Received: by 2002:a05:6a10:a852:0:0:0:0 with SMTP id d18csp2906490pxy; Mon, 3 May 2021 10:37:52 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzf1LNwfDTNZwn6Y0d8y5tKmvSCtHebtY8AYz+y4fDWnlfUZT6VK2Kgf92Q9TLTrT73UBWC X-Received: by 2002:a17:906:b251:: with SMTP id ce17mr17375492ejb.149.1620063472123; Mon, 03 May 2021 10:37:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620063472; cv=none; d=google.com; s=arc-20160816; b=AVSBrthnr6OpvEQD498YrT6ecc85oja5D5hpzGmdPg38sv6KINTNQy+wKY6nkXSydP EFZQEkb/ksi/beUdQP70N+MgcT4/wp6+VTDK1GGRVeg7fZpGf3cOWpAFhZDJuWTzTu05 TbNJf8UD26zQ+fVXdUiGxtxRZU/9CbtYxiwcVOM85JP0dCAiMmvdTfF6XdL1E1IsZrP/ cG91uffTC1suhaQewcMn/4nK4a0OpY2PEnURwh1BDCS6owuwaPJs9boZUjzB/EQNeAJU t73ZN5oYV/nMfyBFzGUcYwhmtF/SI/IPbueCmLpW0O7qoIucY7QP74P9BPqYjFGgvIvm IA3g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:to:from :dkim-signature:dkim-filter; bh=EYht7bnnZALqCAngJGQY0oHKDEKVB3mk09HnhdDDWvk=; b=AVgnXF2hpbQPWuct8+G8SifCb0+bsrn69DvP3WFpC3OR13wfxkFA/NHIHEo+zEwUwl CSVcO+gaHB45+gvtM/8KaNznCsjrie9jS7Vs45QrLNIAo8/8DJ7NmNp7VTBmKX+wKxMo YcUorAwcBzdiVR3VYVkJSRlEyNeh4OiFl2VWwylYRthsKERnixc2JPCSfCPtHHDJTRg3 PJB/qWgzmmBWw1zD/o6Ti36hZEYoNBseXFtWCMAsMcerHCrkCSH1EH2MZmLE3EwXpHwx bV3KaiSxyI3BwEIH81v4FBUR4AZMc3fHFdTo5E48x4x7eA06429Q19pZUTmhU3h/tM4H yuWw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=k223RR53; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id gz20si395726ejc.731.2021.05.03.10.37.26; Mon, 03 May 2021 10:37:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=k223RR53; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231781AbhECRhY (ORCPT + 99 others); Mon, 3 May 2021 13:37:24 -0400 Received: from linux.microsoft.com ([13.77.154.182]:54506 "EHLO linux.microsoft.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231452AbhECRhT (ORCPT ); Mon, 3 May 2021 13:37:19 -0400 Received: from x64host.home (unknown [47.187.223.33]) by linux.microsoft.com (Postfix) with ESMTPSA id 02C9920B8008; Mon, 3 May 2021 10:36:24 -0700 (PDT) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com 02C9920B8008 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1620063385; bh=EYht7bnnZALqCAngJGQY0oHKDEKVB3mk09HnhdDDWvk=; h=From:To:Subject:Date:In-Reply-To:References:From; b=k223RR53gCBeR0IYEEx2yTde/21IkoXVl7restM7bssa2WtPe/+q/LDATZTRexhGT apAZ38tojvUlpG1qXWDwE0WPk3Tt8Ylk2028pLx/ruhcc1CeTEQ7DeXnPcHE9dbg5k GYdcoU6v5P/kCeNomEshBtzuJRFn0RU3ONJILvsU= From: madvenka@linux.microsoft.com To: broonie@kernel.org, jpoimboe@redhat.com, mark.rutland@arm.com, jthierry@redhat.com, catalin.marinas@arm.com, will@kernel.org, jmorris@namei.org, pasha.tatashin@soleen.com, linux-arm-kernel@lists.infradead.org, live-patching@vger.kernel.org, linux-kernel@vger.kernel.org, madvenka@linux.microsoft.com Subject: [RFC PATCH v3 2/4] arm64: Check the return PC against unreliable code sections Date: Mon, 3 May 2021 12:36:13 -0500 Message-Id: <20210503173615.21576-3-madvenka@linux.microsoft.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20210503173615.21576-1-madvenka@linux.microsoft.com> References: <65cf4dfbc439b010b50a0c46ec500432acde86d6> <20210503173615.21576-1-madvenka@linux.microsoft.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: "Madhavan T. Venkataraman" Create a sym_code_ranges[] array to cover the following text sections that contain functions defined as SYM_CODE_*(). These functions are low-level functions (and do not have a proper frame pointer prolog and epilog). So, they are inherently unreliable from a stack unwinding perspective. .entry.text .idmap.text .hyp.idmap.text .hyp.text .hibernate_exit.text .entry.tramp.text If a return PC falls in any of these, mark the stack trace unreliable. The only exception to this is - if the unwinder has reached the last frame already, it will not mark the stack trace unreliable since there is no more unwinding to do. E.g., - ret_from_fork() occurs at the end of the stack trace of kernel tasks. - el0_*() functions occur at the end of EL0 exception stack traces. This covers all user task entries into the kernel. NOTE: - EL1 exception handlers are in .entry.text. So, stack traces that contain those functions will be marked not reliable. This covers interrupts, exceptions and breakpoints encountered while executing in the kernel. - At the end of an interrupt, the kernel can preempt the current task if required. So, the stack traces of all preempted tasks will show the interrupt frame and will be considered unreliable. Signed-off-by: Madhavan T. Venkataraman --- arch/arm64/kernel/stacktrace.c | 54 ++++++++++++++++++++++++++++++++++ 1 file changed, 54 insertions(+) diff --git a/arch/arm64/kernel/stacktrace.c b/arch/arm64/kernel/stacktrace.c index c21a1bca28f3..1ff14615a55a 100644 --- a/arch/arm64/kernel/stacktrace.c +++ b/arch/arm64/kernel/stacktrace.c @@ -15,9 +15,48 @@ #include #include +#include #include #include +struct code_range { + unsigned long start; + unsigned long end; +}; + +struct code_range sym_code_ranges[] = +{ + /* non-unwindable ranges */ + { (unsigned long)__entry_text_start, + (unsigned long)__entry_text_end }, + { (unsigned long)__idmap_text_start, + (unsigned long)__idmap_text_end }, + { (unsigned long)__hyp_idmap_text_start, + (unsigned long)__hyp_idmap_text_end }, + { (unsigned long)__hyp_text_start, + (unsigned long)__hyp_text_end }, +#ifdef CONFIG_HIBERNATION + { (unsigned long)__hibernate_exit_text_start, + (unsigned long)__hibernate_exit_text_end }, +#endif +#ifdef CONFIG_UNMAP_KERNEL_AT_EL0 + { (unsigned long)__entry_tramp_text_start, + (unsigned long)__entry_tramp_text_end }, +#endif + { /* sentinel */ } +}; + +static struct code_range *lookup_range(unsigned long pc) +{ + struct code_range *range; + + for (range = sym_code_ranges; range->start; range++) { + if (pc >= range->start && pc < range->end) + return range; + } + return range; +} + /* * AArch64 PCS assigns the frame pointer to x29. * @@ -43,6 +82,7 @@ int notrace unwind_frame(struct task_struct *tsk, struct stackframe *frame) { unsigned long fp = frame->fp; struct stack_info info; + struct code_range *range; frame->reliable = true; @@ -103,6 +143,8 @@ int notrace unwind_frame(struct task_struct *tsk, struct stackframe *frame) return 0; } + range = lookup_range(frame->pc); + #ifdef CONFIG_FUNCTION_GRAPH_TRACER if (tsk->ret_stack && frame->pc == (unsigned long)return_to_handler) { @@ -118,9 +160,21 @@ int notrace unwind_frame(struct task_struct *tsk, struct stackframe *frame) return -EINVAL; frame->pc = ret_stack->ret; frame->pc = ptrauth_strip_insn_pac(frame->pc); + return 0; } #endif /* CONFIG_FUNCTION_GRAPH_TRACER */ + if (!range->start) + return 0; + + /* + * The return PC falls in an unreliable function. If the final frame + * has been reached, no more unwinding is needed. Otherwise, mark the + * stack trace not reliable. + */ + if (frame->fp) + frame->reliable = false; + return 0; } NOKPROBE_SYMBOL(unwind_frame); -- 2.25.1