Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp29373imm; Thu, 30 Aug 2018 14:49:16 -0700 (PDT) X-Google-Smtp-Source: ANB0VdbrTpWVTRA0evOcR3KWHRdnL5rgcnwoWEgsQRxO/FmokxTxb5Hs3vcVOuivwUFuOLldCJhG X-Received: by 2002:a63:fa0c:: with SMTP id y12-v6mr9389588pgh.177.1535665756213; Thu, 30 Aug 2018 14:49:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1535665756; cv=none; d=google.com; s=arc-20160816; b=w+nDs2vLvdx/TtH30rR7FacuFDzIWef/65xKQK5BFecXP/m8IM++aMuMPYQejvBvAi 7yN5AVF8fnGCc9V+JAhxNM92EeSpEhUhMNw9lhFscUokaxhSYgu4zxhWFsVXtsu9PI2z lcvNOpbSWlkRe7dzqWhdOCYNue3MwhOCjLnLmFaLcsxAndtp/+wWcT5hMXlCN5frK6A3 oaGS6Fjq8fH+JUKvEGscr4vYmpbtwQWmEaIJJaXeS8qo/ngkOWkB0JbuOjOGHWHGW9px wepAv3RJNqA4B+3PokhetFHMbzw5FpE0C/NzL6CiNReUnJEdUc25YxTNHzmyh3Tg3Cub lXRQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature :arc-authentication-results; bh=iaT0h/QgNT8sE8GySblfJoYXW8enXi0AAre2vg3buV0=; b=Rr3wVLDyuXd/xKfoMgfaW2mPv5FG9QVZ8nGH8I3xK8mI3dAVuCXu9lNDrTAxla1Tbd 2bbaDisSfytvgSOqQQQRYAFatNuYWDEPhsVdlHJmJSkbs62X9rnrzapvGoP9Bihi0pwX v+WXvL07z6FlnDjdyggCqYdje7+aTyGcCznPowfPsAjRuIp2zswdJjpejJfqwBikWAVZ px7JzNpd/37y4d4rHtARwGY55M112DhB8ap/XwdwZs/hjV2LDsz/1393mP5JQzcTevAJ 66nGHbyNJ9hbGr40FJvHSnqsCw8zv843jkIGvBrZVkLB3ClyBTLfw827QrjkgLt/sKdb isRg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=NBubt9wc; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p12-v6si7266943pls.53.2018.08.30.14.49.01; Thu, 30 Aug 2018 14:49:16 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=NBubt9wc; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727818AbeHaBv5 (ORCPT + 99 others); Thu, 30 Aug 2018 21:51:57 -0400 Received: from mail-oi0-f66.google.com ([209.85.218.66]:42686 "EHLO mail-oi0-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727607AbeHaBv5 (ORCPT ); Thu, 30 Aug 2018 21:51:57 -0400 Received: by mail-oi0-f66.google.com with SMTP id k81-v6so12069453oib.9 for ; Thu, 30 Aug 2018 14:47:43 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=iaT0h/QgNT8sE8GySblfJoYXW8enXi0AAre2vg3buV0=; b=NBubt9wcw+/0s63cmiYLXoH9kAVRsfZt6IDpaCJpaLmDusgHk7Kw7ljeaRtbqrF5vS rBn/eZ16sCt+nIYjnjnPpmQ5OVfp1qCM94qOsSUbPwj+oBfsBdHoBypTaSTK2i8yvmQH ZmOvDWNQQvrP1Oox5HTX+ZZgbN/Mzb3AWKYH+Lc1GssGRS+R8Rr2K/XLZRHLRVoDKy5h KGzkEamEqwKQ08J9A35nvMTTM/MxeKYZ2Cb+VYAu9lx+2NoPJEOBFg5hzpQ9Al96YZZ2 eMTmua7sBN2aaR4JGccyyxLxudwQGKX/gnL6Kh5oyI8d+h9qlgO8ImqZHeMKQSsLvs1S tf/g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=iaT0h/QgNT8sE8GySblfJoYXW8enXi0AAre2vg3buV0=; b=ipqfM4PckauCS1pBAlWyDWYzzBQPelyNS7BZc8BJv/bmJJlmIIIL+Rtons9aDfEGED VTEu0kQy1xlJS2f/j5j4TVpl8V8lskGsUU3nGpRSirdPpAZeHxYWkNUWWzdIzjmDMrzY exnwzo32l3X9DCBFPNpvczd2LNWsh6Y/iqQL+r9VIuxnmZDaxaXD+LPlKYIZ7GD7lfzL yZaXFicS9OXBJ6Ovj+1LHswwzTzzxpiQBCrQMSbTe06LgjVq+PQu0HffN/9pWlxihs8H ApqQ3zIoCDy1STVL7dmatrQbDku5o16puoiOqJ5xkDlcl/WJVKfPOYMbXQiYMn6rUjqJ YsOg== X-Gm-Message-State: APzg51At/CnXBn1lg6lvRvC9wIEMfr+y9o5FnSvYEef3jvJR7objHDMi 2385MsB0rzNVwC749cHCm/pYaubVNrx4lFNyhMJrXg== X-Received: by 2002:aca:c585:: with SMTP id v127-v6mr4610021oif.348.1535665663220; Thu, 30 Aug 2018 14:47:43 -0700 (PDT) MIME-Version: 1.0 References: <20180830143904.3168-1-yu-cheng.yu@intel.com> <20180830143904.3168-13-yu-cheng.yu@intel.com> <079a55f2-4654-4adf-a6ef-6e480b594a2f@linux.intel.com> <1535649960.26689.15.camel@intel.com> <33d45a12-513c-eba2-a2de-3d6b630e928e@linux.intel.com> <1535651666.27823.6.camel@intel.com> <1535660494.28258.36.camel@intel.com> <1535662366.28781.6.camel@intel.com> In-Reply-To: From: Jann Horn Date: Thu, 30 Aug 2018 23:47:16 +0200 Message-ID: Subject: Re: [RFC PATCH v3 12/24] x86/mm: Modify ptep_set_wrprotect and pmdp_set_wrprotect for _PAGE_DIRTY_SW To: yu-cheng.yu@intel.com Cc: Dave Hansen , "the arch/x86 maintainers" , "H . Peter Anvin" , Thomas Gleixner , Ingo Molnar , kernel list , linux-doc@vger.kernel.org, Linux-MM , linux-arch , Linux API , Arnd Bergmann , Andy Lutomirski , Balbir Singh , Cyrill Gorcunov , Florian Weimer , hjl.tools@gmail.com, Jonathan Corbet , keescook@chromiun.org, Mike Kravetz , Nadav Amit , Oleg Nesterov , Pavel Machek , Peter Zijlstra , ravi.v.shankar@intel.com, vedvyas.shanbhogue@intel.com Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Aug 30, 2018 at 11:01 PM Jann Horn wrote: > > On Thu, Aug 30, 2018 at 10:57 PM Yu-cheng Yu wrote: > > > > On Thu, 2018-08-30 at 22:44 +0200, Jann Horn wrote: > > > On Thu, Aug 30, 2018 at 10:25 PM Yu-cheng Yu > > > wrote: > > ... > > > > In the flow you described, if C writes to the overflow page before > > > > B > > > > gets in with a 'call', the return address is still correct for > > > > B. To > > > > make an attack, C needs to write again before the TLB flush. I > > > > agree > > > > that is possible. > > > > > > > > Assume we have a guard page, can someone in the short window do > > > > recursive calls in B, move ssp to the end of the guard page, and > > > > trigger the same again? He can simply take the incssp route. > > > I don't understand what you're saying. If the shadow stack is > > > between > > > guard pages, you should never be able to move SSP past that area's > > > guard pages without an appropriate shadow stack token (not even with > > > INCSSP, since that has a maximum range of PAGE_SIZE/2), and > > > therefore, > > > it shouldn't matter whether memory outside that range is incorrectly > > > marked as shadow stack. Am I missing something? > > > > INCSSP has a range of 256, but we can do multiple of that. > > But I realize the key is not to have the transient SHSTK page at all. > > The guard page is !pte_write() and even we have flaws in > > ptep_set_wrprotect(), there will not be any transient SHSTK pages. I > > will add guard pages to both ends. > > > > Still thinking how to fix ptep_set_wrprotect(). > > cmpxchg loop? Or is that slow? Something like this: static inline void ptep_set_wrprotect(struct mm_struct *mm, unsigned long addr, pte_t *ptep) { pte_t pte = READ_ONCE(*ptep), new_pte; /* ... your comment about not needing a TLB shootdown here ... */ do { pte = pte_wrprotect(pte); /* note: relies on _PAGE_DIRTY_HW < _PAGE_DIRTY_SW */ /* dirty direct bit-twiddling; you can probably write this in a nicer way */ pte.pte |= (pte.pte & _PAGE_DIRTY_HW) >> _PAGE_BIT_DIRTY_HW << _PAGE_BIT_DIRTY_SW; pte.pte &= ~_PAGE_DIRTY_HW; pte = cmpxchg(ptep, pte, new_pte); } while (pte != new_pte); } I think this has the advantage of not generating weird spurious pagefaults. It's not compatible with Xen PV, but I'm guessing that this whole feature isn't going to support Xen PV anyway? So you could switch between two implementations of ptep_set_wrprotect using the pvop mechanism or so - one for environments that support shadow stacks, one for all other environments. Or is there some arcane reason why cmpxchg doesn't work here the way I think it should?