Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3225023imu; Thu, 29 Nov 2018 18:22:54 -0800 (PST) X-Google-Smtp-Source: AFSGD/WSmIk4oG7XedyqUOqVK5Y9M9rC0h6T4VvM/HBhHyoISFvplEqwYNsN8u2+UYMor1OxG+K1 X-Received: by 2002:a63:7c13:: with SMTP id x19mr3276315pgc.45.1543544574665; Thu, 29 Nov 2018 18:22:54 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543544574; cv=none; d=google.com; s=arc-20160816; b=jAnbbjxUcP+8Fzqk8Ry7iJBGjdj+2x+Z/Ph3dVUnfJc3mSzKtp8p1Skj8qCZCD6uEg xM8tc/Perut8daoIEs9lI8j0j1YvtSP8pyRbI9sdKfz8LboC+0/z3JtcIAjuI6XJclvQ WkoMr4UnvVROgkhPwLFj3DT7CvyEcVW4iGsNcU/kGko1kwhpTCOqEZkQ9o08oxczDNmK x9q6BdDxeANbRF5ryy8AbcO+wqLn2eYqIOIglbi3p9vxcaKGz1xVooVo3GPmJf0cCTKf DxjSWMX19f3pnuDVWJZZmd3t1TsOChcC8cuDPM2+kULRPMtXNTS3LdDUdF0dFEXmf5ee mRcw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:content-transfer-encoding :content-language:accept-language:references:message-id:date :thread-index:thread-topic:subject:cc:to:from; bh=MMl7SZ11o0WNhwqfEqczo5eUfP2kQ+kVjY2tShx8dhA=; b=QMUPxGFdL/Z3FPeXO/jBa0PH8gaCDHsO51p/qsX0DqMBPMMREU7AzxpGHKSikEZuNI WwEpeODXCjSE3B38VwHtRl+EEMav96aS9U5n89Lgls4TO58z7hg5O3xbVGI8wzt17Oj6 HQ54UWExDNFicCULfEDHIUgP1k+BdyMaDLQfBAprxFqrdAPok/IOTCSBFiiPA3D2hLKc KejXVxii6D7PJsHRDWgPYZWXBNCZyR0pm4WvmiqSNQdXPquqb4LlRcrl3YjFXotJ3U+R RoCX2F1xHt6PSMxIHsX39SqF/bHhi4oyii0kTkpB7I7/+Rp1KT3NXlvwjdTpmI0Z0tU0 ebTg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y17si3804995pll.10.2018.11.29.18.22.40; Thu, 29 Nov 2018 18:22:54 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727050AbeK3N2P convert rfc822-to-8bit (ORCPT + 99 others); Fri, 30 Nov 2018 08:28:15 -0500 Received: from mx01.hxt-semitech.com ([223.203.96.7]:33915 "EHLO barracuda.hxt-semitech.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726549AbeK3N2P (ORCPT ); Fri, 30 Nov 2018 08:28:15 -0500 X-ASG-Debug-ID: 1543544432-093b7e197b41010001-xx1T2L Received: from HXTBJIDCEMVIW01.hxtcorp.net ([10.128.0.14]) by barracuda.hxt-semitech.com with ESMTP id AzM3INU2B5I8Heq5 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NO); Fri, 30 Nov 2018 10:20:32 +0800 (CST) X-Barracuda-Envelope-From: dongsheng.wang@hxt-semitech.com Received: from HXTBJIDCEMVIW02.hxtcorp.net (10.128.0.15) by HXTBJIDCEMVIW01.hxtcorp.net (10.128.0.14) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Fri, 30 Nov 2018 10:19:46 +0800 Received: from HXTBJIDCEMVIW02.hxtcorp.net ([fe80::3e:f4ff:7927:a6f6]) by HXTBJIDCEMVIW02.hxtcorp.net ([fe80::3e:f4ff:7927:a6f6%12]) with mapi id 15.00.1395.000; Fri, 30 Nov 2018 10:19:46 +0800 From: "Wang, Dongsheng" To: Kees Cook CC: David Howells , Thomas Gleixner , Ingo Molnar , Andrew Morton , Masahiro Yamada , Tony Luck , Will Deacon , Palmer Dabbelt , "Zheng, Joey" , LKML , "Yang, Shunyong" , Greg KH , "# 3.4.x" Subject: Re: [PATCH 1/1] sched/headers: fix thread_info. is overwritten by STACK_END_MAGIC Thread-Topic: [PATCH 1/1] sched/headers: fix thread_info. is overwritten by STACK_END_MAGIC X-ASG-Orig-Subj: Re: [PATCH 1/1] sched/headers: fix thread_info. is overwritten by STACK_END_MAGIC Thread-Index: AQHUgwHXQvH51CSg9UWtTixRCjaq8A== Date: Fri, 30 Nov 2018 02:19:46 +0000 Message-ID: <24e0c18ed41c44828c753ce9ed3016a5@HXTBJIDCEMVIW02.hxtcorp.net> References: <19391812db6444f3bd260546acded9b7@HXTBJIDCEMVIW02.hxtcorp.net> <810b0ad91d5547c5bbbec1b61c119bdc@HXTBJIDCEMVIW02.hxtcorp.net> Accept-Language: zh-CN, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [10.64.6.159] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 8BIT MIME-Version: 1.0 X-Barracuda-Connect: UNKNOWN[10.128.0.14] X-Barracuda-Start-Time: 1543544432 X-Barracuda-Encrypted: ECDHE-RSA-AES256-SHA384 X-Barracuda-URL: https://192.168.50.101:443/cgi-mod/mark.cgi X-Virus-Scanned: by bsmtpd at hxt-semitech.com X-Barracuda-BRTS-Status: 1 X-Barracuda-Bayes: INNOCENT GLOBAL 0.5000 1.0000 0.0000 X-Barracuda-Spam-Score: 0.00 X-Barracuda-Spam-Status: No, SCORE=0.00 using global scores of TAG_LEVEL=1000.0 QUARANTINE_LEVEL=1000.0 KILL_LEVEL=9.0 tests= X-Barracuda-Spam-Report: Code version 3.2, rules version 3.2.3.62725 Rule breakdown below pts rule name description ---- ---------------------- -------------------------------------------------- Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2018/11/30 10:04, Wang, Dongsheng wrote: > On 2018/11/30 5:22, Kees Cook wrote: >> On Tue, Nov 27, 2018 at 8:38 PM Wang, Dongsheng >> wrote: >>> Hello Kees, >>> >>> On 2018/11/28 6:38, Kees Cook wrote: >>>> On Thu, Nov 22, 2018 at 11:54 PM, Wang Dongsheng >>>> wrote: >>>>> When select ARCH_TASK_STRUCT_ON_STACK the first of thread_info variable >>>>> is overwritten by STACK_END_MAGIC. In fact, the ARCH_TASK_STRUCT_ON_STACK >>>>> is not a real task on stack, it's only init_task on init_stack. >>>>> >>>>> Commit 0500871f21b2 ("Construct init thread stack in the linker script >>>>> rather than by union") added this macro and put task_strcut into >>>>> thread_union. This brings us the following possibilities: >>>>> TASK_ON_STACK THREAD_INFO_IN_TASK STACK >>>>> ----- <-- thread_info & stack >>>>> N N | | --- <-- task >>>>> | | | | >>>>> ----- --- >>>>> >>>>> ----- <-- stack >>>>> N Y | | --- <-- task(Including thread_info) >>>>> | | | | >>>>> ----- --- >>>>> >>>>> ----- <-- stack & task & thread_info >>>>> Y N | | >>>>> | | >>>>> ----- >>>>> >>>>> ----- <-- stack & task(Including thread_info) >>>>> Y Y | | >>>>> | | >>>>> ----- >>>>> The kernel has handled the first two cases correctly. >>>>> >>>>> For the third case: >>>>> TASK_ON_STACK: Y. THREAD_INFO_IN_TASK: N. this case >>>>> should never happen, because the task and thread_info will overlap. So >>>>> when TASK_ON_STACK is selected, THREAD_INFO_IN_TASK must be selected too. >>>>> >>>>> For the fourth case: >>>>> When task on stack, the end of stack should add a sizeof(task_struct) offset. >>>>> >>>>> This patch handled with the third and fourth case. >>>>> >>>>> Fixes: 0500871f21b2 ("Construct init thread stack in the linker ...") >>>>> >>>>> Signed-off-by: Wang Dongsheng >>>>> Signed-off-by: Shunyong Yang >>>>> --- >>>>> arch/Kconfig | 1 + >>>>> include/linux/sched/task_stack.h | 5 ++++- >>>>> 2 files changed, 5 insertions(+), 1 deletion(-) >>>>> >>>>> diff --git a/arch/Kconfig b/arch/Kconfig >>>>> index e1e540ffa979..0a2c73e73195 100644 >>>>> --- a/arch/Kconfig >>>>> +++ b/arch/Kconfig >>>>> @@ -251,6 +251,7 @@ config ARCH_HAS_SET_MEMORY >>>>> # Select if arch init_task must go in the __init_task_data section >>>>> config ARCH_TASK_STRUCT_ON_STACK >>>>> bool >>>>> + depends on THREAD_INFO_IN_TASK || IA64 >>>> The "IA64" part shouldn't be needed since IA64 already selects it. >>>> >>>> Since it's selected, it also can't have a depends, IIUC. >>> Since the IA64 thread_info including task_struct, it doesn't need to >>> select THREAD_INFO_IN_TASK. >>> So we need to allow IA64 select ARCH_TASK_STRUCT_ON_STACK without >>> THREAD_INFO. >> Okay. >> >>>>> # Select if arch has its private alloc_task_struct() function >>>>> config ARCH_TASK_STRUCT_ALLOCATOR >>>>> diff --git a/include/linux/sched/task_stack.h b/include/linux/sched/task_stack.h >>>>> index 6a841929073f..624c48defb9e 100644 >>>>> --- a/include/linux/sched/task_stack.h >>>>> +++ b/include/linux/sched/task_stack.h >>>>> @@ -7,6 +7,7 @@ >>>>> */ >>>>> >>>>> #include >>>>> +#include >>>>> #include >>>>> >>>>> #ifdef CONFIG_THREAD_INFO_IN_TASK >>>>> @@ -25,7 +26,9 @@ static inline void *task_stack_page(const struct task_struct *task) >>>>> >>>>> static inline unsigned long *end_of_stack(const struct task_struct *task) >>>>> { >>>>> - return task->stack; >>>>> + if (!IS_ENABLED(CONFIG_ARCH_TASK_STRUCT_ON_STACK) || task != &init_task) >>>>> + return task->stack; >>>>> + return (unsigned long *)(task + 1); >>>>> } >>>> This seems like a strange place for the change. It feels more like >>>> init_task has been defined incorrectly. >>> The init_task will put into init_stack when ARCH_TASK_STRUCT_ON_STACK is >>> selected. >>> include/asm-generic/vmlinux.lds.h: >>> #define INIT_TASK_DATA(align) \ >>> . = ALIGN(align); \ >>> __start_init_task = .; \ >>> init_thread_union = .; \ >>> init_stack = .; \ >>> KEEP(*(.data..init_task)) \ >>> KEEP(*(.data..init_thread_info)) \ >>> . = __start_init_task + THREAD_SIZE; \ >>> __end_init_task = .; >>> >>> So we need end_of_stack to offset sizeof(task_struct). >> Well, I guess I mean I'd rather the end_of_stack() code not be >> special-cased in the if. The default should be how it was. Perhaps: >> >> if (IS_ENABLED(CONFIG_ARCH_TASK_STRUCT_ON_STACK) && task == &init_task) About this special case: As I mentioned in the description of patch, The ARCH_TASK_STRUCT_ON_STACK is not a real task on stack, it's only init_task on init_stack. The alloc task is not in alloc stack, So if condition including "task == &init_task". Cheers, Dongsheng >> return (unsigned long *)(task + 1); >> return task->stack; >> >> But it still feels strange: why can't task->stack point to the correct >> place in this special case? > Normally, task->stack is the bottom of the stack, the end_of_stack just > need to return task->stack. > The task->stack always represents the bottom of the stack, and it cannot > be changed, so what > happens here is we have some data(task or thread info)that we want to > put at the bottom of the > stack. The end_of_stack just refers to the size of the stack available > to us. > In ARCH_TASK_STRUCT_ON_STACK case, the init_task has been placed in a > fixed location, the task > is placed at the bottom of the stack. Current end_of_stack doesn't > handle this situation, so we need > add a if condition to handle it. And this is just like > !THREAD_INFO_IN_TASK(the thead_info on stack), > the thread_info is placed at the bottom of the stack, the end_of_stack = > the bottom of stack + sizeof(*thread_info). > > > Cheers, > Dongsheng > >