Received: by 2002:a05:6359:c8b:b0:c7:702f:21d4 with SMTP id go11csp1258683rwb; Tue, 27 Sep 2022 10:24:16 -0700 (PDT) X-Google-Smtp-Source: AMsMyM7EYgQkO9/pC7ff7cLufMqf3yHe+OZ5+LNAIo7IcU3uwpVF0M6aG+BlWFCgvU0fjqZuJlMY X-Received: by 2002:a17:902:be0b:b0:179:f94b:5690 with SMTP id r11-20020a170902be0b00b00179f94b5690mr1966930pls.146.1664299455734; Tue, 27 Sep 2022 10:24:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1664299455; cv=none; d=google.com; s=arc-20160816; b=KtwWOcX/KL0qECw5CJBK+OzyLA4cU66xuXH1iXgxsJI7t9s2FUCixqE9L0ttog44SF Gd08eODJMCEXeEOI0NtNDEyWMmoj8Q2uvRyIM712rQqqBxSeO06XmIiq0NU+aA+RtHCb XK5hxnoEuMqBllGMAh8Q++QNF0NVm42bysgsrs8AGCFLIcGX8HdHmiI1EUD9j1O1vC8+ kcHFWeK1YVl1OJ9hVDHezcjUKF0KHTk8+y3dGjyvjbr+05qa3TgGGvB2zIZ06wKLJRNj O3cWIgnBdCEWuYeFZ9ZQLEK7UKKpBJbU3lNgcQ9jrq0XeVh+sdarS2sGTfOz0BrSvAIf kzJw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=OsRxyvAnPbJINHsqDJOAOdVVGQpFFWbztg0hEari6CQ=; b=LIHyDjRFiZvxE7riOwBMbCdAtowpzMPylAeAdRv416ewEgo3Ce9G9IXPpHXnpfNQ2Z jViRGesurZfXttF0f3k9yjWo7icjk+LiD025JGxUR8g8hnhkNKvQsurwLgpzstmVATxc Q3hzEDmZzE/DEjQWeR4itXiM74WuWk66lx9TN0+NoFs2j/Kuq9cuStRrFwcRRxZthD8X VUlk1WallYiHdPPblPYckMfIqdAqMSPjXEm79tB2w3t7nH6ymsBF4pNIvzkXtOGKO+U6 ClsJFLhUseCUhTnl+joQnlExDNJxcFAE25ZmwQ0AZzLb/U63ITlToiqU0DEt+XEixbGo Egcg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=og5ZIfxp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id j14-20020a170903024e00b00172696f35e1si2677289plh.482.2022.09.27.10.24.03; Tue, 27 Sep 2022 10:24:15 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=og5ZIfxp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232906AbiI0Q4l (ORCPT + 99 others); Tue, 27 Sep 2022 12:56:41 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40112 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232384AbiI0Q4A (ORCPT ); Tue, 27 Sep 2022 12:56:00 -0400 Received: from mail-qt1-x82f.google.com (mail-qt1-x82f.google.com [IPv6:2607:f8b0:4864:20::82f]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 404B456B96 for ; Tue, 27 Sep 2022 09:55:34 -0700 (PDT) Received: by mail-qt1-x82f.google.com with SMTP id a20so6392619qtw.10 for ; Tue, 27 Sep 2022 09:55:34 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date; bh=OsRxyvAnPbJINHsqDJOAOdVVGQpFFWbztg0hEari6CQ=; b=og5ZIfxp2QlBMoHAcPkqgBIihTOf1EBA+NkwUg9jRwG0/tUPbAFVNJ8HijT0/UM7oj dGvAplq21ZBx+uJOM960gKWAdgWHmxR5YYAjQZ3fsz79cArLc0GF6KOxFedjxrsMorV3 e6dKQVDNzpkHTgDEVsrq6f+P5s82tah2xLH3Q/iaBfBJCVXI9CnnBxn6Z9gi88IghX8v ZgE6v/kKD8TxVlam6SimXoRg3eOQGyKzJpXjJQLxYWrppidMa7PgFKCGbO/gl6yqWC06 z+7547nthM+plmehFPhFtL/3+le1XXZMJoiLAGYnUVMu6Tx/PIf4dL1sVyW2r+DF7vs+ ugag== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date; bh=OsRxyvAnPbJINHsqDJOAOdVVGQpFFWbztg0hEari6CQ=; b=dKOES1nIH8d0jX1kyQ684WPogBTHjtDh3JyzOUmj/iyeqwRNQH8psvC5069SCD+Zpy t30Rq2Nr4M9HD8gtxd9dlQyTCeB7vpJS8ixMO6a6MDB2NcAC4qmaCjVYbmEi035WmzJ4 xEtPTXZ16cJbpTPvcwDDC4vu2s0Xx2ikyKC2h6AoBx71e4yZ+M9dZBbZiArQnll32A/t e4VO9kQSL4qEApuEcdtlEjfFaI8Xf2sO1cWmwuYx3gNfrEujldvuXn9sOwbX7ufgs78g LEcYjZSDnzxTLnoBpOT5e6HkRlC04jcEyQbWh5KxUu8uRVPtfltuCOv6Tef8tyUgrkIy go0A== X-Gm-Message-State: ACrzQf226qWrnIockTMXcmDs06oM46XqAdm8jS6GD+qdqZnaj7r4ryQO VeT5xHeVTvL2d/9VR/NdOebFI2Q7Fk6B0YQYVvw= X-Received: by 2002:a05:622a:180d:b0:35b:d283:7e65 with SMTP id t13-20020a05622a180d00b0035bd2837e65mr23378318qtc.106.1664297733975; Tue, 27 Sep 2022 09:55:33 -0700 (PDT) MIME-Version: 1.0 References: <0000000000004387dc05e5888ae5@google.com> In-Reply-To: From: Andrey Konovalov Date: Tue, 27 Sep 2022 18:55:23 +0200 Message-ID: Subject: Re: [syzbot] KASAN: invalid-access Read in copy_page To: Catalin Marinas Cc: Linux ARM , LKML , syzkaller-bugs , tongtiangen@huawei.com, Vincenzo Frascino , Kefeng Wang , Will Deacon , syzbot , Evgenii Stepanov , Peter Collingbourne , Dmitry Vyukov Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Sep 6, 2022 at 6:23 PM Catalin Marinas wrote: > > On Tue, Sep 06, 2022 at 04:39:57PM +0200, Andrey Konovalov wrote: > > On Tue, Sep 6, 2022 at 4:29 PM Catalin Marinas wrote: > > > > > Does it take long to reproduce this kasan warning? > > > > > > > > syzbot finds several such cases every day (200 crashes for the past 35 days): > > > > https://syzkaller.appspot.com/bug?extid=c2c79c6d6eddc5262b77 > > > > So once it reaches the tested tree, we should have an answer within a day. > > > > To be specific, this syzkaller instance fuzzes the mainline, so the > > patch with the WARN_ON needs to end up there. > > > > If this is unacceptable, perhaps, we could switch the MTE syzkaller > > instance to the arm64 testing tree. > > It needs some more digging first. My first guess was that a PROT_MTE > page was mapped into the user address space and the task repainted it > but I don't think that's the case. Hi Catalin, syzkaller still keeps hitting this issue and I was wondering if you have any ideas of what could be wrong here? > Since I can't find the kernel boot log for these runs, is there any kind > of swap enabled? I'm trying to narrow down where the problem may be. I don't think there is. Thanks!