Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp1017357ybx; Fri, 1 Nov 2019 15:14:20 -0700 (PDT) X-Google-Smtp-Source: APXvYqzpgK+FH80GLakZY7+5htYfB9lYeoJUSr1vR4q9vZo5lkIVxZc198Ir8pOmdvZ2icmiq58c X-Received: by 2002:aa7:d709:: with SMTP id t9mr13881673edq.266.1572646460230; Fri, 01 Nov 2019 15:14:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572646460; cv=none; d=google.com; s=arc-20160816; b=ic3JRrq0tiqUBsEXYw7955pINEorUMl2rpfsUbCr3tkKPJYuL8dKEok9egwwUijwRy x5b4hSJrxeu/yiad97ymLK0gue1RIl9AFt94ML3WSi94QSalFW74enn7H3DKUYZGWFym 3Z44T3wpsW38tM0H1XwgTqVU/9Hza63MsGGoZr5gt/nR5DPd7HkJywM+f5cwJQcnth2+ WiKguTHgrIXJ9VST4YCBoPfmB7QmdYxO1mqzp6dikgEEgPhDaRGZcFnVAAkIr70XI6gN V4vOQY6VhePMeJ5PTE1sGZPELnKEtT/4V/8nD6Se0dSA3SmeU2ImI4s59HNcvri7ljvz 1r/g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:from:subject:references :mime-version:message-id:in-reply-to:date:dkim-signature; bh=uZ/kQt4EYM2LvpfCusnWoxftHyD2DxgcHTICv7X7dqw=; b=XWaJZ3uiVxJWh0vaw4yciXyFYuJBjV0mQ+ZZX9Uh/bYUbrfrVtW2/6O9cB0NWjfhD1 2VfR8B7irIzNt+TZJ8HrOgISXJKumMOYB9d7Ewh4zU97EcBSbhOfkGJLm3zZFWsee+7M OBOWFmjuCbD0BpCSAvhZhsl8lGSv+S1FTGqg0sFwrjvWJKasPAYtrZXw/2CemypbwW4F 5Uono7mI4S+jSxjufs3zo+1brs7+F+6w/QOG7XygfR2t09se//7EwVvg2J3atc7QgzlE 7YTx3TRgESSIBcTfDxiKt+KvQ3KgVIKkVd7GgcopKFxPnaCwrfg5yLFPHVRV9mI5u7dX bHzg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=odv3zPa4; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b10si1295235eda.160.2019.11.01.15.13.57; Fri, 01 Nov 2019 15:14:20 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=odv3zPa4; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728041AbfKAWMg (ORCPT + 99 others); Fri, 1 Nov 2019 18:12:36 -0400 Received: from mail-pg1-f201.google.com ([209.85.215.201]:34362 "EHLO mail-pg1-f201.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727984AbfKAWMd (ORCPT ); Fri, 1 Nov 2019 18:12:33 -0400 Received: by mail-pg1-f201.google.com with SMTP id w9so8024093pgl.1 for ; Fri, 01 Nov 2019 15:12:32 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:in-reply-to:message-id:mime-version:references:subject:from:to :cc; bh=uZ/kQt4EYM2LvpfCusnWoxftHyD2DxgcHTICv7X7dqw=; b=odv3zPa4RgQ8s6dsoDxvbsmHF3EENGYKEFkki0g9WgsTtiUy1PWOo4QagxAFwNjlM5 UaXo+6ESXS0tfN9t/uaTyImKPgoUdkbU5/6mXIU+WDuhuaMZVZlToQjZBZjUeJ+XCKaN AZaYtQv4cn3jcrlvgSVPiMAL2aX2o/kWtvg0ZhsbFx5XNHfG27Zn+lw1m2rgEzTuN0Qx AhXuI7DUwTtXfZmNooQs1nB+s/Ns/DX1LvGMoiAbd56F3AJ+mJtqGL8w4imrJ9czieHh o3BNgiNlRATQnbvYsOjBOz35StnAU9Usdu1hP8mnieHo1tIou+WOWs5WVmR96RMvFpMw BkXA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:in-reply-to:message-id:mime-version :references:subject:from:to:cc; bh=uZ/kQt4EYM2LvpfCusnWoxftHyD2DxgcHTICv7X7dqw=; b=JRsd1OoxwUo2NzT14V0OYPf6AAV4+UFk1SwrcaLYnLwKMw2LN/hXm6etAP0F+0zisR /gdZPPeNHrhaDqgL6QiteQRigpYKO7LNKJ9vvu6sQgZoVtD4uspI5RxjxjNKrd4CfMNx ZkH9qkD1dV1KAFosF9Yzh2MIvvc9CQPdNUid4o0agEfJvtvJQjyXMDfQVjxI5NIRKLym qth/dTi4MUv/85gPo5ABjIZVrB+EjKyBI0aS7xidPpmGUaFqNSP9RX2c0JLGcPz/JWph cEUGaBoPUM2BNJhr6Ofpf5WvacBK8/o/m7EN6iNm0Y11pZONGBajWv1xkuZT0cZ7song 3YTQ== X-Gm-Message-State: APjAAAXZP1VxjRLknhlWQ+bJcPdY0fLYaz1f7yEPFwr0bxx1/+oozgTo yc6yxwbBVX5Px9d2x62+Cu8n0/BZmhu6qEnaq+w= X-Received: by 2002:a63:3203:: with SMTP id y3mr15810585pgy.437.1572646351983; Fri, 01 Nov 2019 15:12:31 -0700 (PDT) Date: Fri, 1 Nov 2019 15:11:47 -0700 In-Reply-To: <20191101221150.116536-1-samitolvanen@google.com> Message-Id: <20191101221150.116536-15-samitolvanen@google.com> Mime-Version: 1.0 References: <20191018161033.261971-1-samitolvanen@google.com> <20191101221150.116536-1-samitolvanen@google.com> X-Mailer: git-send-email 2.24.0.rc1.363.gb1bccd3e3d-goog Subject: [PATCH v4 14/17] arm64: efi: restore x18 if it was corrupted From: Sami Tolvanen To: Will Deacon , Catalin Marinas , Steven Rostedt , Masami Hiramatsu , Ard Biesheuvel Cc: Dave Martin , Kees Cook , Laura Abbott , Mark Rutland , Marc Zyngier , Nick Desaulniers , Jann Horn , Miguel Ojeda , Masahiro Yamada , clang-built-linux@googlegroups.com, kernel-hardening@lists.openwall.com, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, Sami Tolvanen Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org If we detect a corrupted x18 and SCS is enabled, restore the register before jumping back to instrumented code. This is safe, because the wrapper is called with preemption disabled and a separate shadow stack is used for interrupt handling. Signed-off-by: Sami Tolvanen Reviewed-by: Kees Cook --- arch/arm64/kernel/efi-rt-wrapper.S | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/arch/arm64/kernel/efi-rt-wrapper.S b/arch/arm64/kernel/efi-rt-wrapper.S index 3fc71106cb2b..945744f16086 100644 --- a/arch/arm64/kernel/efi-rt-wrapper.S +++ b/arch/arm64/kernel/efi-rt-wrapper.S @@ -34,5 +34,10 @@ ENTRY(__efi_rt_asm_wrapper) ldp x29, x30, [sp], #32 b.ne 0f ret -0: b efi_handle_corrupted_x18 // tail call +0: +#ifdef CONFIG_SHADOW_CALL_STACK + /* Restore x18 before returning to instrumented code. */ + mov x18, x2 +#endif + b efi_handle_corrupted_x18 // tail call ENDPROC(__efi_rt_asm_wrapper) -- 2.24.0.rc1.363.gb1bccd3e3d-goog