Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp4452242ybx; Mon, 4 Nov 2019 13:38:46 -0800 (PST) X-Google-Smtp-Source: APXvYqwmzta0TkwbP05zKrcHHZmoktB0eNdCflvuLR5U4JaHiHUgB160ma1p69kpu8+uQK3ikZVn X-Received: by 2002:a50:e68c:: with SMTP id z12mr31997123edm.53.1572903525956; Mon, 04 Nov 2019 13:38:45 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1572903525; cv=none; d=google.com; s=arc-20160816; b=BU9G8euTn3V3HWqwkwQo6ubvcVOAjQb6OoE2Q0l4rhOLeZ4gGyIt3tTvksvor0SKJN 9c4alLpiKLV6B/GjezqPVhWcf7KbB6FelXlbXwYaQvdAwVlbaUjr39c3DOKp3BVkAaiO rjPh4po2PlZCB+7b79h5ag//zk3PUc9zmLzVOpCRtmp05v1mhdgHEc84XJxAfhk3wa3K T+0d5LRA7+CSIy15oHVl5+xJ9thOOKh7VuVKeKi474m4svLmYdwSudqLBoanUWrb7VRa l8nHoo5SxA/GgyWDijKwTjbpO1g9AAHdDomEWexwDHNYFDBxg3IMIkh1U0Ta3KQ9KhzH uCLg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=+iM6UF9mA8yEqKM2m+szbX2ng9KhnEZYRb5X/ojWJG0=; b=ny0MogzFw51tzNHaF5dMgPJegYRoBR/PhWODZei/MFuROYcJt6D5Cb9F+DEj2a0kuX wlbISR2wj/wUNqqne2803A9rbVDzgTvFCxXm/nbe6PELNYwNc/EUnKWCQXLJlfkGi7uF ygPOA+Vau1lMzn8FTw1tLhLfZey8U5FXaACgsgaDxHfp5+PraHrWmLfNt9RCOpJbFBB+ ZdnEw7PsH16wnVtHUh5mV1ng+6rSdoTmaWo+zuLa5o5tgEVJKPPWpawcfWSXmGNlA+ij LZ5SCPVfh0wUZBw+8brrUBf6TQ71cKOwAquhfP9T8jajTb+ENH85Uqfufs9q9ePUDAek G/PQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=WQqOCU6q; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a5si12181104ejs.274.2019.11.04.13.38.22; Mon, 04 Nov 2019 13:38:45 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=WQqOCU6q; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729691AbfKDVfl (ORCPT + 99 others); Mon, 4 Nov 2019 16:35:41 -0500 Received: from mail-vs1-f66.google.com ([209.85.217.66]:36748 "EHLO mail-vs1-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728778AbfKDVfl (ORCPT ); Mon, 4 Nov 2019 16:35:41 -0500 Received: by mail-vs1-f66.google.com with SMTP id q21so12018739vsg.3 for ; Mon, 04 Nov 2019 13:35:41 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=+iM6UF9mA8yEqKM2m+szbX2ng9KhnEZYRb5X/ojWJG0=; b=WQqOCU6qrDuZG8nuHgiV+CHsG7gWSoR72oOp+M0wKsltRJK+cGqjt2t0ZxI2LM6V8C 1RQXAzRnu6jhZem6MHYFf5TI8O0Eb0LMsQH/RUeNBQLsild5ptqHR2+8pjmiMbj3JxhX gRUGg1RmBpVc1Q1nhoC4mIIl7umwH3N3gETvGBsHefq3zid8veGm9BMAaqqXtchvboU3 oe82rt/ua0dQOwqs4AcW0tswAhd4f8FEmYPR+Wai5JGF1id5ch5hL+dBrDB6AtOUJFPg GiGCKXyOExBSa2rtb1uirhcrkQbT6A5dkDAwpPptAzVGzCMyH1PZXR7LWJ4+2g7vZ1c1 epJA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=+iM6UF9mA8yEqKM2m+szbX2ng9KhnEZYRb5X/ojWJG0=; b=dAYCsqZ0tu4FU3BfSTWDQbLFfZXeR5wOoRhEmQFs2PN3wLzRkfDi3UZD8KxfihE4+p Gs6vNYss+Q0fsCE2g32WQ+AzARsUQMtwq/R0pa5ozXzY66im4YWaXGlbjNwyckxL19f/ dcarseMaXPaZAJzNA2qHKw1Os2gUDxLSGrcqDvGSNAmh0xHUBhofXgPapXU8/uOkd1xM nd6rSKLWpbZgmNyrppQMCqueYq2hQvjFcyDkcFIKjuyeQxicEVkLgfDfj93Uqq0pbF1M QCr+12ngkPeAZIOlPlM0XfJ+eZ6nJkvtJi6uOBG/pDcOFDEDOoW4ELqj89DbtcxEVQUD h4nw== X-Gm-Message-State: APjAAAX/Sx2/eDnbsACU543ZHyMMPYOa3qJjklVBmkToEOcLrCWPwK56 Xpjgi5geudBEIAly/jIhLxLiv4v4I29GdWESZn3INg== X-Received: by 2002:a05:6102:36a:: with SMTP id f10mr9282538vsa.44.1572903339925; Mon, 04 Nov 2019 13:35:39 -0800 (PST) MIME-Version: 1.0 References: <20191018161033.261971-1-samitolvanen@google.com> <20191101221150.116536-1-samitolvanen@google.com> <20191101221150.116536-8-samitolvanen@google.com> <20191104124017.GD45140@lakrids.cambridge.arm.com> In-Reply-To: <20191104124017.GD45140@lakrids.cambridge.arm.com> From: Sami Tolvanen Date: Mon, 4 Nov 2019 13:35:28 -0800 Message-ID: Subject: Re: [PATCH v4 07/17] scs: add support for stack usage debugging To: Mark Rutland Cc: Will Deacon , Catalin Marinas , Steven Rostedt , Masami Hiramatsu , Ard Biesheuvel , Dave Martin , Kees Cook , Laura Abbott , Marc Zyngier , Nick Desaulniers , Jann Horn , Miguel Ojeda , Masahiro Yamada , clang-built-linux , Kernel Hardening , linux-arm-kernel , LKML Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Nov 4, 2019 at 4:40 AM Mark Rutland wrote: > > +#ifdef CONFIG_DEBUG_STACK_USAGE > > +static inline unsigned long scs_used(struct task_struct *tsk) > > +{ > > + unsigned long *p = __scs_base(tsk); > > + unsigned long *end = scs_magic(tsk); > > + uintptr_t s = (uintptr_t)p; > > As previously, please use unsigned long for consistency. Ack. > > + while (p < end && *p) > > + p++; > > I think this is the only place where we legtimately access the shadow > call stack directly. There's also scs_corrupted, which checks that the end magic is intact. > When using SCS and KASAN, are the > compiler-generated accesses to the SCS instrumented? > > If not, it might make sense to make this: > > while (p < end && READ_ONCE_NOCKECK(*p)) > > ... and poison the allocation from KASAN's PoV, so that we can find > unintentional accesses more easily. Sure, that makes sense. I can poison the allocation for the non-vmalloc case, I'll just need to refactor scs_set_magic to happen before the poisoning. Sami