Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp1335717imu; Tue, 11 Dec 2018 17:46:47 -0800 (PST) X-Google-Smtp-Source: AFSGD/XYesz5y3Jn/ZY8SG8hT0sV/rMsPhMLdTqEAR0GCMmkaHdJnotwFTfILoD5q56G+gT7SzwH X-Received: by 2002:a65:5387:: with SMTP id x7mr16748468pgq.412.1544579207631; Tue, 11 Dec 2018 17:46:47 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544579207; cv=none; d=google.com; s=arc-20160816; b=f6BB3kgzEG/rvHb8uQylAeRNOQhQSFTdul6xKDmVpw9rtx9kPIiLr3qyOzIsJwjxjm AxpBy+1I46WnFQgFo8B4MBmodzs6SwhQtOtJ0WFv9ej2JavWhftbdvTlNnrxgIEfZvcc DYJftDI8Cgfku1m4QDXvyixqu5/MYmuYwFjr2cBs0X1iiyd7YvPwd6GQgut9QoF1xuZX e/EVe1ZDnsMkUygdCxsqi4cVZJffPGBIX98gCSXbNQwPOwP7Bu3mN09bgChav1OwGtl2 Cl2mCWvvzWns/D0UFcteiih8OJFyGWOJk5++Cq1A0OeUFTHYNl00x+KmIgUbuzt29pch OqKw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:content-transfer-encoding :content-language:accept-language:references:message-id:date :thread-index:thread-topic:subject:cc:to:from; bh=rkSWbzidPGUB2yYDurpu+Jqw6tdkB+Tm55fwB38muFA=; b=KvKno64y5pvn0h68HdYt5lwyyEPXgpqo0IgZVG2dTjIXReVFR1RZHMQgiUPSWQhxK1 0Lo6ckgT6AafASawVUWBv/HE8UIrI0LNQmRbOUfaro7hZVR5jFBx2Hzk4F3A9gSkgS/7 B8ny6qZXKV15Z2jR/6WVTP+d4reNb1qm+QZmCk48/L6bDdV0OKsvSNk1sX7SMckjSaVs ztbx9w4A7PYc622Jwbm/YC2jJdTPDb32DcvBf/yO5FK8U9XdQwASgpt/m4bVEfne0xVl X7wRt3Xxf5DSfVq6Wofdlb2ne/jREY0wzpn4Omm0lvoYSM+cdeEgnlpYNf2qTYZp9L3E 8Kjg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 8si13770946plc.88.2018.12.11.17.46.19; Tue, 11 Dec 2018 17:46:47 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726246AbeLLBp1 convert rfc822-to-8bit (ORCPT + 99 others); Tue, 11 Dec 2018 20:45:27 -0500 Received: from mx01.hxt-semitech.com ([223.203.96.7]:51316 "EHLO barracuda.hxt-semitech.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726201AbeLLBp1 (ORCPT ); Tue, 11 Dec 2018 20:45:27 -0500 X-ASG-Debug-ID: 1544579110-093b7e7c620e9e0001-xx1T2L Received: from HXTBJIDCEMVIW01.hxtcorp.net ([10.128.0.14]) by barracuda.hxt-semitech.com with ESMTP id bgasBRbR4NlufTtF (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NO); Wed, 12 Dec 2018 09:45:11 +0800 (CST) X-Barracuda-Envelope-From: dongsheng.wang@hxt-semitech.com Received: from HXTBJIDCEMVIW02.hxtcorp.net (10.128.0.15) by HXTBJIDCEMVIW01.hxtcorp.net (10.128.0.14) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Wed, 12 Dec 2018 09:44:18 +0800 Received: from HXTBJIDCEMVIW02.hxtcorp.net ([fe80::3e:f4ff:7927:a6f6]) by HXTBJIDCEMVIW02.hxtcorp.net ([fe80::3e:f4ff:7927:a6f6%12]) with mapi id 15.00.1395.000; Wed, 12 Dec 2018 09:44:18 +0800 From: "Wang, Dongsheng" To: Kees Cook CC: David Howells , Thomas Gleixner , Ingo Molnar , Andrew Morton , Masahiro Yamada , Tony Luck , Will Deacon , Palmer Dabbelt , "Zheng, Joey" , LKML , "Yang, Shunyong" , Greg KH , "# 3.4.x" Subject: Re: [PATCH 1/1] sched/headers: fix thread_info. is overwritten by STACK_END_MAGIC Thread-Topic: [PATCH 1/1] sched/headers: fix thread_info. is overwritten by STACK_END_MAGIC X-ASG-Orig-Subj: Re: [PATCH 1/1] sched/headers: fix thread_info. is overwritten by STACK_END_MAGIC Thread-Index: AQHUgwHXQvH51CSg9UWtTixRCjaq8A== Date: Wed, 12 Dec 2018 01:44:17 +0000 Message-ID: <1ff3b0c160a342b0a27852db60e95a2e@HXTBJIDCEMVIW02.hxtcorp.net> References: <19391812db6444f3bd260546acded9b7@HXTBJIDCEMVIW02.hxtcorp.net> <810b0ad91d5547c5bbbec1b61c119bdc@HXTBJIDCEMVIW02.hxtcorp.net> <24e0c18ed41c44828c753ce9ed3016a5@HXTBJIDCEMVIW02.hxtcorp.net> Accept-Language: zh-CN, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [192.168.50.13] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 8BIT MIME-Version: 1.0 X-Barracuda-Connect: UNKNOWN[10.128.0.14] X-Barracuda-Start-Time: 1544579111 X-Barracuda-Encrypted: ECDHE-RSA-AES256-SHA384 X-Barracuda-URL: https://192.168.50.101:443/cgi-mod/mark.cgi X-Virus-Scanned: by bsmtpd at hxt-semitech.com X-Barracuda-BRTS-Status: 1 X-Barracuda-Bayes: INNOCENT GLOBAL 0.5000 1.0000 0.0000 X-Barracuda-Spam-Score: 0.00 X-Barracuda-Spam-Status: No, SCORE=0.00 using global scores of TAG_LEVEL=1000.0 QUARANTINE_LEVEL=1000.0 KILL_LEVEL=9.0 tests= X-Barracuda-Spam-Report: Code version 3.2, rules version 3.2.3.63625 Rule breakdown below pts rule name description ---- ---------------------- -------------------------------------------------- Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello all, Any comments about this patch? Cheers, Dongsheng On 2018/11/30 10:19, Wang, Dongsheng wrote: > On 2018/11/30 10:04, Wang, Dongsheng wrote: >> On 2018/11/30 5:22, Kees Cook wrote: >>> On Tue, Nov 27, 2018 at 8:38 PM Wang, Dongsheng >>> wrote: >>>> Hello Kees, >>>> >>>> On 2018/11/28 6:38, Kees Cook wrote: >>>>> On Thu, Nov 22, 2018 at 11:54 PM, Wang Dongsheng >>>>> wrote: >>>>>> When select ARCH_TASK_STRUCT_ON_STACK the first of thread_info variable >>>>>> is overwritten by STACK_END_MAGIC. In fact, the ARCH_TASK_STRUCT_ON_STACK >>>>>> is not a real task on stack, it's only init_task on init_stack. >>>>>> >>>>>> Commit 0500871f21b2 ("Construct init thread stack in the linker script >>>>>> rather than by union") added this macro and put task_strcut into >>>>>> thread_union. This brings us the following possibilities: >>>>>> TASK_ON_STACK THREAD_INFO_IN_TASK STACK >>>>>> ----- <-- thread_info & stack >>>>>> N N | | --- <-- task >>>>>> | | | | >>>>>> ----- --- >>>>>> >>>>>> ----- <-- stack >>>>>> N Y | | --- <-- task(Including thread_info) >>>>>> | | | | >>>>>> ----- --- >>>>>> >>>>>> ----- <-- stack & task & thread_info >>>>>> Y N | | >>>>>> | | >>>>>> ----- >>>>>> >>>>>> ----- <-- stack & task(Including thread_info) >>>>>> Y Y | | >>>>>> | | >>>>>> ----- >>>>>> The kernel has handled the first two cases correctly. >>>>>> >>>>>> For the third case: >>>>>> TASK_ON_STACK: Y. THREAD_INFO_IN_TASK: N. this case >>>>>> should never happen, because the task and thread_info will overlap. So >>>>>> when TASK_ON_STACK is selected, THREAD_INFO_IN_TASK must be selected too. >>>>>> >>>>>> For the fourth case: >>>>>> When task on stack, the end of stack should add a sizeof(task_struct) offset. >>>>>> >>>>>> This patch handled with the third and fourth case. >>>>>> >>>>>> Fixes: 0500871f21b2 ("Construct init thread stack in the linker ...") >>>>>> >>>>>> Signed-off-by: Wang Dongsheng >>>>>> Signed-off-by: Shunyong Yang >>>>>> --- >>>>>> arch/Kconfig | 1 + >>>>>> include/linux/sched/task_stack.h | 5 ++++- >>>>>> 2 files changed, 5 insertions(+), 1 deletion(-) >>>>>> >>>>>> diff --git a/arch/Kconfig b/arch/Kconfig >>>>>> index e1e540ffa979..0a2c73e73195 100644 >>>>>> --- a/arch/Kconfig >>>>>> +++ b/arch/Kconfig >>>>>> @@ -251,6 +251,7 @@ config ARCH_HAS_SET_MEMORY >>>>>> # Select if arch init_task must go in the __init_task_data section >>>>>> config ARCH_TASK_STRUCT_ON_STACK >>>>>> bool >>>>>> + depends on THREAD_INFO_IN_TASK || IA64 >>>>> The "IA64" part shouldn't be needed since IA64 already selects it. >>>>> >>>>> Since it's selected, it also can't have a depends, IIUC. >>>> Since the IA64 thread_info including task_struct, it doesn't need to >>>> select THREAD_INFO_IN_TASK. >>>> So we need to allow IA64 select ARCH_TASK_STRUCT_ON_STACK without >>>> THREAD_INFO. >>> Okay. >>> >>>>>> # Select if arch has its private alloc_task_struct() function >>>>>> config ARCH_TASK_STRUCT_ALLOCATOR >>>>>> diff --git a/include/linux/sched/task_stack.h b/include/linux/sched/task_stack.h >>>>>> index 6a841929073f..624c48defb9e 100644 >>>>>> --- a/include/linux/sched/task_stack.h >>>>>> +++ b/include/linux/sched/task_stack.h >>>>>> @@ -7,6 +7,7 @@ >>>>>> */ >>>>>> >>>>>> #include >>>>>> +#include >>>>>> #include >>>>>> >>>>>> #ifdef CONFIG_THREAD_INFO_IN_TASK >>>>>> @@ -25,7 +26,9 @@ static inline void *task_stack_page(const struct task_struct *task) >>>>>> >>>>>> static inline unsigned long *end_of_stack(const struct task_struct *task) >>>>>> { >>>>>> - return task->stack; >>>>>> + if (!IS_ENABLED(CONFIG_ARCH_TASK_STRUCT_ON_STACK) || task != &init_task) >>>>>> + return task->stack; >>>>>> + return (unsigned long *)(task + 1); >>>>>> } >>>>> This seems like a strange place for the change. It feels more like >>>>> init_task has been defined incorrectly. >>>> The init_task will put into init_stack when ARCH_TASK_STRUCT_ON_STACK is >>>> selected. >>>> include/asm-generic/vmlinux.lds.h: >>>> #define INIT_TASK_DATA(align) \ >>>> . = ALIGN(align); \ >>>> __start_init_task = .; \ >>>> init_thread_union = .; \ >>>> init_stack = .; \ >>>> KEEP(*(.data..init_task)) \ >>>> KEEP(*(.data..init_thread_info)) \ >>>> . = __start_init_task + THREAD_SIZE; \ >>>> __end_init_task = .; >>>> >>>> So we need end_of_stack to offset sizeof(task_struct). >>> Well, I guess I mean I'd rather the end_of_stack() code not be >>> special-cased in the if. The default should be how it was. Perhaps: >>> >>> if (IS_ENABLED(CONFIG_ARCH_TASK_STRUCT_ON_STACK) && task == &init_task) > About this special case: > As I mentioned in the description of patch, The > ARCH_TASK_STRUCT_ON_STACK is not a real task on stack, it's only > init_task on init_stack. > The alloc task is not in alloc stack, So if condition including "task == > &init_task". > > Cheers, > Dongsheng > >>> return (unsigned long *)(task + 1); >>> return task->stack; >>> >>> But it still feels strange: why can't task->stack point to the correct >>> place in this special case? >> Normally, task->stack is the bottom of the stack, the end_of_stack just >> need to return task->stack. >> The task->stack always represents the bottom of the stack, and it cannot >> be changed, so what >> happens here is we have some data(task or thread info)that we want to >> put at the bottom of the >> stack. The end_of_stack just refers to the size of the stack available >> to us. >> In ARCH_TASK_STRUCT_ON_STACK case, the init_task has been placed in a >> fixed location, the task >> is placed at the bottom of the stack. Current end_of_stack doesn't >> handle this situation, so we need >> add a if condition to handle it. And this is just like >> !THREAD_INFO_IN_TASK(the thead_info on stack), >> the thread_info is placed at the bottom of the stack, the end_of_stack = >> the bottom of stack + sizeof(*thread_info). >> >> >> Cheers, >> Dongsheng >> >> >