Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp2355532imj; Mon, 11 Feb 2019 01:09:12 -0800 (PST) X-Google-Smtp-Source: AHgI3IaW3sJsM/DQBJKdBgDbGu+29ZeMlS0Yc1LCll1KttV4ZCeszwpGldCoZbFTRT+d5h7zbWAk X-Received: by 2002:a17:902:8d89:: with SMTP id v9mr21215903plo.90.1549876152044; Mon, 11 Feb 2019 01:09:12 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1549876152; cv=none; d=google.com; s=arc-20160816; b=bD6qqVwM5sbhRJZoDZZafVnb2IPfNT5rHZXESsy2Kv7gmlLTGGCe9elgIx2vg8o0Oe ajfKERyLT+ABQ7p9PGb5IN3cH6uluSWb9STv77chas4Mug10sufCJ1sA6nMBsQC80m6F zlYeyXT8I1uka3R1Hc7Bcj88nrPB7uwHPufwta/QeOkcTquVlLrWAGFJ5q8FS/4AxwSo wYeTonsQcNIRB42XKaGyTYk3vyJvCowOhZP1RZjVHCdu+Cs0hM1DG+bNCcDRy/Yi7l9U cpxIYvSC8/HLzHuYS6tDcsMspITgz/EV786bd7GI/spE2vUcQz1qYS5hVU93LG0ZpMTt w2FQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:in-reply-to :mime-version:user-agent:date:message-id:organization:from:cc :references:to:subject:dkim-signature; bh=RU4olNSJmvY43YkaAxWmPPK2DkywSpbTFjZVCTdxYDE=; b=nI6NN3cbOB85+lkcIc3aDyqeT6diUQY044ul95QkR21tK6Od+WgM8zYwBwv59pP9pv +WO1xMchJbFcd4EHEEHzKu5i/3U8UB0fe3niZu0TKRIyLBo4ECnGQdi2BLN8H/A730Wy z7CHFQ/k5zh1VBTuQOQGgCRq0I9unDwU40LzVsZwdTZFi5h2rHCRBJsA7K6aTNwn2qj0 uR6uO37vpA/RuzTKy39ndxr8q+f7sqwajHeCw7IAzCtIXWpYe5haicmx9Woag1a/D2Pi 8clXWFtW8JnC9K5cDL1RqaNkPLO7U60eFfDr1a1Yt3P4tz71hsDfNPXeymZOLESI7rpT PtHA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2018-07-02 header.b=b6CbU5av; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o125si2570799pfo.242.2019.02.11.01.08.56; Mon, 11 Feb 2019 01:09:12 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2018-07-02 header.b=b6CbU5av; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726358AbfBKJIv (ORCPT + 99 others); Mon, 11 Feb 2019 04:08:51 -0500 Received: from userp2130.oracle.com ([156.151.31.86]:43008 "EHLO userp2130.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725986AbfBKJIu (ORCPT ); Mon, 11 Feb 2019 04:08:50 -0500 Received: from pps.filterd (userp2130.oracle.com [127.0.0.1]) by userp2130.oracle.com (8.16.0.27/8.16.0.27) with SMTP id x1B93gHO141318; Mon, 11 Feb 2019 09:08:22 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=subject : to : references : cc : from : message-id : date : mime-version : in-reply-to : content-type : content-transfer-encoding; s=corp-2018-07-02; bh=RU4olNSJmvY43YkaAxWmPPK2DkywSpbTFjZVCTdxYDE=; b=b6CbU5av25hMKNMVyUclBc8FasgU+0uvl/QHzs5kth0krpjBCQRG2O+HaaYRTwumfb1H l4IqBvvocJ4DbMFufu1snhjsJL93oVM1PSeQ56FsLXtpARFeaG/SlwcMkeq+WglpDn4k d1FTbBnTcGXOiT7ORfGHrgAE7Z3kSlSjeE8iHBR7dQ2ij8qkRo/hupbCCp96qibLQyac 5jLUJG9QbI6AS/+wRw9kCtQ+7XPIM5SlEJaduB3kM+ApCYQWwupR2rpwgzokI5qjeie3 xoqDtFa/E/rwiaHIdSgRGTyXjLwAlRV9ih1hV1OFgV6nBL05Xvvr1+Yb4sLDcRj9iBS1 /g== Received: from aserv0022.oracle.com (aserv0022.oracle.com [141.146.126.234]) by userp2130.oracle.com with ESMTP id 2qhrek4ebx-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 11 Feb 2019 09:08:22 +0000 Received: from userv0121.oracle.com (userv0121.oracle.com [156.151.31.72]) by aserv0022.oracle.com (8.14.4/8.14.4) with ESMTP id x1B98Fbt031585 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 11 Feb 2019 09:08:15 GMT Received: from abhmp0017.oracle.com (abhmp0017.oracle.com [141.146.116.23]) by userv0121.oracle.com (8.14.4/8.13.8) with ESMTP id x1B98ETG026814; Mon, 11 Feb 2019 09:08:14 GMT Received: from [10.166.106.34] (/10.166.106.34) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Mon, 11 Feb 2019 01:08:13 -0800 Subject: Re: [PATCH] x86/alternatives: check int3 breakpoint physical addresses To: Thomas Gleixner References: <1548428249-8258-1-git-send-email-alexandre.chartre@oracle.com> Cc: LKML , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , Josh Poimboeuf , x86@kernel.org, Peter Zijlstra , Alexandre Chartre From: Alexandre Chartre Organization: Oracle Corporation Message-ID: <8995b3b4-b805-c8c7-95a8-a39ab000f289@oracle.com> Date: Mon, 11 Feb 2019 10:08:11 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.6.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit X-Proofpoint-Virus-Version: vendor=nai engine=5900 definitions=9163 signatures=668683 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=884 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1902110071 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 02/10/2019 10:23 PM, Thomas Gleixner wrote: > On Fri, 25 Jan 2019, Alexandre Chartre wrote: >> Note that this issue has been observed and reproduced with a custom kernel >> with some code mapped to different virtual addresses and using jump labels >> As jump labels use text_poke_bp(), crashes were sometimes observed when >> updating jump labels. > > Rightfully so. text_poke_bp() pokes at the kernels text mapping which is > very well defined and unique. Why would you map the same text to different > virtual addresses and then use a randomly chosen one to poke at it? > As an example, we used to have per-CPU SYSCALL entry trampoline [1] where the entry_SYSCALL_64_trampoline function was mapped to a different virtual address for each CPU. So, a syscall would execute entry_SYSCALL_64_trampoline() from a different virtual address depending on the CPU being used. With that code, adding a jump label in entry_SYSCALL_64_trampoline() causes the described issue. This mapping was eventually removed [2]. I don't know if any other code like this is currently present in the kernel (I couldn't find any, but I might not have covered everything). But, as this past commit have shown, this is definitively something that can happen. Thanks, alex. --- [1] 3386bc8aed82 ("x86/entry/64: Create a per-CPU SYSCALL entry trampoline") https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3386bc8aed82 [2] bf904d2762ee ("x86/pti/64: Remove the SYSCALL64 entry trampoline") https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bf904d2762ee