Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp294416pxb; Fri, 15 Jan 2021 13:19:18 -0800 (PST) X-Google-Smtp-Source: ABdhPJz852RsW1YNmGKGoT8C5biKRooUyxM5SWYyVKiivAMzRTzfsZBEgARG4334S7+5A5opqtc3 X-Received: by 2002:aa7:d94e:: with SMTP id l14mr11186339eds.98.1610745557895; Fri, 15 Jan 2021 13:19:17 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1610745557; cv=none; d=google.com; s=arc-20160816; b=LqBHSDngSbJPZsz47Q36tQG0bLEyAD61/yDCKOCN7HpP4CammFJCKSpbRyRPw53+Fl 3svgxxzUJz6L2cvTI4vkv9NcENDCMf9fTxm4iF5PgmFMGm7cT4DugGQtTSoNbAHqwFux Rj3IHr4ZIzPleh5cWYbHtUVsa1JyU+ian6g5YdDgRUVUmMVc2Ws0krEQ5jRDY25GdMDo lqfem26AOe+soFM+Y+ZqlCzyYyKJ9oye+jffp8OC2PGy7ZaOTr+yBpr6cugmqIf8mk6T h/J8nt6zDdnFI3wStTQzcdZ0wjGP2x5cRHbWCXyFIgak9w4tAY2TH5pbw/tPOjM0uAu5 v27A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:message-id:date:subject :cc:to:from:ironport-sdr:ironport-sdr; bh=E1yEDiY+X77mDbCCxBf51lxlWPhqR2IR5fpTGubnlhQ=; b=JpLaefNbIaj9r3ewgnC4F8bwDB6s4CUIoqM8pwXnvhylJzQEor1XoTo21bh8zOoPKM TWW+ToI0xVI3YmggvhywOIOGlaEFBSBm0qWKY0932dhbKAdSalu2O0mazudpXaBIHYke UNcRARzLE40vBo84JBFnPmyowUMtKSFOqfgUqZtGjQCyzDjFXFC/EHPbwPChe0EXTyzX 4IrSjx+1MvHxhjEsZXGMJVmYUKxRUmjD7+slak4GxgOTao0CXzvhovCjlJGFW1wVkNLY k/c2PuDEG9oA9ADDJ00pEuJJzvjuaTosyBCTtA/GbUkVvOntbXOcv25P9eGWEDjF55LE OciQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i3si4724284edj.120.2021.01.15.13.18.54; Fri, 15 Jan 2021 13:19:17 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726081AbhAOVP6 (ORCPT + 99 others); Fri, 15 Jan 2021 16:15:58 -0500 Received: from mga18.intel.com ([134.134.136.126]:45764 "EHLO mga18.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725772AbhAOVP5 (ORCPT ); Fri, 15 Jan 2021 16:15:57 -0500 IronPort-SDR: VEr5Qk2rEoDw2m9faC4pKP8EbC/mEuWr+Z+1421do1hA02bVxMDKLTZUHCvZpmGua7FkkSTJ/X r2gPayINdYmg== X-IronPort-AV: E=McAfee;i="6000,8403,9865"; a="166277108" X-IronPort-AV: E=Sophos;i="5.79,350,1602572400"; d="scan'208";a="166277108" Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by orsmga106.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 15 Jan 2021 13:15:15 -0800 IronPort-SDR: GF4VNj/rfZHCUuhZlfp8BElW8w7/P1PwclGxRzbXTs+r/avtUDf6f38YL9ieSYTOyjmT5/Spxp 6z4zJ92xbbGw== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.79,350,1602572400"; d="scan'208";a="401418967" Received: from chang-linux-3.sc.intel.com ([172.25.66.175]) by fmsmga002.fm.intel.com with ESMTP; 15 Jan 2021 13:15:15 -0800 From: "Chang S. Bae" To: bp@suse.de, tglx@linutronix.de, mingo@kernel.org, luto@kernel.org, x86@kernel.org Cc: len.brown@intel.com, dave.hansen@intel.com, hjl.tools@gmail.com, Dave.Martin@arm.com, jannh@google.com, mpe@ellerman.id.au, tony.luck@intel.com, ravi.v.shankar@intel.com, libc-alpha@sourceware.org, linux-arch@vger.kernel.org, linux-api@vger.kernel.org, linux-kernel@vger.kernel.org, chang.seok.bae@intel.com, Fenghua Yu Subject: [PATCH v4 2/4] x86/elf: Support a new ELF aux vector AT_MINSIGSTKSZ Date: Fri, 15 Jan 2021 13:10:36 -0800 Message-Id: <20210115211038.2072-3-chang.seok.bae@intel.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20210115211038.2072-1-chang.seok.bae@intel.com> References: <20210115211038.2072-1-chang.seok.bae@intel.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Historically, signal.h defines MINSIGSTKSZ (2KB) and SIGSTKSZ (8KB), for use by all architectures with sigaltstack(2). Over time, the hardware state size grew, but these constants did not evolve. Today, literal use of these constants on several architectures may result in signal stack overflow, and thus user data corruption. A few years ago, the ARM team addressed this issue by establishing getauxval(AT_MINSIGSTKSZ), such that the kernel can supply at runtime value that is an appropriate replacement on the current and future hardware. Add getauxval(AT_MINSIGSTKSZ) support to x86, analogous to the support added for ARM in commit 94b07c1f8c39 ("arm64: signal: Report signal frame size to userspace via auxv"). Reported-by: Florian Weimer Fixes: c2bc11f10a39 ("x86, AVX-512: Enable AVX-512 States Context Switch") Signed-off-by: Chang S. Bae Reviewed-by: Len Brown Cc: H.J. Lu Cc: Fenghua Yu Cc: Dave Martin Cc: Michael Ellerman Cc: x86@kernel.org Cc: libc-alpha@sourceware.org Cc: linux-arch@vger.kernel.org Cc: linux-api@vger.kernel.org Cc: linux-kernel@vger.kernel.org Link: https://bugzilla.kernel.org/show_bug.cgi?id=153531 --- arch/x86/include/asm/elf.h | 4 ++++ arch/x86/include/uapi/asm/auxvec.h | 6 ++++-- arch/x86/kernel/signal.c | 5 +++++ 3 files changed, 13 insertions(+), 2 deletions(-) diff --git a/arch/x86/include/asm/elf.h b/arch/x86/include/asm/elf.h index b9a5d488f1a5..044b024abea1 100644 --- a/arch/x86/include/asm/elf.h +++ b/arch/x86/include/asm/elf.h @@ -311,6 +311,7 @@ do { \ NEW_AUX_ENT(AT_SYSINFO, VDSO_ENTRY); \ NEW_AUX_ENT(AT_SYSINFO_EHDR, VDSO_CURRENT_BASE); \ } \ + NEW_AUX_ENT(AT_MINSIGSTKSZ, get_sigframe_size()); \ } while (0) /* @@ -327,6 +328,7 @@ extern unsigned long task_size_32bit(void); extern unsigned long task_size_64bit(int full_addr_space); extern unsigned long get_mmap_base(int is_legacy); extern bool mmap_address_hint_valid(unsigned long addr, unsigned long len); +extern unsigned long get_sigframe_size(void); #ifdef CONFIG_X86_32 @@ -348,6 +350,7 @@ do { \ if (vdso64_enabled) \ NEW_AUX_ENT(AT_SYSINFO_EHDR, \ (unsigned long __force)current->mm->context.vdso); \ + NEW_AUX_ENT(AT_MINSIGSTKSZ, get_sigframe_size()); \ } while (0) /* As a historical oddity, the x32 and x86_64 vDSOs are controlled together. */ @@ -356,6 +359,7 @@ do { \ if (vdso64_enabled) \ NEW_AUX_ENT(AT_SYSINFO_EHDR, \ (unsigned long __force)current->mm->context.vdso); \ + NEW_AUX_ENT(AT_MINSIGSTKSZ, get_sigframe_size()); \ } while (0) #define AT_SYSINFO 32 diff --git a/arch/x86/include/uapi/asm/auxvec.h b/arch/x86/include/uapi/asm/auxvec.h index 580e3c567046..edd7808060e6 100644 --- a/arch/x86/include/uapi/asm/auxvec.h +++ b/arch/x86/include/uapi/asm/auxvec.h @@ -10,11 +10,13 @@ #endif #define AT_SYSINFO_EHDR 33 +#define AT_MINSIGSTKSZ 51 + /* entries in ARCH_DLINFO: */ #if defined(CONFIG_IA32_EMULATION) || !defined(CONFIG_X86_64) -# define AT_VECTOR_SIZE_ARCH 2 +# define AT_VECTOR_SIZE_ARCH 3 #else /* else it's non-compat x86-64 */ -# define AT_VECTOR_SIZE_ARCH 1 +# define AT_VECTOR_SIZE_ARCH 2 #endif #endif /* _ASM_X86_AUXVEC_H */ diff --git a/arch/x86/kernel/signal.c b/arch/x86/kernel/signal.c index 138a9f5b78d8..761d856f8ef7 100644 --- a/arch/x86/kernel/signal.c +++ b/arch/x86/kernel/signal.c @@ -716,6 +716,11 @@ void __init init_sigframe_size(void) max_frame_size = round_up(max_frame_size, FRAME_ALIGNMENT); } +unsigned long get_sigframe_size(void) +{ + return max_frame_size; +} + static inline int is_ia32_compat_frame(struct ksignal *ksig) { return IS_ENABLED(CONFIG_IA32_EMULATION) && -- 2.17.1