Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp3274546pxj; Mon, 7 Jun 2021 06:49:35 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyvOBrBbAAwMLILS7ClOB+5TvifbRZiwsE0kr8h/SrmuvcN01VBAkyN3PYRaLWnlDQ8z8RJ X-Received: by 2002:aa7:dc12:: with SMTP id b18mr20031009edu.52.1623073775374; Mon, 07 Jun 2021 06:49:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623073775; cv=none; d=google.com; s=arc-20160816; b=gjdHUiF/+kdlErIk/AFLJtKQSjY/GMKge9DZJ87pMHRYicwLxJ7ri6WfPZzilk4ZBI VSW89Bz8SvrCPnSPdyciN//LNTbGCxajFA3ekmO+49nJBlywnWWi6bfeEEKDXmdbGfBa lOvcIg4W4TouDO7hCbQ+8pU7joceasu5ch6U/++kQyDuHxTIT87prT2Rr/z7gdwfu396 vmsIA3aSU3g9H1VFVPQCuH/tg/rxU0vdPGCIEYJ/I7yKb98MrJRGqd2OdF4CX/9FUdOL /ncTS2VfV2h4fxk8vhO4ei6YPBSR/jiDVrNjWJT9BAiwLnlnbMvfavaPRqPd2BFYQf/K vldQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to :mime-version:user-agent:date:message-id:from:references:cc:to :subject; bh=phooyOqN7XvbFg9Lc23VdSpkXpViRS8ZIeiZVDcpqus=; b=kA16vcF78SXMkVbk6Dtj5mN7NAmhiAnwyqdJdbUhW0jIcj8ypE3rWdO4vV3nSJU/VX M08K0Ci/6GfLLvplc8pJQjkJViLi+soH1tblJXJ/cnj7rVnFNHSdBXePJPpJjkKQcYDl Ev8X+Clen4df2//+An1aHvgKWS8OENKQ7FRWnVN2g1BqNDuhknnpDKh9X2hMpS+hNyqp nVi6ivbCO07blThKROmNA/OVudoVfW23XF4QhuxJha3VWFsOUpJNlL/YNtsSUa9t/RdO tH83E0NKcSwVebT+mmmwpZJ1Gs6OAmZbF9EYkxpNVnDkdWlpHAR21I9WFsW4zn/DVbzG IKcw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f13si175879edr.531.2021.06.07.06.49.12; Mon, 07 Jun 2021 06:49:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230220AbhFGNr5 (ORCPT + 99 others); Mon, 7 Jun 2021 09:47:57 -0400 Received: from out30-132.freemail.mail.aliyun.com ([115.124.30.132]:46992 "EHLO out30-132.freemail.mail.aliyun.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230177AbhFGNr4 (ORCPT ); Mon, 7 Jun 2021 09:47:56 -0400 X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R571e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01e01424;MF=jnwang@linux.alibaba.com;NM=1;PH=DS;RN=10;SR=0;TI=SMTPD_---0UbemA7z_1623073562; Received: from B-VE2WML7H-1820.local(mailfrom:jnwang@linux.alibaba.com fp:SMTPD_---0UbemA7z_1623073562) by smtp.aliyun-inc.com(127.0.0.1); Mon, 07 Jun 2021 21:46:03 +0800 Subject: Re: [PATCH] tracing: Correct the length check which causes memory corruption To: Liangyan , linux-kernel@vger.kernel.org, Steven Rostedt , Ingo Molnar Cc: Xunlei Pang , yinbinbin@alibabacloud.com, wetp , stable@vger.kernel.org, Greg Kroah-Hartman , Linus Torvalds References: <20210607125734.1770447-1-liangyan.peng@linux.alibaba.com> From: James Wang Message-ID: <71fa2e69-a60b-0795-5fef-31658f89591a@linux.alibaba.com> Date: Mon, 7 Jun 2021 21:46:02 +0800 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:78.0) Gecko/20100101 Thunderbird/78.10.2 MIME-Version: 1.0 In-Reply-To: <20210607125734.1770447-1-liangyan.peng@linux.alibaba.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi list, The originally reproduce command could help you to verify quickly; #!/bin/bash stress-ng --all 2  --class filesystem -x chattr,chdir,chmod,chown,symlink,sync-file,utime,verity,xattr --log-file ./stress.log After inspection, I believe this key stressor should be: stress-ng  --dirdeep 10 It will create a lots of files that with very long PATH; It could make some of OOB issue; My test box is ~100cores Intel platform. James 在 2021/6/7 PM8:57, Liangyan 写道: > We've suffered from severe kernel crashes due to memory corruption on > our production environment, like, > > Call Trace: > [1640542.554277] general protection fault: 0000 [#1] SMP PTI > [1640542.554856] CPU: 17 PID: 26996 Comm: python Kdump: loaded Tainted:G > [1640542.556629] RIP: 0010:kmem_cache_alloc+0x90/0x190 > [1640542.559074] RSP: 0018:ffffb16faa597df8 EFLAGS: 00010286 > [1640542.559587] RAX: 0000000000000000 RBX: 0000000000400200 RCX: > 0000000006e931bf > [1640542.560323] RDX: 0000000006e931be RSI: 0000000000400200 RDI: > ffff9a45ff004300 > [1640542.560996] RBP: 0000000000400200 R08: 0000000000023420 R09: > 0000000000000000 > [1640542.561670] R10: 0000000000000000 R11: 0000000000000000 R12: > ffffffff9a20608d > [1640542.562366] R13: ffff9a45ff004300 R14: ffff9a45ff004300 R15: > 696c662f65636976 > [1640542.563128] FS: 00007f45d7c6f740(0000) GS:ffff9a45ff840000(0000) > knlGS:0000000000000000 > [1640542.563937] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > [1640542.564557] CR2: 00007f45d71311a0 CR3: 000000189d63e004 CR4: > 00000000003606e0 > [1640542.565279] DR0: 0000000000000000 DR1: 0000000000000000 DR2: > 0000000000000000 > [1640542.566069] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: > 0000000000000400 > [1640542.566742] Call Trace: > [1640542.567009] anon_vma_clone+0x5d/0x170 > [1640542.567417] __split_vma+0x91/0x1a0 > [1640542.567777] do_munmap+0x2c6/0x320 > [1640542.568128] vm_munmap+0x54/0x70 > [1640542.569990] __x64_sys_munmap+0x22/0x30 > [1640542.572005] do_syscall_64+0x5b/0x1b0 > [1640542.573724] entry_SYSCALL_64_after_hwframe+0x44/0xa9 > [1640542.575642] RIP: 0033:0x7f45d6e61e27 > > James Wang has reproduced it stably on the latest 4.19 LTS. > After some debugging, we finally proved that it's due to ftrace > buffer out-of-bound access using a debug tool as follows: > [ 86.775200] BUG: Out-of-bounds write at addr 0xffff88aefe8b7000 > [ 86.780806] no_context+0xdf/0x3c0 > [ 86.784327] __do_page_fault+0x252/0x470 > [ 86.788367] do_page_fault+0x32/0x140 > [ 86.792145] page_fault+0x1e/0x30 > [ 86.795576] strncpy_from_unsafe+0x66/0xb0 > [ 86.799789] fetch_memory_string+0x25/0x40 > [ 86.804002] fetch_deref_string+0x51/0x60 > [ 86.808134] kprobe_trace_func+0x32d/0x3a0 > [ 86.812347] kprobe_dispatcher+0x45/0x50 > [ 86.816385] kprobe_ftrace_handler+0x90/0xf0 > [ 86.820779] ftrace_ops_assist_func+0xa1/0x140 > [ 86.825340] 0xffffffffc00750bf > [ 86.828603] do_sys_open+0x5/0x1f0 > [ 86.832124] do_syscall_64+0x5b/0x1b0 > [ 86.835900] entry_SYSCALL_64_after_hwframe+0x44/0xa9 > > commit b220c049d519 ("tracing: Check length before giving out > the filter buffer") adds length check to protect trace data > overflow introduced in 0fc1b09ff1ff, seems that this fix can't prevent > overflow entirely, the length check should also take the sizeof > entry->array[0] into account, since this array[0] is filled the > length of trace data and occupy addtional space and risk overflow. > > Cc: stable@vger.kernel.org > Fixes: b220c049d519 ("tracing: Check length before giving out the filter buffer") > Signed-off-by: Liangyan > Reviewed-by: Xunlei Pang > Reviewed-by: yinbinbin > Reviewed-by: Wetp Zhang > Tested-by: James Wang > Cc: Xunlei Pang > Cc: Greg Kroah-Hartman > --- > kernel/trace/trace.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/kernel/trace/trace.c b/kernel/trace/trace.c > index a21ef9cd2aae..9299057feb56 100644 > --- a/kernel/trace/trace.c > +++ b/kernel/trace/trace.c > @@ -2736,7 +2736,7 @@ trace_event_buffer_lock_reserve(struct trace_buffer **current_rb, > (entry = this_cpu_read(trace_buffered_event))) { > /* Try to use the per cpu buffer first */ > val = this_cpu_inc_return(trace_buffered_event_cnt); > - if ((len < (PAGE_SIZE - sizeof(*entry))) && val == 1) { > + if ((len < (PAGE_SIZE - sizeof(*entry) - sizeof(entry->array[0]))) && val == 1) { > trace_event_setup(entry, type, trace_ctx); > entry->array[0] = len; > return entry;