Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp594822pxb; Wed, 27 Jan 2021 16:10:36 -0800 (PST) X-Google-Smtp-Source: ABdhPJzMo5FPYK9Ih9/qDeKL9q4fUfPa8wsFC3Ri4Ll3dP6MJcKQbTeNJpBPIN5kI8rczMRG8ecy X-Received: by 2002:a05:6402:220e:: with SMTP id cq14mr11269287edb.240.1611792635971; Wed, 27 Jan 2021 16:10:35 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1611792635; cv=none; d=google.com; s=arc-20160816; b=S9W8nytuuByO6rYGHwUAypkU8ahqoQ2eNzZQVBBlunub0drzadV/E0pY7phKtmhaHw JwwCX+m7tGV79MbRuUe5gHYYRf5QrTMw8Jt7em+2hyrkCPSyrizDriaJW7bfDTnLfW7x rji8Z1Pc9jpasvc5npImw3FX8jfKIQR7l22jfr7QgppvfOmUJNzTzhLeIh+jpLl9qiiz gzC1t7jwCkdqbt3FbsyyS6mlvv22MipAfoUJjnB+gHZz0CUZ8S++ESqEfRgFGWLGKYDY xN5zJ5IBYYTOvsQydesQpq48htoKTyg6lbc59313+QLLipVCIpdQfw1Ia2pf5IEZMbUM uHEQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=wm+vn9jXrk5pu9DowH7fSPaZVhmZIy0BNatJWpTDGGs=; b=XWzMOb+jmPk/53t4BZT1pAu/V7bMwiSyz6YjYY9dAZ4eS9V/LM0x0WFPXBv0PbFoMD iOAWzLe8j9+rvz8EGjRbp/F8tDi3go9acukwsCGsTRF0Bg+duJJVGtDTNyCnfvYb9rcA +4j0nv+3EXtPXAVPmzCAOpWq75+ZBepB6GdOH5J5UxKf7El+lXt3SP658iXmFaqF8t5H zNRUoIbaK2dCABoVFOgBlFNYaGnLbhYtsYALx41rWcPBW8CU2Ic91m1pq1ImVlrIUhbI Iux+/TBaVOnhLHqfXV9n3pbKfL7hUOy9pLBPzzHHA7sNCWMRQ9jed7aFw7AN06Si0GDd Sh1g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=KCJaJjgM; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y1si1542476ejl.489.2021.01.27.16.10.11; Wed, 27 Jan 2021 16:10:35 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=KCJaJjgM; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344019AbhA0Rg1 (ORCPT + 99 others); Wed, 27 Jan 2021 12:36:27 -0500 Received: from mail.kernel.org ([198.145.29.99]:44284 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1344006AbhA0Rfd (ORCPT ); Wed, 27 Jan 2021 12:35:33 -0500 Received: by mail.kernel.org (Postfix) with ESMTPSA id 7B8F664DA8; Wed, 27 Jan 2021 17:34:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1611768892; bh=i6kHf86hLpvjWynPpLsneLVR/FYqJtB9g8RT/GX0Tr8=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=KCJaJjgMjSKyieVO4eEAN41pY0xDAHjHDuSNqLlL1y8IyCp4pOivok0N64T+pGuoG YOIwWAGMYTesWPQGD8fy4jIbOKv7Ff3DS5zx5cPNZeKF1o/UyUB7YaMdceXQKjCUIq HL0a5tMHZqR5Semz3f9IV5y7YKMBBZQdMRO9b+whKhLNB63Mcki+Yv9+Z+Qq8FQK8m IGMRZfctb0V8GL/TP2f4xvNIHkkJigJY1QYzxBZ/WRhwvsDjCDgRGGi1oqPQ7zDrID 6dMxH9pcl+f92uoBH1Y+dop6c2AFhp73c/p1sqIMeEujgco1WvQ0YwzC5+NY9FID6D oAcnESnPja+rg== Date: Wed, 27 Jan 2021 17:34:47 +0000 From: Will Deacon To: Dmitry Vyukov Cc: syzbot , Dave Martin , Catalin Marinas , Linux ARM , LKML , Mark Rutland , syzkaller-bugs , Andrey Konovalov Subject: Re: WARNING in __do_kernel_fault Message-ID: <20210127173446.GE358@willie-the-truck> References: <0000000000009bbb7905b9e4a624@google.com> <20210127171453.GC358@willie-the-truck> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jan 27, 2021 at 06:24:22PM +0100, Dmitry Vyukov wrote: > On Wed, Jan 27, 2021 at 6:15 PM Will Deacon wrote: > > > > On Wed, Jan 27, 2021 at 06:00:30PM +0100, Dmitry Vyukov wrote: > > > On Wed, Jan 27, 2021 at 5:56 PM syzbot > > > wrote: > > > > > > > > Hello, > > > > > > > > syzbot found the following issue on: > > > > > > > > HEAD commit: 2ab38c17 mailmap: remove the "repo-abbrev" comment > > > > git tree: upstream > > > > console output: https://syzkaller.appspot.com/x/log.txt?x=15a25264d00000 > > > > kernel config: https://syzkaller.appspot.com/x/.config?x=ad43be24faf1194c > > > > dashboard link: https://syzkaller.appspot.com/bug?extid=45b6fce29ff97069e2c5 > > > > userspace arch: arm64 > > > > > > > > Unfortunately, I don't have any reproducer for this issue yet. > > > > > > > > IMPORTANT: if you fix the issue, please add the following tag to the commit: > > > > Reported-by: syzbot+45b6fce29ff97069e2c5@syzkaller.appspotmail.com > > > > > > This happens on arm64 instance with mte enabled. > > > There is a GPF in reiserfs_xattr_init on x86_64 reported: > > > https://syzkaller.appspot.com/bug?id=8abaedbdeb32c861dc5340544284167dd0e46cde > > > so I would assume it's just a plain NULL deref. Is this WARNING not > > > indicative of a kernel bug? Or there is something special about this > > > particular NULL deref? > > > > Congratulations, you're the first person to trigger this warning! > > > > This fires if we take an unexpected data abort in the kernel but when we > > get into the fault handler the page-table looks ok (according to the CPU via > > an 'AT' instruction). Are you using QEMU system emulation? Perhaps its > > handling of AT isn't quite right. > > Yes, it's qemu-system-aarch64 5.2 with -machine virt,mte=on -cpu max. > Do you see any way forward for this issue? Can somehow prove/disprove > it's qemu at fault? > The instance just started running, but it seems to be the most common > crash so far and it seems to happen on _all_ gpf's. > You can see all arm64 crashes so far here: > https://syzkaller.appspot.com/upstream?manager=ci-qemu2-arm64-mte > They all happen in reiserfs_security_init, but locally I got a bunch > of different stacks, e.g.: Your best bet is to hack is_spurious_el1_translation_fault() to dump addr, es and par, then we can help decipher the logs here. It could also easily be a bug in that code, since it hasn't been run before (well, other than contrived testing when I wrote it). Will