Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp2324349imm; Thu, 7 Jun 2018 08:48:13 -0700 (PDT) X-Google-Smtp-Source: ADUXVKK5fFE1aT3pknX/c5LQkiMvraWjZkaUuWPpxmT/dGh+hyYrR0sM3Cy+g7a/UBpolZLPvZ3O X-Received: by 2002:a62:119d:: with SMTP id 29-v6mr2303706pfr.102.1528386493822; Thu, 07 Jun 2018 08:48:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528386493; cv=none; d=google.com; s=arc-20160816; b=rmFOF6lI9bCrpdDA+Hr6w/fAGUwC0GPaNwEMH1QZoiQgcpNPNO9mfWNRJacp43ik2S W5nGFYyEYXZAAzaKY0CVJN3NtcIB7hDqPM+fYqssUhwFyGQwBWNW/tKGTpW2zKwSai/v xYVgnNbhH6qOX4XABlVs74jcq17gSjxZI72/3cdIzKdMak3rWbnhCy9sJsTa/3HLoMm9 e/XHcbj1UlMBKus4awVLN7Ho4TWY2Q3jwAz+6BqKgKT7berycI9VmCC/pjphK3H1S0ny MmSPcl8eKaYDR0AWOFAROLksumckaZK03Lj2lwNPu0x51PDN3KADHk1f1JhVpVceokCj +FLg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature :arc-authentication-results; bh=W9z1Eb5uCQGbfDWKYqlVvVdI4kLfDpMNWc7Uy9vvilA=; b=AQQ4mzOfl91hSTMJKt3gApWrQi5iTZfoE0y1urbYaNsy//uNCGMCouIN7vynP9abbd DZ/Fmoj0LWZPMiZnKg7YLwvT7j14B40j9kPY4K7r+GZ5rsKig8MZJVh65mPUSe5hf5Jq xB2cna6NCDnIbJ6yDTgrIEI54SJ3VyIKT5DN3wchF5q3cbiGlBzWYi9hsYd0U3vRG9LH Kn8LRaVU6McpbJXk2z2p9Is2RFKivaEe2doZiEtFbq3G6CiMnUwhs7Vgka9HniOy+A4e aZsKiQlo2LG7R0CcGMD0hxi38Dm7QkCN4+F0e0HSOBHi/Y1BSoq0vARmfDIwxqYLvcUD lS+A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=JoF544Ql; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q2-v6si52325586pfb.1.2018.06.07.08.47.59; Thu, 07 Jun 2018 08:48:13 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=JoF544Ql; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S934678AbeFGPq7 (ORCPT + 99 others); Thu, 7 Jun 2018 11:46:59 -0400 Received: from mail.kernel.org ([198.145.29.99]:47400 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S934229AbeFGPq4 (ORCPT ); Thu, 7 Jun 2018 11:46:56 -0400 Received: from mail-it0-f46.google.com (mail-it0-f46.google.com [209.85.214.46]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 28D03208AE for ; Thu, 7 Jun 2018 15:46:56 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1528386416; bh=Jix8cnifTw1QBx5OWB32i+eNmI/ZBGogTdTY3BfSSz0=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=JoF544QluiQE0gJ2Abd9j3b+MjrLwJCuBrBx70nOvouctmfJRs+zI8xDxrcWO0niE q66Lt1kJfhSJCh0uyZr9K4Ra5iOog7bLx+zHvGwsrLPM7fSZLeEk8uyhfL6QDt79wM vuf6KnRxUud0FVOrSO7l8aZIvH8tfN1u/q/NBBa8= Received: by mail-it0-f46.google.com with SMTP id j135-v6so2961361itj.1 for ; Thu, 07 Jun 2018 08:46:56 -0700 (PDT) X-Gm-Message-State: APt69E3T3h12hzzPtdgBopnOeSacdrYUFmaoXFKJWiE8mGMclIaMOPEK 2nx2fXjYb8nq/2fMLejJRZ6eb5lMADUH09HV/DUZMg== X-Received: by 2002:a24:e9c6:: with SMTP id f189-v6mr2529336ith.12.1528386415392; Thu, 07 Jun 2018 08:46:55 -0700 (PDT) MIME-Version: 1.0 References: <20180607143705.3531-1-yu-cheng.yu@intel.com> <20180607143705.3531-2-yu-cheng.yu@intel.com> In-Reply-To: <20180607143705.3531-2-yu-cheng.yu@intel.com> From: Andy Lutomirski Date: Thu, 7 Jun 2018 08:46:43 -0700 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH 1/9] x86/cet: Control protection exception handler To: Yu-cheng Yu Cc: LKML , linux-doc@vger.kernel.org, Linux-MM , linux-arch , X86 ML , "H. Peter Anvin" , Thomas Gleixner , Ingo Molnar , "H. J. Lu" , "Shanbhogue, Vedvyas" , "Ravi V. Shankar" , Dave Hansen , Jonathan Corbet , Oleg Nesterov , Arnd Bergmann , mike.kravetz@oracle.com Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jun 7, 2018 at 7:40 AM Yu-cheng Yu wrote: > > A control protection exception is triggered when a control flow transfer > attempt violated shadow stack or indirect branch tracking constraints. > For example, the return address for a RET instruction differs from the > safe copy on the shadow stack; or a JMP instruction arrives at a non- > ENDBR instruction. > > The control protection exception handler works in a similar way as the > general protection fault handler. > > Signed-off-by: Yu-cheng Yu > --- > arch/x86/entry/entry_32.S | 5 ++++ > arch/x86/entry/entry_64.S | 2 +- > arch/x86/include/asm/traps.h | 3 +++ > arch/x86/kernel/idt.c | 1 + > arch/x86/kernel/traps.c | 61 ++++++++++++++++++++++++++++++++++++++++++++ > 5 files changed, 71 insertions(+), 1 deletion(-) > > diff --git a/arch/x86/entry/entry_32.S b/arch/x86/entry/entry_32.S > index bef8e2b202a8..14b63ef0d7d8 100644 > --- a/arch/x86/entry/entry_32.S > +++ b/arch/x86/entry/entry_32.S > @@ -1070,6 +1070,11 @@ ENTRY(general_protection) > jmp common_exception > END(general_protection) > > +ENTRY(control_protection) > + pushl $do_control_protection > + jmp common_exception > +END(control_protection) Ugh, you're seriously supporting this on 32-bit? Please test double fault handling very carefully -- the CET interaction with task switches is so gross that I didn't even bother reading the spec except to let the architects know that they were a but nuts to support it at all. > + > #ifdef CONFIG_KVM_GUEST > ENTRY(async_page_fault) > ASM_CLAC > diff --git a/arch/x86/entry/entry_64.S b/arch/x86/entry/entry_64.S > index 3166b9674429..5230f705d229 100644 > --- a/arch/x86/entry/entry_64.S > +++ b/arch/x86/entry/entry_64.S > @@ -999,7 +999,7 @@ idtentry spurious_interrupt_bug do_spurious_interrupt_bug has_error_code=0 > idtentry coprocessor_error do_coprocessor_error has_error_code=0 > idtentry alignment_check do_alignment_check has_error_code=1 > idtentry simd_coprocessor_error do_simd_coprocessor_error has_error_code=0 > - > +idtentry control_protection do_control_protection has_error_code=1 > diff --git a/arch/x86/kernel/traps.c b/arch/x86/kernel/traps.c > index 03f3d7695dac..4e8769a19aaf 100644 > --- a/arch/x86/kernel/traps.c > +++ b/arch/x86/kernel/traps.c > +/* > + * When a control protection exception occurs, send a signal > + * to the responsible application. Currently, control > + * protection is only enabled for the user mode. This > + * exception should not come from the kernel mode. > + */ > +dotraplinkage void > +do_control_protection(struct pt_regs *regs, long error_code) > +{ > + struct task_struct *tsk; > + > + RCU_LOCKDEP_WARN(!rcu_is_watching(), "entry code didn't wake RCU"); > + cond_local_irq_enable(regs); > + > + tsk = current; > + if (!cpu_feature_enabled(X86_FEATURE_SHSTK) && > + !cpu_feature_enabled(X86_FEATURE_IBT)) { static_cpu_has(), please. But your handling here is odd -- I think that we should at least warn if we get #CP with CET disable. > + goto exit; > + } > + > + if (!user_mode(regs)) { > + tsk->thread.error_code = error_code; > + tsk->thread.trap_nr = X86_TRAP_CP; I realize you copied this from elsewhere in the file, but please either delete these assignments to error_code and trap_nr or at least hoist them out of the if block. > + if (notify_die(DIE_TRAP, "control protection fault", regs, > + error_code, X86_TRAP_CP, SIGSEGV) != NOTIFY_STOP) Does this notify_die() check serve any purpose at all? Removing all the old ones would be a project, but let's try not to add new callers. > + die("control protection fault", regs, error_code); > + return; > + } > + > + tsk->thread.error_code = error_code; > + tsk->thread.trap_nr = X86_TRAP_CP; > + > + if (show_unhandled_signals && unhandled_signal(tsk, SIGSEGV) && > + printk_ratelimit()) { > + unsigned int max_idx, err_idx; > + > + max_idx = ARRAY_SIZE(control_protection_err) - 1; > + err_idx = min((unsigned int)error_code - 1, max_idx); What if error_code == 0? Is that also invalid? > + pr_info("%s[%d] control protection ip:%lx sp:%lx error:%lx(%s)", > + tsk->comm, task_pid_nr(tsk), > + regs->ip, regs->sp, error_code, > + control_protection_err[err_idx]); > + print_vma_addr(" in ", regs->ip); > + pr_cont("\n"); > + } > + > +exit: > + force_sig_info(SIGSEGV, SEND_SIG_PRIV, tsk); This is definitely wrong for the feature-disabled, !user_mode case. Also, are you planning on enabling CET for kernel code too?