Received: by 2002:a25:c205:0:0:0:0:0 with SMTP id s5csp4677609ybf; Wed, 4 Mar 2020 08:31:48 -0800 (PST) X-Google-Smtp-Source: ADFU+vs7sfnj8p3X1jTSM57QzcWNPzltKyGeBMm+lipyKRw+edGqPgXE70djO0sVsuABlCQiQTKW X-Received: by 2002:a05:6830:1549:: with SMTP id l9mr3010925otp.236.1583339508097; Wed, 04 Mar 2020 08:31:48 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1583339508; cv=none; d=google.com; s=arc-20160816; b=O/cCK8kTsAcV7g3MCye1ROCHq9UiMD+WrDF9ccO+8T6aTSJOCUrljUj0mZ6NmNU3g9 FqLCNT2euW/y6aGgxxHqqDII7rbrV34198euJ38EqtKLHT55WnajqCXFwkSaEdilIOBV roLOJfPwOccJyzAR8MHO5A4kR+9oNlDQ3/Eh3vO6Dw2RomK/94cO5wMTE4h1S4Q0z7+V diTSmna7PTnJlUGIpD4NwWDNl3nU3VVvDppFpGJSxISbyEH+WDfCIt9JvSYB6Cmj7Ypc qSHAW8Mv8PPVaP+IQ+EeyumbM5z/BEtka6FV6D0t/5IjMT8jTBWTj9JbBw/pKXYtRDaT f1rw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=6y/cQvjjcXrtqJl81MyABQqmhWVQawmJlzdYpxMr4ZI=; b=wdENMzdKP5PAdhOzOgj4b6aVJ53JlfLX2/U6ShLFM3yyW+DHOY+124J2sBNUWEcxxx RU1jcqc1zn1Wii7mXx8ayucGMuCsPrh7EmOPGKgcRUeUkq6c2rXqKx7/MtLv5c8Eqt58 6nkGVNgHIHQFBzPtQ2DeK+dsRSxbtJUzvNrXkPmIqOPKAVIv224dkmodJwomOvFKIomS PgnBSUPztDwLQ+JfekEJPYw+oTkTSy0B7ZtO08llPXL4vSRNe7f9/z1V05d7Y5ajyyBB uAMoqcxhwopbUWb21q7mrxRIeqiAO7HTjS4u1g2E4J8xHerAD6zxCVRt5A/T9WQdOFtj 8OWQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l15si1616857oig.146.2020.03.04.08.31.35; Wed, 04 Mar 2020 08:31:48 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387860AbgCDQbI (ORCPT + 99 others); Wed, 4 Mar 2020 11:31:08 -0500 Received: from foss.arm.com ([217.140.110.172]:36876 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726764AbgCDQbI (ORCPT ); Wed, 4 Mar 2020 11:31:08 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 7ACCD31B; Wed, 4 Mar 2020 08:31:07 -0800 (PST) Received: from lakrids.cambridge.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.121.207.14]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id CEA223F6CF; Wed, 4 Mar 2020 08:31:05 -0800 (PST) Date: Wed, 4 Mar 2020 16:31:03 +0000 From: Mark Rutland To: Alex Belits Cc: "frederic@kernel.org" , "rostedt@goodmis.org" , "mingo@kernel.org" , "peterz@infradead.org" , "linux-kernel@vger.kernel.org" , Prasun Kapoor , "tglx@linutronix.de" , "linux-api@vger.kernel.org" , "linux-mm@vger.kernel.org" , "linux-arch@vger.kernel.org" , will@kernel.org, catalin.marinas@arm.com Subject: Re: [PATCH 06/12] task_isolation: arch/arm64: enable task isolation functionality Message-ID: <20200304163103.GJ3575@lakrids.cambridge.arm.com> References: <4473787e1b6bc3cc226067e8d122092a678b63de.camel@marvell.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.11.1+11 (2f07cb52) (2018-12-01) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Alex, For patches affecting arm64, please CC LAKML and the arm64 maintainers (Will and Catalin). I've Cc'd the maintainers here. On Wed, Mar 04, 2020 at 04:10:28PM +0000, Alex Belits wrote: > From: Chris Metcalf > > In do_notify_resume(), call task_isolation_start() for > TIF_TASK_ISOLATION tasks. Add _TIF_TASK_ISOLATION to _TIF_WORK_MASK, > and define a local NOTIFY_RESUME_LOOP_FLAGS to check in the loop, > since we don't clear _TIF_TASK_ISOLATION in the loop. > > We tweak syscall_trace_enter() slightly to carry the "flags" > value from current_thread_info()->flags for each of the tests, > rather than doing a volatile read from memory for each one. This > avoids a small overhead for each test, and in particular avoids > that overhead for TIF_NOHZ when TASK_ISOLATION is not enabled. Stale commit message? Looking at the patch below, this doesn't seem to be the case; it just calls test_thread_flag(TIF_TASK_ISOLATION). > > We instrument the smp_send_reschedule() routine so that it checks for > isolated tasks and generates a suitable warning if needed. > > Finally, report on page faults in task-isolation processes in > do_page_faults(). > > Signed-off-by: Alex Belits The From line says this was from Chris Metcalf, but he's missing from the Sign-off chain here, which isn't right. > --- > arch/arm64/Kconfig | 1 + > arch/arm64/include/asm/thread_info.h | 5 ++++- > arch/arm64/kernel/ptrace.c | 10 ++++++++++ > arch/arm64/kernel/signal.c | 13 ++++++++++++- > arch/arm64/kernel/smp.c | 7 +++++++ > arch/arm64/mm/fault.c | 5 +++++ > 6 files changed, 39 insertions(+), 2 deletions(-) > > diff --git a/arch/arm64/Kconfig b/arch/arm64/Kconfig > index 0b30e884e088..93b6aabc8be9 100644 > --- a/arch/arm64/Kconfig > +++ b/arch/arm64/Kconfig > @@ -129,6 +129,7 @@ config ARM64 > select HAVE_ARCH_PREL32_RELOCATIONS > select HAVE_ARCH_SECCOMP_FILTER > select HAVE_ARCH_STACKLEAK > + select HAVE_ARCH_TASK_ISOLATION > select HAVE_ARCH_THREAD_STRUCT_WHITELIST > select HAVE_ARCH_TRACEHOOK > select HAVE_ARCH_TRANSPARENT_HUGEPAGE > diff --git a/arch/arm64/include/asm/thread_info.h b/arch/arm64/include/asm/thread_info.h > index f0cec4160136..7563098eb5b2 100644 > --- a/arch/arm64/include/asm/thread_info.h > +++ b/arch/arm64/include/asm/thread_info.h > @@ -63,6 +63,7 @@ void arch_release_task_struct(struct task_struct *tsk); > #define TIF_FOREIGN_FPSTATE 3 /* CPU's FP state is not current's */ > #define TIF_UPROBE 4 /* uprobe breakpoint or singlestep */ > #define TIF_FSCHECK 5 /* Check FS is USER_DS on return */ > +#define TIF_TASK_ISOLATION 6 > #define TIF_NOHZ 7 > #define TIF_SYSCALL_TRACE 8 /* syscall trace active */ > #define TIF_SYSCALL_AUDIT 9 /* syscall auditing */ > @@ -83,6 +84,7 @@ void arch_release_task_struct(struct task_struct *tsk); > #define _TIF_NEED_RESCHED (1 << TIF_NEED_RESCHED) > #define _TIF_NOTIFY_RESUME (1 << TIF_NOTIFY_RESUME) > #define _TIF_FOREIGN_FPSTATE (1 << TIF_FOREIGN_FPSTATE) > +#define _TIF_TASK_ISOLATION (1 << TIF_TASK_ISOLATION) > #define _TIF_NOHZ (1 << TIF_NOHZ) > #define _TIF_SYSCALL_TRACE (1 << TIF_SYSCALL_TRACE) > #define _TIF_SYSCALL_AUDIT (1 << TIF_SYSCALL_AUDIT) > @@ -96,7 +98,8 @@ void arch_release_task_struct(struct task_struct *tsk); > > #define _TIF_WORK_MASK (_TIF_NEED_RESCHED | _TIF_SIGPENDING | \ > _TIF_NOTIFY_RESUME | _TIF_FOREIGN_FPSTATE | \ > - _TIF_UPROBE | _TIF_FSCHECK) > + _TIF_UPROBE | _TIF_FSCHECK | \ > + _TIF_TASK_ISOLATION) > > #define _TIF_SYSCALL_WORK (_TIF_SYSCALL_TRACE | _TIF_SYSCALL_AUDIT | \ > _TIF_SYSCALL_TRACEPOINT | _TIF_SECCOMP | \ > diff --git a/arch/arm64/kernel/ptrace.c b/arch/arm64/kernel/ptrace.c > index cd6e5fa48b9c..b35b9b0c594c 100644 > --- a/arch/arm64/kernel/ptrace.c > +++ b/arch/arm64/kernel/ptrace.c > @@ -29,6 +29,7 @@ > #include > #include > #include > +#include > > #include > #include > @@ -1836,6 +1837,15 @@ int syscall_trace_enter(struct pt_regs *regs) > return -1; > } > > + /* > + * In task isolation mode, we may prevent the syscall from > + * running, and if so we also deliver a signal to the process. > + */ > + if (test_thread_flag(TIF_TASK_ISOLATION)) { > + if (task_isolation_syscall(regs->syscallno) == -1) > + return -1; > + } As above, this doesn't match the commit message. AFAICT, task_isolation_syscall() always returns either 0 or -1, which isn't great as an API. I see secure_computing() seems to do the same, and it'd be nice to clean that up to either be a real erro code or a boolean. > + > /* Do the secure computing after ptrace; failures should be fast. */ > if (secure_computing() == -1) > return -1; > diff --git a/arch/arm64/kernel/signal.c b/arch/arm64/kernel/signal.c > index 339882db5a91..d488c91a4877 100644 > --- a/arch/arm64/kernel/signal.c > +++ b/arch/arm64/kernel/signal.c > @@ -20,6 +20,7 @@ > #include > #include > #include > +#include > > #include > #include > @@ -898,6 +899,11 @@ static void do_signal(struct pt_regs *regs) > restore_saved_sigmask(); > } > > +#define NOTIFY_RESUME_LOOP_FLAGS \ > + (_TIF_NEED_RESCHED | _TIF_SIGPENDING | \ > + _TIF_NOTIFY_RESUME | _TIF_FOREIGN_FPSTATE | \ > + _TIF_UPROBE | _TIF_FSCHECK) > + > asmlinkage void do_notify_resume(struct pt_regs *regs, > unsigned long thread_flags) > { > @@ -908,6 +914,8 @@ asmlinkage void do_notify_resume(struct pt_regs *regs, > */ > trace_hardirqs_off(); > > + task_isolation_check_run_cleanup(); > + > do { > /* Check valid user FS if needed */ > addr_limit_user_check(); > @@ -938,7 +946,10 @@ asmlinkage void do_notify_resume(struct pt_regs *regs, > > local_daif_mask(); > thread_flags = READ_ONCE(current_thread_info()->flags); > - } while (thread_flags & _TIF_WORK_MASK); > + } while (thread_flags & NOTIFY_RESUME_LOOP_FLAGS); > + > + if (thread_flags & _TIF_TASK_ISOLATION) > + task_isolation_start(); > } > > unsigned long __ro_after_init signal_minsigstksz; > diff --git a/arch/arm64/kernel/smp.c b/arch/arm64/kernel/smp.c > index d4ed9a19d8fe..00f0f77adea0 100644 > --- a/arch/arm64/kernel/smp.c > +++ b/arch/arm64/kernel/smp.c > @@ -32,6 +32,7 @@ > #include > #include > #include > +#include > > #include > #include > @@ -818,6 +819,7 @@ void arch_send_call_function_single_ipi(int cpu) > #ifdef CONFIG_ARM64_ACPI_PARKING_PROTOCOL > void arch_send_wakeup_ipi_mask(const struct cpumask *mask) > { > + task_isolation_remote_cpumask(mask, "wakeup IPI"); > smp_cross_call(mask, IPI_WAKEUP); > } > #endif > @@ -886,6 +888,9 @@ void handle_IPI(int ipinr, struct pt_regs *regs) > __inc_irq_stat(cpu, ipi_irqs[ipinr]); > } > > + task_isolation_interrupt("IPI type %d (%s)", ipinr, > + ipinr < NR_IPI ? ipi_types[ipinr] : "unknown"); > + Are these tracing hooks? Surely they aren't necessary for functional correctness? > switch (ipinr) { > case IPI_RESCHEDULE: > scheduler_ipi(); > @@ -948,12 +953,14 @@ void handle_IPI(int ipinr, struct pt_regs *regs) > > void smp_send_reschedule(int cpu) > { > + task_isolation_remote(cpu, "reschedule IPI"); > smp_cross_call(cpumask_of(cpu), IPI_RESCHEDULE); > } > > #ifdef CONFIG_GENERIC_CLOCKEVENTS_BROADCAST > void tick_broadcast(const struct cpumask *mask) > { > + task_isolation_remote_cpumask(mask, "timer IPI"); > smp_cross_call(mask, IPI_TIMER); > } > #endif > diff --git a/arch/arm64/mm/fault.c b/arch/arm64/mm/fault.c > index 85566d32958f..fc4b42c81c4f 100644 > --- a/arch/arm64/mm/fault.c > +++ b/arch/arm64/mm/fault.c > @@ -23,6 +23,7 @@ > #include > #include > #include > +#include > > #include > #include > @@ -543,6 +544,10 @@ static int __kprobes do_page_fault(unsigned long addr, unsigned int esr, > */ > if (likely(!(fault & (VM_FAULT_ERROR | VM_FAULT_BADMAP | > VM_FAULT_BADACCESS)))) { > + /* No signal was generated, but notify task-isolation tasks. */ > + if (user_mode(regs)) > + task_isolation_interrupt("page fault at %#lx", addr); > + We check user_mode(regs) much earlier in this function to set FAULT_FLAG_USER. Is there some reason this cannot live there? Also, this seems to be a tracing hook -- is this necessary? Thanks, Mark. > /* > * Major/minor page fault accounting is only done > * once. If we go through a retry, it is extremely > -- > 2.20.1 >