From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-10.8 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 97F37C433DB for ; Wed, 3 Feb 2021 12:53:24 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id 2505964F4E for ; Wed, 3 Feb 2021 12:53:24 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 2505964F4E Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=axtens.net Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id 840366B006E; Wed, 3 Feb 2021 07:53:23 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 7F0A16B0072; Wed, 3 Feb 2021 07:53:23 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 6BAD96B0075; Wed, 3 Feb 2021 07:53:23 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0096.hostedemail.com [216.40.44.96]) by kanga.kvack.org (Postfix) with ESMTP id 560246B006E for ; Wed, 3 Feb 2021 07:53:23 -0500 (EST) Received: from smtpin10.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay02.hostedemail.com (Postfix) with ESMTP id 0C79C3635 for ; Wed, 3 Feb 2021 12:53:23 +0000 (UTC) X-FDA: 77776947486.10.rifle10_3f0d4b0275d3 Received: from filter.hostedemail.com (10.5.16.251.rfc1918.com [10.5.16.251]) by smtpin10.hostedemail.com (Postfix) with ESMTP id DB7C616A4A4 for ; Wed, 3 Feb 2021 12:53:22 +0000 (UTC) X-HE-Tag: rifle10_3f0d4b0275d3 X-Filterd-Recvd-Size: 6262 Received: from mail-pf1-f171.google.com (mail-pf1-f171.google.com [209.85.210.171]) by imf09.hostedemail.com (Postfix) with ESMTP for ; Wed, 3 Feb 2021 12:53:22 +0000 (UTC) Received: by mail-pf1-f171.google.com with SMTP id j12so16574142pfj.12 for ; Wed, 03 Feb 2021 04:53:22 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=axtens.net; s=google; h=from:to:subject:in-reply-to:references:date:message-id:mime-version :content-transfer-encoding; bh=LOtl+4N3n7HC1FTJVHyIZDNqxeDX06oURAfIAKcKhm0=; b=b6TzmQGyTZeGrsFIAcz7KusQs/jmT0+vFcqvfxr55jjPJxAol7u0OU0gfk1kgTJ8hI VlpH16VqRzmxaOo7ppn/zN/ZGfe5NUZ0KQjKUmmTLGYqbu4mgxp/Xer2ptBT35Za0wzg 67jt37ic3jN53srVEPGNwlD1ls6cPnMTzbH4A= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:subject:in-reply-to:references:date :message-id:mime-version:content-transfer-encoding; bh=LOtl+4N3n7HC1FTJVHyIZDNqxeDX06oURAfIAKcKhm0=; b=s9bIe3/q3ChPGlGHFWU53HbVLn5a0cTHMdc1BG2JRsaw6nLD3PW8b3PGaU6uYwel42 c2iQ09M19S/CuRrbwMAmo1oc5F+Vts3e/5dYjuEBSUsK4GWrc8l//sZ42LrE93t7A9Qd bxqxBA+l9N1vbRL4HdHzjBSrXKKfOrnWjZvhkO9rWKcrmaufkSn7zfCMDkvhU151gEg1 J25qaYhmcJmg6UkM0adUTjNXwH06HOsErS4tYU5ve4kSZM0s8wcGcenN5gtIGtGUlHzC mTZ1VMQIWrTP6eSlVQCbp8G2dCzhn+q60km8t40lcQstarVhgsXxFxb+t1dScWSLIwDk MHQg== X-Gm-Message-State: AOAM532iY/Xyjonrj/jYNXG9BHZAwbvqKn3swfnAm8S6O0H+05Q/JL6K tp6sO2WW28MS3W/u5Nj+5KD24g== X-Google-Smtp-Source: ABdhPJxoxaYMqJUUweFxjd8UeCMfbqbN1x4UPxdu1S7fFkwQ6XsD5JnWtAJve9gYCSqzPSGZrPc2TQ== X-Received: by 2002:a63:ff4f:: with SMTP id s15mr3522513pgk.62.1612356801346; Wed, 03 Feb 2021 04:53:21 -0800 (PST) Received: from localhost (2001-44b8-1113-6700-1c59-4eca-f876-fd51.static.ipv6.internode.on.net. [2001:44b8:1113:6700:1c59:4eca:f876:fd51]) by smtp.gmail.com with ESMTPSA id 9sm2288251pfy.110.2021.02.03.04.53.19 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 03 Feb 2021 04:53:20 -0800 (PST) From: Daniel Axtens To: Christophe Leroy , linux-kernel@vger.kernel.org, linux-mm@kvack.org, linuxppc-dev@lists.ozlabs.org, kasan-dev@googlegroups.com, aneesh.kumar@linux.ibm.com, bsingharora@gmail.com Subject: Re: [PATCH v10 6/6] powerpc: Book3S 64-bit outline-only KASAN support In-Reply-To: <4b790789-052f-76de-a289-726517026efd@csgroup.eu> References: <20210203115946.663273-1-dja@axtens.net> <20210203115946.663273-7-dja@axtens.net> <4b790789-052f-76de-a289-726517026efd@csgroup.eu> Date: Wed, 03 Feb 2021 23:53:17 +1100 Message-ID: <875z39wbwi.fsf@dja-thinkpad.axtens.net> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: Christophe Leroy writes: > Le 03/02/2021 =C3=A0 12:59, Daniel Axtens a =C3=A9crit=C2=A0: >> Implement a limited form of KASAN for Book3S 64-bit machines running und= er >> the Radix MMU, supporting only outline mode. >>=20 > >> diff --git a/arch/powerpc/kernel/process.c b/arch/powerpc/kernel/process= .c >> index a66f435dabbf..9a6fd603f0e7 100644 >> --- a/arch/powerpc/kernel/process.c >> +++ b/arch/powerpc/kernel/process.c >> @@ -2157,8 +2157,8 @@ void show_stack(struct task_struct *tsk, unsigned = long *stack, >> break; >>=20=20=20 >> stack =3D (unsigned long *) sp; >> - newsp =3D stack[0]; >> - ip =3D stack[STACK_FRAME_LR_SAVE]; >> + newsp =3D READ_ONCE_NOCHECK(stack[0]); >> + ip =3D READ_ONCE_NOCHECK(stack[STACK_FRAME_LR_SAVE]); >> if (!firstframe || ip !=3D lr) { >> printk("%s["REG"] ["REG"] %pS", >> loglvl, sp, ip, (void *)ip); >> @@ -2176,17 +2176,19 @@ void show_stack(struct task_struct *tsk, unsigne= d long *stack, >> * See if this is an exception frame. >> * We look for the "regshere" marker in the current frame. >> */ >> - if (validate_sp(sp, tsk, STACK_INT_FRAME_SIZE) >> - && stack[STACK_FRAME_MARKER] =3D=3D STACK_FRAME_REGS_MARKER) { >> + if (validate_sp(sp, tsk, STACK_INT_FRAME_SIZE) && >> + (READ_ONCE_NOCHECK(stack[STACK_FRAME_MARKER]) =3D=3D >> + STACK_FRAME_REGS_MARKER)) { >> struct pt_regs *regs =3D (struct pt_regs *) >> (sp + STACK_FRAME_OVERHEAD); >>=20=20=20 >> - lr =3D regs->link; >> + lr =3D READ_ONCE_NOCHECK(regs->link); >> printk("%s--- interrupt: %lx at %pS\n", >> - loglvl, regs->trap, (void *)regs->nip); >> + loglvl, READ_ONCE_NOCHECK(regs->trap), >> + (void *)READ_ONCE_NOCHECK(regs->nip)); >> __show_regs(regs); >> printk("%s--- interrupt: %lx\n", >> - loglvl, regs->trap); >> + loglvl, READ_ONCE_NOCHECK(regs->trap)); >>=20=20=20 >> firstframe =3D 1; >> } > > > The above changes look like a bug fix not directly related to KASAN. Shou= ld be split out in another=20 > patch I think. That code corresponds to the following part of the patch description: | - Make our stack-walking code KASAN-safe by using READ_ONCE_NOCHECK - | generic code, arm64, s390 and x86 all do this for similar sorts of | reasons: when unwinding a stack, we might touch memory that KASAN has | marked as being out-of-bounds. In our case we often get this when | checking for an exception frame because we're checking an arbitrary | offset into the stack frame. | | See commit 20955746320e ("s390/kasan: avoid false positives during stack | unwind"), commit bcaf669b4bdb ("arm64: disable kasan when accessing | frame->fp in unwind_frame"), commit 91e08ab0c851 ("x86/dumpstack: | Prevent KASAN false positive warnings") and commit 6e22c8366416 | ("tracing, kasan: Silence Kasan warning in check_stack of stack_tracer") include/linux/compiler.h describes it as follows: /* * Use READ_ONCE_NOCHECK() instead of READ_ONCE() if you need * to hide memory access from KASAN. */ So I think it is sufficently connected with KASAN to be in this patch. Kind regards, Daniel > > Christophe