Received: by 2002:ac0:8c8e:0:0:0:0:0 with SMTP id r14csp125526ima; Tue, 5 Feb 2019 19:31:46 -0800 (PST) X-Google-Smtp-Source: AHgI3IY+Ccr2ltSJkYkcKVWH7oQHUAj9NpiCVmHE/d8gwVqd1OUYPus6LS84rLSyq4SU5cCq2/B/ X-Received: by 2002:a17:902:6b0c:: with SMTP id o12mr8595661plk.291.1549423905951; Tue, 05 Feb 2019 19:31:45 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1549423905; cv=none; d=google.com; s=arc-20160816; b=Hc8JdMD+Zp4M5Gowu/rcc99isx/BtUM3dNgNdKAl/Sz9JIHFbLd/kXljEJXJ80BHqJ 3BhZmXuDsUeVdUFTZWITie5iFShQkwhmKflYoWhHEXDJrKJ9+jKbP+5IRHU6q0DUeRe+ CEwRMY2ue8zImrXsWLlveG/PobqeqssFGCdajZjNNkt96clQ9WnIKMfK3QyINnIBI7Wa tMmbsvoyqOFiVKQXEILxddVYukRCVWKRtKQ6dolY2i7ajJiMjCejxJTxn2OJ9rjOEOxf bkQPoM7LnyRT6rvURMENC9N7RjKKk2HwJDb3Pw3B881zpojRYsH4geU9HDL1SsMGLZ0p Qgdw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=CNh6Bl8AR7J3+UPwhO4RSKKUKqjcpYNh9UtYG3kx9hE=; b=WmCZiZCH1mqo46UDqh2C5L3pO4dTaAFPlhSgC6y2t0PCf/aviMvB8vLKvqH1MoLV70 86u6Dy6MP1Oy0mIC4NvVDQYHJa1u+DyOtpee1VvStoTP/XQwiPT2vubIvxFaLXbm3gUF SoKwb3IGvc5A/67gxK8TTnNVOdRbpNQaOFx2hOUt5e+1DObZg2jnU57bz8uiB8FBSBdp PknQhhy4lv7OUH/dpoor1kgq+j9KCgpATcHX6TUr1ZhYJoEDRvZOHPSJks/495ugXUL7 FCM/tixRLulyt6/AnPmScus8iTnhJYHO2DOkdvix3SL709Nd49eJtlfoCBXbgK9l4PT9 zkOQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=jeJm9NoH; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d9si4801706plr.127.2019.02.05.19.30.53; Tue, 05 Feb 2019 19:31:45 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=jeJm9NoH; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726949AbfBFCs1 (ORCPT + 99 others); Tue, 5 Feb 2019 21:48:27 -0500 Received: from mail-ua1-f68.google.com ([209.85.222.68]:40711 "EHLO mail-ua1-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726610AbfBFCs0 (ORCPT ); Tue, 5 Feb 2019 21:48:26 -0500 Received: by mail-ua1-f68.google.com with SMTP id n7so1817745uao.7; Tue, 05 Feb 2019 18:48:25 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=CNh6Bl8AR7J3+UPwhO4RSKKUKqjcpYNh9UtYG3kx9hE=; b=jeJm9NoHni3PV5NeJfh/6GrLB8tUuC9lFAK0RdgYnBL8c+FBs0SItZA/MTZKnoz/n4 lJOvcWSq2wYhLq1ebO4OgGiyLMAlkgRjO/Wl5Q8chnE4azwC/bN0iBi+ieaHeqE3dxOX JZRE2Lh34M2X0ap4t4D2oSyk58VR0nISL4RAPyhTTXKB81sd5uldmHrhF7FkAMAZ+fwo EcG4wYKcwGL0RLMmpBRYdNTuhWZCFlHGl9zgA4Lh++EjYzOAdWtpOjrWUwk+Kl5YXJ4Z S90p2/1GgRT+fYwIxP8yY/5FqKz8rJGHBlvZgMZsTIUJ0ECHY16G9c1y8UK/XT/O6rtQ 3VSg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=CNh6Bl8AR7J3+UPwhO4RSKKUKqjcpYNh9UtYG3kx9hE=; b=Wbn263/10ritgdMv4VGmU3w83vhPBZjKyWWepJtdNXCJNYTnttcSnDtcLvQlAi1YbL puudjIOfVBdoM9y79yGa05ccIZpemE1wWhVADz/pD7t0G7KnmCfkceTFEs0UcPNNJE84 cix15V1lTHQpXY+Z1CfFSlshQ1hdoTh/31kwzAzTWD01Hs0Q0hx91NSu4MbUe/nODO0w X8pA7RKGxRddOfpwHzWKFEAi9N/GoWECsvj6f5miOvgLCKUun7xFj/fv02vBauuFS3/9 LJhXKqiOhorWJ0NQu0JNPvjmJmLivkzLpQ9045IYh4bDu9f8zPzXl5ilBnbHBV2lXke0 sEqA== X-Gm-Message-State: AHQUAuYxOQMCDjrD7x8WGWNBNHGdYJNdk6CeDD432CqGazeA+2HE2tl8 O0cHJa9zv4IGR+Cgk10AYF9P6dCG/lGAxonkaYU= X-Received: by 2002:ab0:2981:: with SMTP id u1mr3235931uap.96.1549421304595; Tue, 05 Feb 2019 18:48:24 -0800 (PST) MIME-Version: 1.0 References: <20190122155724.27557-1-joe.lawrence@redhat.com> <20190122155724.27557-2-joe.lawrence@redhat.com> <20190202011455.GN26056@350D> <87bm3qmqak.fsf@concordia.ellerman.id.au> In-Reply-To: <87bm3qmqak.fsf@concordia.ellerman.id.au> From: Balbir Singh Date: Wed, 6 Feb 2019 13:48:11 +1100 Message-ID: Subject: Re: [PATCH 1/4] powerpc/64s: Clear on-stack exception marker upon exception return To: Michael Ellerman Cc: Joe Lawrence , "linux-kernel@vger.kernel.org" , "open list:LINUX FOR POWERPC (32-BIT AND 64-BIT)" , live-patching@vger.kernel.org, Jiri Kosina , Josh Poimboeuf , Nicolai Stange , Torsten Duwe Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Feb 5, 2019 at 10:24 PM Michael Ellerman wrote: > > Balbir Singh writes: > > On Sat, Feb 2, 2019 at 12:14 PM Balbir Singh wrote: > >> > >> On Tue, Jan 22, 2019 at 10:57:21AM -0500, Joe Lawrence wrote: > >> > From: Nicolai Stange > >> > > >> > The ppc64 specific implementation of the reliable stacktracer, > >> > save_stack_trace_tsk_reliable(), bails out and reports an "unreliable > >> > trace" whenever it finds an exception frame on the stack. Stack frames > >> > are classified as exception frames if the STACK_FRAME_REGS_MARKER magic, > >> > as written by exception prologues, is found at a particular location. > >> > > >> > However, as observed by Joe Lawrence, it is possible in practice that > >> > non-exception stack frames can alias with prior exception frames and thus, > >> > that the reliable stacktracer can find a stale STACK_FRAME_REGS_MARKER on > >> > the stack. It in turn falsely reports an unreliable stacktrace and blocks > >> > any live patching transition to finish. Said condition lasts until the > >> > stack frame is overwritten/initialized by function call or other means. > >> > > >> > In principle, we could mitigate this by making the exception frame > >> > classification condition in save_stack_trace_tsk_reliable() stronger: > >> > in addition to testing for STACK_FRAME_REGS_MARKER, we could also take into > >> > account that for all exceptions executing on the kernel stack > >> > - their stack frames's backlink pointers always match what is saved > >> > in their pt_regs instance's ->gpr[1] slot and that > >> > - their exception frame size equals STACK_INT_FRAME_SIZE, a value > >> > uncommonly large for non-exception frames. > >> > > >> > However, while these are currently true, relying on them would make the > >> > reliable stacktrace implementation more sensitive towards future changes in > >> > the exception entry code. Note that false negatives, i.e. not detecting > >> > exception frames, would silently break the live patching consistency model. > >> > > >> > Furthermore, certain other places (diagnostic stacktraces, perf, xmon) > >> > rely on STACK_FRAME_REGS_MARKER as well. > >> > > >> > Make the exception exit code clear the on-stack STACK_FRAME_REGS_MARKER > >> > for those exceptions running on the "normal" kernel stack and returning > >> > to kernelspace: because the topmost frame is ignored by the reliable stack > >> > tracer anyway, returns to userspace don't need to take care of clearing > >> > the marker. > >> > > >> > Furthermore, as I don't have the ability to test this on Book 3E or > >> > 32 bits, limit the change to Book 3S and 64 bits. > >> > > >> > Finally, make the HAVE_RELIABLE_STACKTRACE Kconfig option depend on > >> > PPC_BOOK3S_64 for documentation purposes. Before this patch, it depended > >> > on PPC64 && CPU_LITTLE_ENDIAN and because CPU_LITTLE_ENDIAN implies > >> > PPC_BOOK3S_64, there's no functional change here. > >> > > >> > Fixes: df78d3f61480 ("powerpc/livepatch: Implement reliable stack tracing for the consistency model") > >> > Reported-by: Joe Lawrence > >> > Signed-off-by: Nicolai Stange > >> > Signed-off-by: Joe Lawrence > >> > --- > >> > arch/powerpc/Kconfig | 2 +- > >> > arch/powerpc/kernel/entry_64.S | 7 +++++++ > >> > 2 files changed, 8 insertions(+), 1 deletion(-) > >> > > >> > diff --git a/arch/powerpc/Kconfig b/arch/powerpc/Kconfig > >> > index 2890d36eb531..73bf87b1d274 100644 > >> > --- a/arch/powerpc/Kconfig > >> > +++ b/arch/powerpc/Kconfig > >> > @@ -220,7 +220,7 @@ config PPC > >> > select HAVE_PERF_USER_STACK_DUMP > >> > select HAVE_RCU_TABLE_FREE if SMP > >> > select HAVE_REGS_AND_STACK_ACCESS_API > >> > - select HAVE_RELIABLE_STACKTRACE if PPC64 && CPU_LITTLE_ENDIAN > >> > + select HAVE_RELIABLE_STACKTRACE if PPC_BOOK3S_64 && CPU_LITTLE_ENDIAN > >> > select HAVE_SYSCALL_TRACEPOINTS > >> > select HAVE_VIRT_CPU_ACCOUNTING > >> > select HAVE_IRQ_TIME_ACCOUNTING > >> > diff --git a/arch/powerpc/kernel/entry_64.S b/arch/powerpc/kernel/entry_64.S > >> > index 435927f549c4..a2c168b395d2 100644 > >> > --- a/arch/powerpc/kernel/entry_64.S > >> > +++ b/arch/powerpc/kernel/entry_64.S > >> > @@ -1002,6 +1002,13 @@ END_FTR_SECTION_IFSET(CPU_FTR_HAS_PPR) > >> > ld r2,_NIP(r1) > >> > mtspr SPRN_SRR0,r2 > >> > > >> > + /* > >> > + * Leaving a stale exception_marker on the stack can confuse > >> > + * the reliable stack unwinder later on. Clear it. > >> > + */ > >> > + li r2,0 > >> > + std r2,STACK_FRAME_OVERHEAD-16(r1) > >> > + > >> > >> Could you please double check, r4 is already 0 at this point > >> IIUC. So the change might be a simple > >> > >> std r4,STACK_FRAME_OVERHEAD-16(r1) > >> > > > > r4 is not 0, sorry for the noise > > Isn't it? It is, I seem to be reading the wrong bits and confused myself, had to re-read mtmsrd to ensure it does not modify RS, just MSR. So I guess we could reuse r4. Should I send a patch on top of this? I have limited testing infrastructure at the moment, I could use qemu Balbir Singh.