Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp4182230ybx; Mon, 4 Nov 2019 09:06:11 -0800 (PST) X-Google-Smtp-Source: APXvYqwKVFhT5X3as2TZNEhUsoG1NIwy1NgOXRArXKzH621bg4FzN6sfx+aNFc23XGlH2IPQHrWJ X-Received: by 2002:aa7:d6cf:: with SMTP id x15mr12665373edr.202.1572887171099; Mon, 04 Nov 2019 09:06:11 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1572887171; cv=none; d=google.com; s=arc-20160816; b=ex+ulVKyQb1R8ucph8qFWfVWw2Dy7J/KQ9mzPS+G7YHNoIKnD86g7Y/nUWySlNueX5 Qc/E48P5pqHm8saLr2iwFPs+Y4SdohrMtfFoOrf0pKQMUTLE/hWFC1DCQU/oLC6zvtBS hqOGJjMpuOxHbeJkCHvfPRmA8V6RRI0hzg2RUvc8mVKOSWxZX9OUX4QzZfhmVjf6anWl N5zRXgGhHNkWSJHrjs+K7/pu50GEU/vBKyojDxaS7EpvhVUuya5a2fBVCHxSHn+1UYqx W8EPTVU3FPG6vXrNSY4BjMYgHU+LiTspHDHwSG3FoiXywn7xfduFGtnE31B3Z/H9QBrH byvQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=tiPrt8SBOMotsbG4SwZyt72R7yCiKHlT0JU9Tga6ug4=; b=kN7op5SMqGy+/aaXw1axUmOSR7IP//amlBFk7yNc45sr5yAsjFOqul/7qIczEbYhUn sXAe6eqFHdHsqMBNdzHXOxBxvt+M75vO5hP9PExBNXyQo0eXz+4ATU/qd9gZHHJcO4rX H1bbrs64gSPhM4RsHv7VGxtkWi44s6Ed+S3FmmpKw/LKrXsdZMKSMdAIlD8oBMlVYNOP +q5Cly3lasGm95bhZ3g8oWc8eR1F7Ne5aUPQFEK3MnTY5RT/y1K3zair3WCFJoGyyjac /glTitFU60dj+QeoGZ2xbPt0GjKoDnKtQgUVaySyG8FifxDE9qsgcPntu+oj51g7SbQu pRiw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id dc16si4744724ejb.192.2019.11.04.09.05.45; Mon, 04 Nov 2019 09:06:11 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728322AbfKDRFD (ORCPT + 99 others); Mon, 4 Nov 2019 12:05:03 -0500 Received: from foss.arm.com ([217.140.110.172]:47476 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727861AbfKDRFD (ORCPT ); Mon, 4 Nov 2019 12:05:03 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 9992D1F1; Mon, 4 Nov 2019 09:05:02 -0800 (PST) Received: from lakrids.cambridge.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.121.207.14]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 605073F71A; Mon, 4 Nov 2019 09:05:00 -0800 (PST) Date: Mon, 4 Nov 2019 17:04:54 +0000 From: Mark Rutland To: Sami Tolvanen Cc: Will Deacon , Catalin Marinas , Steven Rostedt , Masami Hiramatsu , Ard Biesheuvel , Dave Martin , Kees Cook , Laura Abbott , Marc Zyngier , Nick Desaulniers , Jann Horn , Miguel Ojeda , Masahiro Yamada , clang-built-linux@googlegroups.com, kernel-hardening@lists.openwall.com, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v4 10/17] arm64: disable kretprobes with SCS Message-ID: <20191104170454.GA2024@lakrids.cambridge.arm.com> References: <20191018161033.261971-1-samitolvanen@google.com> <20191101221150.116536-1-samitolvanen@google.com> <20191101221150.116536-11-samitolvanen@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20191101221150.116536-11-samitolvanen@google.com> User-Agent: Mutt/1.11.1+11 (2f07cb52) (2018-12-01) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Nov 01, 2019 at 03:11:43PM -0700, Sami Tolvanen wrote: > With CONFIG_KRETPROBES, function return addresses are modified to > redirect control flow to kretprobe_trampoline. This is incompatible > with SCS. I'm a bit confused as to why that's the case -- could you please elaborate on how this is incompatible? IIUC kretrobes works by patching the function entry point with a BRK, so that it can modify the LR _before_ it is saved to the stack. I don't see how SCS affects that. When the instrumented function returns, it'll balance its SCS state, then "return" to kretprobe_trampoline. Since kretprobe_trampoline is plain assembly, it doesn't have SCS, and can modify the LR live, as it does. So functionally, that appears to work. What am I missing? Thanks, Mark. > Signed-off-by: Sami Tolvanen > Reviewed-by: Kees Cook > --- > arch/arm64/Kconfig | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/arch/arm64/Kconfig b/arch/arm64/Kconfig > index 3f047afb982c..e7b57a8a5531 100644 > --- a/arch/arm64/Kconfig > +++ b/arch/arm64/Kconfig > @@ -165,7 +165,7 @@ config ARM64 > select HAVE_STACKPROTECTOR > select HAVE_SYSCALL_TRACEPOINTS > select HAVE_KPROBES > - select HAVE_KRETPROBES > + select HAVE_KRETPROBES if !SHADOW_CALL_STACK > select HAVE_GENERIC_VDSO > select IOMMU_DMA if IOMMU_SUPPORT > select IRQ_DOMAIN > -- > 2.24.0.rc1.363.gb1bccd3e3d-goog >