Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp37354094rwd; Tue, 11 Jul 2023 13:05:06 -0700 (PDT) X-Google-Smtp-Source: APBJJlGK5OpOy7nbP6y2x4Uqnv0SbdRItEwKQmooQyWr0kJCQF/fmwyGLTrMaVV685OMFAmLmw0P X-Received: by 2002:a17:90b:d87:b0:263:5702:d4c5 with SMTP id bg7-20020a17090b0d8700b002635702d4c5mr12603969pjb.19.1689105906158; Tue, 11 Jul 2023 13:05:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1689105906; cv=none; d=google.com; s=arc-20160816; b=VZiWtgjJs/k5m9Q+CQ5PjBprn8NiDRLzdbF1tGhEsFqtYM4esMehtN43QaRTH9gELH VNNKi4hyJStxba7miSM6SNTzqGW+ATdnpLIB/0vxt8+Dl1P1IjyPeJOVQRYpTteiq+p8 JrMMP289j2XCupoBG84W7PqaAAUKIYPo+q21iXYb/xda4xe15tWYL5hHyimggdhfS3jG mgIe2O06QWM26v054QRFF59/jUrZQKPyIXGc5exnLdq0RKbHslPLXlRTThzPzO2FiM8+ cNNmrBURGTuWAZEy1Ka8xdf/NEgMbDR6pTyoDe791P3+hLmy14bNDLKwigf2kl08GBwq 1JSA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=71S4OYLhQQwuRvPjfH+bq+kwj0L33Xru6X2N7QppLqk=; fh=Dl07FRP5q/B0JBHN0v0fC2WPbZYH+jLLtRh1Qk6MosE=; b=YGXkQOc5dASGN4jRfDcRCw6YJmSUIeeSyVXj+J0k7dRKS4kzkMQc4d/06fD1HVA9FD 0l81Ngcc/w/7uZTV4CTUobebA/s3ch3gNlrUTaoPMOZwNZJpgwouJwR9TFpK6o5sXjIf zCcxFZ3hpXUuyYTdkPV03sAUbTyCZwLuTZi47Ph8Jn36f3Usu2yxoFTd84Xj34ViB3ID yFsXfeAUm/XyN3EA6aojH7z7w667bf8xxpuwfmuf2dDA3zu6x9QRRzY6qaByp60dJSDR tw3YB2xBLbQes3Ki4r3Q2aa5BXa5WJ6qMzFddNEWDJBTZET46MyArm+kPuh6uESMCIDz R7mA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Xup7mWiw; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id l15-20020a17090a49cf00b00262ea2f8539si9386445pjm.153.2023.07.11.13.04.52; Tue, 11 Jul 2023 13:05:06 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Xup7mWiw; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230252AbjGKTyx (ORCPT + 99 others); Tue, 11 Jul 2023 15:54:53 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59360 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229521AbjGKTyw (ORCPT ); Tue, 11 Jul 2023 15:54:52 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 311CB10D2; Tue, 11 Jul 2023 12:54:51 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id C3C0B615E0; Tue, 11 Jul 2023 19:54:50 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id A4D90C433C8; Tue, 11 Jul 2023 19:54:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1689105290; bh=QD1kIvnVeFrYv8Gze2fLJLg0i/YqJFcXn0WrP/nZGg4=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=Xup7mWiwCHAi8aT6fbGucKKPxIBbP3jLmitcW/5X7SFIUjt4qsDbEuuYt8nC30oQu ZemjvWFcLm/15nnd8pyYP5UqbEvcVj/BXnrt2Qx13pyqCCc9SLIOtPvDnVQkH5k3o5 cCTVu9Aa/FhbGfk42ZRYw0MTt+5TVPJxCZY+AAFE= Date: Tue, 11 Jul 2023 21:54:46 +0200 From: Greg Kroah-Hartman To: Nathan Chancellor Cc: Sasha Levin , Peter Zijlstra , Petr Pavlu , tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, hpa@zytor.com, samitolvanen@google.com, x86@kernel.org, linux-trace-kernel@vger.kernel.org, linux-kernel@vger.kernel.org, llvm@lists.linux.dev, ndesaulniers@google.com, Masami Hiramatsu , stable@vger.kernel.org Subject: Re: [RFC PATCH 0/2] x86: kprobes: Fix CFI_CLANG related issues Message-ID: <2023071139-engorge-catchable-70fa@gregkh> References: <168899125356.80889.17967397360941194229.stgit@devnote2> <20230710155703.GA4021842@dev-arch.thelio-3990X> <20230711103303.287af608cc47dcf70d709070@kernel.org> <20230711183704.GA2758126@dev-arch.thelio-3990X> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230711183704.GA2758126@dev-arch.thelio-3990X> X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jul 11, 2023 at 11:37:04AM -0700, Nathan Chancellor wrote: > Masami, thanks for verifying! > > Hi Greg and Sasha, > > On Tue, Jul 11, 2023 at 10:33:03AM +0900, Masami Hiramatsu wrote: > > On Mon, 10 Jul 2023 08:57:03 -0700 > > Nathan Chancellor wrote: > > > > > On Mon, Jul 10, 2023 at 09:14:13PM +0900, Masami Hiramatsu (Google) wrote: > > > > I just build tested, since I could not boot the kernel with CFI_CLANG=y. > > > > Would anyone know something about this error? > > > > > > > > [ 0.141030] MMIO Stale Data: Unknown: No mitigations > > > > [ 0.153511] SMP alternatives: Using kCFI > > > > [ 0.164593] Freeing SMP alternatives memory: 36K > > > > [ 0.165053] Kernel panic - not syncing: stack-protector: Kernel stack is corrupted in: start_kernel+0x472/0x48b > > > > [ 0.166028] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 6.4.2-00002-g12b1b2fca8ef #126 > > > > [ 0.166028] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014 > > > > [ 0.166028] Call Trace: > > > > [ 0.166028] > > > > [ 0.166028] dump_stack_lvl+0x6e/0xb0 > > > > [ 0.166028] panic+0x146/0x2f0 > > > > [ 0.166028] ? start_kernel+0x472/0x48b > > > > [ 0.166028] __stack_chk_fail+0x14/0x20 > > > > [ 0.166028] start_kernel+0x472/0x48b > > > > [ 0.166028] x86_64_start_reservations+0x24/0x30 > > > > [ 0.166028] x86_64_start_kernel+0xa6/0xbb > > > > [ 0.166028] secondary_startup_64_no_verify+0x106/0x11b > > > > [ 0.166028] > > > > [ 0.166028] ---[ end Kernel panic - not syncing: stack-protector: Kernel stack is corrupted in: start_kernel+0x472/0x48b ]--- > > > > > > This looks like https://github.com/ClangBuiltLinux/linux/issues/1815 to > > > me. What version of LLVM are you using? This was fixed in 16.0.4. Commit > > > 514ca14ed544 ("start_kernel: Add __no_stack_protector function > > > attribute") should resolve it on the Linux side, it looks like that is > > > in 6.5-rc1. Not sure if we should backport it or just let people upgrade > > > their toolchains on older releases. > > > > Thanks for the info. I confirmed that the commit fixed the boot issue. > > So I think it should be backported to the stable tree. > > Would you please apply commit 514ca14ed544 ("start_kernel: Add > __no_stack_protector function attribute") to linux-6.4.y? The series > ending with commit 611d4c716db0 ("x86/hyperv: Mark hv_ghcb_terminate() > as noreturn") that shipped in 6.4 exposes an LLVM issue that affected > 16.0.0 and 16.0.1, which was resolved in 16.0.2. When using those > affected LLVM releases, the following crash at boot occurs: > > [ 0.181667] Kernel panic - not syncing: stack-protector: Kernel stack is corrupted in: start_kernel+0x3cf/0x3d0 > [ 0.182621] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 6.4.3 #1 > [ 0.182621] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.2-0-gea1b7a073390-prebuilt.qemu.org 04/01/2014 > [ 0.182621] Call Trace: > [ 0.182621] > [ 0.182621] dump_stack_lvl+0x6a/0xa0 > [ 0.182621] panic+0x124/0x2f0 > [ 0.182621] ? start_kernel+0x3cf/0x3d0 > [ 0.182621] ? acpi_enable+0x64/0xc0 > [ 0.182621] __stack_chk_fail+0x14/0x20 > [ 0.182621] start_kernel+0x3cf/0x3d0 > [ 0.182621] x86_64_start_reservations+0x24/0x30 > [ 0.182621] x86_64_start_kernel+0xab/0xb0 > [ 0.182621] secondary_startup_64_no_verify+0x107/0x10b > [ 0.182621] > [ 0.182621] ---[ end Kernel panic - not syncing: stack-protector: Kernel stack is corrupted in: start_kernel+0x3cf/0x3d0 ]--- > > 514ca14ed544 aims to avoid this on the Linux side. I have verified that > it applies to 6.4.3 cleanly and resolves the issue there, as has Masami. > > If there are any issues or questions, please let me know. Now queued up, thanks. greg k-h