Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp4386391imm; Sat, 21 Jul 2018 18:24:39 -0700 (PDT) X-Google-Smtp-Source: AAOMgpcgPexRpTJ699A0+uvaYO/bP8WxieVy6F1AD+WtZGcMcJiiWwIoG807SF3j/2QYd38aHkZB X-Received: by 2002:a62:6746:: with SMTP id b67-v6mr7775150pfc.243.1532222679301; Sat, 21 Jul 2018 18:24:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1532222679; cv=none; d=google.com; s=arc-20160816; b=GXeimlaviR95mncH2KWx2KqhE+su+ATEBv1e5RznGfIQN/dV83HOTtv8wCByh3pbDH fiwmc91SasQtKn/jJ8hSXbf3Kn2tt2O280jR3adN4j9qb4WH9RFB38X27i7NW4Rs8PRv 8vj3U/jV0yg1Gv4y7lrH19MdhFbsSJKHxAPtu1mapmEx13ClLEtgCfYAq+kTIyHuwEqA YFf4wonuqwczPxBgkswHVz2wcjU+cz7J+xcjlrS5l2uBb8YeDJ3PzRDqooTro855VcEn 91upfEPXSqq2t99zddTxtETO7IYOES7qizeGd40torxReaXZgZQc4UFbLUnhHRyPebgH 9EBQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:references:cc:to:from:subject:dkim-signature :arc-authentication-results; bh=MafrjHOMlzAWtrMLq+usDPsZMBJjQE5NsDIrIaQlLGc=; b=Ls9i0X96lQUWvEWFfeJiMR1XF/9yUD05H1/V8NLNOfpkk+6bkR0bjTs6uEpiLIUZ7F NtiaZiwTyQR14eGDSP8TMQT5bjZub0C1dgN9JoUi8eaSNEF9spbE+lsQdblDU/BsPPlO w5L4SN1MxEfYzZjsZj5awdvFLE3R8lr/KGEj4XqYKC4ChjRdXWAAG8o/NhJgZWYsWq03 CyXd/jIbvh7bKwZsytH80t5P8k+jfCZzhRa4UMG86YbYn62D6KIEawNrr7S8IoEbaq/9 4qOdF1Hxobz7YkGpXGxLTiPCzn2ca8Ork/5JBopYMYs80H+CMMT26slhRKfe6YFNtL/k R0Pw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@runbox.com header.s=rbselector1 header.b=dTaBtu8J; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 69-v6si5512601pft.235.2018.07.21.18.23.44; Sat, 21 Jul 2018 18:24:39 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@runbox.com header.s=rbselector1 header.b=dTaBtu8J; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728312AbeGVCPx (ORCPT + 99 others); Sat, 21 Jul 2018 22:15:53 -0400 Received: from aibo.runbox.com ([91.220.196.211]:59920 "EHLO aibo.runbox.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728229AbeGVCPw (ORCPT ); Sat, 21 Jul 2018 22:15:52 -0400 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=runbox.com; s=rbselector1; h=Content-Transfer-Encoding:Content-Type:In-Reply-To: MIME-Version:Date:Message-ID:References:Cc:To:From:Subject; bh=MafrjHOMlzAWtrMLq+usDPsZMBJjQE5NsDIrIaQlLGc=; b=dTaBtu8JoDUkodOhXcEAj3iM1J Hw+RwOev2oMUthygbx/Eo0qvTHlaThY+KYr5G7+GxguHWCLH5S7hMOWVupIBNXDVV3htHW9lNTZed vpR7yMEM7y1U5HqbJ1Js1gaZBCVBZt/YCJCcKd39LvYw+KnIIw5eeV+UlzD5e6FwXRMyqtxWorSDm sc52iV1sh1L+Hpi3KRF287I6DpOssjqdnnJJLqS+fGgV40tn5ScLYceWmdh3uQwv3ZjdtDsdKw1ta 5JUxeLWh5FVnV845aFZ2aMMVrfIpqnLqSD+9eCySYkcODyhBhBwstydRkFVCcomq25LgaEOV9/Ja1 vKxPNtWA==; Received: from [10.9.9.211] (helo=mailfront11.runbox.com) by mailtransmit02.runbox with esmtp (Exim 4.86_2) (envelope-from ) id 1fh33F-0007fk-LY; Sun, 22 Jul 2018 03:20:45 +0200 Received: by mailfront11.runbox.com with esmtpsa (uid:769847 ) (TLS1.2:DHE_RSA_AES_128_CBC_SHA1:128) (Exim 4.82) id 1fh33B-00019b-44; Sun, 22 Jul 2018 03:20:41 +0200 Subject: Re: [PATCH 1/2] x86/entry/64: Do not clear %rbx under Xen From: "M. Vefa Bicakci" To: Andy Lutomirski Cc: LKML , Dominik Brodowski , Ingo Molnar , "H. Peter Anvin" , Thomas Gleixner , Boris Ostrovsky , Juergen Gross , xen-devel@lists.xenproject.org, X86 ML , stable , Dan Williams , Andi Kleen References: <20180721194909.23903-1-m.v.b@runbox.com> Message-ID: <74f29b48-7522-c4f4-c2e7-d8e41fd88873@runbox.com> Date: Sat, 21 Jul 2018 21:20:35 -0400 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=windows-1252; format=flowed Content-Language: en-CA Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 07/21/2018 07:37 PM, M. Vefa Bicakci wrote: > On 07/21/2018 07:30 PM, Andy Lutomirski wrote: >> On Sat, Jul 21, 2018 at 4:19 PM, M. Vefa Bicakci wrote: >>> On 07/21/2018 05:45 PM, Andy Lutomirski wrote: >>>> >>>> On Sat, Jul 21, 2018 at 12:49 PM, M. Vefa Bicakci >>>> wrote: >>>>> >>>>> Commit 3ac6d8c787b8 ("x86/entry/64: Clear registers for >>>>> exceptions/interrupts, to reduce speculation attack surface") >>>>> unintendedly >>>>> broke Xen PV virtual machines by clearing the %rbx register at the end of >>>>> xen_failsafe_callback before the latter jumps to error_exit. >>>>> error_exit expects the %rbx register to be a flag indicating whether >>>>> there should be a return to kernel mode. >>>>> >>>>> This commit makes sure that the %rbx register is not cleared by >>>>> the PUSH_AND_CLEAR_REGS macro, when the macro in question is instantiated >>>>> by xen_failsafe_callback, to avoid the issue. >>>> >>>> >>>> Seems like a genuine problem, but: >>>> >>>>> diff --git a/arch/x86/entry/entry_64.S b/arch/x86/entry/entry_64.S >>>>> index c7449f377a77..96e8ff34129e 100644 >>>>> --- a/arch/x86/entry/entry_64.S >>>>> +++ b/arch/x86/entry/entry_64.S >>>>> @@ -1129,7 +1129,7 @@ ENTRY(xen_failsafe_callback) >>>>> ????????? addq??? $0x30, %rsp >>>>> ????????? UNWIND_HINT_IRET_REGS >>>>> ????????? pushq?? $-1 /* orig_ax = -1 => not a system call */ >>>>> -?????? PUSH_AND_CLEAR_REGS >>>>> +?????? PUSH_AND_CLEAR_REGS clear_rbx=0 >>>>> ????????? ENCODE_FRAME_POINTER >>>>> ????????? jmp???? error_exit >>>> >>>> >>>> The old code first set RBX to zero then, if frame pointers are on, >>>> sets it to some special non-zero value, then crosses its fingers and >>>> hopes for the best.? Your patched code just skips the zeroing part, so >>>> RBX either contains the ENCODE_FRAME_POINTER result or is >>>> uninitialized. >>>> >>>> How about actually initializing rbx to something sensible like, say, 1? >>> >>> Hello Andy, >>> >>> Thank you for the review! Apparently, I have not done my homework fully. >>> I will test your suggestion and report back, most likely in a few hours. >>> >>> I have been testing with the next/linux-next tree's master branch >>> (dated 20180720), and I noticed that ENCODE_FRAME_POINTER changes the >>> frame pointer (i.e., RBP) register, as opposed to the RBX register, >>> which the patch aims to avoid changing before jumping to error_exit. >>> It is possible that I am missing something though -- I am not sure about >>> the connection between the RBP and RBX registers. >> >> Sorry, brain fart on my part. > > No problem! :-) > >>> The change introduced by commit 3ac6d8c787b8 is in the excerpt below. Would >>> it >>> be valid to state that the original code had the same issue that you >>> referred >>> to (i.e., leaving the RBX register uninitialized)? >> >> Presumably. >> >> I would propose a rather different fix: >> >> https://git.kernel.org/pub/scm/linux/kernel/git/luto/linux.git/commit/?h=x86/pti&id=bb3d76b50c3bc78b67d79cf90d328f38a435c793 >> >> Any chance you could test that and see if it fixes your problem? > > Of course; I will report back with the result in a few hours. Hello Andy, I confirm that the commit at [1] resolves the issue in question as well. To test, I first reverted my commit, applied your commit and verified that the bug cannot be reproduced. Afterwards, I reverted your commit and verified that the bug is reproducible. I am not sure about the best way to document the bug I encountered in your commit message, but in case you plan to have your commit merged, please feel free to add a "Reported-and-tested-by: M. Vefa Bicakci " tag to the commit message, possibly with a link to this e-mail thread. Finally, as I had mentioned in my commit message, this bug exists in all kernel versions 4.14 and greater, so it would be nice if you could carbon-copy "stable@vger.kernel.org" in the commit message as well. Thank you, Vefa [1] https://git.kernel.org/pub/scm/linux/kernel/git/luto/linux.git/commit/?h=x86/pti&id=bb3d76b50c3bc78b67d79cf90d328f38a435c793