From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1978BC5475B for ; Wed, 6 Mar 2024 04:00:18 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 875286B0075; Tue, 5 Mar 2024 23:00:18 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 825816B007E; Tue, 5 Mar 2024 23:00:18 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 6EC806B0083; Tue, 5 Mar 2024 23:00:18 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0013.hostedemail.com [216.40.44.13]) by kanga.kvack.org (Postfix) with ESMTP id 5B0136B0075 for ; Tue, 5 Mar 2024 23:00:18 -0500 (EST) Received: from smtpin07.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay10.hostedemail.com (Postfix) with ESMTP id 222A8C0B62 for ; Wed, 6 Mar 2024 04:00:18 +0000 (UTC) X-FDA: 81865261716.07.2722EE9 Received: from szxga04-in.huawei.com (szxga04-in.huawei.com [45.249.212.190]) by imf28.hostedemail.com (Postfix) with ESMTP id B5789C0020 for ; Wed, 6 Mar 2024 04:00:14 +0000 (UTC) Authentication-Results: imf28.hostedemail.com; dkim=none; spf=pass (imf28.hostedemail.com: domain of xiaojiangfeng@huawei.com designates 45.249.212.190 as permitted sender) smtp.mailfrom=xiaojiangfeng@huawei.com; dmarc=pass (policy=quarantine) header.from=huawei.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1709697616; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=DgU1E9FoRQ3hQ0SjAJkzMwl2IqjCcRdJZaXUC9zZ6bU=; b=lusdzZxHeDeCOEC0UN8IXglO5NRj1F3DFtqZ2WWt1psLp+yeobtSK/GDIt7xodtTz/uh6r gf54E12CSJd0uJFULdMi+yu9ENQVUrMxxJ6ZUnCHBm5C2Jxfr6jzn0GbohlDWhzvIavZWg +TBwHmMXE4NaRUJ2Y6E5WBa5gAgcoNI= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1709697616; a=rsa-sha256; cv=none; b=RDd1mJSB7/qPQ3BYKej4AdpJBWEjtWbK2Suz8gHa3Dq9/ll/oZRbubY1FjMGsSvNkToQOg uH+4SUIZAPf6SwNs2IJZLlBt8bQLrX9UowxHveGLNT+ukOnjvfmzV3vidN7btK1ZI/NiM7 kbUEW+V0tyO7I7c+6PQidqbuIT5Ie7w= ARC-Authentication-Results: i=1; imf28.hostedemail.com; dkim=none; spf=pass (imf28.hostedemail.com: domain of xiaojiangfeng@huawei.com designates 45.249.212.190 as permitted sender) smtp.mailfrom=xiaojiangfeng@huawei.com; dmarc=pass (policy=quarantine) header.from=huawei.com Received: from mail.maildlp.com (unknown [172.19.88.234]) by szxga04-in.huawei.com (SkyGuard) with ESMTP id 4TqJYS5MLvz2BfN5; Wed, 6 Mar 2024 11:57:48 +0800 (CST) Received: from canpemm500010.china.huawei.com (unknown [7.192.105.118]) by mail.maildlp.com (Postfix) with ESMTPS id A006014011A; Wed, 6 Mar 2024 12:00:09 +0800 (CST) Received: from [10.67.111.82] (10.67.111.82) by canpemm500010.china.huawei.com (7.192.105.118) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.35; Wed, 6 Mar 2024 12:00:09 +0800 Subject: Re: [PATCH] usercopy: delete __noreturn from usercopy_abort To: Josh Poimboeuf References: <1709516385-7778-1-git-send-email-xiaojiangfeng@huawei.com> <202403040938.D770633@keescook> <77bb0d81-f496-7726-9495-57088a4c0bfc@huawei.com> <202403050129.5B72ACAA0D@keescook> <20240305175846.qnyiru7uaa7itqba@treble> CC: Kees Cook , Jann Horn , , , , , , , , , , , , , , Russell King , , Ard Biesheuvel From: Jiangfeng Xiao Message-ID: Date: Wed, 6 Mar 2024 12:00:04 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.7.1 MIME-Version: 1.0 In-Reply-To: <20240305175846.qnyiru7uaa7itqba@treble> Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Originating-IP: [10.67.111.82] X-ClientProxiedBy: dggems703-chm.china.huawei.com (10.3.19.180) To canpemm500010.china.huawei.com (7.192.105.118) X-Stat-Signature: gtchhc9cfxsqzrb547rjjyrbosaj5iq5 X-Rspamd-Server: rspam10 X-Rspamd-Queue-Id: B5789C0020 X-Rspam-User: X-HE-Tag: 1709697614-731396 X-HE-Meta: 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: On 2024/3/6 1:58, Josh Poimboeuf wrote: >>>> For the usercopy_abort function, whether '__noreturn' is added >>>> does not affect the internal behavior of the usercopy_abort function. >>>> Therefore, it is recommended that '__noreturn' be deleted >>>> so that backtrace can work properly. >>> >>> This isn't acceptable. Removing __noreturn this will break >>> objtool's processing of execution flow for livepatching, IBT, and >>> KCFI instrumentation. These all depend on an accurate control flow >>> descriptions, and usercopy_abort is correctly marked __noreturn. > > __noreturn also has the benefit of enabling the compiler to produce more > compact code for callees. > >> Thank you for providing this information. >> I'll go back to further understand how __noreturn is used >> in features such as KCFI and livepatching. > > Adding ARM folks -- see > https://lkml.kernel.org/lkml/1709516385-7778-1-git-send-email-xiaojiangfeng@huawei.com > for the original bug report. > > This is an off-by-one bug which is common in unwinders, due to the fact > that the address on the stack points to the return address rather than > the call address. > Thanks for your advice. I think I understand. To solve this problem, I need to fix the off-by-one bug which is common in unwinders. I'll try to fix it later by referring to your patch. > So, for example, when the last instruction of a function is a function > call (e.g., to a noreturn function), it can cause the unwinder to > incorrectly try to unwind from the function *after* the callee. > > For ORC (x86), we fixed this by decrementing the PC for call frames (but > not exception frames). I've seen user space unwinders do similar, for > non-signal frames. > > Something like the following might fix your issue (completely untested): > > diff --git a/arch/arm/include/asm/stacktrace.h b/arch/arm/include/asm/stacktrace.h > index 360f0d2406bf..4891e38cdc1f 100644 > --- a/arch/arm/include/asm/stacktrace.h > +++ b/arch/arm/include/asm/stacktrace.h > @@ -21,9 +21,7 @@ struct stackframe { > struct llist_node *kr_cur; > struct task_struct *tsk; > #endif > -#ifdef CONFIG_UNWINDER_FRAME_POINTER > bool ex_frame; > -#endif > }; > > static __always_inline > @@ -37,9 +35,8 @@ void arm_get_current_stackframe(struct pt_regs *regs, struct stackframe *frame) > frame->kr_cur = NULL; > frame->tsk = current; > #endif > -#ifdef CONFIG_UNWINDER_FRAME_POINTER > - frame->ex_frame = in_entry_text(frame->pc); > -#endif > + frame->ex_frame = !!regs; > + > } > > extern int unwind_frame(struct stackframe *frame); > diff --git a/arch/arm/kernel/stacktrace.c b/arch/arm/kernel/stacktrace.c > index 620aa82e3bdd..caed7436da09 100644 > --- a/arch/arm/kernel/stacktrace.c > +++ b/arch/arm/kernel/stacktrace.c > @@ -154,9 +154,6 @@ static void start_stack_trace(struct stackframe *frame, struct task_struct *task > frame->kr_cur = NULL; > frame->tsk = task; > #endif > -#ifdef CONFIG_UNWINDER_FRAME_POINTER > - frame->ex_frame = in_entry_text(frame->pc); > -#endif > } > > void arch_stack_walk(stack_trace_consume_fn consume_entry, void *cookie, > @@ -167,6 +164,7 @@ void arch_stack_walk(stack_trace_consume_fn consume_entry, void *cookie, > if (regs) { > start_stack_trace(&frame, NULL, regs->ARM_fp, regs->ARM_sp, > regs->ARM_lr, regs->ARM_pc); > + frame.ex_frame = true; > } else if (task != current) { > #ifdef CONFIG_SMP > /* > @@ -180,6 +178,7 @@ void arch_stack_walk(stack_trace_consume_fn consume_entry, void *cookie, > thread_saved_sp(task), 0, > thread_saved_pc(task)); > #endif > + frame.ex_frame = false; > } else { > here: > start_stack_trace(&frame, task, > @@ -187,6 +186,7 @@ void arch_stack_walk(stack_trace_consume_fn consume_entry, void *cookie, > current_stack_pointer, > (unsigned long)__builtin_return_address(0), > (unsigned long)&&here); > + frame.ex_frame = false; > /* skip this function */ > if (unwind_frame(&frame)) > return; > diff --git a/arch/arm/kernel/traps.c b/arch/arm/kernel/traps.c > index 3bad79db5d6e..46a5b1eb3f0a 100644 > --- a/arch/arm/kernel/traps.c > +++ b/arch/arm/kernel/traps.c > @@ -84,10 +84,10 @@ void dump_backtrace_entry(unsigned long where, unsigned long from, > printk("%sFunction entered at [<%08lx>] from [<%08lx>]\n", > loglvl, where, from); > #elif defined CONFIG_BACKTRACE_VERBOSE > - printk("%s[<%08lx>] (%ps) from [<%08lx>] (%pS)\n", > + printk("%s[<%08lx>] (%ps) from [<%08lx>] (%pB)\n", > loglvl, where, (void *)where, from, (void *)from); > #else > - printk("%s %ps from %pS\n", loglvl, (void *)where, (void *)from); > + printk("%s %ps from %pB\n", loglvl, (void *)where, (void *)from); > #endif > > if (in_entry_text(from) && end <= ALIGN(frame, THREAD_SIZE)) > diff --git a/arch/arm/kernel/unwind.c b/arch/arm/kernel/unwind.c > index 9d2192156087..99ded32196af 100644 > --- a/arch/arm/kernel/unwind.c > +++ b/arch/arm/kernel/unwind.c > @@ -407,7 +407,7 @@ int unwind_frame(struct stackframe *frame) > { > const struct unwind_idx *idx; > struct unwind_ctrl_block ctrl; > - unsigned long sp_low; > + unsigned long sp_low, pc; > > /* store the highest address on the stack to avoid crossing it*/ > sp_low = frame->sp; > @@ -417,19 +417,22 @@ int unwind_frame(struct stackframe *frame) > pr_debug("%s(pc = %08lx lr = %08lx sp = %08lx)\n", __func__, > frame->pc, frame->lr, frame->sp); > > - idx = unwind_find_idx(frame->pc); > + pc = frame->ex_frame ? frame->pc : frame->pc - 4; > + > + idx = unwind_find_idx(pc); > if (!idx) { > - if (frame->pc && kernel_text_address(frame->pc)) { > - if (in_module_plt(frame->pc) && frame->pc != frame->lr) { > + if (kernel_text_address(pc)) { > + if (in_module_plt(pc) && frame->pc != frame->lr) { > /* > * Quoting Ard: Veneers only set PC using a > * PC+immediate LDR, and so they don't affect > * the state of the stack or the register file > */ > frame->pc = frame->lr; > + frame->ex_frame = false; > return URC_OK; > } > - pr_warn("unwind: Index not found %08lx\n", frame->pc); > + pr_warn("unwind: Index not found %08lx\n", pc); > } > return -URC_FAILURE; > } > @@ -442,7 +445,7 @@ int unwind_frame(struct stackframe *frame) > if (idx->insn == 1) > /* can't unwind */ > return -URC_FAILURE; > - else if (frame->pc == prel31_to_addr(&idx->addr_offset)) { > + else if (frame->ex_frame && pc == prel31_to_addr(&idx->addr_offset)) { > /* > * Unwinding is tricky when we're halfway through the prologue, > * since the stack frame that the unwinder expects may not be > @@ -451,9 +454,10 @@ int unwind_frame(struct stackframe *frame) > * a function, we are still effectively in the stack frame of > * the caller, and the unwind info has no relevance yet. > */ > - if (frame->pc == frame->lr) > + if (pc == frame->lr) > return -URC_FAILURE; > frame->pc = frame->lr; > + frame->ex_frame = false; > return URC_OK; > } else if ((idx->insn & 0x80000000) == 0) > /* prel31 to the unwind table */ > @@ -515,6 +519,7 @@ int unwind_frame(struct stackframe *frame) > frame->lr = ctrl.vrs[LR]; > frame->pc = ctrl.vrs[PC]; > frame->lr_addr = ctrl.lr_addr; > + frame->ex_frame = false; > > return URC_OK; > } > @@ -544,6 +549,7 @@ void unwind_backtrace(struct pt_regs *regs, struct task_struct *tsk, > */ > here: > frame.pc = (unsigned long)&&here; > + frame.ex_frame = false; > } else { > /* task blocked in __switch_to */ > frame.fp = thread_saved_fp(tsk); > @@ -554,11 +560,12 @@ void unwind_backtrace(struct pt_regs *regs, struct task_struct *tsk, > */ > frame.lr = 0; > frame.pc = thread_saved_pc(tsk); > + frame.ex_frame = false; > } > > while (1) { > int urc; > - unsigned long where = frame.pc; > + unsigned long where = frame.ex_frame ? frame.pc : frame.pc - 4; > > urc = unwind_frame(&frame); > if (urc < 0) > . >