From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-13.3 required=3.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,USER_IN_DEF_DKIM_WL autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 87500C433DB for ; Tue, 16 Mar 2021 16:04:04 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 5AB9964F6A for ; Tue, 16 Mar 2021 16:04:04 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238367AbhCPQDf (ORCPT ); Tue, 16 Mar 2021 12:03:35 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43680 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238395AbhCPQD3 (ORCPT ); Tue, 16 Mar 2021 12:03:29 -0400 Received: from mail-qk1-x736.google.com (mail-qk1-x736.google.com [IPv6:2607:f8b0:4864:20::736]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id EE2B5C06174A for ; Tue, 16 Mar 2021 09:03:28 -0700 (PDT) Received: by mail-qk1-x736.google.com with SMTP id x10so35729105qkm.8 for ; Tue, 16 Mar 2021 09:03:28 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=beVxRTMBMXPpmNrXHLYtJs0EbkQrNYHRKHyxRcHuRb4=; b=awxSxSy4uwWFzbkMD8sxKddEysDquay9biMF9KhoimOyTg8rI0A8N5JMTqSAw9ZWC3 bOIkkGLySwlBbw4sHieL3iZ9itgC0ILzj/+70qwyNrBE7dyRSGHbsoIqvTyW3E3FgoQd gM1tVxMpX6uBYFUNcK996RWmBRyTYkj7MajWME1b9WtW7np9uaWXjQ3MqLplAmG9i4H4 FM5681UjVflvNnSWkR3dkwtXrikrXvnjYWf0S34mOGWz3B9AWXwP5W/JVIYvITwD5txy e58n/1O7tqNlBZZM7BefWdolZdlEkCU/672p5RfJFUJ93iUAjQ0OHGrMm8hE2UeJugh2 sMGQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=beVxRTMBMXPpmNrXHLYtJs0EbkQrNYHRKHyxRcHuRb4=; b=YG1YjgToWAAEpjY3Y8hYTvXacImheO3USpVoyVcl07LFher55OyUrCJBANtXIOcmOV vrJrdTyNGAaTxNU7zt3ZuosGE4gMbMuetbX35zkbo/XyAjdAKY5IN5TcBsS/Se+Qah/x LcQaOp6UFGCk+vYV3MKmGqtrTR5h2adQL98cUxAMEkCq3mjbf7mgU0CPr6sC9C7PFwFA kuwa5xBS8CanPAy3isaEwAx/wVcVnfxZ2Y9c+PWyIzFdtPdgEUJVNFluOqHIgjBuEKns qOhYgoAt3SHbOJTB9Ui+DGky8Mq1WpitNPKvO0c/Do8Fo5bdOTfhnFTJub8T4FO9iWLq XxWw== X-Gm-Message-State: AOAM532KoWMvnIjUimCcFXcRw2+ldRg9ONYyV3ZAdSlnPfiCJcuHC2ZO gHrTl+aQeEbY2l99tG2x+mHxUD3WdSfaztx0zxQN/w== X-Google-Smtp-Source: ABdhPJyHqFKybJ5rQin3MWnJ3Of9cFOqQpCXXsc44QzH+iUoekUd1pC6hQAeTOhuPETNmLlxujDVr3AMkVf/HKwAzh4= X-Received: by 2002:a05:620a:981:: with SMTP id x1mr225906qkx.501.1615910607811; Tue, 16 Mar 2021 09:03:27 -0700 (PDT) MIME-Version: 1.0 References: <00000000000069802205bda22b7f@google.com> <20210316155102.GP1463@shell.armlinux.org.uk> In-Reply-To: <20210316155102.GP1463@shell.armlinux.org.uk> From: Dmitry Vyukov Date: Tue, 16 Mar 2021 17:03:16 +0100 Message-ID: Subject: Re: [syzbot] kernel panic: corrupted stack end in openat To: Russell King - ARM Linux admin Cc: Arnd Bergmann , syzbot , Linus Walleij , Linux ARM , Andrew Morton , LKML , Linux-MM , syzkaller-bugs Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Mar 16, 2021 at 4:51 PM Russell King - ARM Linux admin wrote: > > On Tue, Mar 16, 2021 at 04:44:45PM +0100, Arnd Bergmann wrote: > > On Tue, Mar 16, 2021 at 11:17 AM Dmitry Vyukov wro= te: > > > On Tue, Mar 16, 2021 at 11:02 AM Arnd Bergmann wrote: > > > > > On Tue, Mar 16, 2021 at 8:18 AM syzbot > > > > > > > > > [<8073772c>] (integrity_kernel_read) from [<8073a904>] (ima_cal= c_file_hash_tfm+0x178/0x228 security/integrity/ima/ima_crypto.c:484) > > > > > > [<8073a78c>] (ima_calc_file_hash_tfm) from [<8073ae2c>] (ima_ca= lc_file_shash security/integrity/ima/ima_crypto.c:515 [inline]) > > > > > > [<8073a78c>] (ima_calc_file_hash_tfm) from [<8073ae2c>] (ima_ca= lc_file_hash+0x124/0x8b8 security/integrity/ima/ima_crypto.c:572) > > > > > > > > ima_calc_file_hash_tfm() has a SHASH_DESC_ON_STACK(), which by itse= lf can > > > > use up 512 bytes, but KASAN sometimes triples this number. However,= I see > > > > you do not actually have KASAN enabled, so there is probably more t= o it. > > > > > > The compiler is gcc version 10.2.1 20210110 (Debian 10.2.1-6) > > > > Ok, building with Ubuntu 10.2.1-1ubuntu1 20201207 locally, that's > > the closest I have installed, and I think the Debian and Ubuntu version= s > > are generally quite close in case of gcc since they are maintained by > > the same packagers. > > > > I see ima_calc_field_array_hash_tfm() shows up as one of the larger > > stack users, but not alarmingly high: > > ../security/integrity/ima/ima_crypto.c: In function > > =E2=80=98ima_calc_field_array_hash_tfm=E2=80=99: > > ../security/integrity/ima/ima_crypto.c:624:1: warning: the frame size > > of 664 bytes is larger than 600 bytes [-Wframe-larger-than=3D] > > none of the other functions from the call chain have more than 600 byte= s > > in this combination of config/compiler/sourcetree. > > > > In combination, I don't get to more than ~2300 bytes: > > ... which shouldn't be a problem - that's just over 1/4 of the stack > space. Could it be the syzbot's gcc is doing something weird and > inflating the stack frames? It's just a stock Debian-provided gcc. Which I would assume also just a plain gcc. From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-13.3 required=3.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,USER_IN_DEF_DKIM_WL autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 188D3C433DB for ; Tue, 16 Mar 2021 16:03:32 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id B6BA164FEA for ; Tue, 16 Mar 2021 16:03:31 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org B6BA164FEA Authentication-Results: mail.kernel.org; dmarc=fail (p=reject dis=none) header.from=google.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id 52E966B008C; Tue, 16 Mar 2021 12:03:31 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 505508D0002; Tue, 16 Mar 2021 12:03:31 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 3CD708D0001; Tue, 16 Mar 2021 12:03:31 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0124.hostedemail.com [216.40.44.124]) by kanga.kvack.org (Postfix) with ESMTP id 212726B008C for ; Tue, 16 Mar 2021 12:03:31 -0400 (EDT) Received: from smtpin12.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay02.hostedemail.com (Postfix) with ESMTP id CF874365C for ; Tue, 16 Mar 2021 16:03:30 +0000 (UTC) X-FDA: 77926207380.12.E64F07B Received: from mail-qk1-f169.google.com (mail-qk1-f169.google.com [209.85.222.169]) by imf24.hostedemail.com (Postfix) with ESMTP id 04B26A001A98 for ; Tue, 16 Mar 2021 16:03:28 +0000 (UTC) Received: by mail-qk1-f169.google.com with SMTP id a9so35691495qkn.13 for ; Tue, 16 Mar 2021 09:03:28 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=beVxRTMBMXPpmNrXHLYtJs0EbkQrNYHRKHyxRcHuRb4=; b=awxSxSy4uwWFzbkMD8sxKddEysDquay9biMF9KhoimOyTg8rI0A8N5JMTqSAw9ZWC3 bOIkkGLySwlBbw4sHieL3iZ9itgC0ILzj/+70qwyNrBE7dyRSGHbsoIqvTyW3E3FgoQd gM1tVxMpX6uBYFUNcK996RWmBRyTYkj7MajWME1b9WtW7np9uaWXjQ3MqLplAmG9i4H4 FM5681UjVflvNnSWkR3dkwtXrikrXvnjYWf0S34mOGWz3B9AWXwP5W/JVIYvITwD5txy e58n/1O7tqNlBZZM7BefWdolZdlEkCU/672p5RfJFUJ93iUAjQ0OHGrMm8hE2UeJugh2 sMGQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=beVxRTMBMXPpmNrXHLYtJs0EbkQrNYHRKHyxRcHuRb4=; b=R8HCnisXBkKulciSp8UxBm65Q4toyCvBGtMWi/pQOzmWRYEmbwEiKF+5ZOqGwRShON Uhb9QMoKnJjFZy4hpVDxZTF40rUHVtqzh0VkV9lF3XpAyPTPSkip1okVyHhSGyW1X17C ZVb1eCGMyQDaYXP+OQTEKJRubYw65Rk/uVY2sxyreJK6ehM4QWCx2fni6ifDZUKORXsD NeyYix7rca56SxX4+HlaRCTaNQORqYjKyY7m69BkjPmbfV0OOhw19Lp/7AMFl1EkW2wY XNXlF9BbNddvy6GY+5mrUllB4JjcW1NumQXCT3VdUvG7C4bMeKtAWfMn51lbltb4+Nur 0RxA== X-Gm-Message-State: AOAM533ImQLgKsedeCWqsLfk0AkFFLnbpUzvr85eXRO829/GX44a1oYb hTj7EHr8URT4ib8VNxFVqqcyhwrKnpruRBi0JHSkyQ== X-Google-Smtp-Source: ABdhPJyHqFKybJ5rQin3MWnJ3Of9cFOqQpCXXsc44QzH+iUoekUd1pC6hQAeTOhuPETNmLlxujDVr3AMkVf/HKwAzh4= X-Received: by 2002:a05:620a:981:: with SMTP id x1mr225906qkx.501.1615910607811; Tue, 16 Mar 2021 09:03:27 -0700 (PDT) MIME-Version: 1.0 References: <00000000000069802205bda22b7f@google.com> <20210316155102.GP1463@shell.armlinux.org.uk> In-Reply-To: <20210316155102.GP1463@shell.armlinux.org.uk> From: Dmitry Vyukov Date: Tue, 16 Mar 2021 17:03:16 +0100 Message-ID: Subject: Re: [syzbot] kernel panic: corrupted stack end in openat To: Russell King - ARM Linux admin Cc: Arnd Bergmann , syzbot , Linus Walleij , Linux ARM , Andrew Morton , LKML , Linux-MM , syzkaller-bugs Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Stat-Signature: xfemhd6thc9az9te1q3bfecaewirxirw X-Rspamd-Server: rspam05 X-Rspamd-Queue-Id: 04B26A001A98 Received-SPF: none (google.com>: No applicable sender policy available) receiver=imf24; identity=mailfrom; envelope-from=""; helo=mail-qk1-f169.google.com; client-ip=209.85.222.169 X-HE-DKIM-Result: pass/pass X-HE-Tag: 1615910608-606610 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Tue, Mar 16, 2021 at 4:51 PM Russell King - ARM Linux admin wrote: > > On Tue, Mar 16, 2021 at 04:44:45PM +0100, Arnd Bergmann wrote: > > On Tue, Mar 16, 2021 at 11:17 AM Dmitry Vyukov wro= te: > > > On Tue, Mar 16, 2021 at 11:02 AM Arnd Bergmann wrote: > > > > > On Tue, Mar 16, 2021 at 8:18 AM syzbot > > > > > > > > > [<8073772c>] (integrity_kernel_read) from [<8073a904>] (ima_cal= c_file_hash_tfm+0x178/0x228 security/integrity/ima/ima_crypto.c:484) > > > > > > [<8073a78c>] (ima_calc_file_hash_tfm) from [<8073ae2c>] (ima_ca= lc_file_shash security/integrity/ima/ima_crypto.c:515 [inline]) > > > > > > [<8073a78c>] (ima_calc_file_hash_tfm) from [<8073ae2c>] (ima_ca= lc_file_hash+0x124/0x8b8 security/integrity/ima/ima_crypto.c:572) > > > > > > > > ima_calc_file_hash_tfm() has a SHASH_DESC_ON_STACK(), which by itse= lf can > > > > use up 512 bytes, but KASAN sometimes triples this number. However,= I see > > > > you do not actually have KASAN enabled, so there is probably more t= o it. > > > > > > The compiler is gcc version 10.2.1 20210110 (Debian 10.2.1-6) > > > > Ok, building with Ubuntu 10.2.1-1ubuntu1 20201207 locally, that's > > the closest I have installed, and I think the Debian and Ubuntu version= s > > are generally quite close in case of gcc since they are maintained by > > the same packagers. > > > > I see ima_calc_field_array_hash_tfm() shows up as one of the larger > > stack users, but not alarmingly high: > > ../security/integrity/ima/ima_crypto.c: In function > > =E2=80=98ima_calc_field_array_hash_tfm=E2=80=99: > > ../security/integrity/ima/ima_crypto.c:624:1: warning: the frame size > > of 664 bytes is larger than 600 bytes [-Wframe-larger-than=3D] > > none of the other functions from the call chain have more than 600 byte= s > > in this combination of config/compiler/sourcetree. > > > > In combination, I don't get to more than ~2300 bytes: > > ... which shouldn't be a problem - that's just over 1/4 of the stack > space. Could it be the syzbot's gcc is doing something weird and > inflating the stack frames? It's just a stock Debian-provided gcc. Which I would assume also just a plain gcc. From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.0 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_ADSP_CUSTOM_MED,DKIM_SIGNED,DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 23325C433E6 for ; Tue, 16 Mar 2021 16:05:45 +0000 (UTC) Received: from desiato.infradead.org (desiato.infradead.org [90.155.92.199]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id AF78664F6A for ; Tue, 16 Mar 2021 16:05:44 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org AF78664F6A Authentication-Results: mail.kernel.org; dmarc=fail (p=reject dis=none) header.from=google.com Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=desiato.20200630; h=Sender:Content-Transfer-Encoding :Content-Type:List-Subscribe:List-Help:List-Post:List-Archive: List-Unsubscribe:List-Id:Cc:To:Subject:Message-ID:Date:From:In-Reply-To: References:MIME-Version:Reply-To:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Owner; bh=bRiOWgtuO6at0PEC73yczok5Mcn5bAUZBxkBEb8QlBY=; b=mWuk0+mgwjftn80IIM2j0x62K 3v3Cn2aW8HAlOGe39A+K4CTav2vePGoIZV2Btyf6FHjjpK457VgVVqWOGTcmtnUMtiC0zJxP4EiWV eiVwF0Fv28nRyfXLOaDyY0mPUfiZ3E4xHtRxdSMDEBoOP6ueeSmE2sMvefeQfY75fxSZ1EEPE1Pt3 hX5PoPGvWErbPsMLKE5dLjog5LEVM+XIPNcF0sCkR0m2G2xP9bfJvbG2LFQQIoG7TxtxWHgdtCDm4 3ftWRcVr7dJVtjoA1EzWhzZa7zMtPsbSFf1sTAPOJcIWNOUcVtC99iJcs8lGpTFE3R0MwEUn3jrC2 OI+zi0elA==; Received: from localhost ([::1] helo=desiato.infradead.org) by desiato.infradead.org with esmtp (Exim 4.94 #2 (Red Hat Linux)) id 1lMCAY-001BRZ-2d; Tue, 16 Mar 2021 16:03:42 +0000 Received: from mail-qk1-x72a.google.com ([2607:f8b0:4864:20::72a]) by desiato.infradead.org with esmtps (Exim 4.94 #2 (Red Hat Linux)) id 1lMCAL-001BOd-Ix for linux-arm-kernel@lists.infradead.org; Tue, 16 Mar 2021 16:03:35 +0000 Received: by mail-qk1-x72a.google.com with SMTP id n24so5564716qkh.9 for ; Tue, 16 Mar 2021 09:03:29 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=beVxRTMBMXPpmNrXHLYtJs0EbkQrNYHRKHyxRcHuRb4=; b=awxSxSy4uwWFzbkMD8sxKddEysDquay9biMF9KhoimOyTg8rI0A8N5JMTqSAw9ZWC3 bOIkkGLySwlBbw4sHieL3iZ9itgC0ILzj/+70qwyNrBE7dyRSGHbsoIqvTyW3E3FgoQd gM1tVxMpX6uBYFUNcK996RWmBRyTYkj7MajWME1b9WtW7np9uaWXjQ3MqLplAmG9i4H4 FM5681UjVflvNnSWkR3dkwtXrikrXvnjYWf0S34mOGWz3B9AWXwP5W/JVIYvITwD5txy e58n/1O7tqNlBZZM7BefWdolZdlEkCU/672p5RfJFUJ93iUAjQ0OHGrMm8hE2UeJugh2 sMGQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=beVxRTMBMXPpmNrXHLYtJs0EbkQrNYHRKHyxRcHuRb4=; b=pbHSGiUGJ8ZQIQVNXGk7JXyKp8+xK5Nbe8OqKshhfqYEzIpv43qrgBOUJoOGNlUnkv /OTquRcwqLmKbgVezzz46JFx98a6Xny2uDS6tzYfWSKDtvGqP9SSKF/EoqhbIIXVFewY Fj4INdCjgdohkf9vsUn3izeO/waUF8NfTacF/yI0Y7gfAWu7NMYrkgsoJC076Fz9MlS+ mqvZFe2ZjYidSdPVbcs9zdpSt6wtVRau7rk/i1kHyT+7UeBiogv2eTWS7O8vhYg9+CJM 8CTBgzw/YokqpyceAKKp2Own9wxKrjQP2foSFKuLrMdq6008Z4XpmQlBwQsKhNLS2FYz 2tXQ== X-Gm-Message-State: AOAM53121xkpVhxvV293bhPJRVSbPaT6iWg1xYM1N/A2wb+oDzB9XpNl 6tEGaUyeRn/P/2iinKE9XBlzhaVF3ufAXq1OzdBdhw== X-Google-Smtp-Source: ABdhPJyHqFKybJ5rQin3MWnJ3Of9cFOqQpCXXsc44QzH+iUoekUd1pC6hQAeTOhuPETNmLlxujDVr3AMkVf/HKwAzh4= X-Received: by 2002:a05:620a:981:: with SMTP id x1mr225906qkx.501.1615910607811; Tue, 16 Mar 2021 09:03:27 -0700 (PDT) MIME-Version: 1.0 References: <00000000000069802205bda22b7f@google.com> <20210316155102.GP1463@shell.armlinux.org.uk> In-Reply-To: <20210316155102.GP1463@shell.armlinux.org.uk> From: Dmitry Vyukov Date: Tue, 16 Mar 2021 17:03:16 +0100 Message-ID: Subject: Re: [syzbot] kernel panic: corrupted stack end in openat To: Russell King - ARM Linux admin Cc: Arnd Bergmann , syzbot , Linus Walleij , Linux ARM , Andrew Morton , LKML , Linux-MM , syzkaller-bugs X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20210316_160330_004796_62E192BB X-CRM114-Status: GOOD ( 21.22 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org T24gVHVlLCBNYXIgMTYsIDIwMjEgYXQgNDo1MSBQTSBSdXNzZWxsIEtpbmcgLSBBUk0gTGludXgg YWRtaW4KPGxpbnV4QGFybWxpbnV4Lm9yZy51az4gd3JvdGU6Cj4KPiBPbiBUdWUsIE1hciAxNiwg MjAyMSBhdCAwNDo0NDo0NVBNICswMTAwLCBBcm5kIEJlcmdtYW5uIHdyb3RlOgo+ID4gT24gVHVl LCBNYXIgMTYsIDIwMjEgYXQgMTE6MTcgQU0gRG1pdHJ5IFZ5dWtvdiA8ZHZ5dWtvdkBnb29nbGUu Y29tPiB3cm90ZToKPiA+ID4gT24gVHVlLCBNYXIgMTYsIDIwMjEgYXQgMTE6MDIgQU0gQXJuZCBC ZXJnbWFubiA8YXJuZEBhcm5kYi5kZT4gd3JvdGU6Cj4gPiA+ID4gPiBPbiBUdWUsIE1hciAxNiwg MjAyMSBhdCA4OjE4IEFNIHN5emJvdAo+ID4gPgo+ID4gPiA+ID4gPiBbPDgwNzM3NzJjPl0gKGlu dGVncml0eV9rZXJuZWxfcmVhZCkgZnJvbSBbPDgwNzNhOTA0Pl0gKGltYV9jYWxjX2ZpbGVfaGFz aF90Zm0rMHgxNzgvMHgyMjggc2VjdXJpdHkvaW50ZWdyaXR5L2ltYS9pbWFfY3J5cHRvLmM6NDg0 KQo+ID4gPiA+ID4gPiBbPDgwNzNhNzhjPl0gKGltYV9jYWxjX2ZpbGVfaGFzaF90Zm0pIGZyb20g Wzw4MDczYWUyYz5dIChpbWFfY2FsY19maWxlX3NoYXNoIHNlY3VyaXR5L2ludGVncml0eS9pbWEv aW1hX2NyeXB0by5jOjUxNSBbaW5saW5lXSkKPiA+ID4gPiA+ID4gWzw4MDczYTc4Yz5dIChpbWFf Y2FsY19maWxlX2hhc2hfdGZtKSBmcm9tIFs8ODA3M2FlMmM+XSAoaW1hX2NhbGNfZmlsZV9oYXNo KzB4MTI0LzB4OGI4IHNlY3VyaXR5L2ludGVncml0eS9pbWEvaW1hX2NyeXB0by5jOjU3MikKPiA+ ID4gPgo+ID4gPiA+IGltYV9jYWxjX2ZpbGVfaGFzaF90Zm0oKSBoYXMgYSBTSEFTSF9ERVNDX09O X1NUQUNLKCksIHdoaWNoIGJ5IGl0c2VsZiBjYW4KPiA+ID4gPiB1c2UgdXAgNTEyIGJ5dGVzLCBi dXQgS0FTQU4gc29tZXRpbWVzIHRyaXBsZXMgdGhpcyBudW1iZXIuIEhvd2V2ZXIsIEkgc2VlCj4g PiA+ID4geW91IGRvIG5vdCBhY3R1YWxseSBoYXZlIEtBU0FOIGVuYWJsZWQsIHNvIHRoZXJlIGlz IHByb2JhYmx5IG1vcmUgdG8gaXQuCj4gPiA+Cj4gPiA+IFRoZSBjb21waWxlciBpcyBnY2MgdmVy c2lvbiAxMC4yLjEgMjAyMTAxMTAgKERlYmlhbiAxMC4yLjEtNikKPiA+Cj4gPiBPaywgYnVpbGRp bmcgd2l0aCBVYnVudHUgMTAuMi4xLTF1YnVudHUxIDIwMjAxMjA3IGxvY2FsbHksIHRoYXQncwo+ ID4gdGhlIGNsb3Nlc3QgSSBoYXZlIGluc3RhbGxlZCwgYW5kIEkgdGhpbmsgdGhlIERlYmlhbiBh bmQgVWJ1bnR1IHZlcnNpb25zCj4gPiBhcmUgZ2VuZXJhbGx5IHF1aXRlIGNsb3NlIGluIGNhc2Ug b2YgZ2NjIHNpbmNlIHRoZXkgYXJlIG1haW50YWluZWQgYnkKPiA+IHRoZSBzYW1lIHBhY2thZ2Vy cy4KPiA+Cj4gPiBJIHNlZSBpbWFfY2FsY19maWVsZF9hcnJheV9oYXNoX3RmbSgpIHNob3dzIHVw IGFzIG9uZSBvZiB0aGUgbGFyZ2VyCj4gPiBzdGFjayB1c2VycywgYnV0IG5vdCBhbGFybWluZ2x5 IGhpZ2g6Cj4gPiAuLi9zZWN1cml0eS9pbnRlZ3JpdHkvaW1hL2ltYV9jcnlwdG8uYzogSW4gZnVu Y3Rpb24KPiA+IOKAmGltYV9jYWxjX2ZpZWxkX2FycmF5X2hhc2hfdGZt4oCZOgo+ID4gLi4vc2Vj dXJpdHkvaW50ZWdyaXR5L2ltYS9pbWFfY3J5cHRvLmM6NjI0OjE6IHdhcm5pbmc6IHRoZSBmcmFt ZSBzaXplCj4gPiBvZiA2NjQgYnl0ZXMgaXMgbGFyZ2VyIHRoYW4gNjAwIGJ5dGVzIFstV2ZyYW1l LWxhcmdlci10aGFuPV0KPiA+IG5vbmUgb2YgdGhlIG90aGVyIGZ1bmN0aW9ucyBmcm9tIHRoZSBj YWxsIGNoYWluIGhhdmUgbW9yZSB0aGFuIDYwMCBieXRlcwo+ID4gaW4gdGhpcyBjb21iaW5hdGlv biBvZiBjb25maWcvY29tcGlsZXIvc291cmNldHJlZS4KPiA+Cj4gPiBJbiBjb21iaW5hdGlvbiwg SSBkb24ndCBnZXQgdG8gbW9yZSB0aGFuIH4yMzAwIGJ5dGVzOgo+Cj4gLi4uIHdoaWNoIHNob3Vs ZG4ndCBiZSBhIHByb2JsZW0gLSB0aGF0J3MganVzdCBvdmVyIDEvNCBvZiB0aGUgc3RhY2sKPiBz cGFjZS4gQ291bGQgaXQgYmUgdGhlIHN5emJvdCdzIGdjYyBpcyBkb2luZyBzb21ldGhpbmcgd2Vp cmQgYW5kCj4gaW5mbGF0aW5nIHRoZSBzdGFjayBmcmFtZXM/CgpJdCdzIGp1c3QgYSBzdG9jayBE ZWJpYW4tcHJvdmlkZWQgZ2NjLiBXaGljaCBJIHdvdWxkIGFzc3VtZSBhbHNvIGp1c3QKYSBwbGFp biBnY2MuCgpfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXwps aW51eC1hcm0ta2VybmVsIG1haWxpbmcgbGlzdApsaW51eC1hcm0ta2VybmVsQGxpc3RzLmluZnJh ZGVhZC5vcmcKaHR0cDovL2xpc3RzLmluZnJhZGVhZC5vcmcvbWFpbG1hbi9saXN0aW5mby9saW51 eC1hcm0ta2VybmVsCg==