Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp6083270rwb; Mon, 14 Nov 2022 14:06:48 -0800 (PST) X-Google-Smtp-Source: AA0mqf7btzVz1ZtqTqZFvM5wZ1FkZ15PbiKQ22ISsGRTxjOBH2jPiLtsHNbUmKFJ+tNVQfgjKovS X-Received: by 2002:a17:902:e8d5:b0:186:5ce5:8022 with SMTP id v21-20020a170902e8d500b001865ce58022mr1162428plg.62.1668463608576; Mon, 14 Nov 2022 14:06:48 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1668463608; cv=none; d=google.com; s=arc-20160816; b=XGvlTZOBGzwcZrGMrvtAzbkr0cTX88ogCsiOQleOFAnMh5j8V3WrzLYp4BcvR7nROZ EA24V+4O153KuVS4mh7vpHvcQ1gmG4eKQCpQXSivGbVuwrI9M+72avtLxeTIdzYi+udi 13QtyjybQANg58ytmlti9Dfbibq3TyObsLCFFcH72WY1ihHoDPdIGOsEJB1i5SN+sh3N BaTZMEkLL6M5eBEaXhlF1vNbqMv9kehaLtd+nyWz9jq20xPf0B6KH4+UO9onkytJkmbb RPCroYVOylwthFoI9yrdyLNEyu5HFfMnAxJYo94mOUzfta1KJDHr8VMR1otQdqCR1dAd T+Jg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=mcMQ6oGt3lHEFdYvtNKrgWQbO0ZWYUaaXk4OdmcSKAE=; b=kOwvfykFClgL8gOeCu8m40vitOIb19Cjq//r3ySqNQV+aRuxFgaHKMf1bZZ3wsOVsR 079lXhL9d81eyt9+qB6u+2m2h9e5d01gpaLO/XSUDzG+fEMLKF9i+SfnuV60B/UMj0T2 Tq9ZtKfg58ktSapPtQQcLEVcB85fcovqYdikpKvBAvm7NbeyW1KqmO+jVON45AgiZbHa 4wwZKz4F/zROqeQGvaOrTgmQDS+cPU+9A+U77ZmYN2aElW+aNywpfkvBucSb41HyjIGW KAuJJcMuNnVczqfO9Q+bk012rVGXyJppXf66fqGsN0tlfammCijmqNmmSAfd4vPLoTM2 YOKg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=QNOvJtZ4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 14-20020a630d4e000000b0046b121a3246si10323688pgn.842.2022.11.14.14.06.37; Mon, 14 Nov 2022 14:06:48 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=QNOvJtZ4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237557AbiKNVnX (ORCPT + 89 others); Mon, 14 Nov 2022 16:43:23 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36246 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235836AbiKNVnV (ORCPT ); Mon, 14 Nov 2022 16:43:21 -0500 Received: from mail-ot1-x32b.google.com (mail-ot1-x32b.google.com [IPv6:2607:f8b0:4864:20::32b]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F17A819001 for ; Mon, 14 Nov 2022 13:43:19 -0800 (PST) Received: by mail-ot1-x32b.google.com with SMTP id w26-20020a056830061a00b0066c320f5b49so7476718oti.5 for ; Mon, 14 Nov 2022 13:43:19 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=mcMQ6oGt3lHEFdYvtNKrgWQbO0ZWYUaaXk4OdmcSKAE=; b=QNOvJtZ4MGSV5OFgY1M95uPa5H3x0A1t60/APstJgzlgAftcS9kToQVWqUvcrnfKBv IMsm+flXQZ3ig1u0qNIcRhCOXCNpp6BjStn5MjpKU/+okoXqVFfAFN4GaR0W8r/7/RJB 4dlJ9DxHtj/obYPTYH4iV0pCFUTLaUmix6Emnkwq9ixOVkzyWEah8HUoxS8xZ+/Uda1J aAg7ZsHwJrjmJWSgaxy9+EgqGzX22ZiVvVau4UKLWISV/Ty3uLZG5TViyQx5UlXRMa1d YwZnu9YRiaWgMBIAbfakmd+b2y7K2qj6cYBjjG3QOfw3OjPyuPk9RmLj/r3hk0by0B9V MdRA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=mcMQ6oGt3lHEFdYvtNKrgWQbO0ZWYUaaXk4OdmcSKAE=; b=BH1Wrkn4aD+8q/xbhnFncvMI4lSH6yLzyBY7j1uhZuXdw343fo/g/m2lVQC9b1r4YM VnqZGiRoFBVIFClqOoAXFNvNcIYXCZwX5yRh9ZjKKt5QOevwW7VTeragTjSbUIL2/wBs DQaOlmBiCMtZqEVvaCgOjuGDUGlMU2Q8PN3x3+3qCCgsMSRHSS2+zloicbfcE6MC1AOQ u/I1epNwDhrUjbrvXi5yheZOugN4s5HsUO53ht0b2Zx09UU2yxhhKUmQPN72PIbCYKQV BFOay2Cc9pE7YatlebP35qO9x9snpOLkSKfQ2GA0Ukoa/esP1PZyeFRXImbFH3hV/h6W jsIw== X-Gm-Message-State: ANoB5pl/CUAkylMdT2ubaB/fQVOj4PQ81wtM9AsQ43AW2wNtsH9W9Nzv V5YzUfg8C8K8duwRrWpBLg1z34YqNBwBRhatXw== X-Received: by 2002:a9d:7752:0:b0:66c:49c4:39a with SMTP id t18-20020a9d7752000000b0066c49c4039amr7400288otl.81.1668462199286; Mon, 14 Nov 2022 13:43:19 -0800 (PST) MIME-Version: 1.0 References: In-Reply-To: From: Brian Gerst Date: Mon, 14 Nov 2022 16:43:07 -0500 Message-ID: Subject: Re: [PATCH v2 1/2] x86/stackprotector/32: Make the canary into a regular percpu variable To: Ferry Toth Cc: Andy Shevchenko , Dave Hansen , Andy Lutomirski , x86@kernel.org, LKML , Sedat Dilek , Nick Desaulniers , Sean Christopherson , Joerg Roedel Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Nov 10, 2022 at 2:36 PM Ferry Toth wrote: > > Hi, > > Op 09-11-2022 om 23:33 schreef Brian Gerst: > > On Wed, Nov 9, 2022 at 9:50 AM Andy Shevchenko > > wrote: > >> On Fri, Sep 30, 2022 at 11:18:51PM +0200, Ferry Toth wrote: > >>> Op 30-09-2022 om 22:30 schreef Ferry Toth: > >>>> Op 29-09-2022 om 16:20 schreef Andy Shevchenko: > >>>>> On Thu, Sep 29, 2022 at 04:56:07PM +0300, Andy Shevchenko wrote: > >>>>>> On Sat, Feb 13, 2021 at 11:19:44AM -0800, Andy Lutomirski wrote: > >>>>>>> On 32-bit kernels, the stackprotector canary is quite nasty -- it is > >>>>>>> stored at %gs:(20), which is nasty because 32-bit kernels use %fs for > >>>>>>> percpu storage. It's even nastier because it means that whether %gs > >>>>>>> contains userspace state or kernel state while running kernel code > >>>>>>> depends on whether stackprotector is enabled (this is > >>>>>>> CONFIG_X86_32_LAZY_GS), and this setting radically changes the way > >>>>>>> that segment selectors work. Supporting both variants is a > >>>>>>> maintenance and testing mess. > >>>>>>> > >>>>>>> Merely rearranging so that percpu and the stack canary > >>>>>>> share the same segment would be messy as the 32-bit percpu address > >>>>>>> layout isn't currently compatible with putting a variable at a fixed > >>>>>>> offset. > >>>>>>> > >>>>>>> Fortunately, GCC 8.1 added options that allow the stack canary to be > >>>>>>> accessed as %fs:__stack_chk_guard, effectively turning it > >>>>>>> into an ordinary > >>>>>>> percpu variable. This lets us get rid of all of the code to > >>>>>>> manage the > >>>>>>> stack canary GDT descriptor and the CONFIG_X86_32_LAZY_GS mess. > >>>>>>> > >>>>>>> (That name is special. We could use any symbol we want for the > >>>>>>> %fs-relative mode, but for CONFIG_SMP=n, gcc refuses to > >>>>>>> let us use any > >>>>>>> name other than __stack_chk_guard.) > >>>>>>> > >>>>>>> This patch forcibly disables stackprotector on older compilers that > >>>>>>> don't support the new options and makes the stack canary into a > >>>>>>> percpu variable. The "lazy GS" approach is now used for all 32-bit > >>>>>>> configurations. > >>>>>>> > >>>>>>> This patch also makes load_gs_index() work on 32-bit kernels. On > >>>>>>> 64-bit kernels, it loads the GS selector and updates the user > >>>>>>> GSBASE accordingly. (This is unchanged.) On 32-bit kernels, > >>>>>>> it loads the GS selector and updates GSBASE, which is now > >>>>>>> always the user base. This means that the overall effect is > >>>>>>> the same on 32-bit and 64-bit, which avoids some ifdeffery. > >>>>>> This patch broke 32-bit boot on Intel Merrifield > >>>>>> > >>>>>> git bisect start > >>>>>> # good: [9f4ad9e425a1d3b6a34617b8ea226d56a119a717] Linux 5.12 > >>>>>> git bisect good 9f4ad9e425a1d3b6a34617b8ea226d56a119a717 > >>>>>> # bad: [62fb9874f5da54fdb243003b386128037319b219] Linux 5.13 > >>>>>> git bisect bad 62fb9874f5da54fdb243003b386128037319b219 > >>>>>> # bad: [85f3f17b5db2dd9f8a094a0ddc665555135afd22] Merge branch > >>>>>> 'md-fixes' of > >>>>>> https://git.kernel.org/pub/scm/linux/kernel/git/song/md into > >>>>>> block-5.13 > >>>>>> git bisect bad 85f3f17b5db2dd9f8a094a0ddc665555135afd22 > >>>>>> # good: [ca62e9090d229926f43f20291bb44d67897baab7] Merge tag > >>>>>> 'regulator-v5.13' of > >>>>>> git://git.kernel.org/pub/scm/linux/kernel/git/broonie/regulator > >>>>>> git bisect good ca62e9090d229926f43f20291bb44d67897baab7 > >>>>>> # bad: [68a32ba14177d4a21c4a9a941cf1d7aea86d436f] Merge tag > >>>>>> 'drm-next-2021-04-28' of git://anongit.freedesktop.org/drm/drm > >>>>>> git bisect bad 68a32ba14177d4a21c4a9a941cf1d7aea86d436f > >>>>>> # good: [49c70ece54b0d1c51bc31b2b0c1070777c992c26] > >>>>>> drm/amd/display: Change input parameter for set_drr > >>>>>> git bisect good 49c70ece54b0d1c51bc31b2b0c1070777c992c26 > >>>>>> # good: [0b276e470a4d43e1365d3eb53c608a3d208cabd4] media: coda: > >>>>>> fix macroblocks count control usage > >>>>>> git bisect good 0b276e470a4d43e1365d3eb53c608a3d208cabd4 > >>>>>> # bad: [c6536676c7fe3f572ba55842e59c3c71c01e7fb3] Merge tag > >>>>>> 'x86_core_for_v5.13' of > >>>>>> git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip > >>>>>> git bisect bad c6536676c7fe3f572ba55842e59c3c71c01e7fb3 > >>>>>> # good: [d1466bc583a81830cef2399a4b8a514398351b40] Merge branch > >>>>>> 'work.inode-type-fixes' of > >>>>>> git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfs > >>>>>> git bisect good d1466bc583a81830cef2399a4b8a514398351b40 > >>>>>> # good: [fafe1e39ed213221c0bce6b0b31669334368dc97] Merge tag > >>>>>> 'afs-netfs-lib-20210426' of > >>>>>> git://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs > >>>>>> git bisect good fafe1e39ed213221c0bce6b0b31669334368dc97 > >>>>>> # bad: [b1f480bc0686e65d5413c035bd13af2ea4888784] Merge branch > >>>>>> 'x86/cpu' into WIP.x86/core, to merge the NOP changes & resolve > >>>>>> a semantic conflict > >>>>>> git bisect bad b1f480bc0686e65d5413c035bd13af2ea4888784 > >>>>>> # bad: [0c925c61dae18ee3cb93a61cc9dd9562a066034d] > >>>>>> x86/tools/insn_decoder_test: Convert to insn_decode() > >>>>>> git bisect bad 0c925c61dae18ee3cb93a61cc9dd9562a066034d > >>>>>> # bad: [514ef77607b9ff184c11b88e8f100bc27f07460d] > >>>>>> x86/boot/compressed/sev-es: Convert to insn_decode() > >>>>>> git bisect bad 514ef77607b9ff184c11b88e8f100bc27f07460d > >>>>>> # bad: [9e761296c52dcdb1aaa151b65bd39accb05740d9] x86/insn: > >>>>>> Rename insn_decode() to insn_decode_from_regs() > >>>>>> git bisect bad 9e761296c52dcdb1aaa151b65bd39accb05740d9 > >>>>>> # bad: [d0962f2b24c99889a386f0658c71535f56358f77] x86/entry/32: > >>>>>> Remove leftover macros after stackprotector cleanups > >>>>>> git bisect bad d0962f2b24c99889a386f0658c71535f56358f77 > >>>>>> # bad: [3fb0fdb3bbe7aed495109b3296b06c2409734023] > >>>>>> x86/stackprotector/32: Make the canary into a regular percpu > >>>>>> variable > >>>>>> git bisect bad 3fb0fdb3bbe7aed495109b3296b06c2409734023 > >>>>>> # first bad commit: [3fb0fdb3bbe7aed495109b3296b06c2409734023] > >>>>>> x86/stackprotector/32: Make the canary into a regular percpu > >>>>>> variable > >>>> With the bad commit the last words in dmesg are: > >>>> > >>>> mem auto-init: stack:off, heap alloc:off, heap free:off > >>>> Initializing HighMem for node 0 (00036ffe:0003f500) > >>>> Initializing Movable for node 0 (00000000:00000000) > >>>> Checking if this processor honours the WP bit even in supervisor > >>>> mode...Ok. > >>>> Memory: 948444K/1004124K available (12430K kernel code, 2167K rwdata, > >>>> 4948K rodata, 716K init, 716K bss, 55680K reserved, 0K cma-reserved, > >>>> 136200K highmem) > >>>> SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 > >>>> trace event string verifier disabled > >>>> Dynamic Preempt: voluntary > >>>> rcu: Preemptible hierarchical RCU implementation. > >>>> rcu: RCU event tracing is enabled. > >>>> rcu: RCU restricting CPUs from NR_CPUS=8 to nr_cpu_ids=2. > >>>> Trampoline variant of Tasks RCU enabled. > >>>> Tracing variant of Tasks RCU enabled. > >>>> rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. > >>>> rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 > >>>> NR_IRQS: 2304, nr_irqs: 512, preallocated irqs: 0 > >>>> > >>>> without the bad commit dmesg continues: > >>>> > >>>> random: get_random_bytes called from start_kernel+0x492/0x65a with > >>>> crng_init=0 > >>>> Console: colour dummy device 80x25 > >>>> printk: console [tty0] enabled > >>>> printk: bootconsole [uart0] disabled > >>>> > >>>> .... > >>>> > >>>>>> Any suggestions how to fix are welcome! > >>>>>> > >>> Interesting. I added the following fragment to the kernel config: > >>> > >>> # CONFIG_STACKPROTECTOR is not set > >>> > >>> And this resolves the boot issue (tested with v5.17 i686 on Intel > >>> Merrifield) > >> I'm not sure that's the correct approach. > I didn't intend as a resolution, merely as a workaround. And since > revert was not possible, as proof issue is localized in stack protector. > >> Any answer from the Andy Lutomirski? > >> > >> And in general to x86 maintainers, do we support all features on x86 32-bit? If > >> no, can it be said explicitly, please? > > What compiler version are you using? > > I built with Yocto Honister which builds it's own cross-compiler gcc > 11.2. For completeness: > > root@yuna:~# uname -a > Linux yuna 5.17.0-edison-acpi-standard #1 SMP PREEMPT Sun Mar 20 > 20:14:17 UTC 2022 i686 i686 i386 GNU/Linux > > root@yuna:~# cat /proc/version > Linux version 5.17.0-edison-acpi-standard (oe-user@oe-host) > (i686-poky-linux-gcc (GCC) 11.2.0, GNU ld (GNU Binutils) 2.37.20210721) > #1 SMP PREEMPT Sun Mar 20 20:14:17 UTC 2022 > > root@yuna:~# cat /etc/os-release > ID=poky-edison > NAME="Poky (Yocto Project Reference Distro)" > VERSION="3.4.4 (honister)" > VERSION_ID=3.4.4 > PRETTY_NAME="Poky (Yocto Project Reference Distro) 3.4.4 (honister)" > > > -- > > Brian Gerst What exactly happens when it fails (hang/reboot/oops)? Does removing the call to boot_init_stack_canary() in init/main.c fix the problem? -- Brian Gerst