[PATCH v2 1/3] ARM: stacktrace: harden FP stacktraces against invalid stacks
Colin Cross
ccross at android.com
Thu Jan 24 17:53:38 EST 2013
On Thu, Jan 24, 2013 at 1:07 PM, Laura Abbott <lauraa at codeaurora.org> wrote:
> On 11/29/2012 3:00 PM, Colin Cross wrote:
>
>> +bool sp_addr_valid(unsigned long sp)
>> +{
>> + unsigned long high;
>> + unsigned long offset;
>> + unsigned int pfn;
>> + unsigned int start_pfn;
>> + unsigned int end_pfn;
>> +
>> + if (!IS_ALIGNED(sp, 4))
>> + return false;
>> +
>> + offset = sp & (THREAD_SIZE - 1);
>> +
>> + if (offset > THREAD_START_SP)
>> + return false;
>> +
>> + if (offset < sizeof(struct thread_info))
>> + return false;
>> +
>> + high = STACK_MAX(sp);
>> +
>> + if (!virt_addr_valid(sp) || !virt_addr_valid(high))
>> + return false;
>> +
>> + start_pfn = page_to_pfn(virt_to_page(sp));
>> + end_pfn = page_to_pfn(virt_to_page(high));
>> + for (pfn = start_pfn; pfn <= end_pfn; pfn++)
>> + if (!pfn_valid(pfn))
>> + return false;
>> +
>> + return true;
>> +}
>
>
> I get crashes on bootup with CONFIG_SPARSEMEM enabled if a stacktrace needs
> to be saved before the sections are setup:
>
> <1>[ 0.000000] Unable to handle kernel NULL pointer dereference at
> virtual address 00000000
> <1>[ 0.000000] pgd = c0004000
> <1>[ 0.000000] [00000000] *pgd=00000000
> <0>[ 0.000000] Internal error: Oops: 5 [#1] PREEMPT SMP ARM
> <4>[ 0.000000] Modules linked in:
> <4>[ 0.000000] CPU: 0 Not tainted (3.4.0-ga472ec0-00007-g6479b9e-dirty
> #10)
> <4>[ 0.000000] PC is at sp_addr_valid+0xb0/0x1bc
> <4>[ 0.000000] LR is at unwind_frame+0x4c/0x5b0
> ...
> <1>[ 0.000000] Unable to handle kernel NULL pointer dereference at
> virtual address 00000000
> <1>[ 0.000000] pgd = c0004000
> <1>[ 0.000000] [00000000] *pgd=00000000
> <0>[ 0.000000] BUG: spinlock lockup on CPU#0, swapper/0
> <0>[ 0.000000] lock: die_lock+0x0/0x10, .magic: dead4ead, .owner:
> swapper/0, .owner_cpu: 0
> <1>[ 0.000000] Unable to handle kernel NULL pointer dereference at
> virtual address 00000000
> <1>[ 0.000000] pgd = c0004000
> <1>[ 0.000000] [00000000] *pgd=00000000
> <0>[ 0.000000] BUG: spinlock lockup on CPU#0, swapper/0
> <0>[ 0.000000] lock: die_lock+0x0/0x10, .magic: dead4ead, .owner:
> swapper/0, .owner_cpu: 0
> [repeat several more times]
>
> In this case, the stacktrace is being saved via a call to kmemleak_free in
> free_bootmem. The sections have not yet been initialized so there is a crash
> in virt_to_page when accessing the section data.
>
> I don't see an easy workaround for this right now unless we want to restrict
> sp_addr_valid until later in bootup.
Thanks for testing, I was able to reproduce the problem. It is easily
fixed by replacing page_to_pfn(virt_to_page(x)) with
__phys_to_pfn(__virt_to_phys(x)) to avoid touching the page structs at
all.
More information about the linux-arm-kernel
mailing list