Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp1250907pxk; Fri, 25 Sep 2020 09:49:59 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxeTuyN99WUORvMiISfU2t+yyzLycv9SGU0W5UkJKM75659jNz3VY55ObTWClUv7h1813Bq X-Received: by 2002:a50:9355:: with SMTP id n21mr2210029eda.237.1601052599799; Fri, 25 Sep 2020 09:49:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1601052599; cv=none; d=google.com; s=arc-20160816; b=dezv3qV5woo5wcmcqB3Ba6Nb+pF+ntaTUH03P5r+BlNYJDfJrvcInR3jFLvMxYovok poLHD844U71UrkaE9/yMB4OpU74CaNaZWHlfe2z8ikIy74lQshU42kZcIDYw2kiKs+v9 4Yeyn/TqFFvTbA1Irpa7pWvYKAtA8LzxFpq2HtytHxypxWwCtaFUMGdP/XU5/8k2F+Me 1k1CKrlB8tuLdU9TLmP8PAm5QntAbFBn1J3MUgA0pmINwoN96RGhOabnrCKpZXQGn8UU q1m/6A56DRcMljGPc5wg23xm0lOp68TgJpa3SG80aAKcjS/1AXkZyGJ4IIbiukidOorZ GVpA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:ironport-sdr:ironport-sdr; bh=gA8p4Y6+QUxKpGebjMx5hFWiIztCNFduAg/azfSPAEM=; b=PJF4wp/Nk8LWtIoSCpaqM0X6uoECbLapq7rvTpyPj+YKknU3Tj1k4jfPV4axsfuGMj kFCTUHBeoFExV6f9Ycfjyi4/M4YRgTD5SXQ3XCOm3DlidYlWp/jp5o6tUlGSULLJ7DpP 0J73QygWFjL6fp0LZphlVM+xe46ga0ePUsXiGXpAthuqgScM9ka44oB98BAYyE7yLgWj kXBpBGclOdrC+VvE++L/iMl9qYzVkBYzCTGcc/n2xS5Wv5M2AnDVOUR4cCpOOsU+OXb7 l5bmSogydDij7gFWknbUEERaKjVhR6GQ9pWmRzNaSCfHCG6K4rpaTiSYQQnhqsDwQeuH H+AA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id cn3si2582277edb.282.2020.09.25.09.49.37; Fri, 25 Sep 2020 09:49:59 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729479AbgIYQsE (ORCPT + 99 others); Fri, 25 Sep 2020 12:48:04 -0400 Received: from mga01.intel.com ([192.55.52.88]:45354 "EHLO mga01.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727812AbgIYQsD (ORCPT ); Fri, 25 Sep 2020 12:48:03 -0400 IronPort-SDR: IGBJdcdLHK/rkTvqrCAOZsnNpD0AbG+qAZydLzSFxtMZ3JRqv4O1cTSfoG4DkkgOPDOYtWQwZG PS+qlJ59cpAA== X-IronPort-AV: E=McAfee;i="6000,8403,9755"; a="179657363" X-IronPort-AV: E=Sophos;i="5.77,302,1596524400"; d="scan'208";a="179657363" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 25 Sep 2020 09:48:02 -0700 IronPort-SDR: XbYr2jPVpT1Wf6fIuRpAKebBnup6ZoThBmfiO9H5MEW0vAntBNX4+b0Tc3QLEpvPIPzUkLk/qB wcEFkVXs16qQ== X-IronPort-AV: E=Sophos;i="5.77,302,1596524400"; d="scan'208";a="336806828" Received: from yyu32-mobl1.amr.corp.intel.com (HELO [10.213.161.229]) ([10.213.161.229]) by fmsmga004-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 25 Sep 2020 09:47:59 -0700 Subject: Re: [PATCH v13 8/8] x86/vsyscall/64: Fixup Shadow Stack and Indirect Branch Tracking for vsyscall emulation To: Andy Lutomirski Cc: X86 ML , "H. Peter Anvin" , Thomas Gleixner , Ingo Molnar , LKML , "open list:DOCUMENTATION" , Linux-MM , linux-arch , Linux API , Arnd Bergmann , Balbir Singh , Borislav Petkov , Cyrill Gorcunov , Dave Hansen , Eugene Syromiatnikov , Florian Weimer , "H.J. Lu" , Jann Horn , Jonathan Corbet , Kees Cook , Mike Kravetz , Nadav Amit , Oleg Nesterov , Pavel Machek , Peter Zijlstra , Randy Dunlap , "Ravi V. Shankar" , Vedvyas Shanbhogue , Dave Martin , Weijiang Yang , Pengfei Xu References: <20200925145804.5821-1-yu-cheng.yu@intel.com> <20200925145804.5821-9-yu-cheng.yu@intel.com> From: "Yu, Yu-cheng" Message-ID: Date: Fri, 25 Sep 2020 09:47:55 -0700 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:68.0) Gecko/20100101 Thunderbird/68.12.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 9/25/2020 9:31 AM, Andy Lutomirski wrote: > On Fri, Sep 25, 2020 at 7:58 AM Yu-cheng Yu wrote: >> [...] >> @@ -286,6 +289,37 @@ bool emulate_vsyscall(unsigned long error_code, >> /* Emulate a ret instruction. */ >> regs->ip = caller; >> regs->sp += 8; >> + >> +#ifdef CONFIG_X86_CET >> + if (tsk->thread.cet.shstk_size || tsk->thread.cet.ibt_enabled) { >> + struct cet_user_state *cet; >> + struct fpu *fpu; >> + >> + fpu = &tsk->thread.fpu; >> + fpregs_lock(); >> + >> + if (!test_thread_flag(TIF_NEED_FPU_LOAD)) { >> + copy_fpregs_to_fpstate(fpu); >> + set_thread_flag(TIF_NEED_FPU_LOAD); >> + } >> + >> + cet = get_xsave_addr(&fpu->state.xsave, XFEATURE_CET_USER); >> + if (!cet) { >> + fpregs_unlock(); >> + goto sigsegv; > > I *think* your patchset tries to keep cet.shstk_size and > cet.ibt_enabled in sync with the MSR, in which case it should be > impossible to get here, but a comment and a warning would be much > better than a random sigsegv. Yes, it should be impossible to get here. I will add a comment and a warning, but still do sigsegv. Should this happen, and the function return, the app gets a control-protection fault. Why not let it fail early? > > Shouldn't we have a get_xsave_addr_or_allocate() that will never > return NULL but instead will mark the state as in use and set up the > init state if the feature was previously not in use? > We already have a static __raw_xsave_addr(), which returns a pointer to the requested xstate. Maybe we can export __raw_xsave_addr(), if that is needed.