Received: by 2002:a25:f815:0:0:0:0:0 with SMTP id u21csp3706910ybd; Tue, 25 Jun 2019 07:10:19 -0700 (PDT) X-Google-Smtp-Source: APXvYqwPVxj7jNMxap6SLoY+eGs7p7O053ar6m4fbucxLfoirwKi8fLe2IBCdRXkrMQIXYRFbbPi X-Received: by 2002:a17:902:da4:: with SMTP id 33mr89612773plv.209.1561471818981; Tue, 25 Jun 2019 07:10:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1561471818; cv=none; d=google.com; s=arc-20160816; b=wWs3akiNQiF7aSZz6r9RVR6Uec2lscaiIO0lENnDs/7ZO7cuiBSftOgHJ17G3AAhMg QmHuAXJ9TLHHPaKT6G4IrxfV0FkV1neDEBSL1MtviLqhzLkS+fhCOjO1fyCHvDi43bXZ Vu3JwlFDpPOLb6aE9lHxlzEStg40VCfLyJy0X6ZmYeUnU3vl/0sb0YnzNkmfDvtDBTsr W78t/nFBOnXGXueROKb0Hc5g6rml3eUEI7Z/ylOeKP/JgfItgOrBiMAD6JOR7U+Ntlm7 YKJw6jUTG4aQRdYsJI2VaDM99IiXcoyUzaloMOIMyNBHtvfwga7Dhs75LbX30wJ8Bxmr LALw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:thread-index:thread-topic :content-transfer-encoding:mime-version:subject:references :in-reply-to:message-id:cc:to:from:date:dkim-signature:dkim-filter; bh=ZqtVnpig7t9YimfV4x1WLgCndeFnHjjcXNpTezLm3iY=; b=DWcy20Ys8e4pdluGoY7INBg4vrHl0tIlNvYRVDnrbgz8Yyj7NNLXXnAaNQwx6uNX// gbXeH9CINvnx4KJXLSRxs9Ch+PHFmpX4RBO0nDTu0JTBN0skL/itlMmtHKSKMnuBzux0 qdprGTKG4K2RsDeKk4E9zqdzDj8q2sNr6AYEOQk0ZS0A4PXHV5lGgmTVeucSSMysuS6X fxHmW7o7THWtJIf6z2itBU2BLVvVKwdp/Rv5pG7Z3zCJuQl8IQGd5+0MadMbLQ3FgRWi eAsq1YVAMvMO2/+BEx4emepNeIEC7+dGE5M5VPtKC/VJyBdodufm3nQ1i6N0cxDNjD3I ajpA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@efficios.com header.s=default header.b=ikKpGFU7; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=efficios.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c23si14523202pfo.168.2019.06.25.07.10.03; Tue, 25 Jun 2019 07:10:18 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@efficios.com header.s=default header.b=ikKpGFU7; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=efficios.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728818AbfFYOI4 (ORCPT + 99 others); Tue, 25 Jun 2019 10:08:56 -0400 Received: from mail.efficios.com ([167.114.142.138]:39880 "EHLO mail.efficios.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726532AbfFYOI4 (ORCPT ); Tue, 25 Jun 2019 10:08:56 -0400 Received: from localhost (ip6-localhost [IPv6:::1]) by mail.efficios.com (Postfix) with ESMTP id E19D525BF95; Tue, 25 Jun 2019 10:08:53 -0400 (EDT) Received: from mail.efficios.com ([IPv6:::1]) by localhost (mail02.efficios.com [IPv6:::1]) (amavisd-new, port 10032) with ESMTP id QyG8j99SOcIq; Tue, 25 Jun 2019 10:08:53 -0400 (EDT) Received: from localhost (ip6-localhost [IPv6:::1]) by mail.efficios.com (Postfix) with ESMTP id 1327B25BF8C; Tue, 25 Jun 2019 10:08:53 -0400 (EDT) DKIM-Filter: OpenDKIM Filter v2.10.3 mail.efficios.com 1327B25BF8C DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=efficios.com; s=default; t=1561471733; bh=ZqtVnpig7t9YimfV4x1WLgCndeFnHjjcXNpTezLm3iY=; h=Date:From:To:Message-ID:MIME-Version; b=ikKpGFU7YciA3AINVWgB2B9+MmY7CrT/hs5z3j3oxwWAEKK2S1SmZPgPsklqhU/sZ dVbCuHoeEemHI9rmi4u4fF2nBpb6d3g8CeifBMFFc5wSA2EkpBGZolMpd98gv4FgFR OmSwoA1fzXFHXSW6KFX64T1cb/lePK1RyhQE8nvkEqduP7H40pR5Q7xFn4DdA2rV0H ttFSsRciSrYDFHdjI3NpyoziASkSwoqT2a7fWZHbryF9WPXe9bHFnPZyNz8s56HtCj 1gE4FxU5B9vFc4yM5DWf9c/4PckPwnaG5uCJ4+YOw2pbhTU12A2Es0lsQcj+ElGfsb C0L8HejwhA4fQ== X-Virus-Scanned: amavisd-new at efficios.com Received: from mail.efficios.com ([IPv6:::1]) by localhost (mail02.efficios.com [IPv6:::1]) (amavisd-new, port 10026) with ESMTP id 9SYqnRt07nsl; Tue, 25 Jun 2019 10:08:52 -0400 (EDT) Received: from mail02.efficios.com (mail02.efficios.com [167.114.142.138]) by mail.efficios.com (Postfix) with ESMTP id E1BDC25BF85; Tue, 25 Jun 2019 10:08:52 -0400 (EDT) Date: Tue, 25 Jun 2019 10:08:52 -0400 (EDT) From: Mathieu Desnoyers To: Will Deacon Cc: shuah , linux-kernel , Peter Zijlstra , Thomas Gleixner , Joel Fernandes , Catalin Marinas , Dave Watson , Andi Kleen , linux-kselftest , "H. Peter Anvin" , Chris Lameter , Russell King , Michael Kerrisk , "Paul E . McKenney" , Paul Turner , Boqun Feng , Josh Triplett , rostedt , Ben Maurer , linux-api , Andy Lutomirski , Andrew Morton , Linus Torvalds , carlos , Florian Weimer Message-ID: <795143697.722.1561471732756.JavaMail.zimbra@efficios.com> In-Reply-To: <20190625091507.GA13263@fuggles.cambridge.arm.com> References: <20190617152304.23371-1-mathieu.desnoyers@efficios.com> <20190624172429.GA11133@fuggles.cambridge.arm.com> <1620037196.377.1561400426591.JavaMail.zimbra@efficios.com> <20190625091507.GA13263@fuggles.cambridge.arm.com> Subject: Re: [RFC PATCH 1/1] Revert "rseq/selftests: arm: use udf instruction for RSEQ_SIG" MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-Originating-IP: [167.114.142.138] X-Mailer: Zimbra 8.8.12_GA_3803 (ZimbraWebClient - FF67 (Linux)/8.8.12_GA_3794) Thread-Topic: Revert "rseq/selftests: arm: use udf instruction for RSEQ_SIG" Thread-Index: hgYsmTALHNxnmFiVR4MEQT9OBpRJPA== Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org ----- On Jun 25, 2019, at 5:15 AM, Will Deacon will.deacon@arm.com wrote: > On Mon, Jun 24, 2019 at 02:20:26PM -0400, Mathieu Desnoyers wrote: >> ----- On Jun 24, 2019, at 1:24 PM, Will Deacon will.deacon@arm.com wrote: >> >> > On Mon, Jun 17, 2019 at 05:23:04PM +0200, Mathieu Desnoyers wrote: >> >> This reverts commit 2b845d4b4acd9422bbb668989db8dc36dfc8f438. >> >> >> >> That commit introduces build issues for programs compiled in Thumb mode. >> >> Rather than try to be clever and emit a valid trap instruction on arm32, >> >> which requires special care about big/little endian handling on that >> >> architecture, just emit plain data. Data in the instruction stream is >> >> technically expected on arm32: this is how literal pools are >> >> implemented. Reverting to the prior behavior does exactly that. >> >> >> >> Signed-off-by: Mathieu Desnoyers >> >> CC: Peter Zijlstra >> >> CC: Thomas Gleixner >> >> CC: Joel Fernandes >> >> CC: Catalin Marinas >> >> CC: Dave Watson >> >> CC: Will Deacon >> >> CC: Shuah Khan >> >> CC: Andi Kleen >> >> CC: linux-kselftest@vger.kernel.org >> >> CC: "H . Peter Anvin" >> >> CC: Chris Lameter >> >> CC: Russell King >> >> CC: Michael Kerrisk >> >> CC: "Paul E . McKenney" >> >> CC: Paul Turner >> >> CC: Boqun Feng >> >> CC: Josh Triplett >> >> CC: Steven Rostedt >> >> CC: Ben Maurer >> >> CC: linux-api@vger.kernel.org >> >> CC: Andy Lutomirski >> >> CC: Andrew Morton >> >> CC: Linus Torvalds >> >> CC: Carlos O'Donell >> >> CC: Florian Weimer >> >> --- >> >> tools/testing/selftests/rseq/rseq-arm.h | 52 ++------------------------------- >> >> 1 file changed, 2 insertions(+), 50 deletions(-) >> >> >> >> diff --git a/tools/testing/selftests/rseq/rseq-arm.h >> >> b/tools/testing/selftests/rseq/rseq-arm.h >> >> index 84f28f147fb6..5f262c54364f 100644 >> >> --- a/tools/testing/selftests/rseq/rseq-arm.h >> >> +++ b/tools/testing/selftests/rseq/rseq-arm.h >> >> @@ -5,54 +5,7 @@ >> >> * (C) Copyright 2016-2018 - Mathieu Desnoyers >> >> */ >> >> >> >> -/* >> >> - * RSEQ_SIG uses the udf A32 instruction with an uncommon immediate operand >> >> - * value 0x5de3. This traps if user-space reaches this instruction by mistake, >> >> - * and the uncommon operand ensures the kernel does not move the instruction >> >> - * pointer to attacker-controlled code on rseq abort. >> >> - * >> >> - * The instruction pattern in the A32 instruction set is: >> >> - * >> >> - * e7f5def3 udf #24035 ; 0x5de3 >> >> - * >> >> - * This translates to the following instruction pattern in the T16 instruction >> >> - * set: >> >> - * >> >> - * little endian: >> >> - * def3 udf #243 ; 0xf3 >> >> - * e7f5 b.n <7f5> >> >> - * >> >> - * pre-ARMv6 big endian code: >> >> - * e7f5 b.n <7f5> >> >> - * def3 udf #243 ; 0xf3 >> >> - * >> >> - * ARMv6+ -mbig-endian generates mixed endianness code vs data: little-endian >> >> - * code and big-endian data. Ensure the RSEQ_SIG data signature matches code >> >> - * endianness. Prior to ARMv6, -mbig-endian generates big-endian code and data >> >> - * (which match), so there is no need to reverse the endianness of the data >> >> - * representation of the signature. However, the choice between BE32 and BE8 >> >> - * is done by the linker, so we cannot know whether code and data endianness >> >> - * will be mixed before the linker is invoked. >> >> - */ >> >> - >> >> -#define RSEQ_SIG_CODE 0xe7f5def3 >> >> - >> >> -#ifndef __ASSEMBLER__ >> >> - >> >> -#define RSEQ_SIG_DATA \ >> >> - ({ \ >> >> - int sig; \ >> >> - asm volatile ("b 2f\n\t" \ >> >> - "1: .inst " __rseq_str(RSEQ_SIG_CODE) "\n\t" \ >> >> - "2:\n\t" \ >> >> - "ldr %[sig], 1b\n\t" \ >> >> - : [sig] "=r" (sig)); \ >> >> - sig; \ >> >> - }) >> >> - >> >> -#define RSEQ_SIG RSEQ_SIG_DATA >> >> - >> >> -#endif >> >> +#define RSEQ_SIG 0x53053053 >> > >> > I don't get why you're reverting back to this old signature value, when the >> > one we came up with will work well when interpreted as an instruction in the >> > *vast* majority of scenarios that people care about (A32/T32 little-endian). >> > I think you might be under-estimating just how dead things like BE32 really >> > are. >> >> My issue is that the current .instr approach is broken for programs or functions >> built in Thumb mode, and I received no feedback on the solutions I proposed for >> those issues, which led me to propose a patch reverting to a simple .word. > > I understand why you're moving from .inst to .word, but I don't understand > why that necessitates a change in the value. Why not .word 0xe7f5def3 ? You > could also flip the bytes around in case of big-endian, which would keep the > instruction coding clean for BE8. As long as we state and document that this should not be expected to generate valid instructions on big endian prior to ARMv6, I'm OK with that approach, e.g.: /* * - ARM little endian * * RSEQ_SIG uses the udf A32 instruction with an uncommon immediate operand * value 0x5de3. This traps if user-space reaches this instruction by mistake, * and the uncommon operand ensures the kernel does not move the instruction * pointer to attacker-controlled code on rseq abort. * * The instruction pattern in the A32 instruction set is: * * e7f5def3 udf #24035 ; 0x5de3 * * This translates to the following instruction pattern in the T16 instruction * set: * * little endian: * def3 udf #243 ; 0xf3 * e7f5 b.n <7f5> * * - ARMv6+ big endian: * * ARMv6+ -mbig-endian generates mixed endianness code vs data: little-endian * code and big-endian data. The data value of the signature needs to have its * byte order reversed to generate the trap instruction: * * Data: 0xf3def5e7 * * Translates to this A32 instruction pattern: * * e7f5def3 udf #24035 ; 0x5de3 * * Translates to this T16 instruction pattern: * * def3 udf #243 ; 0xf3 * e7f5 b.n <7f5> * * - Prior to ARMv6 big endian: * * Prior to ARMv6, -mbig-endian generates big-endian code and data (which match), * so the endianness of the data representation of the signature should not be * reversed. However, the choice between BE32 and BE8 is done by the linker, * so we cannot know whether code and data endianness will be mixed before the * linker is invoked. So rather than try to play tricks with the linker, the rseq * signature is simply data (not a trap instruction) prior to ARMv6 on big endian. * This is why the signature is expressed as data (.word) rather than as instruction * (.inst) in assembler. */ #ifdef __ARMEB__ #define RSEQ_SIG 0xf3def5e7 /* udf #24035 ; 0x5de3 (ARMv6+) */ #else #define RSEQ_SIG 0xe7f5def3 /* udf #24035 ; 0x5de3 */ #endif > >> > That said, when you ran into .inst.n/.inst.w issues, did you try something >> > along the lines of the WASM() macro we use in arch/arm/, which adds the ".w" >> > suffix when targetting Thumb? >> >> AFAIU, the WASM macros depend on CONFIG_THUMB2_KERNEL, which may be fine within >> the kernel, but for user-space things are a bit more complex. >> >> A compile-unit can be compiled as thumb, which will set a compiler define >> which we could use to detect thumb mode. However, unfortunately, a single >> function can also be compiled with an attribute selecting thumb mode, which >> AFAIU does not influence the preprocessor defines. > > Thanks, I hadn't considered that case. I don't know the right way to handle > that in the toolchain, so using .word is probably the best bet in the > absence of any better suggestions from the tools folks. Emitting a no-op within an excluded section, and using the size of that no-op to restore the original mode is the best way I found, but I find it rather tricky and bug-prone, so I would rather prefer the .word approach. Thoughts ? Thanks, Mathieu -- Mathieu Desnoyers EfficiOS Inc. http://www.efficios.com