Received: by 2002:a25:683:0:0:0:0:0 with SMTP id 125csp800411ybg; Mon, 1 Jun 2020 15:01:54 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyCt/eIrDO4Xq0jSHs6ClzrcDZXcry3C3LFezPI6r3uINquZ56HWlTmZ6p8LB+D3mqNR21j X-Received: by 2002:a17:906:e47:: with SMTP id q7mr7733911eji.279.1591048913798; Mon, 01 Jun 2020 15:01:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591048913; cv=none; d=google.com; s=arc-20160816; b=YjH7MkF+jl2ZXnz8xS+oxkrc0eeOa/ezmGOfjLFrFyyFSQbX4SucORy3uM/usaqWYb enR+4hoKUID+a32rxf1Hrs6EvHl5G/kNlysJEyHRPqmw5Hla3QDAA6PIRZk7Kzw4snEZ 6piWt9V1tkSB68tTjOec8zqjemKMBvVo3HGzgVzPcwVDiPMAv+vDzAOgdlEKltIG6J72 GMKK6P5ydb46tHj72ZuDAfLbhWMZiI4VIBiwoV8XChkfs1W+mOtdnMHl55c45HyVyQzn b7yF3QITekd3gnADJjT/ZH8VNmxjdptrRizGlViZHVc1YXheqA9u2pNaiDG1y/2xHwjT twfQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=g+qT5CDg1Hl318DfZBqoL7CtK87zn/7lSP+eewgvhWQ=; b=T44DOmwW7w7M1As/9X1Y66NnwtY7C5fUbqXXnP5TlWuEHc8CsYdGncavn6vr6+UDZM met3r/0B9tNXBZZjHJBEbb03GVYltxn/6WFH4038yotDC89ne3Lpxo6NB9fyfYg+EgcK PoQfbEalHonzETaK7CI7p3htY8z1NQLbliVgfrChEPg1aVqPAjEx1QglPsAyd5f+8g1K mZGesBvsdNLeEJ6RAiKtU+qz62eoBRFMoQgjB4FwsSnPKJ8NR/uyrtyo22cAvEwUgCMU Nmn4MYJZl2hWH3QLLmzscxaSsDomnKXSnaxHFjzBlZNWFzn7jjETMjw2Y68uBgVosl/W AgKg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=AFJOoQ8g; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p20si420397ejg.263.2020.06.01.15.01.30; Mon, 01 Jun 2020 15:01:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=AFJOoQ8g; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729883AbgFAV5t (ORCPT + 99 others); Mon, 1 Jun 2020 17:57:49 -0400 Received: from mail.kernel.org ([198.145.29.99]:42906 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729869AbgFAV5s (ORCPT ); Mon, 1 Jun 2020 17:57:48 -0400 Received: from mail-oi1-f177.google.com (mail-oi1-f177.google.com [209.85.167.177]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C1191207BB for ; Mon, 1 Jun 2020 21:57:47 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1591048667; bh=AKFeVvvp8LVyjfTkKWoYziq7hclqKDBIeDN0NgDDkgk=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=AFJOoQ8gFME1wsDJxqLKkWDYmlWfer7cncjhx603warjh/3KBhl88U8m8SSOxSp5G yqjZTPukpoPhptso7/qSJCt3PE69ZEw7OkIFTuAtxNRTmMNTi+QbVT9GtvkMURP0to B9mf9TRFfCNon8nQzjxFUzdz+wN+whMHfw80dxdU= Received: by mail-oi1-f177.google.com with SMTP id s21so1493398oic.9 for ; Mon, 01 Jun 2020 14:57:47 -0700 (PDT) X-Gm-Message-State: AOAM532zDCkxCMiqOJ2D0eU2n++XRWyDGn8mL5PuHu6f0885kMFyc4qw z25zwjNYFKSebvcOYYEB6Qkfcgt+rovooM2Gat0= X-Received: by 2002:aca:b707:: with SMTP id h7mr980564oif.174.1591048667042; Mon, 01 Jun 2020 14:57:47 -0700 (PDT) MIME-Version: 1.0 References: <20200521100952.GA5360@willie-the-truck> <20200521173738.GA29590@e121166-lin.cambridge.arm.com> <20200526202157.GE2206@willie-the-truck> <20200527134104.GA16115@e121166-lin.cambridge.arm.com> <20200601070459.GB8601@willie-the-truck> In-Reply-To: From: Ard Biesheuvel Date: Mon, 1 Jun 2020 23:57:35 +0200 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: arm64/acpi: NULL dereference reports from UBSAN at boot To: Nick Desaulniers Cc: Will Deacon , Lorenzo Pieralisi , Hanjun Guo , "Rafael J. Wysocki" , Linux ARM , LKML , Mark Rutland , Dmitry Vyukov , Alexander Potapenko , Peter Collingbourne Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 1 Jun 2020 at 23:52, Nick Desaulniers wrote: > > On Mon, Jun 1, 2020 at 12:05 AM Will Deacon wrote: > > > > On Wed, May 27, 2020 at 02:41:04PM +0100, Lorenzo Pieralisi wrote: > > > On Tue, May 26, 2020 at 09:21:57PM +0100, Will Deacon wrote: > > > > Hi Lorenzo, Hanjun, [+Nick] > > > > > > > > On Thu, May 21, 2020 at 06:37:38PM +0100, Lorenzo Pieralisi wrote: > > > > > On Thu, May 21, 2020 at 11:09:53AM +0100, Will Deacon wrote: > > > > > > Hi folks, > > > > > > > > > > > > I just tried booting the arm64 for-kernelci branch under QEMU (version > > > > > > 4.2.50 (v4.2.0-779-g4354edb6dcc7)) with UBSAN enabled, and I see a > > > > > > couple of NULL pointer dereferences reported at boot. I think they're > > > > > > both GIC related (log below). I don't see a panic with UBSAN disabled, > > > > > > so something's fishy here. > > > > > > > > > > May I ask you the QEMU command line please - just to make sure I can > > > > > replicate it. > > > > > > > > As it turns out, I'm only able to reproduce this when building with Clang, > > > > but I don't know whether that's because GCC is missing something of Clang > > > > is signalling a false positive. You also don't need all of those whacky > > > > fuzzing options enabled. > > > > > > > > Anyway, to reproduce: > > > > > > > > $ git checkout for-next/kernelci > > > > $ make ARCH=arm64 CC=clang CROSS_COMPILE=aarch64-linux-gnu- defconfig > > > > > > > > $ make ARCH=arm64 CC=clang CROSS_COMPILE=aarch64-linux-gnu- Image > > > > > > > > I throw that at QEMU using: > > > > > > > > qemu-system-aarch64 -M virt -machine virtualization=true \ > > > > -machine virt,gic-version=3 \ > > > > -cpu max,sve=off -smp 2 -m 4096 \ > > > > -drive if=pflash,format=raw,file=efi.img,readonly \ > > > > -drive if=pflash,format=raw,file=varstore.img \ > > > > -drive if=virtio,format=raw,file=disk.img \ > > > > -device virtio-scsi-pci,id=scsi0 \ > > > > -device virtio-rng-pci \ > > > > -device virtio-net-pci,netdev=net0 \ > > > > -netdev user,id=net0,hostfwd=tcp::8222-:22 \ > > > > -nographic \ > > > > -kernel ~/work/linux/arch/arm64/boot/Image \ > > > > -append "earlycon root=/dev/vda2" > > > > > > > > I built QEMU a while ago according to: > > > > > > > > https://mirrors.edge.kernel.org/pub/linux/kernel/people/will/docs/qemu/qemu-arm64-howto.html > > > > > > > > and its version 4.2.50 (v4.2.0-779-g4354edb6dcc7). > > > > > > > > My clang is version 11.0.1. > > > > > > Thanks a lot Will. > > > > > > I *think* I was right - it is the ACPI_OFFSET() macro: > > > > > > #define ACPI_OFFSET(d, f) ACPI_PTR_DIFF (&(((d *) 0)->f), (void *) 0) > > > > > > that triggers the warnings (I suspected it because at least in one of > > > the warnings I could not see any dereference of any dynamically > > > allocated data). > > > > Cheers, Lorenzo. > > > > > Now on what to do with it - thoughts welcome. > > > > Nick -- any idea what to do about the above? The '#define' pasted by > > Lorenzo is causing a couple of spurious UBSAN splats when compiling with > > clang 11. > > If there's undefined behavior from that macro soup, we should be able > to reproduce it outside of the kernel and regardless of target > architecture, right? The macros aren't too much to throw into a file: > > ```foo.c > #define acpi_uintptr_t void * > #define ACPI_CAST_PTR(t, p) ((t *) (acpi_uintptr_t) (p)) > typedef unsigned char u8; > typedef unsigned long u64; > typedef u64 acpi_size; > #define ACPI_PTR_DIFF(a, b) ((acpi_size) (ACPI_CAST_PTR (u8, (a)) - > ACPI_CAST_PTR (u8, (b)))) > #define ACPI_OFFSET(d, f) ACPI_PTR_DIFF (&(((d *) 0)->f), (void *) 0) > > struct foo { > unsigned char bar; > int baz; > }; > > int main() { > return ACPI_OFFSET(struct foo, baz); > } > ``` > I think looks right. If we run that through -E, and clean that up > further, we get: > ```bar.c > typedef unsigned char u8; > typedef unsigned long u64; > > struct foo { > unsigned char bar; > int baz; > }; > > int main() { > return ((u64) (((u8 *) (void *) ((&(((struct foo *) 0)->baz)))) - ((u8 > *) (void *) (((void *) 0))))); > } > ``` > I may be miscounting my parentheses, but how do you take the address > of `type`->`member`? What does that even mean? > > + some more sanitizer folks and Ard for ACPI. > > anyways, running foo.c through a compiler: > $ clang -O2 foo.c -fsanitize=undefined > $ ./a.out > foo.c:15:12: runtime error: member access within null pointer of type > 'struct foo' > SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior foo.c:15:12 in > > (msg looks truncated, wtf) > > Anyways, it looks like the address of member from NULL subexpression > looks problematic. I wonder if offsetof can be used here? > > #define ACPI_OFFSET(d, f) ACPI_PTR_DIFF (offsetof(d, f), (void *) 0) > > Seems to work in my basic test case. Untested in the kernel. > > IIUC, ACPI_OFFSET is trying to calculate the difference between the > offset of a member of a struct and 0? Isn't that the tautology `x - 0 > == x`? No. ACPI_OFFSET() is just a poor person's version of offsetof(). (Note that it calculates the difference between &(((d *) 0)->f) and (void *)0x0, so the 0x0 term is there on both sides)