Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp720600rwb; Wed, 9 Nov 2022 07:56:28 -0800 (PST) X-Google-Smtp-Source: AA0mqf7errHjq0H8RR9hgPWA5h1oOXje/73mSUf22bodWOL6M0NN4BUmSnUtCBMXeY017WrgJroZ X-Received: by 2002:a17:902:f70f:b0:188:6862:5917 with SMTP id h15-20020a170902f70f00b0018868625917mr27555193plo.129.1668009388385; Wed, 09 Nov 2022 07:56:28 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1668009388; cv=none; d=google.com; s=arc-20160816; b=AxFHzTnQjifjzibAZUOfWVcPWiPHSUMo5EhXCMIziZGIMvUhMTpwzvPFYrX8GhBL1p GnGI2U+7CZeuHM3XQItLsQXT3JfzRLlN1kjjqTOdlVM2bCkAviSBm62TJL4+Uz6x5sWU il5mC/ePRVP/n4kyHDmiimEQ6Btzh4ZriCuNR8g5ahwUBJQQutMlWNpNoSO2wst+v6w/ z822aF8039zTjNd2ZOlhMxz78rFS7QZ0BtoZFMKGrMT/6bGAq65RezAN9zTL2riQ0mfe hHCx7KP7AOwCrMLS5bNmeVKDU2zdJeJWHKM1BVgjwth9VTNyUcJp21dkuxK9f3QI//fT FhVA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:organization:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=mcu1Q82RUL7+euawIRZzO1aavA0vk+Zvxc/80LMgW1g=; b=ZZEF2sZCKy2OCSuwuIBwIrmYxO5SUKlhlGEBTk1INB57KBXG/eClBFB5JvzgkhEXAC yBMR1jFCOUzrKu1yvgiSx2UgPAka3tvog+O9cwQ4lwFV3EjAWEeLw5ll9tJ8rCmczvMh LF7MygRoXZ5SFewdV/anTpKUu9tl32W9wW9D9o+JjZ1YD4xIf+maw2bk72zsG+Rf2+WB SBF8v4R4+H9uikFSdPy25Yzy86MFEvAcsz8MRxOpxnuYB24diIHEJs8p+DYpzoithEww BA0Nq3mlHP/k0sOsLy0c2iM2X3mItUMDsmrJv/TaPrDCZdL/8qa1AxkpvpMuaFajEFmP I/mw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=cynxdTsz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id d4-20020a170903230400b0018659ff71d2si18867477plh.62.2022.11.09.07.56.16; Wed, 09 Nov 2022 07:56:28 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=cynxdTsz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229995AbiKIOuY (ORCPT + 92 others); Wed, 9 Nov 2022 09:50:24 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57624 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229447AbiKIOuV (ORCPT ); Wed, 9 Nov 2022 09:50:21 -0500 Received: from mga04.intel.com (mga04.intel.com [192.55.52.120]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A13941115 for ; Wed, 9 Nov 2022 06:50:20 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1668005420; x=1699541420; h=date:from:to:cc:subject:message-id:references: mime-version:content-transfer-encoding:in-reply-to; bh=gfzi9tkjaZ5VNZtCp8rbBelYBFXpgrGPUWFSeiMAiNE=; b=cynxdTszh4tu2sG/F+7tn31kZo27cCtJQF0xoQfMyH5LW1nSlPRRyzI+ DeZIbkdUCASzqVM0if6wUmdnGt3rVYFfWDLehsU8fsGPIUudL0kMw0ZM2 ENN4/QvetN7j0Mr9ttVCQk05G9T0a35oCi0RojZbzXUW1GxvCvX0SzXqj ZjjZbAbdUMqoDw+LdERm9RY0YHqZ4TlbmFxBWD5KNS7yKikDT3zM2vDVS +fKgxQvPC1KMVWBfVATiRWP+TIRCEkSBZjQk/tkmrEYUawADKO7uYPDAv buT8EzVjCMuujj923o2C171PFTHlAAWCKkADSvM45+1wjkvW4g2Fno59t g==; X-IronPort-AV: E=McAfee;i="6500,9779,10526"; a="309704411" X-IronPort-AV: E=Sophos;i="5.96,150,1665471600"; d="scan'208";a="309704411" Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by fmsmga104.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 09 Nov 2022 06:50:20 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6500,9779,10526"; a="742421575" X-IronPort-AV: E=Sophos;i="5.96,150,1665471600"; d="scan'208";a="742421575" Received: from smile.fi.intel.com ([10.237.72.54]) by fmsmga002.fm.intel.com with ESMTP; 09 Nov 2022 06:50:17 -0800 Received: from andy by smile.fi.intel.com with local (Exim 4.96) (envelope-from ) id 1osmP9-009mwN-1W; Wed, 09 Nov 2022 16:50:15 +0200 Date: Wed, 9 Nov 2022 16:50:15 +0200 From: Andy Shevchenko To: Ferry Toth , Dave Hansen Cc: Andy Lutomirski , x86@kernel.org, LKML , Sedat Dilek , Nick Desaulniers , Sean Christopherson , Brian Gerst , Joerg Roedel Subject: Re: [PATCH v2 1/2] x86/stackprotector/32: Make the canary into a regular percpu variable Message-ID: References: MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: Organization: Intel Finland Oy - BIC 0357606-4 - Westendinkatu 7, 02160 Espoo X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Sep 30, 2022 at 11:18:51PM +0200, Ferry Toth wrote: > Op 30-09-2022 om 22:30 schreef Ferry Toth: > > Op 29-09-2022 om 16:20 schreef Andy Shevchenko: > > > On Thu, Sep 29, 2022 at 04:56:07PM +0300, Andy Shevchenko wrote: > > > > On Sat, Feb 13, 2021 at 11:19:44AM -0800, Andy Lutomirski wrote: > > > > > On 32-bit kernels, the stackprotector canary is quite nasty -- it is > > > > > stored at %gs:(20), which is nasty because 32-bit kernels use %fs for > > > > > percpu storage.? It's even nastier because it means that whether %gs > > > > > contains userspace state or kernel state while running kernel code > > > > > depends on whether stackprotector is enabled (this is > > > > > CONFIG_X86_32_LAZY_GS), and this setting radically changes the way > > > > > that segment selectors work.? Supporting both variants is a > > > > > maintenance and testing mess. > > > > > > > > > > Merely rearranging so that percpu and the stack canary > > > > > share the same segment would be messy as the 32-bit percpu address > > > > > layout isn't currently compatible with putting a variable at a fixed > > > > > offset. > > > > > > > > > > Fortunately, GCC 8.1 added options that allow the stack canary to be > > > > > accessed as %fs:__stack_chk_guard, effectively turning it > > > > > into an ordinary > > > > > percpu variable.? This lets us get rid of all of the code to > > > > > manage the > > > > > stack canary GDT descriptor and the CONFIG_X86_32_LAZY_GS mess. > > > > > > > > > > (That name is special.? We could use any symbol we want for the > > > > > ? %fs-relative mode, but for CONFIG_SMP=n, gcc refuses to > > > > > let us use any > > > > > ? name other than __stack_chk_guard.) > > > > > > > > > > This patch forcibly disables stackprotector on older compilers that > > > > > don't support the new options and makes the stack canary into a > > > > > percpu variable.? The "lazy GS" approach is now used for all 32-bit > > > > > configurations. > > > > > > > > > > This patch also makes load_gs_index() work on 32-bit kernels.? On > > > > > 64-bit kernels, it loads the GS selector and updates the user > > > > > GSBASE accordingly.? (This is unchanged.)? On 32-bit kernels, > > > > > it loads the GS selector and updates GSBASE, which is now > > > > > always the user base.? This means that the overall effect is > > > > > the same on 32-bit and 64-bit, which avoids some ifdeffery. > > > > This patch broke 32-bit boot on Intel Merrifield > > > > > > > > git bisect start > > > > # good: [9f4ad9e425a1d3b6a34617b8ea226d56a119a717] Linux 5.12 > > > > git bisect good 9f4ad9e425a1d3b6a34617b8ea226d56a119a717 > > > > # bad: [62fb9874f5da54fdb243003b386128037319b219] Linux 5.13 > > > > git bisect bad 62fb9874f5da54fdb243003b386128037319b219 > > > > # bad: [85f3f17b5db2dd9f8a094a0ddc665555135afd22] Merge branch > > > > 'md-fixes' of > > > > https://git.kernel.org/pub/scm/linux/kernel/git/song/md into > > > > block-5.13 > > > > git bisect bad 85f3f17b5db2dd9f8a094a0ddc665555135afd22 > > > > # good: [ca62e9090d229926f43f20291bb44d67897baab7] Merge tag > > > > 'regulator-v5.13' of > > > > git://git.kernel.org/pub/scm/linux/kernel/git/broonie/regulator > > > > git bisect good ca62e9090d229926f43f20291bb44d67897baab7 > > > > # bad: [68a32ba14177d4a21c4a9a941cf1d7aea86d436f] Merge tag > > > > 'drm-next-2021-04-28' of git://anongit.freedesktop.org/drm/drm > > > > git bisect bad 68a32ba14177d4a21c4a9a941cf1d7aea86d436f > > > > # good: [49c70ece54b0d1c51bc31b2b0c1070777c992c26] > > > > drm/amd/display: Change input parameter for set_drr > > > > git bisect good 49c70ece54b0d1c51bc31b2b0c1070777c992c26 > > > > # good: [0b276e470a4d43e1365d3eb53c608a3d208cabd4] media: coda: > > > > fix macroblocks count control usage > > > > git bisect good 0b276e470a4d43e1365d3eb53c608a3d208cabd4 > > > > # bad: [c6536676c7fe3f572ba55842e59c3c71c01e7fb3] Merge tag > > > > 'x86_core_for_v5.13' of > > > > git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip > > > > git bisect bad c6536676c7fe3f572ba55842e59c3c71c01e7fb3 > > > > # good: [d1466bc583a81830cef2399a4b8a514398351b40] Merge branch > > > > 'work.inode-type-fixes' of > > > > git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfs > > > > git bisect good d1466bc583a81830cef2399a4b8a514398351b40 > > > > # good: [fafe1e39ed213221c0bce6b0b31669334368dc97] Merge tag > > > > 'afs-netfs-lib-20210426' of > > > > git://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs > > > > git bisect good fafe1e39ed213221c0bce6b0b31669334368dc97 > > > > # bad: [b1f480bc0686e65d5413c035bd13af2ea4888784] Merge branch > > > > 'x86/cpu' into WIP.x86/core, to merge the NOP changes & resolve > > > > a semantic conflict > > > > git bisect bad b1f480bc0686e65d5413c035bd13af2ea4888784 > > > > # bad: [0c925c61dae18ee3cb93a61cc9dd9562a066034d] > > > > x86/tools/insn_decoder_test: Convert to insn_decode() > > > > git bisect bad 0c925c61dae18ee3cb93a61cc9dd9562a066034d > > > > # bad: [514ef77607b9ff184c11b88e8f100bc27f07460d] > > > > x86/boot/compressed/sev-es: Convert to insn_decode() > > > > git bisect bad 514ef77607b9ff184c11b88e8f100bc27f07460d > > > > # bad: [9e761296c52dcdb1aaa151b65bd39accb05740d9] x86/insn: > > > > Rename insn_decode() to insn_decode_from_regs() > > > > git bisect bad 9e761296c52dcdb1aaa151b65bd39accb05740d9 > > > > # bad: [d0962f2b24c99889a386f0658c71535f56358f77] x86/entry/32: > > > > Remove leftover macros after stackprotector cleanups > > > > git bisect bad d0962f2b24c99889a386f0658c71535f56358f77 > > > > # bad: [3fb0fdb3bbe7aed495109b3296b06c2409734023] > > > > x86/stackprotector/32: Make the canary into a regular percpu > > > > variable > > > > git bisect bad 3fb0fdb3bbe7aed495109b3296b06c2409734023 > > > > # first bad commit: [3fb0fdb3bbe7aed495109b3296b06c2409734023] > > > > x86/stackprotector/32: Make the canary into a regular percpu > > > > variable > > > > With the bad commit the last words in dmesg are: > > > > mem auto-init: stack:off, heap alloc:off, heap free:off > > Initializing HighMem for node 0 (00036ffe:0003f500) > > Initializing Movable for node 0 (00000000:00000000) > > Checking if this processor honours the WP bit even in supervisor > > mode...Ok. > > Memory: 948444K/1004124K available (12430K kernel code, 2167K rwdata, > > 4948K rodata, 716K init, 716K bss, 55680K reserved, 0K cma-reserved, > > 136200K highmem) > > SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 > > trace event string verifier disabled > > Dynamic Preempt: voluntary > > rcu: Preemptible hierarchical RCU implementation. > > rcu:???? RCU event tracing is enabled. > > rcu:???? RCU restricting CPUs from NR_CPUS=8 to nr_cpu_ids=2. > > ?Trampoline variant of Tasks RCU enabled. > > ?Tracing variant of Tasks RCU enabled. > > rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. > > rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 > > NR_IRQS: 2304, nr_irqs: 512, preallocated irqs: 0 > > > > without the bad commit dmesg continues: > > > > random: get_random_bytes called from start_kernel+0x492/0x65a with > > crng_init=0 > > Console: colour dummy device 80x25 > > printk: console [tty0] enabled > > printk: bootconsole [uart0] disabled > > > > .... > > > > > > Any suggestions how to fix are welcome! > > > > > Interesting. I added the following fragment to the kernel config: > > # CONFIG_STACKPROTECTOR is not set > > And this resolves the boot issue (tested with v5.17 i686 on Intel > Merrifield) I'm not sure that's the correct approach. Any answer from the Andy Lutomirski? And in general to x86 maintainers, do we support all features on x86 32-bit? If no, can it be said explicitly, please? > > > > Configuration is based on in-tree i386_defconfig with some > > > > drivers enabled > > > > on top (no core stuff was altered, but if you wish to check, it's here: > > > > https://github.com/andy-shev/linux/blob/eds-acpi/arch/x86/configs/i386_defconfig). > > > > > > > For the record (and preventing some questions) the v6.0-rc7 still > > > has this issue. > > > > > > I can't test reverts, because it's huge pile of changes in that area > > > happened > > > for the last year or so. > > > > > I just tested this by reverting 3fb0fdb3 "x86/stackprotector/32: Make > > the canary into a regular percpu variable" and it's prerequisite > > d0962f2b "x86/entry/32: Remove leftover macros after stackprotector > > cleanups" on top of v5.13 and indeed this resolves the boot issue. > > > > I can also confirm the 2 reverts will not apply on top of v6.0-rc7. -- With Best Regards, Andy Shevchenko