Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp36172716rwd; Mon, 10 Jul 2023 19:32:38 -0700 (PDT) X-Google-Smtp-Source: APBJJlGXub8dnbU0RZWZu37m1XKNuXB4z/wEHEErvEgZN089WL9mn/R+DJhjsFpT3+lRmJkwMdSS X-Received: by 2002:a05:6a20:3d1f:b0:12f:c61e:7cc3 with SMTP id y31-20020a056a203d1f00b0012fc61e7cc3mr18535878pzi.38.1689042758415; Mon, 10 Jul 2023 19:32:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1689042758; cv=none; d=google.com; s=arc-20160816; b=yJgMh0wXbrr35GgOrCybvWT0tdob0DevrQEqkiSUSXr8dBBBStlY7Sa1ZOz5HTQwxT t/Vhb8qVPUTm93ZznLbTxMJ/NipcJ4KqzYdPkrQcARtj6TQey108L563eXEWWIdhHFXo 5mDoBwvN2cwSytgwuZhxAHnd97VD0S1hoRQBkYKFFsY4zJJPccY1x5iwOfxuhl/MWNqL Bjv5mkAd7CMQbb0UK0nOPqoDLFG0ScdRI9yaXWyO3ESJUQDfpj2pZ/BT4vFjSacHA2rv fS6NW8xRCzDqdE/1bko2ZgDUwMOUNrAiNpw2Wlr/hv+ELKW7o+5sB6dAM/Wqg1Y7YTQo 63hQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=AUCGG9SCCVbnCw229Pa2SEQWYCsYFQGGA9Nc1dPdS4Q=; fh=k6Gkhye4PnwC6hnVyVSchi+okZ71P2AdmH1A+7+BdjU=; b=M5KkcdBVo4udcwlrvBrN+INBiAJ2nt0NbL1CvUgEWE9wPKVOmWhDv0/v6bsEqUK4ZK P9q2Ip30faU/BHM4gmj+FtcTIdHjF4Et/ydCmG8mS5oY7zgLbRSY4Hc9ZQEM5Cl7FlHW bMR4f/FZiNNKR7X2jl5zcZz5fZHXrUB1ewiD29B5tgrrM11pOG3je+GpxcKD0RyMZaPL UfpDChd5wcDLKKAmMAXudSYmi94YQ6tgqdlca8hub7jpKGBV4L1eNuQhVpRk1AmzhKD/ 5ThsENlMkm/NbGvhnxOvf3UIZ6mDvim7NNua3bZ50G+P09Ra3Tpl2niu3OlpU+Puiq+v C2tQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=l8YVL43F; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id jz11-20020a170903430b00b001b0044f186fsi743205plb.41.2023.07.10.19.32.25; Mon, 10 Jul 2023 19:32:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=l8YVL43F; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230325AbjGKBdM (ORCPT + 99 others); Mon, 10 Jul 2023 21:33:12 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41388 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230133AbjGKBdL (ORCPT ); Mon, 10 Jul 2023 21:33:11 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6B3EDE3; Mon, 10 Jul 2023 18:33:10 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 0248C612AC; Tue, 11 Jul 2023 01:33:10 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 2D6FDC433C7; Tue, 11 Jul 2023 01:33:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1689039189; bh=QDRQnHoafNPtNndmmJCDWbHEn5BC5mW3Cf6B9Yi5nl8=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=l8YVL43Fe8WkS6hWTx2bCObBHxOUXiVmbo5XicQGBS+PjHV6Lo2azCINCXtGiXKDa y5aoJ+mlPz6Ar8RSzrA3Na96HB9HijQCsCAEPS0dIMBdT26HJ96jM/+ghOzscwmXc1 n2zjXqIiPtktTjUO90LIM+SlUBz2xE8Kq7qz5byNveFSme2/TiwKWlQ11tFlptm0fX EhDoZOaAGG5lII2TNWKgE+Qmznz+4DanrLE0y9FvIEm/t0VUvexenmMM83bxiN34zr rr62LTaB4MjT2fNEv+1pj0Y3mPkI2iilPM2hgzBPHDJvzxYIWS2WihwNfD49BqMg4Q glb+i/SGPeLzQ== Date: Tue, 11 Jul 2023 10:33:03 +0900 From: Masami Hiramatsu (Google) To: Nathan Chancellor Cc: Peter Zijlstra , Petr Pavlu , tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, hpa@zytor.com, samitolvanen@google.com, x86@kernel.org, linux-trace-kernel@vger.kernel.org, linux-kernel@vger.kernel.org, llvm@lists.linux.dev, ndesaulniers@google.com Subject: Re: [RFC PATCH 0/2] x86: kprobes: Fix CFI_CLANG related issues Message-Id: <20230711103303.287af608cc47dcf70d709070@kernel.org> In-Reply-To: <20230710155703.GA4021842@dev-arch.thelio-3990X> References: <168899125356.80889.17967397360941194229.stgit@devnote2> <20230710155703.GA4021842@dev-arch.thelio-3990X> X-Mailer: Sylpheed 3.7.0 (GTK+ 2.24.32; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-7.2 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A, RCVD_IN_DNSWL_HI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 10 Jul 2023 08:57:03 -0700 Nathan Chancellor wrote: > On Mon, Jul 10, 2023 at 09:14:13PM +0900, Masami Hiramatsu (Google) wrote: > > I just build tested, since I could not boot the kernel with CFI_CLANG=y. > > Would anyone know something about this error? > > > > [ 0.141030] MMIO Stale Data: Unknown: No mitigations > > [ 0.153511] SMP alternatives: Using kCFI > > [ 0.164593] Freeing SMP alternatives memory: 36K > > [ 0.165053] Kernel panic - not syncing: stack-protector: Kernel stack is corrupted in: start_kernel+0x472/0x48b > > [ 0.166028] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 6.4.2-00002-g12b1b2fca8ef #126 > > [ 0.166028] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014 > > [ 0.166028] Call Trace: > > [ 0.166028] > > [ 0.166028] dump_stack_lvl+0x6e/0xb0 > > [ 0.166028] panic+0x146/0x2f0 > > [ 0.166028] ? start_kernel+0x472/0x48b > > [ 0.166028] __stack_chk_fail+0x14/0x20 > > [ 0.166028] start_kernel+0x472/0x48b > > [ 0.166028] x86_64_start_reservations+0x24/0x30 > > [ 0.166028] x86_64_start_kernel+0xa6/0xbb > > [ 0.166028] secondary_startup_64_no_verify+0x106/0x11b > > [ 0.166028] > > [ 0.166028] ---[ end Kernel panic - not syncing: stack-protector: Kernel stack is corrupted in: start_kernel+0x472/0x48b ]--- > > This looks like https://github.com/ClangBuiltLinux/linux/issues/1815 to > me. What version of LLVM are you using? This was fixed in 16.0.4. Commit > 514ca14ed544 ("start_kernel: Add __no_stack_protector function > attribute") should resolve it on the Linux side, it looks like that is > in 6.5-rc1. Not sure if we should backport it or just let people upgrade > their toolchains on older releases. Thanks for the info. I confirmed that the commit fixed the boot issue. So I think it should be backported to the stable tree. Thanks! > > Cheers, > Nathan -- Masami Hiramatsu (Google)