Received: by 2002:ad5:4acb:0:0:0:0:0 with SMTP id n11csp3483693imw; Mon, 11 Jul 2022 09:27:17 -0700 (PDT) X-Google-Smtp-Source: AGRyM1s/PbHlrW6lpzwsIZI89kBm+FPH57YeUBIgKscC7fJ2krDglKIrIMwbTA5MDV0xFB4uIile X-Received: by 2002:a05:6a00:1786:b0:528:369c:77fd with SMTP id s6-20020a056a00178600b00528369c77fdmr19520534pfg.76.1657556837649; Mon, 11 Jul 2022 09:27:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1657556837; cv=none; d=google.com; s=arc-20160816; b=mGKTgb1GIgjq+0PoqygVgrfkC3Gxkit5fSuxRMjrDrGNg88AXCVucor3omcy/IKqmN DirpjIlQTISW/u+JnLVGxxaYzc4/kUQ6nvZ58pdvaW3WR2xS7+MNIxA7J0ek42G+GA2r yUMmezSeu+uFMyvyJKUM8tM6zneQcCW8YXCopK+1k1nLzfU2fFKA0P2lWMVywdGJZ02B 8NOloq2OawPrMIJBkk9GApMybprUGA2Cxr8BNJW2fBuD59D9gtQNoO5cIrV4fBe6vne8 aYMp9JaHp4P2HyeDZdPHST3Lav/GAqCcJ56jb5QQEUiP2BBP8sls9ONPEwWQGzWvMk8z 4yTw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-disposition :mime-version:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=qE5Hfv5VCwLSYsk0/A6ehAj58zxnaUA1xN7mzAEjQ1M=; b=kawiPOSDc7rXs7Wv+Vc/CMzNlvyoGtHTgaC/4nvbQZs8HSiWgEinEVB0c7Xw1tkM3o Hqfl/4t+VcoFIEv27ut+c7faZofF8NoLC4SHzy8rIY8TFdLdbe+i6egQThAbvtYIEapG BV4Z1d8Mi4iyPvAGpihbithevcIHPBa7TqrINOUiThJy1BZlte93up3aaEwWUUfaaX3W AiaorRu5KYpCcr03V8i2W1CiTpQom1SQIjbS1C5NAbSsr8VuaFpKO8ztsnB2N0GwPxFJ 5czkYPMLmZmBQGYa0vR38cTXXkxLiUH26NjcAmEr8SXsB1PSQ/E3mygM2U3dktJlKog3 haWw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b="Ljq/N3z8"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id d7-20020a056a0010c700b0052ad5283a4csi3683744pfu.260.2022.07.11.09.27.05; Mon, 11 Jul 2022 09:27:17 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b="Ljq/N3z8"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231703AbiGKQPZ (ORCPT + 99 others); Mon, 11 Jul 2022 12:15:25 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39642 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229594AbiGKQPY (ORCPT ); Mon, 11 Jul 2022 12:15:24 -0400 Received: from mga12.intel.com (mga12.intel.com [192.55.52.136]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C083E77A6B; Mon, 11 Jul 2022 09:15:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1657556123; x=1689092123; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=95nOb3V1KKqq1c3e8OArM4orPLvj7Ko/hX8oKXIFz4k=; b=Ljq/N3z8eR3OnwRkIf3lMGDPeokFlMKp34K4Z2nHLXm8oUiQ/YhZY+44 +k5fjiMjDzNg+1iuR62AbFPEI+j2WfGShIkpcTOudKPwsvXMeC8hoHltL Vgf9X5dyIR7Q7ZPbO+SM58Wmg3F8hBfdNC3FZhCY4/qV3JCOBl3LekMeF kiqt6qyp/XmFdAE25/EABL0SieUkYLCxUWZiDKVFU1tzI2xaiW9bzM3NN 2Bu4bZZNkfQ1EIrJDDtWaQ5U7TywI0daKoLqr3UEWnrC9FZK6gNwiymXO WjsChy/T5LZE8TTVUdqen+ZJPeckq1kqGwYwWbbEM3y4D+1DXdy4Qpk0+ A==; X-IronPort-AV: E=McAfee;i="6400,9594,10405"; a="264485495" X-IronPort-AV: E=Sophos;i="5.92,263,1650956400"; d="scan'208";a="264485495" Received: from fmsmga008.fm.intel.com ([10.253.24.58]) by fmsmga106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 11 Jul 2022 09:14:58 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.92,263,1650956400"; d="scan'208";a="652517910" Received: from irvmail001.ir.intel.com ([10.43.11.63]) by fmsmga008.fm.intel.com with ESMTP; 11 Jul 2022 09:14:55 -0700 Received: from newjersey.igk.intel.com (newjersey.igk.intel.com [10.102.20.203]) by irvmail001.ir.intel.com (8.14.3/8.13.6/MailSET/Hub) with ESMTP id 26BGErbR005796; Mon, 11 Jul 2022 17:14:54 +0100 From: Alexander Lobakin To: Andy Shevchenko Cc: Alexander Lobakin , kernel test robot , Yury Norov , Mark Rutland , LKML , Linux Memory Management List , linux-alpha@vger.kernel.org, linux-hexagon@vger.kernel.org, linux-ia64@vger.kernel.org, linux-m68k@lists.linux-m68k.org, linux-s390@vger.kernel.org, linux-sh@vger.kernel.org, linux-arch@vger.kernel.org, lkp@lists.01.org, lkp@intel.com Subject: Re: [bitops] 0e862838f2: BUG:KASAN:wild-memory-access_in_dmar_parse_one_rhsa Date: Mon, 11 Jul 2022 18:13:41 +0200 Message-Id: <20220711161341.21605-1-alexandr.lobakin@intel.com> X-Mailer: git-send-email 2.36.1 In-Reply-To: References: MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Disposition: inline Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-5.0 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_PASS,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Andy Shevchenko Date: Fri, 8 Jul 2022 15:17:40 +0300 > On Thu, Jul 07, 2022 at 10:10:20PM +0800, kernel test robot wrote: > > > > (please be noted we reported > > "[bitops] 001bea109d: BUG:KASAN:wild-memory-access_in_dmar_parse_one_rhsa" > > on > > https://lore.kernel.org/all/YrnGLtDXAveqXGok@xsang-OptiPlex-9020/ > > now we noticed this commit has already been merged into linux-next/master, > > and the issue is still existing. report again FYI) > > > > Greeting, > > > > FYI, we noticed the following commit (built with gcc-11): > > > > commit: 0e862838f290147ea9c16db852d8d494b552d38d ("bitops: unify non-atomic bitops prototypes across architectures") > > https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git master > > > > in testcase: xfstests > > version: xfstests-x86_64-c1144bf-1_20220627 > > with following parameters: > > > > disk: 2pmem > > fs: ext4 > > test: ext4-dax > > ucode: 0x700001c > > > > test-description: xfstests is a regression test suite for xfs and other files ystems. > > test-url: git://git.kernel.org/pub/scm/fs/xfs/xfstests-dev.git > > > > > > on test machine: 16 threads 1 sockets Intel(R) Xeon(R) CPU D-1541 @ 2.10GHz with 48G memory > > > > caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace): > > > > > > > > If you fix the issue, kindly add following tag > > Reported-by: kernel test robot > > > > > > [ 4.668325][ T0] BUG: KASAN: wild-memory-access in dmar_parse_one_rhsa (arch/x86/include/asm/bitops.h:214 arch/x86/include/asm/bitops.h:226 include/asm-generic/bitops/instrumented-non-atomic.h:142 include/linux/nodemask.h:415 drivers/iommu/intel/dmar.c:497) > > [ 4.676149][ T0] Read of size 8 at addr 1fffffff85115558 by task swapper/0/0 > > [ 4.683454][ T0] > > [ 4.685638][ T0] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.19.0-rc3-00004-g0e862838f290 #1 > > [ 4.694331][ T0] Hardware name: Supermicro SYS-5018D-FN4T/X10SDV-8C-TLN4F, BIOS 1.1 03/02/2016 > > [ 4.703196][ T0] Call Trace: > > [ 4.706334][ T0] > > [ 4.709133][ T0] ? dmar_parse_one_rhsa (arch/x86/include/asm/bitops.h:214 arch/x86/include/asm/bitops.h:226 include/asm-generic/bitops/instrumented-non-atomic.h:142 include/linux/nodemask.h:415 drivers/iommu/intel/dmar.c:497) > > [ 4.714272][ T0] dump_stack_lvl (lib/dump_stack.c:107 (discriminator 1)) > > [ 4.718632][ T0] kasan_report (mm/kasan/report.c:162 mm/kasan/report.c:493) > > [ 4.722903][ T0] ? dmar_parse_one_rhsa (arch/x86/include/asm/bitops.h:214 arch/x86/include/asm/bitops.h:226 include/asm-generic/bitops/instrumented-non-atomic.h:142 include/linux/nodemask.h:415 drivers/iommu/intel/dmar.c:497) > > [ 4.728042][ T0] kasan_check_range (mm/kasan/generic.c:190) > > [ 4.732750][ T0] dmar_parse_one_rhsa (arch/x86/include/asm/bitops.h:214 arch/x86/include/asm/bitops.h:226 include/asm-generic/bitops/instrumented-non-atomic.h:142 include/linux/nodemask.h:415 drivers/iommu/intel/dmar.c:497) > > [ 4.737715][ T0] dmar_walk_remapping_entries (drivers/iommu/intel/dmar.c:609) > > [ 4.743375][ T0] parse_dmar_table (drivers/iommu/intel/dmar.c:671) > > [ 4.748079][ T0] ? dmar_table_detect (drivers/iommu/intel/dmar.c:633) > > [ 4.752872][ T0] ? dmar_free_dev_scope (drivers/iommu/intel/dmar.c:408) > > [ 4.758010][ T0] ? init_dmars (drivers/iommu/intel/iommu.c:3359) > > [ 4.762370][ T0] ? iommu_resume (drivers/iommu/intel/iommu.c:3419) > > [ 4.766903][ T0] ? dmar_walk_dsm_resource+0x300/0x300 > > [ 4.772909][ T0] ? dmar_acpi_insert_dev_scope (drivers/iommu/intel/dmar.c:466) > > [ 4.778655][ T0] ? dmar_check_one_atsr (drivers/iommu/intel/iommu.c:3521) > > [ 4.783795][ T0] dmar_table_init (drivers/iommu/intel/dmar.c:846) > > [ 4.788239][ T0] intel_prepare_irq_remapping (drivers/iommu/intel/irq_remapping.c:742) > > [ 4.793811][ T0] irq_remapping_prepare (drivers/iommu/irq_remapping.c:102) > > [ 4.798778][ T0] enable_IR_x2apic (arch/x86/kernel/apic/apic.c:1928) > > [ 4.803395][ T0] default_setup_apic_routing (arch/x86/kernel/apic/probe_64.c:25 (discriminator 1)) > > [ 4.808883][ T0] apic_intr_mode_init (arch/x86/kernel/apic/apic.c:1446) > > [ 4.813761][ T0] x86_late_time_init (arch/x86/kernel/time.c:101) > > [ 4.818467][ T0] start_kernel (init/main.c:1101) > > [ 4.822827][ T0] secondary_startup_64_no_verify (arch/x86/kernel/head_64.S:358) > > Seems like related to nodemask APIs. It points to arch_test_bit() (node_online() -> test_bit()), converted from a macro to a function, more precisely, to variable_test_bit(), which I didn't touch. ...oh ok I got it! pxm_to_node() can return %NUMA_NO_NODE which equals to -1. The mentioned commit converts the macro to the function which now takes `unsigned long` as @nr (bit number). So I guess it gets converted to %ULONG_MAX - 1. Now the question is: what should a bitop do if we have negative bit number? Because there are 2 solutions: 1. (I prefer it) A caller must check that bitop arguments are valid. UB for negative (== too big) bit numbers. dmar_parse_one_rhsa() must be fixed so that it will check return value of pxm_to_node(): int node = pxm_to_node(rhsa->proximity_domain); - if (!node_online(node)) + if (node != NUMA_NO_NODE && !node_online(node)) node = NUMA_NO_NODE; 2. My code is broken, I shouldn't change `long` to `unsigned long` or should change it for {constant,variable}_test_bit() as well or do something else and let it behave as it was previously (it wasn't crashing probably due to a good luck or...). > > -- > With Best Regards, > Andy Shevchenko Thanks, Olek