* [bug] stack protector panics on v4.10-rc1+
[not found] <627000186.495731.1485210132000.JavaMail.zimbra@redhat.com>
@ 2017-01-24 0:10 ` Jan Stancek
2017-01-24 0:35 ` Tyrel Datwyler
2017-01-24 1:04 ` Segher Boessenkool
0 siblings, 2 replies; 9+ messages in thread
From: Jan Stancek @ 2017-01-24 0:10 UTC (permalink / raw)
To: mpe, christophe.leroy, linuxppc-dev
Cc: Artem Savkov, Herton Krzesinski, jstancek
Hi,
I'm running into panics with stack protector enabled on ppc64le
lpar (IBM,8408-E8E), starting with:
commit 6533b7c16ee5712041b4e324100550e02a9a5dda
Author: Christophe Leroy <christophe.leroy@c-s.fr>
Date: Tue Nov 22 11:49:30 2016 +0100
powerpc: Initial stack protector (-fstack-protector) support
CONFIG_HAVE_CC_STACKPROTECTOR=y
CONFIG_CC_STACKPROTECTOR=y
# CONFIG_CC_STACKPROTECTOR_NONE is not set
# CONFIG_CC_STACKPROTECTOR_REGULAR is not set
CONFIG_CC_STACKPROTECTOR_STRONG=y
For example (it crashes at various places):
[ 1.028466] systemd[1]: Set hostname to <localhost.localdomain>.
[ 1.036105] Kernel panic - not syncing: stack-protector: Kernel stack is corrupted in: c000000000ad2250
[ 1.036105]
[ 1.036124] CPU: 5 PID: 168 Comm: dracut-rootfs-g Tainted: G W 4.0.0+ #11
[ 1.036131] Call Trace:
[ 1.036141] [c0000000fe113a80] [c000000000af13e8] dump_stack+0xa0/0xdc (unreliable)
[ 1.036153] [c0000000fe113ab0] [c000000000ae5138] panic+0x110/0x2bc
[ 1.036163] [c0000000fe113b40] [c0000000000dd664] __stack_chk_fail+0x24/0x30
[ 1.036172] [c0000000fe113ba0] [c000000000ad2250] wait_for_completion+0x190/0x1a0
[ 1.036182] [c0000000fe113c20] [c000000000221920] stop_one_cpu+0x110/0x1b0
[ 1.036191] [c0000000fe113d00] [c000000000134a58] sched_exec+0xf8/0x180
[ 1.036200] [c0000000fe113d60] [c0000000003b0f74] SyS_execve+0x414/0xb10
[ 1.036210] [c0000000fe113e30] [c000000000009308] system_call+0x38/0xb4
[ 1.052902] Rebooting in 10 seconds..
I tried applying this commit on older kernels, and every kernel I tried, going
back as far as 3.10 was panic-ing early during boot on stack corruption.
I tried gcc-4.8.5-11.el7, and Fedora 25's gcc-6.3.1-1.fc25 with same result.
(gdb) disassemble wait_for_completion
Dump of assembler code for function wait_for_completion:
...
0xc000000000c6642c <+140>: ld r9,-28688(r13)
0xc000000000c66430 <+144>: xor. r8,r8,r9
0xc000000000c66434 <+148>: li r9,0
0xc000000000c66438 <+152>: bne- 0xc000000000c665d8 <wait_for_completion+568>
...
0xc000000000c665d8 <+568>: bl 0xc0000000000f5c68 <__stack_chk_fail+8>
I came across following gcc commit:
https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=0d55f4d0aeaeb16629a2c07c96a190695b83a7e6
which mentions offset above:
"If TARGET_THREAD_SSP_OFFSET is defined, use -0x7010(13) resp.
-0x7008(2) instead of reading __stack_chk_guard variable."
It looks like it's not reading canary value from __stack_chk_guard variable.
atm. I'm not sure where -28688(r13) falls in ppc kernel (somewhere near paca struct?).
Is anyone else seeing these panics?
Regards,
Jan
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [bug] stack protector panics on v4.10-rc1+
2017-01-24 0:10 ` [bug] stack protector panics on v4.10-rc1+ Jan Stancek
@ 2017-01-24 0:35 ` Tyrel Datwyler
2017-01-24 1:04 ` Segher Boessenkool
1 sibling, 0 replies; 9+ messages in thread
From: Tyrel Datwyler @ 2017-01-24 0:35 UTC (permalink / raw)
To: Jan Stancek, mpe, christophe.leroy, linuxppc-dev
Cc: Artem Savkov, Herton Krzesinski
On 01/23/2017 04:10 PM, Jan Stancek wrote:
> Hi,
>
> I'm running into panics with stack protector enabled on ppc64le
> lpar (IBM,8408-E8E), starting with:
>
> commit 6533b7c16ee5712041b4e324100550e02a9a5dda
> Author: Christophe Leroy <christophe.leroy@c-s.fr>
> Date: Tue Nov 22 11:49:30 2016 +0100
> powerpc: Initial stack protector (-fstack-protector) support
>
> CONFIG_HAVE_CC_STACKPROTECTOR=y
> CONFIG_CC_STACKPROTECTOR=y
> # CONFIG_CC_STACKPROTECTOR_NONE is not set
> # CONFIG_CC_STACKPROTECTOR_REGULAR is not set
> CONFIG_CC_STACKPROTECTOR_STRONG=y
>
> For example (it crashes at various places):
> [ 1.028466] systemd[1]: Set hostname to <localhost.localdomain>.
> [ 1.036105] Kernel panic - not syncing: stack-protector: Kernel stack is corrupted in: c000000000ad2250
> [ 1.036105]
> [ 1.036124] CPU: 5 PID: 168 Comm: dracut-rootfs-g Tainted: G W 4.0.0+ #11
> [ 1.036131] Call Trace:
> [ 1.036141] [c0000000fe113a80] [c000000000af13e8] dump_stack+0xa0/0xdc (unreliable)
> [ 1.036153] [c0000000fe113ab0] [c000000000ae5138] panic+0x110/0x2bc
> [ 1.036163] [c0000000fe113b40] [c0000000000dd664] __stack_chk_fail+0x24/0x30
> [ 1.036172] [c0000000fe113ba0] [c000000000ad2250] wait_for_completion+0x190/0x1a0
> [ 1.036182] [c0000000fe113c20] [c000000000221920] stop_one_cpu+0x110/0x1b0
> [ 1.036191] [c0000000fe113d00] [c000000000134a58] sched_exec+0xf8/0x180
> [ 1.036200] [c0000000fe113d60] [c0000000003b0f74] SyS_execve+0x414/0xb10
> [ 1.036210] [c0000000fe113e30] [c000000000009308] system_call+0x38/0xb4
> [ 1.052902] Rebooting in 10 seconds..
>
> I tried applying this commit on older kernels, and every kernel I tried, going
> back as far as 3.10 was panic-ing early during boot on stack corruption.
> I tried gcc-4.8.5-11.el7, and Fedora 25's gcc-6.3.1-1.fc25 with same result.
>
> (gdb) disassemble wait_for_completion
> Dump of assembler code for function wait_for_completion:
> ...
> 0xc000000000c6642c <+140>: ld r9,-28688(r13)
> 0xc000000000c66430 <+144>: xor. r8,r8,r9
> 0xc000000000c66434 <+148>: li r9,0
> 0xc000000000c66438 <+152>: bne- 0xc000000000c665d8 <wait_for_completion+568>
> ...
> 0xc000000000c665d8 <+568>: bl 0xc0000000000f5c68 <__stack_chk_fail+8>
>
> I came across following gcc commit:
> https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=0d55f4d0aeaeb16629a2c07c96a190695b83a7e6
> which mentions offset above:
> "If TARGET_THREAD_SSP_OFFSET is defined, use -0x7010(13) resp.
> -0x7008(2) instead of reading __stack_chk_guard variable."
>
> It looks like it's not reading canary value from __stack_chk_guard variable.
> atm. I'm not sure where -28688(r13) falls in ppc kernel (somewhere near paca struct?).
>
> Is anyone else seeing these panics?
I believe there was some discussion in the following thread:
https://www.mail-archive.com/linuxppc-dev@lists.ozlabs.org/msg112813.html
-Tyrel
>
> Regards,
> Jan
>
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [bug] stack protector panics on v4.10-rc1+
2017-01-24 0:10 ` [bug] stack protector panics on v4.10-rc1+ Jan Stancek
2017-01-24 0:35 ` Tyrel Datwyler
@ 2017-01-24 1:04 ` Segher Boessenkool
2017-01-24 3:41 ` Michael Ellerman
1 sibling, 1 reply; 9+ messages in thread
From: Segher Boessenkool @ 2017-01-24 1:04 UTC (permalink / raw)
To: Jan Stancek
Cc: mpe, christophe.leroy, linuxppc-dev, Artem Savkov,
Herton Krzesinski
On Mon, Jan 23, 2017 at 07:10:00PM -0500, Jan Stancek wrote:
> I'm running into panics with stack protector enabled on ppc64le
> I came across following gcc commit:
> https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=0d55f4d0aeaeb16629a2c07c96a190695b83a7e6
> which mentions offset above:
> "If TARGET_THREAD_SSP_OFFSET is defined, use -0x7010(13) resp.
> -0x7008(2) instead of reading __stack_chk_guard variable."
>
> It looks like it's not reading canary value from __stack_chk_guard variable.
> atm. I'm not sure where -28688(r13) falls in ppc kernel (somewhere near paca struct?).
>
> Is anyone else seeing these panics?
Everyone is.
This is fixed in GCC 8 (and will be backported to GCC 7 and GCC 6 and
maybe even GCC 5). See <http://gcc.gnu.org/r244556> (and r244562 and
r244677).
The kernel will need to use -mstack-protector-guard=global for now, and
it later can use -mstack-protector-guard=tls -mstack-protector-register=<reg>
-mstack-protector-offset=<offset>. If your GCC does not support this yet
(most people's situation right now) you cannot use the stack protector in
the kernel.
Segher
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [bug] stack protector panics on v4.10-rc1+
2017-01-24 1:04 ` Segher Boessenkool
@ 2017-01-24 3:41 ` Michael Ellerman
2017-01-24 4:09 ` Michael Ellerman
0 siblings, 1 reply; 9+ messages in thread
From: Michael Ellerman @ 2017-01-24 3:41 UTC (permalink / raw)
To: Segher Boessenkool, Jan Stancek
Cc: christophe.leroy, linuxppc-dev, Artem Savkov, Herton Krzesinski
Segher Boessenkool <segher@kernel.crashing.org> writes:
> On Mon, Jan 23, 2017 at 07:10:00PM -0500, Jan Stancek wrote:
>> I'm running into panics with stack protector enabled on ppc64le
>
>> I came across following gcc commit:
>> https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=0d55f4d0aeaeb16629a2c07c96a190695b83a7e6
>> which mentions offset above:
>> "If TARGET_THREAD_SSP_OFFSET is defined, use -0x7010(13) resp.
>> -0x7008(2) instead of reading __stack_chk_guard variable."
>>
>> It looks like it's not reading canary value from __stack_chk_guard variable.
>> atm. I'm not sure where -28688(r13) falls in ppc kernel (somewhere near paca struct?).
>>
>> Is anyone else seeing these panics?
>
> Everyone is.
Are they? I'm not?
> This is fixed in GCC 8 (and will be backported to GCC 7 and GCC 6 and
> maybe even GCC 5). See <http://gcc.gnu.org/r244556> (and r244562 and
> r244677).
# cat /proc/version
Linux version 4.10.0-rc5-compiler_gcc-6.3.0-00006-ge357eb97a6be (michael@ka3.ozlabs.ibm.com) (gcc version 6.3.0 (Custom 4b5e15daff8b5444) ) #558 SMP Tue Jan 24 14:29:04 AEDT 2017
# zgrep STACKPROTECTOR /proc/config.gz
CONFIG_HAVE_CC_STACKPROTECTOR=y
CONFIG_CC_STACKPROTECTOR=y
CONFIG_CC_STACKPROTECTOR_REGULAR=y
I guess I'm just lucky?
cheers
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [bug] stack protector panics on v4.10-rc1+
2017-01-24 3:41 ` Michael Ellerman
@ 2017-01-24 4:09 ` Michael Ellerman
2017-01-25 3:54 ` Balbir Singh
0 siblings, 1 reply; 9+ messages in thread
From: Michael Ellerman @ 2017-01-24 4:09 UTC (permalink / raw)
To: Segher Boessenkool, Jan Stancek
Cc: christophe.leroy, linuxppc-dev, Artem Savkov, Herton Krzesinski
Michael Ellerman <mpe@ellerman.id.au> writes:
> Segher Boessenkool <segher@kernel.crashing.org> writes:
>
>> On Mon, Jan 23, 2017 at 07:10:00PM -0500, Jan Stancek wrote:
>>> I'm running into panics with stack protector enabled on ppc64le
>>
>>> I came across following gcc commit:
>>> https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=0d55f4d0aeaeb16629a2c07c96a190695b83a7e6
>>> which mentions offset above:
>>> "If TARGET_THREAD_SSP_OFFSET is defined, use -0x7010(13) resp.
>>> -0x7008(2) instead of reading __stack_chk_guard variable."
>>>
>>> It looks like it's not reading canary value from __stack_chk_guard variable.
>>> atm. I'm not sure where -28688(r13) falls in ppc kernel (somewhere near paca struct?).
>>>
>>> Is anyone else seeing these panics?
>>
>> Everyone is.
>
> Are they? I'm not?
>
>> This is fixed in GCC 8 (and will be backported to GCC 7 and GCC 6 and
>> maybe even GCC 5). See <http://gcc.gnu.org/r244556> (and r244562 and
>> r244677).
>
> # cat /proc/version
> Linux version 4.10.0-rc5-compiler_gcc-6.3.0-00006-ge357eb97a6be (michael@ka3.ozlabs.ibm.com) (gcc version 6.3.0 (Custom 4b5e15daff8b5444) ) #558 SMP Tue Jan 24 14:29:04 AEDT 2017
>
> # zgrep STACKPROTECTOR /proc/config.gz
> CONFIG_HAVE_CC_STACKPROTECTOR=y
> CONFIG_CC_STACKPROTECTOR=y
> CONFIG_CC_STACKPROTECTOR_REGULAR=y
>
> I guess I'm just lucky?
No, I'm just using a gcc built without libc as Segher pointed out:
https://www.mail-archive.com/linuxppc-dev@lists.ozlabs.org/msg113181.html
Right. Tony's compilers are built using a (modified version of) buildall,
and buildall goes out of its way to build without libc whatsoever, even
if the configuration (powerpc64-linux, for example) expects one.
Which leads to TARGET_LIBC_PROVIDES_SSP being undefined (it would normally
be true for glibc >= 2.4), and that is all. Mystery solved. Thanks!
So my inclination is to revert the powerpc stack protector code for
4.10, and we can try again for 4.11 or 12.
cheers
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [bug] stack protector panics on v4.10-rc1+
2017-01-24 4:09 ` Michael Ellerman
@ 2017-01-25 3:54 ` Balbir Singh
2017-01-25 4:17 ` Segher Boessenkool
2017-01-26 7:05 ` Benjamin Herrenschmidt
0 siblings, 2 replies; 9+ messages in thread
From: Balbir Singh @ 2017-01-25 3:54 UTC (permalink / raw)
To: Michael Ellerman
Cc: Segher Boessenkool, Jan Stancek, Herton Krzesinski, Artem Savkov,
linuxppc-dev
On Tue, Jan 24, 2017 at 03:09:40PM +1100, Michael Ellerman wrote:
> Michael Ellerman <mpe@ellerman.id.au> writes:
>
> > # zgrep STACKPROTECTOR /proc/config.gz
> > CONFIG_HAVE_CC_STACKPROTECTOR=y
> > CONFIG_CC_STACKPROTECTOR=y
> > CONFIG_CC_STACKPROTECTOR_REGULAR=y
> >
> > I guess I'm just lucky?
>
> No, I'm just using a gcc built without libc as Segher pointed out:
>
> https://www.mail-archive.com/linuxppc-dev@lists.ozlabs.org/msg113181.html
>
> Right. Tony's compilers are built using a (modified version of) buildall,
> and buildall goes out of its way to build without libc whatsoever, even
> if the configuration (powerpc64-linux, for example) expects one.
>
> Which leads to TARGET_LIBC_PROVIDES_SSP being undefined (it would normally
> be true for glibc >= 2.4), and that is all. Mystery solved. Thanks!
>
>
> So my inclination is to revert the powerpc stack protector code for
> 4.10, and we can try again for 4.11 or 12.
>
That makes sense. We then wait for the right gcc version? I guess we also
push for per-task gaurd value as opposed to a global one?
Balbir Singh
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [bug] stack protector panics on v4.10-rc1+
2017-01-25 3:54 ` Balbir Singh
@ 2017-01-25 4:17 ` Segher Boessenkool
2017-01-26 7:05 ` Benjamin Herrenschmidt
1 sibling, 0 replies; 9+ messages in thread
From: Segher Boessenkool @ 2017-01-25 4:17 UTC (permalink / raw)
To: Balbir Singh
Cc: Michael Ellerman, Jan Stancek, Herton Krzesinski, Artem Savkov,
linuxppc-dev
On Wed, Jan 25, 2017 at 09:24:53AM +0530, Balbir Singh wrote:
> > So my inclination is to revert the powerpc stack protector code for
> > 4.10, and we can try again for 4.11 or 12.
>
> That makes sense. We then wait for the right gcc version? I guess we also
> push for per-task gaurd value as opposed to a global one?
Global value will work (with GCC 7) as-is. Per-task will require some
kernel work, but yeah you want it, that is why the options for that exist ;-)
You don't have to revert the current stack protector code; just condition it
on the relevant GCC flags (you will need to do that later anyway).
Segher
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [bug] stack protector panics on v4.10-rc1+
2017-01-25 3:54 ` Balbir Singh
2017-01-25 4:17 ` Segher Boessenkool
@ 2017-01-26 7:05 ` Benjamin Herrenschmidt
2017-01-26 7:06 ` Benjamin Herrenschmidt
1 sibling, 1 reply; 9+ messages in thread
From: Benjamin Herrenschmidt @ 2017-01-26 7:05 UTC (permalink / raw)
To: Balbir Singh, Michael Ellerman
Cc: linuxppc-dev, Artem Savkov, Herton Krzesinski, Jan Stancek
On Wed, 2017-01-25 at 09:24 +0530, Balbir Singh wrote:
> That makes sense. We then wait for the right gcc version? I guess we
> also
> push for per-task gaurd value as opposed to a global one?
I'm thinking per-cpu will be easier as r13 is readily available as
PACA.
Cheers,
Ben.
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [bug] stack protector panics on v4.10-rc1+
2017-01-26 7:05 ` Benjamin Herrenschmidt
@ 2017-01-26 7:06 ` Benjamin Herrenschmidt
0 siblings, 0 replies; 9+ messages in thread
From: Benjamin Herrenschmidt @ 2017-01-26 7:06 UTC (permalink / raw)
To: Balbir Singh, Michael Ellerman
Cc: linuxppc-dev, Artem Savkov, Herton Krzesinski, Jan Stancek
On Thu, 2017-01-26 at 18:05 +1100, Benjamin Herrenschmidt wrote:
> On Wed, 2017-01-25 at 09:24 +0530, Balbir Singh wrote:
> > That makes sense. We then wait for the right gcc version? I guess
> > we
> > also
> > push for per-task gaurd value as opposed to a global one?
>
> I'm thinking per-cpu will be easier as r13 is readily available as
> PACA.
Actually it has to be per-task ... so we'll have to put it in the PACA
and context switch the value in there.
Cheers,
Ben.
^ permalink raw reply [flat|nested] 9+ messages in thread
end of thread, other threads:[~2017-01-26 7:07 UTC | newest]
Thread overview: 9+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
[not found] <627000186.495731.1485210132000.JavaMail.zimbra@redhat.com>
2017-01-24 0:10 ` [bug] stack protector panics on v4.10-rc1+ Jan Stancek
2017-01-24 0:35 ` Tyrel Datwyler
2017-01-24 1:04 ` Segher Boessenkool
2017-01-24 3:41 ` Michael Ellerman
2017-01-24 4:09 ` Michael Ellerman
2017-01-25 3:54 ` Balbir Singh
2017-01-25 4:17 ` Segher Boessenkool
2017-01-26 7:05 ` Benjamin Herrenschmidt
2017-01-26 7:06 ` Benjamin Herrenschmidt
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).