Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp1336689imm; Wed, 20 Jun 2018 16:16:52 -0700 (PDT) X-Google-Smtp-Source: ADUXVKKsDEkfGD85syQb4sXvEdJuT/jqqXg/eteuZRili7shR3Aok68mgdFL8lLqNthgkHgA2UqI X-Received: by 2002:a17:902:3041:: with SMTP id u59-v6mr25916614plb.208.1529536612739; Wed, 20 Jun 2018 16:16:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1529536612; cv=none; d=google.com; s=arc-20160816; b=h1ex1CfVoAUbmF9gLjzLQcb1ZlLipFgJWHUi58DRHQ/ogia3y0/shsf8LLMX2MR2CW mrdMQl0RBW1JIodT0qiDkAt9hNrdD+NMmQzCW+G3xmt9NlSFPlzUk4l//erxsD+ao3IN ejxYngI545JwkvF6bJUH5reiq4fsOhGwrOkbjhjP1Y8ROJRhGmn1Ci+b4YFnjc3uI/dO diB6UuMwgnzfkLN5CdT0hpbt+vyIOkJgyrUMkc1McI/Cmvyv9FSjrQdcXx4stiuc0+L7 maEU82LFN/uuEZOHU206/bNDd/hjviFPJC9QOr4jON2XgFZGrbcAo7I/hxCCNo4WuSxM SIDQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=f1T0O80I55Zk+EttnbhkDBKLawuHDLr6Hl7ESN66xyE=; b=LhkjNxKszaboxK7WgxorgVs5DRahKwiqLvnF1CM7mK5fluM4FL8xADIDTT/Tl1lvrO oprLNXyvxCtBvZovnhtdmSxqAVOG9gCLTA8xutsd/d1QlggmCznA3H15Ymc+Q2M/ZxbE UY6T9Opkt6J5/ZdgN45xV5B/Vg+pgYGqtcpUdfVOFlNraOkpNQFRkT1v/v5Hgy54+xZw FpVdk0Uun9bNKTwUHoXDoEezE/PFZKCkI5nFOPxdSeGm7ZDDksF0ofyCIkeGmdtWz/pI GkO0MekYQ4rjsZ2oCoqCsQPJWPZMnY8FgMEewsnRlxCRh5r3rAPVx6QOF6rZNGsQ9UXm /lXw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o128-v6si3457368pfg.5.2018.06.20.16.16.39; Wed, 20 Jun 2018 16:16:52 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932528AbeFTXPc (ORCPT + 99 others); Wed, 20 Jun 2018 19:15:32 -0400 Received: from mga09.intel.com ([134.134.136.24]:29835 "EHLO mga09.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754304AbeFTXP1 (ORCPT ); Wed, 20 Jun 2018 19:15:27 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga001.jf.intel.com ([10.7.209.18]) by orsmga102.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 20 Jun 2018 16:15:26 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.51,249,1526367600"; d="scan'208";a="66325210" Received: from chang-linux-2.sc.intel.com ([10.3.52.139]) by orsmga001.jf.intel.com with ESMTP; 20 Jun 2018 16:15:25 -0700 From: "Chang S. Bae" To: Andy Lutomirski , "H . Peter Anvin" , Thomas Gleixner , Ingo Molnar Cc: Andi Kleen , Dave Hansen , Markus T Metzger , Ravi Shankar , "Chang S . Bae" , LKML Subject: [PATCH v4 2/7] x86/fsgsbase/64: Make ptrace read FS/GS base accurately Date: Wed, 20 Jun 2018 16:15:01 -0700 Message-Id: <1529536506-26237-3-git-send-email-chang.seok.bae@intel.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1529536506-26237-1-git-send-email-chang.seok.bae@intel.com> References: <1529536506-26237-1-git-send-email-chang.seok.bae@intel.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Andy Lutomirski ptrace can read FS/GS base using the register access API (PTRACE_PEEKUSER, etc) or PTRACE_ARCH_PRCTL. Make both of these mechanisms return the actual FS/GS base. This will improve debuggability by providing the correct information to ptracer (GDB and etc). Signed-off-by: Andy Lutomirski [chang: Rebase and revise patch description] Signed-off-by: Chang S. Bae Reviewed-by: Andi Kleen Cc: H. Peter Anvin Cc: Dave Hansen Cc: Thomas Gleixner Cc: Ingo Molnar --- arch/x86/kernel/process_64.c | 67 +++++++++++++++++++++++++++++++++----------- 1 file changed, 51 insertions(+), 16 deletions(-) diff --git a/arch/x86/kernel/process_64.c b/arch/x86/kernel/process_64.c index ace0158..e498671 100644 --- a/arch/x86/kernel/process_64.c +++ b/arch/x86/kernel/process_64.c @@ -279,6 +279,49 @@ static __always_inline void load_seg_legacy(unsigned short prev_index, } } +static unsigned long task_seg_base(struct task_struct *task, + unsigned short selector) +{ + unsigned short idx = selector >> 3; + unsigned long base; + + if (likely((selector & SEGMENT_TI_MASK) == 0)) { + if (unlikely(idx >= GDT_ENTRIES)) + return 0; + + /* + * There are no user segments in the GDT with nonzero bases + * other than the TLS segments. + */ + if (idx < GDT_ENTRY_TLS_MIN || idx > GDT_ENTRY_TLS_MAX) + return 0; + + idx -= GDT_ENTRY_TLS_MIN; + base = get_desc_base(&task->thread.tls_array[idx]); + } else { +#ifdef CONFIG_MODIFY_LDT_SYSCALL + struct ldt_struct *ldt; + + /* + * If performance here mattered, we could protect the LDT + * with RCU. This is a slow path, though, so we can just + * take the mutex. + */ + mutex_lock(&task->mm->context.lock); + ldt = task->mm->context.ldt; + if (unlikely(idx >= ldt->nr_entries)) + base = 0; + else + base = get_desc_base(ldt->entries + idx); + mutex_unlock(&task->mm->context.lock); +#else + base = 0; +#endif + } + + return base; +} + void write_fsbase(unsigned long fsbase) { /* set the selector to 0 to not confuse __switch_to */ @@ -297,16 +340,12 @@ unsigned long read_task_fsbase(struct task_struct *task) { unsigned long fsbase; - if (task == current) { + if (task == current) fsbase = read_fsbase(); - } else { - /* - * XXX: This will not behave as expected if called - * if fsindex != 0. This preserves an existing bug - * that will be fixed. - */ + else if (task->thread.fsindex == 0) fsbase = task->thread.fsbase; - } + else + fsbase = task_seg_base(task, task->thread.fsindex); return fsbase; } @@ -315,16 +354,12 @@ unsigned long read_task_gsbase(struct task_struct *task) { unsigned long gsbase; - if (task == current) { + if (task == current) gsbase = read_inactive_gsbase(); - } else { - /* - * XXX: This will not behave as expected if called - * if gsindex != 0. Same bug preservation as above - * read_task_fsbase. - */ + else if (task->thread.gsindex == 0) gsbase = task->thread.gsbase; - } + else + gsbase = task_seg_base(task, task->thread.gsindex); return gsbase; } -- 2.7.4