From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 53FE7C4332F for ; Wed, 21 Dec 2022 12:49:02 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231830AbiLUMtA (ORCPT ); Wed, 21 Dec 2022 07:49:00 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45376 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229596AbiLUMsl (ORCPT ); Wed, 21 Dec 2022 07:48:41 -0500 Received: from relay9-d.mail.gandi.net (relay9-d.mail.gandi.net [IPv6:2001:4b98:dc4:8::229]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6701322BF5; Wed, 21 Dec 2022 04:48:39 -0800 (PST) Received: (Authenticated sender: alex@ghiti.fr) by mail.gandi.net (Postfix) with ESMTPSA id 12746FF80A; Wed, 21 Dec 2022 12:48:32 +0000 (UTC) Message-ID: <555f4c90-39fb-3cb9-0b26-1b8af6b4f486@ghiti.fr> Date: Wed, 21 Dec 2022 13:48:32 +0100 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.4.2 Subject: Re: [syzbot] riscv/fixes boot error: WARNING in __apply_to_page_range (2) Content-Language: en-US To: syzbot , andrii@kernel.org, aou@eecs.berkeley.edu, ast@kernel.org, bjorn@kernel.org, bpf@vger.kernel.org, daniel@iogearbox.net, haoluo@google.com, john.fastabend@gmail.com, jolsa@kernel.org, kpsingh@kernel.org, linux-kernel@vger.kernel.org, linux-riscv@lists.infradead.org, luke.r.nels@gmail.com, martin.lau@linux.dev, palmer@dabbelt.com, paul.walmsley@sifive.com, sdf@google.com, song@kernel.org, syzkaller-bugs@googlegroups.com, xi.wang@gmail.com, yhs@fb.com References: <000000000000ea7a5c05f051fd00@google.com> From: Alexandre Ghiti In-Reply-To: <000000000000ea7a5c05f051fd00@google.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org (resending as the first answer was sent in HTML, sorry) On 12/21/22 09:03, syzbot wrote: > Hello, > > syzbot found the following issue on: > > HEAD commit: eb67d239f3aa Merge tag 'riscv-for-linus-6.2-mw1' of git://.. > git tree: git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes > console output: https://syzkaller.appspot.com/x/log.txt?x=16672680480000 > kernel config: https://syzkaller.appspot.com/x/.config?x=be108b5bcf4ef832 > dashboard link: https://syzkaller.appspot.com/bug?extid=5702f46b5b22bdb38b7e > compiler: riscv64-linux-gnu-gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2 > userspace arch: riscv64 > > IMPORTANT: if you fix the issue, please add the following tag to the commit: > Reported-by: syzbot+5702f46b5b22bdb38b7e@syzkaller.appspotmail.com > > ------------[ cut here ]------------ > WARNING: CPU: 0 PID: 2760 at mm/memory.c:2637 apply_to_pmd_range mm/memory.c:2637 [inline] This leads to the following: if (WARN_ON_ONCE(pmd_leaf(*pmd)))     return -EINVAL; > WARNING: CPU: 0 PID: 2760 at mm/memory.c:2637 apply_to_pud_range mm/memory.c:2680 [inline] > WARNING: CPU: 0 PID: 2760 at mm/memory.c:2637 apply_to_p4d_range mm/memory.c:2716 [inline] > WARNING: CPU: 0 PID: 2760 at mm/memory.c:2637 __apply_to_page_range+0x988/0x1212 mm/memory.c:2750 > Modules linked in: > CPU: 0 PID: 2760 Comm: dhcpcd Not tainted 6.1.0-syzkaller-13662-geb67d239f3aa #0 > Hardware name: riscv-virtio,qemu (DT) > epc : apply_to_pmd_range mm/memory.c:2637 [inline] > epc : apply_to_pud_range mm/memory.c:2680 [inline] > epc : apply_to_p4d_range mm/memory.c:2716 [inline] > epc : __apply_to_page_range+0x988/0x1212 mm/memory.c:2750 > ra : apply_to_pmd_range mm/memory.c:2637 [inline] > ra : apply_to_pud_range mm/memory.c:2680 [inline] > ra : apply_to_p4d_range mm/memory.c:2716 [inline] > ra : __apply_to_page_range+0x988/0x1212 mm/memory.c:2750 > epc : ffffffff8042aac8 ra : ffffffff8042aac8 sp : ff20000004d57290 > gp : ffffffff85cdd280 tp : ff6000000e206200 t0 : ff60000010988a00 > t1 : 00000000000f0000 t2 : ffffffff804616b4 s0 : ff20000004d57380 > s1 : 0000000000000006 a0 : 0000000000000007 a1 : 00000000000f0000 > a2 : ffffffff8042aac8 a3 : 0000000000000002 a4 : ff6000000e207200 > a5 : 0000000000000000 a6 : 0000000000000003 a7 : 0000000000000000 > s2 : fffffffeef001000 s3 : 00000000371000e7 s4 : ff6000007a660bc0 > s5 : 0000000000001000 s6 : fffffffeef001000 s7 : 0000000000000001 > s8 : ffffffff804d8484 s9 : 0000000000000000 s10: fffffffeef000000 > s11: 0000000000000000 t3 : fffffffff3f3f300 t4 : fffffffef0a07c70 > t5 : fffffffef0a07c71 t6 : ff6000000ebcccb8 > status: 0000000000000120 badaddr: 0000000000000000 cause: 0000000000000003 > [] apply_to_page_range+0x34/0x46 mm/memory.c:2769 > [] kasan_populate_vmalloc+0x52/0x5e mm/kasan/shadow.c:315 > [] alloc_vmap_area+0x4a6/0x1636 mm/vmalloc.c:1647 > [] __get_vm_area_node+0x272/0x3b0 mm/vmalloc.c:2515 > [] __vmalloc_node_range+0x280/0xdb8 mm/vmalloc.c:3187 > [] bpf_jit_alloc_exec+0x46/0x52 arch/riscv/net/bpf_jit_core.c:190 Here we can see that we are allocating the shadow memory for a BPF region which is *vmalloc-backed*: but the current upstream implementation does populate the BPF region at initialization, it does not shallow populate it. And we try to use huge pages when possible so that can trigger this warning here. This is something that I fixed in the following series: https://patchwork.kernel.org/project/linux-riscv/list/?series=705150 :) Glad to see syzbot running again, thanks Alex > [] bpf_jit_binary_alloc+0x96/0x13c kernel/bpf/core.c:1027 > [] bpf_int_jit_compile+0x87a/0xa8c arch/riscv/net/bpf_jit_core.c:112 > [] bpf_prog_select_runtime+0x1a2/0x22e kernel/bpf/core.c:2191 > [] bpf_migrate_filter+0x258/0x2be net/core/filter.c:1298 > [] bpf_prepare_filter+0x10e/0x1b4 net/core/filter.c:1346 > [] __get_filter+0x148/0x1a0 net/core/filter.c:1515 > [] sk_attach_filter+0x22/0x11a net/core/filter.c:1530 > [] sk_setsockopt+0x144e/0x270c net/core/sock.c:1297 > [] sock_setsockopt+0x48/0x58 net/core/sock.c:1549 > [] __sys_setsockopt+0x3f0/0x418 net/socket.c:2242 > [] __do_sys_setsockopt net/socket.c:2257 [inline] > [] sys_setsockopt+0x3a/0x4c net/socket.c:2254 > [] ret_from_syscall+0x0/0x2 > irq event stamp: 940 > hardirqs last enabled at (939): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline] > hardirqs last enabled at (939): [] _raw_spin_unlock_irqrestore+0x68/0x98 kernel/locking/spinlock.c:194 > hardirqs last disabled at (940): [] __trace_hardirqs_off+0x18/0x20 arch/riscv/kernel/trace_irq.c:25 > softirqs last enabled at (888): [] softirq_handle_end kernel/softirq.c:414 [inline] > softirqs last enabled at (888): [] __do_softirq+0x640/0x930 kernel/softirq.c:600 > softirqs last disabled at (883): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] > softirqs last disabled at (883): [] invoke_softirq kernel/softirq.c:452 [inline] > softirqs last disabled at (883): [] __irq_exit_rcu+0x154/0x1ea kernel/softirq.c:650 > ---[ end trace 0000000000000000 ]--- > > > --- > This report is generated by a bot. It may contain errors. > See https://goo.gl/tpsmEJ for more information about syzbot. > syzbot engineers can be reached at syzkaller@googlegroups.com. > > syzbot will keep track of this issue. See: > https://goo.gl/tpsmEJ#status for how to communicate with syzbot. > > _______________________________________________ > linux-riscv mailing list > linux-riscv@lists.infradead.org > http://lists.infradead.org/mailman/listinfo/linux-riscv