From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751613AbdK3J72 (ORCPT ); Thu, 30 Nov 2017 04:59:28 -0500 Received: from mail-pl0-f68.google.com ([209.85.160.68]:38033 "EHLO mail-pl0-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750918AbdK3J70 (ORCPT ); Thu, 30 Nov 2017 04:59:26 -0500 X-Google-Smtp-Source: AGs4zMZfIlQI7Jk78CSXgaQ1KcRbTSdX1Zu9cftS9S9y0DYaWSKSLQwTmKzj3nCjvVCFX4+lgd/zfcwhBRH6VvNc1II= MIME-Version: 1.0 In-Reply-To: <20171129175430.GA58181@big-sky.attlocal.net> References: <20171126063117.oytmra3tqoj5546u@wfg-t540p.sh.intel.com> <20171127210301.GA55812@localhost.corp.microsoft.com> <20171128124534.3jvuala525wvn64r@wfg-t540p.sh.intel.com> <20171129175430.GA58181@big-sky.attlocal.net> From: Dmitry Vyukov Date: Thu, 30 Nov 2017 10:59:05 +0100 Message-ID: Subject: Re: [pcpu] BUG: KASAN: use-after-scope in pcpu_setup_first_chunk+0x1e3b/0x29e2 To: Dennis Zhou Cc: Fengguang Wu , Ard Biesheuvel , Kees Cook , Linux-MM , Tejun Heo , Christoph Lameter , Linus Torvalds , Josef Bacik , LKML , LKP , Andrey Ryabinin , Mark Rutland Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Nov 29, 2017 at 6:54 PM, Dennis Zhou wrote: > Hi everyone, > > I spent a bit of time learning more about this problem as Fengguang was > able to determine the root commit f7dd2507893cc3. I reproduced the bug > in userspace to make life a bit easier and below the assignment occurs > before the unpoison. This is fine if we're sequentially proceeding, but > as in the case in percpu, it's calling the function in a for loop > causing the assignment to happen after it has been poisoned in the prior > iteration. > > [0.00%]: > _1 = (long unsigned int) i_4; > _2 = _1 * 16; > _3 = p_8 + _2; > list_14 = _3; > __u = {}; > ASAN_MARK (UNPOISON, &__u, 8); > __u.__val = list_14; > > [0.00%]: > _24 = __u.__val; > ASAN_MARK (POISON, &__u, 8); > list_14->prev = list_14; > i_13 = i_4 + 1; > > [0.00%]: > # i_4 = PHI > if (i_4 <= 9) > goto ; [0.00%] > else > goto ; [0.00%] > > I don't know how to go about fixing this though. The reproducing code is > below and was compiled with gcc-7 and the structleak_plugin. Are we sure that structleak plugin is not at fault? If yes, then we need to report this to https://gcc.gnu.org/bugzilla/ with instructions on how to build/use the plugin. > I hope this helps. > > Thanks, > Dennis > > ---- > #include > #include > > #define barrier() > > #define WRITE_ONCE(x, val) \ > ({ \ > union { typeof(x) __val; char __c[1]; } __u = \ > { .__val = (typeof(x)) (val) }; \ > __write_once_size(&(x), __u.__c, sizeof(x)); \ > __u.__val; \ > }) > > typedef uint8_t __u8; > typedef uint16_t __u16; > typedef uint32_t __u32; > typedef uint64_t __u64; > > static inline __attribute__((always_inline)) void __write_once_size(volatile void *p, void *res, int size) > { > switch (size) { > case 1: *(volatile __u8 *)p = *(__u8 *)res; break; > case 2: *(volatile __u16 *)p = *(__u16 *)res; break; > case 4: *(volatile __u32 *)p = *(__u32 *)res; break; > case 8: *(volatile __u64 *)p = *(__u64 *)res; break; > default: > barrier(); > __builtin_memcpy((void *)p, (const void *)res, size); > barrier(); > } > } > > struct list_head { > struct list_head *next, *prev; > }; > > static inline __attribute__((always_inline)) void INIT_LIST_HEAD(struct list_head *list) > { > WRITE_ONCE(list->next, list); > list->prev = list; > } > > int main(int argc, char *argv[]) > { > struct list_head *p = malloc(10 * sizeof(struct list_head)); > int i; > > for (i = 0; i < 10; i++) { > INIT_LIST_HEAD(&p[i]); > } > > free(p); > > return 0; > } From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-pf0-f197.google.com (mail-pf0-f197.google.com [209.85.192.197]) by kanga.kvack.org (Postfix) with ESMTP id 3E8AC6B0038 for ; Thu, 30 Nov 2017 04:59:27 -0500 (EST) Received: by mail-pf0-f197.google.com with SMTP id y62so4618228pfd.3 for ; Thu, 30 Nov 2017 01:59:27 -0800 (PST) Received: from mail-sor-f65.google.com (mail-sor-f65.google.com. [209.85.220.65]) by mx.google.com with SMTPS id l30sor1506544plg.33.2017.11.30.01.59.26 for (Google Transport Security); Thu, 30 Nov 2017 01:59:26 -0800 (PST) MIME-Version: 1.0 In-Reply-To: <20171129175430.GA58181@big-sky.attlocal.net> References: <20171126063117.oytmra3tqoj5546u@wfg-t540p.sh.intel.com> <20171127210301.GA55812@localhost.corp.microsoft.com> <20171128124534.3jvuala525wvn64r@wfg-t540p.sh.intel.com> <20171129175430.GA58181@big-sky.attlocal.net> From: Dmitry Vyukov Date: Thu, 30 Nov 2017 10:59:05 +0100 Message-ID: Subject: Re: [pcpu] BUG: KASAN: use-after-scope in pcpu_setup_first_chunk+0x1e3b/0x29e2 Content-Type: text/plain; charset="UTF-8" Sender: owner-linux-mm@kvack.org List-ID: To: Dennis Zhou Cc: Fengguang Wu , Ard Biesheuvel , Kees Cook , Linux-MM , Tejun Heo , Christoph Lameter , Linus Torvalds , Josef Bacik , LKML , LKP , Andrey Ryabinin , Mark Rutland On Wed, Nov 29, 2017 at 6:54 PM, Dennis Zhou wrote: > Hi everyone, > > I spent a bit of time learning more about this problem as Fengguang was > able to determine the root commit f7dd2507893cc3. I reproduced the bug > in userspace to make life a bit easier and below the assignment occurs > before the unpoison. This is fine if we're sequentially proceeding, but > as in the case in percpu, it's calling the function in a for loop > causing the assignment to happen after it has been poisoned in the prior > iteration. > > [0.00%]: > _1 = (long unsigned int) i_4; > _2 = _1 * 16; > _3 = p_8 + _2; > list_14 = _3; > __u = {}; > ASAN_MARK (UNPOISON, &__u, 8); > __u.__val = list_14; > > [0.00%]: > _24 = __u.__val; > ASAN_MARK (POISON, &__u, 8); > list_14->prev = list_14; > i_13 = i_4 + 1; > > [0.00%]: > # i_4 = PHI > if (i_4 <= 9) > goto ; [0.00%] > else > goto ; [0.00%] > > I don't know how to go about fixing this though. The reproducing code is > below and was compiled with gcc-7 and the structleak_plugin. Are we sure that structleak plugin is not at fault? If yes, then we need to report this to https://gcc.gnu.org/bugzilla/ with instructions on how to build/use the plugin. > I hope this helps. > > Thanks, > Dennis > > ---- > #include > #include > > #define barrier() > > #define WRITE_ONCE(x, val) \ > ({ \ > union { typeof(x) __val; char __c[1]; } __u = \ > { .__val = (typeof(x)) (val) }; \ > __write_once_size(&(x), __u.__c, sizeof(x)); \ > __u.__val; \ > }) > > typedef uint8_t __u8; > typedef uint16_t __u16; > typedef uint32_t __u32; > typedef uint64_t __u64; > > static inline __attribute__((always_inline)) void __write_once_size(volatile void *p, void *res, int size) > { > switch (size) { > case 1: *(volatile __u8 *)p = *(__u8 *)res; break; > case 2: *(volatile __u16 *)p = *(__u16 *)res; break; > case 4: *(volatile __u32 *)p = *(__u32 *)res; break; > case 8: *(volatile __u64 *)p = *(__u64 *)res; break; > default: > barrier(); > __builtin_memcpy((void *)p, (const void *)res, size); > barrier(); > } > } > > struct list_head { > struct list_head *next, *prev; > }; > > static inline __attribute__((always_inline)) void INIT_LIST_HEAD(struct list_head *list) > { > WRITE_ONCE(list->next, list); > list->prev = list; > } > > int main(int argc, char *argv[]) > { > struct list_head *p = malloc(10 * sizeof(struct list_head)); > int i; > > for (i = 0; i < 10; i++) { > INIT_LIST_HEAD(&p[i]); > } > > free(p); > > return 0; > } -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: email@kvack.org From mboxrd@z Thu Jan 1 00:00:00 1970 Content-Type: multipart/mixed; boundary="===============4509590115725709728==" MIME-Version: 1.0 From: Dmitry Vyukov To: lkp@lists.01.org Subject: Re: [pcpu] BUG: KASAN: use-after-scope in pcpu_setup_first_chunk+0x1e3b/0x29e2 Date: Thu, 30 Nov 2017 10:59:05 +0100 Message-ID: In-Reply-To: <20171129175430.GA58181@big-sky.attlocal.net> List-Id: --===============4509590115725709728== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable On Wed, Nov 29, 2017 at 6:54 PM, Dennis Zhou wrot= e: > Hi everyone, > > I spent a bit of time learning more about this problem as Fengguang was > able to determine the root commit f7dd2507893cc3. I reproduced the bug > in userspace to make life a bit easier and below the assignment occurs > before the unpoison. This is fine if we're sequentially proceeding, but > as in the case in percpu, it's calling the function in a for loop > causing the assignment to happen after it has been poisoned in the prior > iteration. > > [0.00%]: > _1 =3D (long unsigned int) i_4; > _2 =3D _1 * 16; > _3 =3D p_8 + _2; > list_14 =3D _3; > __u =3D {}; > ASAN_MARK (UNPOISON, &__u, 8); > __u.__val =3D list_14; > > [0.00%]: > _24 =3D __u.__val; > ASAN_MARK (POISON, &__u, 8); > list_14->prev =3D list_14; > i_13 =3D i_4 + 1; > > [0.00%]: > # i_4 =3D PHI > if (i_4 <=3D 9) > goto ; [0.00%] > else > goto ; [0.00%] > > I don't know how to go about fixing this though. The reproducing code is > below and was compiled with gcc-7 and the structleak_plugin. Are we sure that structleak plugin is not at fault? If yes, then we need to report this to https://gcc.gnu.org/bugzilla/ with instructions on how to build/use the plugin. > I hope this helps. > > Thanks, > Dennis > > ---- > #include > #include > > #define barrier() > > #define WRITE_ONCE(x, val) \ > ({ \ > union { typeof(x) __val; char __c[1]; } __u =3D \ > { .__val =3D (typeof(x)) (val) }; \ > __write_once_size(&(x), __u.__c, sizeof(x)); \ > __u.__val; \ > }) > > typedef uint8_t __u8; > typedef uint16_t __u16; > typedef uint32_t __u32; > typedef uint64_t __u64; > > static inline __attribute__((always_inline)) void __write_once_size(volat= ile void *p, void *res, int size) > { > switch (size) { > case 1: *(volatile __u8 *)p =3D *(__u8 *)res; break; > case 2: *(volatile __u16 *)p =3D *(__u16 *)res; break; > case 4: *(volatile __u32 *)p =3D *(__u32 *)res; break; > case 8: *(volatile __u64 *)p =3D *(__u64 *)res; break; > default: > barrier(); > __builtin_memcpy((void *)p, (const void *)res, size); > barrier(); > } > } > > struct list_head { > struct list_head *next, *prev; > }; > > static inline __attribute__((always_inline)) void INIT_LIST_HEAD(struct l= ist_head *list) > { > WRITE_ONCE(list->next, list); > list->prev =3D list; > } > > int main(int argc, char *argv[]) > { > struct list_head *p =3D malloc(10 * sizeof(struct list_head)); > int i; > > for (i =3D 0; i < 10; i++) { > INIT_LIST_HEAD(&p[i]); > } > > free(p); > > return 0; > } --===============4509590115725709728==--