Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp1193983rwr; Wed, 26 Apr 2023 11:13:23 -0700 (PDT) X-Google-Smtp-Source: AKy350Zaw2TjLMuyNi93Z3nXhBVdC8rmm+4d5EtvYMpNqSG/+iJ5kKi/MXLO/aON8BW4yVvi5t2I X-Received: by 2002:a05:6a00:2387:b0:640:dbe4:190c with SMTP id f7-20020a056a00238700b00640dbe4190cmr13627394pfc.4.1682532803169; Wed, 26 Apr 2023 11:13:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1682532803; cv=none; d=google.com; s=arc-20160816; b=NKwIAGAYn0ArWvs0U3DtQYEi9ip2GLzPhE+sJKEp8bh/MaeGPjiuvSiFDlEFBng3yg JyXffn5CHXzdknjyAnAzTGyR11/jnl5m47mLaRlUcil3+sxFCei1rBYYGNuFMRj25IhE qR35hDn7JctNdZ8l5mtSKlb1u9tAX0Wyd5n1ToXV+otcTjTXcyYfwcfYS1peKFv0HfkW opwaamIvUBnFE9ZXrWRHmVn65i9q6alTfNx/3VykJSURqEwv8Z6qDvl+mdvJc762eV1D m4StakWEoxAwI4uykP2Dc3UHhKzpwJrW8ZZ1j9i6KpB7quhGN1Lfebs1FdsRfk7XpQFN WAqg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent :content-transfer-encoding:references:in-reply-to:date:cc:to:from :subject:message-id:dkim-signature; bh=ySp7kwK8JmaVlh4QLUG0qlbVODoAxBB2EvzFd0DJGYc=; b=GqEdH2UiD3rWnjVbdTztsgm+Og6AClshlHm3hEpgj0tR/6NQA5tkNxT3+iTTOK/bcw vbCPGjdtJ2l6Gro5tZu9x9AgnvR5TDbqHE08UT2mAa/WYquBoYwU3kQP7sdCDVtQxoV7 Eg7MaQzh1cl4T6PSEHueOhm1a7RQ/Yp7k3+FwmDwuTltFiZYAfP9whObj+0yxwLeMa5t pPmfbr2LaMN3FVtRuMB7CGJjXuLsARR+blfn4CWKeEoSTflSueMD6s7qQ3nX9sd0sv9Z 0Qct0UE8tbRzKWsgszW27y3MmpSi56QWiDrIh8sF4O+wbZOaJnfdEm/A4x7SY7f4juH7 Xulg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=E2j0xqYk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id f21-20020aa79695000000b0063b8cd70801si16958065pfk.264.2023.04.26.11.13.07; Wed, 26 Apr 2023 11:13:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=E2j0xqYk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229822AbjDZSD3 (ORCPT + 99 others); Wed, 26 Apr 2023 14:03:29 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42560 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233322AbjDZSD1 (ORCPT ); Wed, 26 Apr 2023 14:03:27 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 96F0A76B4 for ; Wed, 26 Apr 2023 11:03:24 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 31FFD60AD6 for ; Wed, 26 Apr 2023 18:03:24 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 95B1BC433EF; Wed, 26 Apr 2023 18:03:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1682532203; bh=+gW1t81U43qlS5mrFEoNWpIN3Xj6kQ4n1Ya1m0H/TZM=; h=Subject:From:To:Cc:Date:In-Reply-To:References:From; b=E2j0xqYkPWi5fEnslDzuxsDLRjDYUDqdpIATJn9fY/9QzPsmDJDt/aApF4d9BBt9D 6t1HgIyT+lK8nDkUS5E5JkeaD8TOTpMbLmaGQYSICWokjcwSyG8LnLFkiKC54sHrvE Y5+Ph0W7mDiuCMuboy9fODRaxV7c1f1kowB3JW7ekonbOlrxLw+8tGR4HkbV2tpBZd Cm0jT13m5Lf6YbeOydL7vQY6B8QN77xcaZqLlKHFbovdPqNRRuP5J6byucB5Tsshoz V+SKdMdBQhN4vMZ0KPMyDkKhzIf7kTL4+7gzmLf52DC1T62o2lCiWzZUDzTTbTYGZS CsCGlpZlwDuqQ== Message-ID: Subject: Re: [Syzkaller & bisect] There is WARNING in tpm_chip_unregister in upstream patch "tpm: st33zp24: Mark ACPI and OF related data as maybe unused" From: Jarkko Sakkinen To: Krzysztof Kozlowski , Pengfei Xu , l.sanfilippo@kunbus.com Cc: linux-kernel@vger.kernel.org, jgg@ziepe.ca, heng.su@intel.com, peterhuewe@gmx.de, dhowells@redhat.com, lkp@intel.com Date: Wed, 26 Apr 2023 21:03:19 +0300 In-Reply-To: <1b67d480-d6f1-965f-ccfa-0874eb9a3b6b@linaro.org> References: <1b67d480-d6f1-965f-ccfa-0874eb9a3b6b@linaro.org> Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable User-Agent: Evolution 3.48.0-1 MIME-Version: 1.0 X-Spam-Status: No, score=-4.6 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 2023-04-26 at 15:12 +0200, Krzysztof Kozlowski wrote: > On 26/04/2023 11:10, Pengfei Xu wrote: > > Hi Jarkko and Krzysztof Kozlowski, > >=20 > > Greeting! > >=20 > > Platform: x86 platforms > >=20 > > There is WARNING in tpm_chip_unregister in upstream patch "tpm: st33zp2= 4: Mark > > ACPI and OF related data as maybe unused": > > https://lore.kernel.org/lkml/20230424144130.1084795-1-jarkko@kernel.org= / > > -> https://lore.kernel.org/lkml/20230319141354.22907-1-krzysztof.kozlow= ski@linaro.org/ > >=20 > > We tested Intel internal kernel and found that, the above patch caused = below > > WARNING and then kernel BUG dmesg info. After reverted above commit on = top > > of Intel internal kernel, this issue was gone. > > I checked that internal commit:"c3985d8b9c22 tpm: st33zp24: Mark ACPI a= nd OF > > related data as maybe unused" was same as above link patch. > > This issue could be reproduced in 155s in VM. > >=20 > > All detailed info: https://github.com/xupengfe/syzkaller_logs/tree/main= /230426_132902_tpm_chip_unregister_warning > > Syzkaller reproduced code: https://github.com/xupengfe/syzkaller_logs/b= lob/main/230426_132902_tpm_chip_unregister_warning/repro.c > > Syzkaller syscall reproduced steps: https://github.com/xupengfe/syzkall= er_logs/blob/main/230426_132902_tpm_chip_unregister_warning/repro.prog > > Syzkaller analysis report: https://github.com/xupengfe/syzkaller_logs/b= lob/main/230426_132902_tpm_chip_unregister_warning/repro.report > > Kconfig: https://github.com/xupengfe/syzkaller_logs/blob/main/230426_13= 2902_tpm_chip_unregister_warning/kconfig_origin > > Bisect info: https://github.com/xupengfe/syzkaller_logs/blob/main/23042= 6_132902_tpm_chip_unregister_warning/bisect_info.log > >=20 > > " > > [ 24.638052] memfd_create() without MFD_EXEC nor MFD_NOEXEC_SEAL, pid= =3D329 'systemd' > > [ 28.731375] cgroup: Unknown subsys name 'net' > > [ 28.741433] cgroup: Unknown subsys name 'rlimit' > > [ 35.900833] tpm tpm0: Operation Canceled > > [ 35.901377] ------------[ cut here ]------------ > > [ 35.901648] refcount_t: addition on 0; use-after-free. > > [ 35.901986] WARNING: CPU: 0 PID: 4095 at lib/refcount.c:25 refcount_= warn_saturate+0xe6/0x1c0 >=20 > Thanks for the report. I am quite surprised that this commit was pointed > as possible cause. The patch does not touch anything related to reported > issue... At least I do not see it. Could be some tooling problem in your > reproduction steps? I see a critical bug in this commit. Because only tpm_tis_core calls tpm_chip_startup(), in effect none of this code is ever executd for e.g. tpm_crb and tpm_vtpm_proxy and some other drivers that are not based on TIS/FIFO specification. Lino, can you submit a fix re-enabling non-tpm_tis drivers? BR, Jarkko