Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp5439365pxu; Tue, 22 Dec 2020 17:59:07 -0800 (PST) X-Google-Smtp-Source: ABdhPJymReztACfSdkc7thM+yMuoXpmtDKOWVPIJHy79gcTSAjB12wIgARJmP/pXzT2MYmvjbFc/ X-Received: by 2002:a05:6402:149a:: with SMTP id e26mr23564314edv.150.1608688747000; Tue, 22 Dec 2020 17:59:07 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1608688746; cv=none; d=google.com; s=arc-20160816; b=dV3Okge+Ad7/VwRpWqO8+F5dTFF5mBfWYHDxkofZ5K6cMr4yopC65JZcl+JudIEfXL VQ3Ye/883RK6eYbz6kyV30cparfnne0pCjgDztx+uoxlGjPnX9G7I/RwiIG1TCuW/3LG BMEa6ilRpeIhoGw70yJiqsceK5BkYl42ZqG9I7hLo3Qs6ryQwWeWRyFPZZ1t+pYfh+2G dCBGtbCpoB9tATRGyjzS1N6x9HJkoBrYxZNYpYirqLubFWn8YT0isYysse7yd31lv37s //pb/E4QhmTGt1cYsLaHOMr+AN5Nz81EnCT6olBMV/8Lt4+9wNYo5vf0IWMqrKrvDh2o C5iQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:date:subject:cc:to:from:ironport-sdr :ironport-sdr; bh=6MnNA8CTrb4RwzY+B1SgwALJNsrD7fP2VvS52Z98k5U=; b=dPcNhNI71TiQR3SY8Jfuew0LfjvssAzZz3U7m5K1bM3zwjhPP0er6Wbg/61okBWgZJ asED1X76Axz2VHtlD28OyUbpsmxbRJbsiMoq6bpvrOgSFbwmWSDDQnnr8oP7N4vmZ9mg VihtEt7OgyuolO9/Eifmx6G42EtNAOJQjCvwZhI8bP4A4nkG/QwWbXBlfojvDITuDa1K 3gKszftplkKtAW/IQTmnow0reO4pG4Dd8ilrFFfxlL4q6+h7FTalf7mYOSvya5bvWbs1 4x8jpWouvY1PvPc6+HazSJWwKAcXr+iTRvHLPi7f59xryuFaN8De8Aio9bw5HNS2Qx8d t9aw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id k8si10993094ejg.191.2020.12.22.17.58.44; Tue, 22 Dec 2020 17:59:06 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726807AbgLWB6R (ORCPT + 99 others); Tue, 22 Dec 2020 20:58:17 -0500 Received: from mga06.intel.com ([134.134.136.31]:49021 "EHLO mga06.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726361AbgLWB6Q (ORCPT ); Tue, 22 Dec 2020 20:58:16 -0500 IronPort-SDR: 6/5/hEI65WYj41wI9AjeK0K8Sw31TSmCAF0vpOJQa/wmDTtp2dTW2gDU5BAbvCW11Wku9+ytCj 0ZI9gVN0ikSA== X-IronPort-AV: E=McAfee;i="6000,8403,9843"; a="237508790" X-IronPort-AV: E=Sophos;i="5.78,440,1599548400"; d="scan'208";a="237508790" Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 22 Dec 2020 17:57:34 -0800 IronPort-SDR: yKGf3adYatD3eoY0tuXwgz1+NJhRrMtTFTzMfHezOqij4PZBXBtISpD1hyJUM8IP5GEQlaQXYY CdJHd91uQlVQ== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.78,440,1599548400"; d="scan'208";a="457755715" Received: from chang-linux-3.sc.intel.com ([172.25.66.175]) by fmsmga001.fm.intel.com with ESMTP; 22 Dec 2020 17:57:33 -0800 From: "Chang S. Bae" To: bp@suse.de, tglx@linutronix.de, mingo@kernel.org, luto@kernel.org, x86@kernel.org Cc: len.brown@intel.com, dave.hansen@intel.com, hjl.tools@gmail.com, Dave.Martin@arm.com, jannh@google.com, mpe@ellerman.id.au, tony.luck@intel.com, ravi.v.shankar@intel.com, libc-alpha@sourceware.org, linux-arch@vger.kernel.org, linux-api@vger.kernel.org, linux-kernel@vger.kernel.org, chang.seok.bae@intel.com Subject: [PATCH v3 0/4] x86: Improve Minimum Alternate Stack Size Date: Tue, 22 Dec 2020 17:53:08 -0800 Message-Id: <20201223015312.4882-1-chang.seok.bae@intel.com> X-Mailer: git-send-email 2.17.1 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org During signal entry, the kernel pushes data onto the normal userspace stack. On x86, the data pushed onto the user stack includes XSAVE state, which has grown over time as new features and larger registers have been added to the architecture. MINSIGSTKSZ is a constant provided in the kernel signal.h headers and typically distributed in lib-dev(el) packages, e.g. [1]. Its value is compiled into programs and is part of the user/kernel ABI. The MINSIGSTKSZ constant indicates to userspace how much data the kernel expects to push on the user stack, [2][3]. However, this constant is much too small and does not reflect recent additions to the architecture. For instance, when AVX-512 states are in use, the signal frame size can be 3.5KB while MINSIGSTKSZ remains 2KB. The bug report [4] explains this as an ABI issue. The small MINSIGSTKSZ can cause user stack overflow when delivering a signal. In this series, we suggest a couple of things: 1. Provide a variable minimum stack size to userspace, as a similar approach to [5] 2. Avoid using a too-small alternate stack Changes from v2 [7]: * Simplified the sigaltstack overflow prevention (Jann Horn) * Renamed fpstate size helper with cleanup (Borislav Petkov) * Cleaned up the signframe struct size defines (Borislav Petkov) * Revised the selftest messages (Borislav Petkov) * Revised a changelog (Borislav Petkov) Changes from v1 [6]: * Took stack alignment into account for sigframe size (Dave Martin) [1]: https://sourceware.org/git/?p=glibc.git;a=blob;f=sysdeps/unix/sysv/linux/bits/sigstack.h;h=b9dca794da093dc4d41d39db9851d444e1b54d9b;hb=HEAD [2]: https://www.gnu.org/software/libc/manual/html_node/Signal-Stack.html [3]: https://man7.org/linux/man-pages/man2/sigaltstack.2.html [4]: https://bugzilla.kernel.org/show_bug.cgi?id=153531 [5]: https://blog.linuxplumbersconf.org/2017/ocw/system/presentations/4671/original/plumbers-dm-2017.pdf [6]: https://lore.kernel.org/lkml/20200929205746.6763-1-chang.seok.bae@intel.com/ [7]: https://lore.kernel.org/lkml/20201119190237.626-1-chang.seok.bae@intel.com/ Chang S. Bae (4): x86/signal: Introduce helpers to get the maximum signal frame size x86/elf: Support a new ELF aux vector AT_MINSIGSTKSZ x86/signal: Prevent an alternate stack overflow before a signal delivery selftest/x86/signal: Include test cases for validating sigaltstack arch/x86/include/asm/elf.h | 4 + arch/x86/include/asm/fpu/signal.h | 2 + arch/x86/include/asm/sigframe.h | 2 + arch/x86/include/uapi/asm/auxvec.h | 6 +- arch/x86/kernel/cpu/common.c | 3 + arch/x86/kernel/fpu/signal.c | 19 ++++ arch/x86/kernel/signal.c | 69 +++++++++++- tools/testing/selftests/x86/Makefile | 2 +- tools/testing/selftests/x86/sigaltstack.c | 128 ++++++++++++++++++++++ 9 files changed, 228 insertions(+), 7 deletions(-) create mode 100644 tools/testing/selftests/x86/sigaltstack.c -- 2.17.1