu_alloc In-Reply-To: <20191205125900.GB29780@localhost.localdomain> References: <000000000000314c120598dc69bd@google.com> <877e3be6eu.fsf@dja-thinkpad.axtens.net> <20191205125900.GB29780@localhost.localdomain> Date: Fri, 06 Dec 2019 00:10:41 +1100 Message-ID: <871rtiex4e.fsf@dja-thinkpad.axtens.net> MIME-Version: 1.0 Content-Type: text/plain Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Daniel Borkmann writes: > On Thu, Dec 05, 2019 at 03:35:21PM +1100, Daniel Axtens wrote: >> >> HEAD commit: 1ab75b2e Add linux-next specific files for 20191203 >> >> git tree: linux-next >> >> console output: https://syzkaller.appspot.com/x/log.txt?x=10edf2eae00000 >> >> kernel config: https://syzkaller.appspot.com/x/.config?x=de1505c727f0ec20 >> >> dashboard link: https://syzkaller.appspot.com/bug?extid=82e323920b78d54aaed5 >> >> compiler: gcc (GCC) 9.0.0 20181231 (experimental) >> >> syz repro: https://syzkaller.appspot.com/x/repro.syz?x=156ef061e00000 >> >> C reproducer: https://syzkaller.appspot.com/x/repro.c?x=11641edae00000 >> >> >> >> IMPORTANT: if you fix the bug, please add the following tag to the commit: >> >> Reported-by: syzbot+82e323920b78d54aaed5@syzkaller.appspotmail.com >> > >> > +Daniel, is it the same as: >> > https://syzkaller.appspot.com/bug?id=f6450554481c55c131cc23d581fbd8ea42e63e18 >> > If so, is it possible to make KASAN detect this consistently with the >> > same crash type so that syzbot does not report duplicates? >> >> It looks like both of these occur immediately after failure injection. I >> think my assumption that I could ignore the chance of failures in the >> per-cpu allocation path will have to be revisited. That's annoying. >> >> I'll try to spin something today but Andrey feel free to pip me at the >> post again :) >> >> I'm not 100% confident to call them dups just yet, but I'm about 80% >> confident that they are. > > Ok. Double checked BPF side yesterday night, but looks sane to me and the > fault also hints into pcpu_alloc() rather than BPF code. Daniel, from your > above reply, I read that you are aware of how the bisected commit would > have caused the fault? Yes, this one is on me - I did not take into account the brutal efficiency of the fault injector when implementing my KASAN support for vmalloc areas. I have a fix, I'm just doing final tests now. Regards, Daniel > > Thanks, > Daniel > > -- > You received this message because you are subscribed to the Google Groups "kasan-dev" group. > To unsubscribe from this group and stop receiving emails from it, send an email to kasan-dev+unsubscribe@googlegroups.com. > To view this discussion on the web visit https://groups.google.com/d/msgid/kasan-dev/20191205125900.GB29780%40localhost.localdomain.