Received: by 10.192.165.148 with SMTP id m20csp1082378imm; Wed, 2 May 2018 13:50:38 -0700 (PDT) X-Google-Smtp-Source: AB8JxZqV7rJraV4CD7bOBXVT54Q84JGN7oKsccn3w2OjJ0tDdLpPoluyFdffFHeT6Rsrt1h7ErBF X-Received: by 10.98.202.74 with SMTP id n71mr20728922pfg.149.1525294237985; Wed, 02 May 2018 13:50:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525294237; cv=none; d=google.com; s=arc-20160816; b=o4DlRow1uF5FGk7/yQiq/BKFbU4REjO8KJnkOkXvp0pGlM78xj4DeK/svDPtDpAt1P NFIil7siegRAqroPEEHuXu28hOobtEtx6mVHe200zPup2uk008OWVSlp66qZAWy9a6vj Mf1XNxxcGN90wK0DhTF7YVnb2LGJuMEXMmH65AGhq8XRNL0yrB2MHlnFJ2ce2C1DmjvB qyB9HXBfU6MuYOEf6fupbjJG2FgXOJ4Mzp3lx/lUOj6+4ivjQFFEAvEusbz4SzR1gnOT TsHpwAJ3wUEbb5CGCZZDIMtJQ90e9Wze4N6HkIJTrYb0j9M4E4TwglHV0CyATzLwww0/ DClQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=A+QdfuPhN03o8iMF02clLqI2xVKuc/7SgU2ROgt1QpM=; b=svB5bAMgnFEaGORtGy00HnYEN9MY4NS3Civj0/JoDJZqkHNZqFOWw9w35Vh/34H858 VnXdDW8/WPEV4zhnuOUyXLMP+7hQI9enraXKTPT7drU2lP9KH6k8snQa006OT6usVTKq fnIJSXyHapIgPwZx4HZ/SVH8piygwiPWxviAX+Ts7wAj7DAw7UHv+oV7Hv3TSva4VQAc wpak9EjFTgMCPynT1f2zaI44MLGv9oi3DnI6/1jEcjAIrp44eVTXdB+G2B5fWN4RMKUW 0an40a3/PKXbVVcwN40cGyL+PBtlc2RXENf1yqWJKQDTOTZ9EvnwLHq5tIbXmPXFqVae o1JA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d10-v6si10228614pgu.626.2018.05.02.13.50.23; Wed, 02 May 2018 13:50:37 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751272AbeEBUuP (ORCPT + 99 others); Wed, 2 May 2018 16:50:15 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:54104 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1750939AbeEBUuK (ORCPT ); Wed, 2 May 2018 16:50:10 -0400 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.rdu2.redhat.com [10.11.54.4]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 4B86C406C759; Wed, 2 May 2018 20:50:10 +0000 (UTC) Received: from treble (ovpn-123-232.rdu2.redhat.com [10.10.123.232]) by smtp.corp.redhat.com (Postfix) with SMTP id E31532022DE3; Wed, 2 May 2018 20:50:09 +0000 (UTC) Date: Wed, 2 May 2018 15:50:09 -0500 From: Josh Poimboeuf To: Vince Weaver Cc: Peter Zijlstra , Ingo Molnar , linux-kernel@vger.kernel.org, Arnaldo Carvalho de Melo , Thomas Gleixner , Andy Lutomirski Subject: Re: perf: fuzzer causes stack going in wrong direction warnings Message-ID: <20180502205009.codkvscnh4j4hm6b@treble> References: <20180109160551.GK3040@hirez.programming.kicks-ass.net> <20180109170716.bqmexpmywwr4bwuv@treble> <20180111052538.2qhj6oxnc24xumhk@treble> <20180111192112.d35nkotzklicd27c@treble> <20180501135850.enx4waqd5d7yowlj@treble> <20180501220458.p3rgwzh3jcqt4jmm@treble> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20180501220458.p3rgwzh3jcqt4jmm@treble> User-Agent: Mutt/1.6.0.1 (2016-04-01) X-Scanned-By: MIMEDefang 2.78 on 10.11.54.4 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.5]); Wed, 02 May 2018 20:50:10 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.5]); Wed, 02 May 2018 20:50:10 +0000 (UTC) for IP:'10.11.54.4' DOMAIN:'int-mx04.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'jpoimboe@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, May 01, 2018 at 05:04:58PM -0500, Josh Poimboeuf wrote: > On Tue, May 01, 2018 at 03:59:31PM -0400, Vince Weaver wrote: > > On Tue, 1 May 2018, Josh Poimboeuf wrote: > > > > > Can you try the following patch? > > > > I applied the patch, but the warnings don't really look that different. > > > > [ 62.220322] WARNING: stack recursion on stack type 4 > > [ 62.220326] WARNING: can't dereference registers at 000000009ca2e86d for ip swapgs_restore_regs_and_return_to_usermode+0x79/0x87 > > [ 367.597013] WARNING: stack going in the wrong direction? ip=native_sched_clock+0x9/0x90 > > Bummer. I'll need to come up with a patch to dump more info. After looking closer, I realized that at least some of these warnings are due to bad unwind hints in the entry code. Can you try this patch instead of the last one? diff --git a/arch/x86/entry/calling.h b/arch/x86/entry/calling.h index be63330c5511..73f5d4c10304 100644 --- a/arch/x86/entry/calling.h +++ b/arch/x86/entry/calling.h @@ -165,6 +165,7 @@ For 32-bit we have the following conventions - kernel is built with .endif popq %rdx popq %rsi + UNWIND_HINT_IRET_REGS offset=16 .if \pop_rdi popq %rdi .endif diff --git a/arch/x86/entry/entry_64.S b/arch/x86/entry/entry_64.S index 805f52703ee3..c6c54ce30090 100644 --- a/arch/x86/entry/entry_64.S +++ b/arch/x86/entry/entry_64.S @@ -306,7 +306,6 @@ GLOBAL(entry_SYSCALL_64_after_hwframe) */ syscall_return_via_sysret: /* rcx and r11 are already restored (see code above) */ - UNWIND_HINT_EMPTY POP_REGS pop_rdi=0 skip_r11rcx=1 /* @@ -315,6 +314,7 @@ syscall_return_via_sysret: */ movq %rsp, %rdi movq PER_CPU_VAR(cpu_tss_rw + TSS_sp0), %rsp + UNWIND_HINT_EMPTY pushq RSP-RDI(%rdi) /* RSP */ pushq (%rdi) /* RDI */ @@ -666,6 +666,7 @@ GLOBAL(swapgs_restore_regs_and_return_to_usermode) */ movq %rsp, %rdi movq PER_CPU_VAR(cpu_tss_rw + TSS_sp0), %rsp + UNWIND_HINT_EMPTY /* Copy the IRET frame to the trampoline stack. */ pushq 6*8(%rdi) /* SS */ @@ -1640,6 +1641,7 @@ nmi_restore: * at the "iret" frame. */ addq $6*8, %rsp + UNWIND_HINT_IRET_REGS /* * Clear "NMI executing". Set DF first so that we can easily diff --git a/tools/objtool/check.c b/tools/objtool/check.c index 92b6a2c21631..d66f14bb6c50 100644 --- a/tools/objtool/check.c +++ b/tools/objtool/check.c @@ -1239,7 +1239,7 @@ static int update_insn_state_regs(struct instruction *insn, struct insn_state *s struct cfi_reg *cfa = &state->cfa; struct stack_op *op = &insn->stack_op; - if (cfa->base != CFI_SP) + if (cfa->base != CFI_SP && cfa->base != CFI_SP_INDIRECT) return 0; /* push */