Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp4218241pxf; Tue, 16 Mar 2021 08:16:42 -0700 (PDT) X-Google-Smtp-Source: ABdhPJylDg4DQSfCZ62Y8qYWTyU33MSIw06yKUM/LPAKpUdoTcUGakH50qmMP7Ui5Um6pXqCnFDm X-Received: by 2002:a17:906:c301:: with SMTP id s1mr29645736ejz.382.1615907802156; Tue, 16 Mar 2021 08:16:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1615907802; cv=none; d=google.com; s=arc-20160816; b=QP4O/sO+mDlcRIp1n8onoTHBAhL3a9scK1XqLoJ7j/mOG03y8azCHNV52qoeJQP/sP zkeVw38duDGaaMFUuq+VEUPUGwvCRUWQDjBEUditshDGPXsn2NTvcrUHr8ug7dY5ige7 Wm2Abrjwh/hBAycU3EoAzF/GUKktjIRVqFPlSokBMlfUnfDCu/fMBorlNgnQdf17MJqN jrtF+5AnBIdNK+KDlXs49cOCDYQOdcwU+l++/yafnfH1Ne5wm9lmKG3j9jhdcrJUF3KZ 9M0oXYPcg95+FSoM6nWABM/+urGIuqWd0TDH58BbJac1ir6aB3bC/3VG9kzn5YxQDIU1 C0ig== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version; bh=IlcUbj5XN3wioHhn4zH7OXnWWyB1G4bbkakZamrVuu0=; b=tSfAiqcXB51UJFiDbhuxo5dfCNd4xcwSilTXy30fNY8ijU4RlKhhoKOIWh5MAV4mZ7 wCP6TfsO0i21K/mkQDfV4NohDzQ1daxEpNZBw1CM3OvqlVAOz0Yfk2yvfIpHeA7xb0Aa SknF9fNOY07QuH70Pbte1Z7O+lbra9wt4+jH44qQ0bXM41OmoI4M+Uv08gNRCjCunEIP Vq8aY1q8caQeC8gEpJBMjRVDYUneHOJdEdZvOCGXziAUx3vDFzKO2mDSUhsboygDQ1yI x3/mAN9eaBZ7ZL5fBisXc16W4gUxF1vnXfRZK+u7uymB4Ms5YfuF1WqrPVw/oTgfY3Cj /YHw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g4si6328198ejx.700.2021.03.16.08.16.19; Tue, 16 Mar 2021 08:16:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236223AbhCPKDJ (ORCPT + 99 others); Tue, 16 Mar 2021 06:03:09 -0400 Received: from mout.kundenserver.de ([212.227.17.13]:37841 "EHLO mout.kundenserver.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236228AbhCPKCu (ORCPT ); Tue, 16 Mar 2021 06:02:50 -0400 Received: from mail-oi1-f180.google.com ([209.85.167.180]) by mrelayeu.kundenserver.de (mreue109 [213.165.67.113]) with ESMTPSA (Nemesis) id 1M6DSo-1lJvkV34XY-006gYF for ; Tue, 16 Mar 2021 11:02:47 +0100 Received: by mail-oi1-f180.google.com with SMTP id v192so29952080oia.5 for ; Tue, 16 Mar 2021 03:02:47 -0700 (PDT) X-Gm-Message-State: AOAM531n21IrRWgHnkh1mMCl5Z4QeCNkp9pwHtAuLrdR7IMwNQyjz3Lg ML2mi2gUD5bENsoj9DOeDT+SrwC3hPTYKHZRZZY= X-Received: by 2002:a05:6808:3d9:: with SMTP id o25mr2915607oie.4.1615888966485; Tue, 16 Mar 2021 03:02:46 -0700 (PDT) MIME-Version: 1.0 References: <00000000000069802205bda22b7f@google.com> In-Reply-To: From: Arnd Bergmann Date: Tue, 16 Mar 2021 11:02:29 +0100 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [syzbot] kernel panic: corrupted stack end in openat To: Dmitry Vyukov Cc: syzbot , Russell King - ARM Linux , Linus Walleij , Linux ARM , Andrew Morton , LKML , Linux-MM , syzkaller-bugs Content-Type: text/plain; charset="UTF-8" X-Provags-ID: V03:K1:y9JUqt5bJpWbp5GO62rcqqmFUkOLAcxSn1DwmeHgb5HjAsGLJn8 sgaHjeiv41FLxrKd/uuN/ubtWGaruoijKSJ/Xqgqh5idy7FIipXvrFIY2SDZdLfCmMfyfyU 4qwDYDpjSNSJkpe6C2ZmjCyeLJanS6t6gVwBWZtA27dgFy9FLgmgAT2czOSOeGhqUHCf44y eZyIfSuuPGVCSLD4FmlMw== X-Spam-Flag: NO X-UI-Out-Filterresults: notjunk:1;V03:K0:cDV3J6L76Vo=:w/IaYkw2lW2sdy/QY8cUAB lzJn0wFZQtqNgaHeYapqS193/lV0boNCEEjL5ebz2srPSikFm859ifu4c9tgreUYF7NM0Aq/e gYf0iPoyAgDj9TLLxZOSh7y4JrCu2XwofYmbAM8qgx/niXDVJeL1p6D8pa62ulzgW51Ev5pX1 g5CXCVFUX0O4dFlGGWhbpwvNadrvGCTBZkWwAeStEBd1YmMsePu3Bdsye5VS+IFOXnnGcLMzH qm1n6SUb9F3SV/IPMH2+5JKXLtJWuuiMg0MMLe8WjbPymsFAkuJNf5RaIX+6JEd3deo4SWDC5 Uj0kI4k0oAH+w78CFDM1E/CLrp5Edz7NxVw6RLxL2DbDjbwxt1dYqac8veRHQkaTaAe3PSK+p IYpKiK44dIOkbuCXCEvRdl+Axn9WY2AGihp86tuoZEokA3Qo34iVUV6Xua36y Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Mar 16, 2021 at 8:59 AM Dmitry Vyukov wrote: > > On Tue, Mar 16, 2021 at 8:18 AM syzbot > wrote: > > > > Hello, > > > > syzbot found the following issue on: > > > > HEAD commit: 1e28eed1 Linux 5.12-rc3 > > git tree: upstream > > console output: https://syzkaller.appspot.com/x/log.txt?x=167535e6d00000 > > kernel config: https://syzkaller.appspot.com/x/.config?x=e0cee1f53de33ca3 > > dashboard link: https://syzkaller.appspot.com/bug?extid=0b06ef9b44d00d600183 > > userspace arch: arm > > > > Unfortunately, I don't have any reproducer for this issue yet. > > > > IMPORTANT: if you fix the issue, please add the following tag to the commit: > > Reported-by: syzbot+0b06ef9b44d00d600183@syzkaller.appspotmail.com > > +arm32 maintainer > I think this is a real stack overflow on arm32, the stack is indeed deep. Nice find. I see there was already a second report, so it seems to be reproducible as well. If you are able to trigger this reliably, you could try printing the frame pointer while unwinding to see what is actually going on: --- a/arch/arm/kernel/traps.c +++ b/arch/arm/kernel/traps.c @@ -68,8 +68,8 @@ void dump_backtrace_entry(unsigned long where, unsigned long from, unsigned long end = frame + 4 + sizeof(struct pt_regs); #ifdef CONFIG_KALLSYMS - printk("%s[<%08lx>] (%ps) from [<%08lx>] (%pS)\n", - loglvl, where, (void *)where, from, (void *)from); + printk("%s[<%08lx>] (%ps) from [<%08lx>] (%pS), frame %08lx\n", + loglvl, where, (void *)where, from, (void *)from, frame); #else printk("%sFunction entered at [<%08lx>] from [<%08lx>]\n", loglvl, where, from); If that doesn't help, I could have a look at the binary to see which functions in the call chain take a lot of stack space, if any. Which exact compiler version do you use for building these kernels? I can try doing a build with the same commit and config. This one function is one that I have seen before when looking at build warnings with KASAN: > > [<8073772c>] (integrity_kernel_read) from [<8073a904>] (ima_calc_file_hash_tfm+0x178/0x228 security/integrity/ima/ima_crypto.c:484) > > [<8073a78c>] (ima_calc_file_hash_tfm) from [<8073ae2c>] (ima_calc_file_shash security/integrity/ima/ima_crypto.c:515 [inline]) > > [<8073a78c>] (ima_calc_file_hash_tfm) from [<8073ae2c>] (ima_calc_file_hash+0x124/0x8b8 security/integrity/ima/ima_crypto.c:572) ima_calc_file_hash_tfm() has a SHASH_DESC_ON_STACK(), which by itself can use up 512 bytes, but KASAN sometimes triples this number. However, I see you do not actually have KASAN enabled, so there is probably more to it. Arnd