Received: by 2002:a05:6a10:1a4d:0:0:0:0 with SMTP id nk13csp3545214pxb; Fri, 4 Feb 2022 10:45:14 -0800 (PST) X-Google-Smtp-Source: ABdhPJzdW/6GuNfZ+u0lx7rV1pUby1N+92DoLEfxbVrmbbmo4jzE+QAK1Z8+RO2qL4TBSsywZE3r X-Received: by 2002:a17:907:3d90:: with SMTP id he16mr171641ejc.643.1644000314295; Fri, 04 Feb 2022 10:45:14 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1644000314; cv=none; d=google.com; s=arc-20160816; b=c74vSqbyFnB3u5TOLseBP80QKCRHmkUygcKTHOt8t2IryfRgUjOApuSJkt/mZoBA3z SDlRMgEzTsg3tqP+f69gZ/EUdZq0uJHwSEK0c2nLkbsOzL8SMxIdeYEWErHr/XWKK2Hr EMY0nASLdOMPVgKuOwjqFeFc06noOnypd1zJhIZ3ogI4KBc3JblXE3DfAuyATM5dLDFe /Opzbqlx2GW21nZCQ6c1VvstjR/zSyO6+1aNmjODL3Gun4xNqwCGADouCOuNyK4V2Z2d cnRmixKJwkUphT4+os5MhHWdtEvZhqgay26Bdadtp4/ZZJjYVOgjhgD6xoTHUzbevtE4 TlNQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:dkim-signature; bh=hnuCjOcrcVbTrSMGDeFitTnyY+vwDbK2/TPhiEo9TIY=; b=0XAy7YMhe1ZT9ByIFpTB1NNqF8UiuhYglWpUaPuoXjxvrKwABzJWXFG8JGDSb6S3B2 fKqaQBviuZrbxEs6n3LVA2TretpAFv4UZ0jYQd37JbbfB6FE34L0nidQXamDtXodq8BE /oeID7+8Wg/a0msnhXBIgvmw0hRi79H+CJKI7ezpxdhtI5gb2Zi2rBSnE5pDlLhPB8l0 LshcU5MFEfqoy/nBDbAaXVvxoZ5UMrg8MWGdsRqxSp+pLg7bTvVJ5mVWhJo1qSTHO0GR o++Eqn3/gDPrhb4rJnSDrtkdwTSZ/3/LD+gU3hJlqdE1A9a+EpuhZqKEflEBAxd9ZZoC GjYA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=google header.b="bGrhcn/Z"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id i21si85308edr.468.2022.02.04.10.44.49; Fri, 04 Feb 2022 10:45:14 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=google header.b="bGrhcn/Z"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345588AbiBBPwv (ORCPT + 99 others); Wed, 2 Feb 2022 10:52:51 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33024 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1345566AbiBBPwu (ORCPT ); Wed, 2 Feb 2022 10:52:50 -0500 Received: from mail-il1-x131.google.com (mail-il1-x131.google.com [IPv6:2607:f8b0:4864:20::131]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 54326C06173B for ; Wed, 2 Feb 2022 07:52:50 -0800 (PST) Received: by mail-il1-x131.google.com with SMTP id z7so17406233ilb.6 for ; Wed, 02 Feb 2022 07:52:50 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linuxfoundation.org; s=google; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=hnuCjOcrcVbTrSMGDeFitTnyY+vwDbK2/TPhiEo9TIY=; b=bGrhcn/ZvfDpHWNEWDSBjLp+4cy2d/yHhtihOOYV3lMkyzPmQxHG84pnZf01rhqafB WbEdrn1JDmAZhI0+ucBk7sTbZ5hhY6+d3AA1OZBz2+JRSROtN3nUtnC7vZbh28Rhod8Q iKMvXn7CqgBHMWzG6+vZ0i+h+urQ2ZH1maBHk= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=hnuCjOcrcVbTrSMGDeFitTnyY+vwDbK2/TPhiEo9TIY=; b=wZCwVkhq8SvxqwEHBaNkG44nZc2M3Z3bRBWcn23CWB/BTkG0B3QRFYrwsbxz0Fjrog RHAtrGKdXUmYtrUCiw7qbHAdr3UxR01BQxONeuShdKKKg8g/DbJOjjtRt5GIGGJ8v0rR NcUHCyYe4bkKq8/RtORHdvw/65QryoGQP1uGdBM6jtHQJ11icuWfTpMnz7eLMY31Lp5l krHZAICZX2Ap1vsBcndRnN36d8xN0rr0LE/DOXhRhm8QZgiQ6eeewwn23gzEYKCCU8nY mZrqlBT0HMHdgNT59mSo+pqr3yP005vQFPWaKtwbXwVCcwkQsOGp+y+au8E7gEBQ59jS Tz6w== X-Gm-Message-State: AOAM533FyG03Vvx0hLK2AwigS6IDl8RFh3XF93UY+cDBFUOUsyaJ67qd nidxJsnpsOSO/pi2xZXATT96Pg== X-Received: by 2002:a92:1901:: with SMTP id 1mr16973107ilz.70.1643817169453; Wed, 02 Feb 2022 07:52:49 -0800 (PST) Received: from [192.168.1.128] ([71.205.29.0]) by smtp.gmail.com with ESMTPSA id e11sm17164586ioq.41.2022.02.02.07.52.48 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Wed, 02 Feb 2022 07:52:49 -0800 (PST) Subject: Re: [PATCH] pidfd: fix test failure due to stack overflow on some arches To: Christian Brauner , Axel Rasmussen Cc: Christian Brauner , Shuah Khan , Zach O'Keefe , linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, Shuah Khan References: <20220127212951.3604667-1-axelrasmussen@google.com> <20220128085616.tnsowlg5iff6ofm4@wittgenstein> From: Shuah Khan Message-ID: <924d8fd8-7069-41d2-9887-f36160d9f598@linuxfoundation.org> Date: Wed, 2 Feb 2022 08:52:47 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.8.1 MIME-Version: 1.0 In-Reply-To: <20220128085616.tnsowlg5iff6ofm4@wittgenstein> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 1/28/22 1:56 AM, Christian Brauner wrote: > On Thu, Jan 27, 2022 at 01:29:51PM -0800, Axel Rasmussen wrote: >> When running the pidfd_fdinfo_test on arm64, it fails for me. After some >> digging, the reason is that the child exits due to SIGBUS, because it >> overflows the 1024 byte stack we've reserved for it. >> >> To fix the issue, increase the stack size to 8192 bytes (this number is >> somewhat arbitrary, and was arrived at through experimentation -- I kept >> doubling until the failure no longer occurred). >> >> Also, let's make the issue easier to debug. wait_for_pid() returns an >> ambiguous value: it may return -1 in all of these cases: >> >> 1. waitpid() itself returned -1 >> 2. waitpid() returned success, but we found !WIFEXITED(status). >> 3. The child process exited, but it did so with a -1 exit code. >> >> There's no way for the caller to tell the difference. So, at least log >> which occurred, so the test runner can debug things. >> >> While debugging this, I found that we had !WIFEXITED(), because the >> child exited due to a signal. This seems like a reasonably common case, >> so also print out whether or not we have WIFSIGNALED(), and the >> associated WTERMSIG() (if any). This lets us see the SIGBUS I'm fixing >> clearly when it occurs. >> >> Finally, I'm suspicious of allocating the child's stack on our stack. >> man clone(2) suggests that the correct way to do this is with mmap(), >> and in particular by setting MAP_STACK. So, switch to doing it that way >> instead. > > Heh, yes. :) > > commit 99c3a000279919cc4875c9dfa9c3ebb41ed8773e > Author: Michael Kerrisk > Date: Thu Nov 14 12:19:21 2019 +0100 > > clone.2: Allocate child's stack using mmap(2) rather than malloc(3) > > Christian Brauner suggested mmap(MAP_STACKED), rather than > malloc(), as the canonical way of allocating a stack for the > child of clone(), and Jann Horn noted some reasons why: > > Not on Linux, but on OpenBSD, they do use MAP_STACK now > AFAIK; this was announced here: > . > Basically they periodically check whether the userspace > stack pointer points into a MAP_STACK region, and if not, > they kill the process. So even if it's a no-op on Linux, it > might make sense to advise people to use the flag to improve > portability? I'm not sure if that's something that belongs > in Linux manpages. > > Another reason against malloc() is that when setting up > thread stacks in proper, reliable software, you'll probably > want to place a guard page (in other words, a 4K PROT_NONE > VMA) at the bottom of the stack to reliably catch stack > overflows; and you probably don't want to do that with > malloc, in particular with non-page-aligned allocations. > > And the OpenBSD 6.5 manual pages says: > > MAP_STACK > Indicate that the mapping is used as a stack. This > flag must be used in combination with MAP_ANON and > MAP_PRIVATE. > > And I then noticed that MAP_STACK seems already to be on > FreeBSD for a long time: > > MAP_STACK > Map the area as a stack. MAP_ANON is implied. > Offset should be 0, fd must be -1, and prot should > include at least PROT_READ and PROT_WRITE. This > option creates a memory region that grows to at > most len bytes in size, starting from the stack > top and growing down. The stack top is the startā€ > ing address returned by the call, plus len bytes. > The bottom of the stack at maximum growth is the > starting address returned by the call. > > The entire area is reserved from the point of view > of other mmap() calls, even if not faulted in yet. > > Reported-by: Jann Horn > Reported-by: Christian Brauner > Signed-off-by: Michael Kerrisk > > >> >> Signed-off-by: Axel Rasmussen >> --- > > Yeah, stack handling - especially with legacy clone() - is yucky on the > best of days. Thank you for the fix. > > Acked-by: Christian Brauner > Thank you both. Will apply for 5.17-rc4 or so. thanks, -- Shuah