Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp4088010pxk; Tue, 29 Sep 2020 14:05:01 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwpPpYIgWmtEAeU3RUV8jyPE/+TMXUpfPDmWYzpuoegyMT3qysSAew5bHXjzOutU1H0kvvi X-Received: by 2002:a17:906:3913:: with SMTP id f19mr6142396eje.83.1601413501657; Tue, 29 Sep 2020 14:05:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1601413501; cv=none; d=google.com; s=arc-20160816; b=TQZLqooKxaZ481GfCiwwC8AfxMrc7WOUDmSmxgyvAbQvbxHJHyK91Jkc1DO8pB7Xae PAa41gtCqGvQRa+xdqIVvg1puIPR4agghRlkTZIFBl1hr3m9GIaELvAPsWA1tmaK8xCG atbvHmGqxYCDuMQmG02myQQHdrm12Uejd/gS7thnE34L72ZaqVef8iW1yAL45trnocY0 Uyp7Af9hwFnwCP1zBSY9Y7+UJVByEANPRbqY73/T0E8jnmDPd6ofiNJJ/K7Sv1YTRsr/ x9kJeW+NHTmBb8yQ2Hi2fxqtRy4BRdq310H+cnHFZCAahtbnGMzy5pkd+eZWF/z/Se6n diKQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:date:subject:cc:to:from:ironport-sdr :ironport-sdr; bh=0rfjm2zHeBe6gi3MJBU/ClvPmZjAXxMpjKrPS9r/1t8=; b=karPc196XfWRDg8T86yazdWaJSQqIqUbxokPqHhO/90PEOTEV0Xy5y8GKEYPKwOhBN 3+ZVKq0PueGiC5WeVhuUK8SgzNXziDbiOzTNTY4V+x7l0Fpcd/0k2S6in862RcAjdqpI ffsR9n2XhxpDrIBgE2qZi9GX3kxWnV8O3pR9xutbWwRFddQY9v1jIgOVPY8qoWlMyajo clKXEAY4ZLwWbQg+xFoLq1xjfUhirXIGq27ef7IpiRT4KYFcp/dRUdlLhOok9WPCxaJz g6hiWzJI7i545zrpQmSBJ0J/UHSUY+oGrz0skUt8qD6+mOFxJUr5bKdXjv01LZRujHq1 NHBA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x99si3573727ede.160.2020.09.29.14.04.38; Tue, 29 Sep 2020 14:05:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729368AbgI2VBo (ORCPT + 99 others); Tue, 29 Sep 2020 17:01:44 -0400 Received: from mga02.intel.com ([134.134.136.20]:60573 "EHLO mga02.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728729AbgI2VBo (ORCPT ); Tue, 29 Sep 2020 17:01:44 -0400 IronPort-SDR: chJ2gBJXE8LCof6NiCxDl3C99+fmhBJ4tV/YY7CGxWQ0/+VX7DLfXf8TBe9CW9ubF3Lt37BVpH wq9XNm4a2MGQ== X-IronPort-AV: E=McAfee;i="6000,8403,9759"; a="149947655" X-IronPort-AV: E=Sophos;i="5.77,319,1596524400"; d="scan'208";a="149947655" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga006.fm.intel.com ([10.253.24.20]) by orsmga101.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 29 Sep 2020 14:01:22 -0700 IronPort-SDR: bFn8JtJ42VossFrlSUkzKDjyua51j/jF2FeiiAoBoXvDILU7PlBemmWR34TyuRuKfxE1NraZ6/ TvBROEA/0eLg== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.77,319,1596524400"; d="scan'208";a="514024807" Received: from chang-linux-3.sc.intel.com ([172.25.66.175]) by fmsmga006.fm.intel.com with ESMTP; 29 Sep 2020 14:01:22 -0700 From: "Chang S. Bae" To: tglx@linutronix.de, mingo@kernel.org, bp@suse.de, luto@kernel.org, x86@kernel.org Cc: len.brown@intel.com, dave.hansen@intel.com, hjl.tools@gmail.com, Dave.Martin@arm.com, mpe@ellerman.id.au, tony.luck@intel.com, ravi.v.shankar@intel.com, libc-alpha@sourceware.org, linux-arch@vger.kernel.org, linux-api@vger.kernel.org, linux-kernel@vger.kernel.org, chang.seok.bae@intel.com Subject: [RFC PATCH 0/4] x86: Improve Minimum Alternate Stack Size Date: Tue, 29 Sep 2020 13:57:42 -0700 Message-Id: <20200929205746.6763-1-chang.seok.bae@intel.com> X-Mailer: git-send-email 2.17.1 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org During signal entry, the kernel pushes data onto the normal userspace stack. On x86, the data pushed onto the user stack includes XSAVE state, which has grown over time as new features and larger registers have been added to the architecture. MINSIGSTKSZ is a constant provided in the kernel signal.h headers and typically distributed in lib-dev(el) packages, e.g. [1]. Its value is compiled into programs and is part of the user/kernel ABI. The MINSIGSTKSZ constant indicates to userspace how much data the kernel expects to push on the user stack, [2][3]. However, this constant is much too small and does not reflect recent additions to the architecture. For instance, when AVX-512 states are in use, the signal frame size can be 3.5KB while MINSIGSTKSZ remains 2KB. The bug report [4] explains this as an ABI issue. The small MINSIGSTKSZ can cause user stack overflow when delivering a signal. In this series, we suggest a couple of things: 1. Provide a variable minimum stack size to userspace, as a similar approach to [5] 2. Avoid using a too-small alternate stack [1]: https://sourceware.org/git/?p=glibc.git;a=blob;f=sysdeps/unix/sysv/linux/bits/sigstack.h;h=b9dca794da093dc4d41d39db9851d444e1b54d9b;hb=HEAD [2]: https://www.gnu.org/software/libc/manual/html_node/Signal-Stack.html [3]: https://man7.org/linux/man-pages/man2/sigaltstack.2.html [4]: https://bugzilla.kernel.org/show_bug.cgi?id=153531 [5]: https://blog.linuxplumbersconf.org/2017/ocw/system/presentations/4671/original/plumbers-dm-2017.pdf Chang S. Bae (4): x86/signal: Introduce helpers to get the maximum signal frame size x86/elf: Support a new ELF aux vector AT_MINSIGSTKSZ x86/signal: Prevent an alternate stack overflow before a signal delivery selftest/x86/signal: Include test cases for validating sigaltstack arch/x86/ia32/ia32_signal.c | 11 +- arch/x86/include/asm/elf.h | 4 + arch/x86/include/asm/fpu/signal.h | 2 + arch/x86/include/asm/sigframe.h | 25 +++++ arch/x86/include/uapi/asm/auxvec.h | 6 +- arch/x86/kernel/cpu/common.c | 3 + arch/x86/kernel/fpu/signal.c | 20 ++++ arch/x86/kernel/signal.c | 66 +++++++++++- tools/testing/selftests/x86/Makefile | 2 +- tools/testing/selftests/x86/sigaltstack.c | 126 ++++++++++++++++++++++ 10 files changed, 258 insertions(+), 7 deletions(-) create mode 100644 tools/testing/selftests/x86/sigaltstack.c -- 2.17.1