Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp2420878imm; Wed, 3 Oct 2018 03:41:33 -0700 (PDT) X-Google-Smtp-Source: ACcGV63yDvLq3E8IswdVt8avKHpVuMZMi/uFzWF6fJqJcBzMUyixkQhKA7mXIOs3u+HRe73ligL2 X-Received: by 2002:a63:184a:: with SMTP id 10-v6mr796317pgy.81.1538563293431; Wed, 03 Oct 2018 03:41:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1538563293; cv=none; d=google.com; s=arc-20160816; b=MhodY6/W/kdVwdhZPFyS4L9sZ5dt9vwExXXLkBFOjFRCG3PdS1adaSmtH5vYiTJpFa 37cGjJ/jWzvWFmlKQyY1jckTq2FJi6j+IdzJ+Mr9Il8mXyRccLFhbzFR6kmaOJzSTBaQ WF6D+O4SihPtKm/8rCuzpz7E83l7CIeuRsaU5xeSOH8k0Y8vgbNr9azadAU+gVyWUTwF zcxqsqTq872V49KNFBMaBKNvvUQc/XaMH6upOsct5xD7Aa+kgmr1dmX8UZlj45w5lyN3 avw8CzKTIQKIbFpYG/FqYRCd/bvgHkSB+H/aaycha/UeBpRL73VhYfnObO+Ccg+szOvj UiNg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=KoAYpHg+y2+/eSt2jbudw7JadOwJBJI8wf6yoa7PZFA=; b=a0oQls7/pDWnug+yUJPhLenhVcKFw0l3weNWCiVfkXBqgMaKeQFi3aRVRcEeoF0IfQ 9pFV8fVNwjzANq9tCqQYNOejErFEF4NWuCeaTHYqGGsOlxgzJ1RkKTyyy1RbDRj7M/Gs 4KLp3leRzr4EOopLgtzA/lXmPoEKJOna+LSlyN0hmH6NR2QV9R3WlLM31pg8dSfsrLIg /8lj4sCzX+vmjlqm7U3ds2Q72NJK57CeeoLwF+J3QX/ulz4Qfzuu1SDoL0U85ZSq6vCB AANzR9VRxwiZmJ0f+EYStknrFu99LDd4RdFwYRbm9NpHRS6B2HeTowuMJVskyF8Bwd9G +COA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 34-v6si1232605plp.310.2018.10.03.03.41.18; Wed, 03 Oct 2018 03:41:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726769AbeJCR1a (ORCPT + 99 others); Wed, 3 Oct 2018 13:27:30 -0400 Received: from mx1.redhat.com ([209.132.183.28]:50032 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726517AbeJCR13 (ORCPT ); Wed, 3 Oct 2018 13:27:29 -0400 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.phx2.redhat.com [10.5.11.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 8111781256; Wed, 3 Oct 2018 10:39:41 +0000 (UTC) Received: from asgard.redhat.com (ovpn-200-17.brq.redhat.com [10.40.200.17]) by smtp.corp.redhat.com (Postfix) with ESMTPS id CFE0318351; Wed, 3 Oct 2018 10:39:29 +0000 (UTC) Date: Wed, 3 Oct 2018 12:39:59 +0200 From: Eugene Syromiatnikov To: Yu-cheng Yu Cc: x86@kernel.org, "H. Peter Anvin" , Thomas Gleixner , Ingo Molnar , linux-kernel@vger.kernel.org, linux-doc@vger.kernel.org, linux-mm@kvack.org, linux-arch@vger.kernel.org, linux-api@vger.kernel.org, Arnd Bergmann , Andy Lutomirski , Balbir Singh , Cyrill Gorcunov , Dave Hansen , Florian Weimer , "H.J. Lu" , Jann Horn , Jonathan Corbet , Kees Cook , Mike Kravetz , Nadav Amit , Oleg Nesterov , Pavel Machek , Peter Zijlstra , Randy Dunlap , "Ravi V. Shankar" , Vedvyas Shanbhogue Subject: Re: [RFC PATCH v4 06/27] x86/cet: Control protection exception handler Message-ID: <20181003103959.GB7111@asgard.redhat.com> References: <20180921150351.20898-1-yu-cheng.yu@intel.com> <20180921150351.20898-7-yu-cheng.yu@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180921150351.20898-7-yu-cheng.yu@intel.com> User-Agent: Mutt/1.5.23 (2014-03-12) X-Scanned-By: MIMEDefang 2.79 on 10.5.11.14 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.25]); Wed, 03 Oct 2018 10:39:41 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Sep 21, 2018 at 08:03:30AM -0700, Yu-cheng Yu wrote: > diff --git a/arch/x86/kernel/traps.c b/arch/x86/kernel/traps.c > index e6db475164ed..873765adc244 100644 > --- a/arch/x86/kernel/traps.c > +++ b/arch/x86/kernel/traps.c > @@ -578,6 +578,64 @@ do_general_protection(struct pt_regs *regs, long error_code) > } > NOKPROBE_SYMBOL(do_general_protection); > > +static const char *control_protection_err[] = > +{ > + "unknown", > + "near-ret", > + "far-ret/iret", > + "endbranch", > + "rstorssp", > + "setssbsy", > +}; > + > +/* > + * When a control protection exception occurs, send a signal > + * to the responsible application. Currently, control > + * protection is only enabled for the user mode. This > + * exception should not come from the kernel mode. > + */ > +dotraplinkage void > +do_control_protection(struct pt_regs *regs, long error_code) > +{ > + struct task_struct *tsk; > + > + RCU_LOCKDEP_WARN(!rcu_is_watching(), "entry code didn't wake RCU"); > + if (notify_die(DIE_TRAP, "control protection fault", regs, > + error_code, X86_TRAP_CP, SIGSEGV) == NOTIFY_STOP) > + return; > + cond_local_irq_enable(regs); > + > + if (!user_mode(regs)) > + die("kernel control protection fault", regs, error_code); > + > + if (!static_cpu_has(X86_FEATURE_SHSTK) && > + !static_cpu_has(X86_FEATURE_IBT)) > + WARN_ONCE(1, "CET is disabled but got control " > + "protection fault\n"); > + > + tsk = current; > + tsk->thread.error_code = error_code; > + tsk->thread.trap_nr = X86_TRAP_CP; > + > + if (show_unhandled_signals && unhandled_signal(tsk, SIGSEGV) && > + printk_ratelimit()) { > + unsigned int max_err; > + > + max_err = ARRAY_SIZE(control_protection_err) - 1; > + if ((error_code < 0) || (error_code > max_err)) > + error_code = 0; > + pr_info("%s[%d] control protection ip:%lx sp:%lx error:%lx(%s)", > + tsk->comm, task_pid_nr(tsk), > + regs->ip, regs->sp, error_code, > + control_protection_err[error_code]); > + print_vma_addr(KERN_CONT " in ", regs->ip); > + pr_cont("\n"); > + } > + > + force_sig_info(SIGSEGV, SEND_SIG_PRIV, tsk); That way, no information is provided to userspace (both application and debugger), which is rather unfortunate. It would be nice if a new SEGV_* code was added at least, and CET error (with error code constant provided in UAPI) is passed via si_errno. (Having ip/sp/*ssp would be even better, but I'm not exactly sure about ramifications of providing this kind of information to user space).