Received: by 2002:ac0:8c9a:0:0:0:0:0 with SMTP id r26csp4923139ima; Tue, 5 Feb 2019 03:38:47 -0800 (PST) X-Google-Smtp-Source: AHgI3IYCn4R/EF1CUEUkY+u+coC4AkLDaEJjOhvyL5bC0l0jG/H+Rn/hvm8fQd3LckwP9yFnyXbV X-Received: by 2002:a63:5b1f:: with SMTP id p31mr4158418pgb.56.1549366727171; Tue, 05 Feb 2019 03:38:47 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1549366727; cv=none; d=google.com; s=arc-20160816; b=z04ToitTPYt1a+8xzdliC0AHZPw1DG4W5BfT3QNPEsICOnmlvB5zJmJylWOWx/uVKi 7Uvoy1cp5qvXq/slJCS7qxJChU4Xd9ELceSgY1WEDMinWuAOpxQduMQeLT2N36HZEOms 1OQ7k4fEpN9//9YM8IC9Zofs/ww6aeES6n+0xSulXZdVNUHpygfcuOMdQojo4Fdl7qRw dP+/a7rijw+BWhhNaFm7Fsl4FM4HrCv+tyy8TAED5C08zkZSkdfBtEA+JwvUiQjTHtG9 xb/8tIChwIPk2Nbm2BVe8hKnQdxUxzaO4NwHr07n9wf+JEG654rLCllt6ON25ID9lCFH 7/Ug== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:references :in-reply-to:subject:cc:to:from; bh=V4YHJOc2yh743etMN0qGnY8dbOrh2Qu+ipsjqm0fYJw=; b=xTDq8GZnJ0oidbBCm4fxicQlT5YfxvFKS8d6TLnetTa2+MzUQ98EA/OGXEumYGYxX+ SYB+teN7VYkXZK4exBycDmqJKXT6iDQS1qyQKaJgBflALeEOK7rynCGalVFs4mrlvHSi Vimkbd5AFutfPhAsWMkdboQRBWebkWlfnGFde8m+cIgDmyFLlIRBsUCw21b7U+AGSW9A hhKttG90y97xbSrTU5Pulp6IjOIvaewgPLdSt74rSBzeAKUMXUnrKBwCV9+Arr8q56IQ eClr91r6iu403Zayj15GWeX5UFW2vawcWDw8tyietWzTYsoa+zeNT7J0cx6dTsBMyZQW 0UaA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e35si420870pgb.548.2019.02.05.03.38.31; Tue, 05 Feb 2019 03:38:47 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728653AbfBELYY (ORCPT + 99 others); Tue, 5 Feb 2019 06:24:24 -0500 Received: from ozlabs.org ([203.11.71.1]:36063 "EHLO ozlabs.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727687AbfBELYY (ORCPT ); Tue, 5 Feb 2019 06:24:24 -0500 Received: from authenticated.ozlabs.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPSA id 43v2KJ4FCKz9s4V; Tue, 5 Feb 2019 22:24:20 +1100 (AEDT) From: Michael Ellerman To: Balbir Singh , Joe Lawrence Cc: "linux-kernel\@vger.kernel.org" , "open list\:LINUX FOR POWERPC \(32-BIT AND 64-BIT\)" , live-patching@vger.kernel.org, Jiri Kosina , Josh Poimboeuf , Nicolai Stange , Torsten Duwe Subject: Re: [PATCH 1/4] powerpc/64s: Clear on-stack exception marker upon exception return In-Reply-To: References: <20190122155724.27557-1-joe.lawrence@redhat.com> <20190122155724.27557-2-joe.lawrence@redhat.com> <20190202011455.GN26056@350D> Date: Tue, 05 Feb 2019 22:24:19 +1100 Message-ID: <87bm3qmqak.fsf@concordia.ellerman.id.au> MIME-Version: 1.0 Content-Type: text/plain Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Balbir Singh writes: > On Sat, Feb 2, 2019 at 12:14 PM Balbir Singh wrote: >> >> On Tue, Jan 22, 2019 at 10:57:21AM -0500, Joe Lawrence wrote: >> > From: Nicolai Stange >> > >> > The ppc64 specific implementation of the reliable stacktracer, >> > save_stack_trace_tsk_reliable(), bails out and reports an "unreliable >> > trace" whenever it finds an exception frame on the stack. Stack frames >> > are classified as exception frames if the STACK_FRAME_REGS_MARKER magic, >> > as written by exception prologues, is found at a particular location. >> > >> > However, as observed by Joe Lawrence, it is possible in practice that >> > non-exception stack frames can alias with prior exception frames and thus, >> > that the reliable stacktracer can find a stale STACK_FRAME_REGS_MARKER on >> > the stack. It in turn falsely reports an unreliable stacktrace and blocks >> > any live patching transition to finish. Said condition lasts until the >> > stack frame is overwritten/initialized by function call or other means. >> > >> > In principle, we could mitigate this by making the exception frame >> > classification condition in save_stack_trace_tsk_reliable() stronger: >> > in addition to testing for STACK_FRAME_REGS_MARKER, we could also take into >> > account that for all exceptions executing on the kernel stack >> > - their stack frames's backlink pointers always match what is saved >> > in their pt_regs instance's ->gpr[1] slot and that >> > - their exception frame size equals STACK_INT_FRAME_SIZE, a value >> > uncommonly large for non-exception frames. >> > >> > However, while these are currently true, relying on them would make the >> > reliable stacktrace implementation more sensitive towards future changes in >> > the exception entry code. Note that false negatives, i.e. not detecting >> > exception frames, would silently break the live patching consistency model. >> > >> > Furthermore, certain other places (diagnostic stacktraces, perf, xmon) >> > rely on STACK_FRAME_REGS_MARKER as well. >> > >> > Make the exception exit code clear the on-stack STACK_FRAME_REGS_MARKER >> > for those exceptions running on the "normal" kernel stack and returning >> > to kernelspace: because the topmost frame is ignored by the reliable stack >> > tracer anyway, returns to userspace don't need to take care of clearing >> > the marker. >> > >> > Furthermore, as I don't have the ability to test this on Book 3E or >> > 32 bits, limit the change to Book 3S and 64 bits. >> > >> > Finally, make the HAVE_RELIABLE_STACKTRACE Kconfig option depend on >> > PPC_BOOK3S_64 for documentation purposes. Before this patch, it depended >> > on PPC64 && CPU_LITTLE_ENDIAN and because CPU_LITTLE_ENDIAN implies >> > PPC_BOOK3S_64, there's no functional change here. >> > >> > Fixes: df78d3f61480 ("powerpc/livepatch: Implement reliable stack tracing for the consistency model") >> > Reported-by: Joe Lawrence >> > Signed-off-by: Nicolai Stange >> > Signed-off-by: Joe Lawrence >> > --- >> > arch/powerpc/Kconfig | 2 +- >> > arch/powerpc/kernel/entry_64.S | 7 +++++++ >> > 2 files changed, 8 insertions(+), 1 deletion(-) >> > >> > diff --git a/arch/powerpc/Kconfig b/arch/powerpc/Kconfig >> > index 2890d36eb531..73bf87b1d274 100644 >> > --- a/arch/powerpc/Kconfig >> > +++ b/arch/powerpc/Kconfig >> > @@ -220,7 +220,7 @@ config PPC >> > select HAVE_PERF_USER_STACK_DUMP >> > select HAVE_RCU_TABLE_FREE if SMP >> > select HAVE_REGS_AND_STACK_ACCESS_API >> > - select HAVE_RELIABLE_STACKTRACE if PPC64 && CPU_LITTLE_ENDIAN >> > + select HAVE_RELIABLE_STACKTRACE if PPC_BOOK3S_64 && CPU_LITTLE_ENDIAN >> > select HAVE_SYSCALL_TRACEPOINTS >> > select HAVE_VIRT_CPU_ACCOUNTING >> > select HAVE_IRQ_TIME_ACCOUNTING >> > diff --git a/arch/powerpc/kernel/entry_64.S b/arch/powerpc/kernel/entry_64.S >> > index 435927f549c4..a2c168b395d2 100644 >> > --- a/arch/powerpc/kernel/entry_64.S >> > +++ b/arch/powerpc/kernel/entry_64.S >> > @@ -1002,6 +1002,13 @@ END_FTR_SECTION_IFSET(CPU_FTR_HAS_PPR) >> > ld r2,_NIP(r1) >> > mtspr SPRN_SRR0,r2 >> > >> > + /* >> > + * Leaving a stale exception_marker on the stack can confuse >> > + * the reliable stack unwinder later on. Clear it. >> > + */ >> > + li r2,0 >> > + std r2,STACK_FRAME_OVERHEAD-16(r1) >> > + >> >> Could you please double check, r4 is already 0 at this point >> IIUC. So the change might be a simple >> >> std r4,STACK_FRAME_OVERHEAD-16(r1) >> > > r4 is not 0, sorry for the noise Isn't it? cheers