Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp4053061pxk; Tue, 29 Sep 2020 13:01:36 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy2/2lWEO1ASBVKzq5yUI4kljb7SLAKT2bT5qeyP77Lo0XIb8L70lXewS3xuPsXhqd6uXFJ X-Received: by 2002:a05:6402:1012:: with SMTP id c18mr5026751edu.77.1601409696095; Tue, 29 Sep 2020 13:01:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1601409696; cv=none; d=google.com; s=arc-20160816; b=cMsCXowrB93KMl+CZ5wpuhbg3oRIlcWOoh/JoqENajMebGuEqR1iztBrlHUvSYN3RL DcospyxJCzBDgMpCKcceWqHEL9WIBlG2zKWaoztBRzljjK52tRnqf0n/dcziO1keGyC7 2Y4j6qcUZVqjfxIjonVNjGSOTlPxpSrPPSh0MKd1eCikl0sZhAApp8jR6BfVQPhFVmbS HAHk1m5rwBgT1I8ltcwVmuwQqjNEh1GnMSF1W6gZ5sqtej55P/faSGK9EJvyYnBLllNd mziPN+5+jQcBDYDIALOL5u9asmRUKEmKcCyWRPvIVCMTRueggWE32nOdcVpu3vzdJ/UE BY6w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=A1RxwE6EMmPttsbjQNQJqtJeeG5w/FcmpV2fZrotK1U=; b=Aq/WcejQEPfRmj0RG76EOmMVkHQoSr5ki67MCEF8kQAmJi0BByj/UNbDha2zV1SNmy eCZAnX/OuJ+5wf06Er21m4g/R15YjAqJJZuo7ZhZ7/xq9to7c71E/2PH9wKLbpFEgwUj Jt9fjHfT6aF0eXmblDs7no6H/bcEJkPS9AShVI55sI+LYw6xChxXjsHcpZeYU4pDfuhS dPUbZzhCPKe/ABcS3O4DrxQoAVgNix65J0wrLvVLTCV/9xhW3TvtAYDO/sCMjBwexrB9 r8NttnAXufn1Fomf4mSjZi+qRjwGCJqOHh+ZepjFJF2DwYxX1Xfxdmgw5b58hpAMuwe6 1SqA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=vGZY5Xah; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e18si3602111edy.386.2020.09.29.13.01.12; Tue, 29 Sep 2020 13:01:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=vGZY5Xah; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728761AbgI2T5s (ORCPT + 99 others); Tue, 29 Sep 2020 15:57:48 -0400 Received: from mail.kernel.org ([198.145.29.99]:49780 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727740AbgI2T5r (ORCPT ); Tue, 29 Sep 2020 15:57:47 -0400 Received: from mail-wr1-f41.google.com (mail-wr1-f41.google.com [209.85.221.41]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id DBAF32083B for ; Tue, 29 Sep 2020 19:57:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1601409466; bh=Qwu5PoL63lD9i/Fv1xhrZCI4FoJQXvwA0rtPHDOgnU8=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=vGZY5XahMr5R+WKF6EfFh1JVk4HZVMZzR7QS4bPnpAPvPTX+f+smn0YBpAU5zlTPX 3J/GZNFCqc4hBT0ImF3z/Ea3WX29Vxa6HXJL7k6fj55kMIbrw2h1jBjMjbY+z9JIH/ Rl1zj4dQALVQuxsfJSKNbi23Qp6NHVHNk+eXKAfI= Received: by mail-wr1-f41.google.com with SMTP id x14so6775900wrl.12 for ; Tue, 29 Sep 2020 12:57:45 -0700 (PDT) X-Gm-Message-State: AOAM5327+OWi2baAabEtMdK6pUbdHq42LuUjNDS61j8dsjnfha9OuW29 9nQDvdH1ZaftpSbpFdieRsMogN8rwqfhKlBd9iz3vQ== X-Received: by 2002:adf:a3c3:: with SMTP id m3mr6065511wrb.70.1601409464264; Tue, 29 Sep 2020 12:57:44 -0700 (PDT) MIME-Version: 1.0 References: <99B32E59-CFF2-4756-89BD-AEA0021F355F@amacapital.net> In-Reply-To: From: Andy Lutomirski Date: Tue, 29 Sep 2020 12:57:32 -0700 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH v13 8/8] x86/vsyscall/64: Fixup Shadow Stack and Indirect Branch Tracking for vsyscall emulation To: "Yu, Yu-cheng" Cc: Andy Lutomirski , X86 ML , "H. Peter Anvin" , Thomas Gleixner , Ingo Molnar , LKML , "open list:DOCUMENTATION" , Linux-MM , linux-arch , Linux API , Arnd Bergmann , Balbir Singh , Borislav Petkov , Cyrill Gorcunov , Dave Hansen , Eugene Syromiatnikov , Florian Weimer , "H.J. Lu" , Jann Horn , Jonathan Corbet , Kees Cook , Mike Kravetz , Nadav Amit , Oleg Nesterov , Pavel Machek , Peter Zijlstra , Randy Dunlap , "Ravi V. Shankar" , Vedvyas Shanbhogue , Dave Martin , Weijiang Yang , Pengfei Xu Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Sep 29, 2020 at 11:37 AM Yu, Yu-cheng wrote: > > On 9/28/2020 10:37 AM, Andy Lutomirski wrote: > > On Mon, Sep 28, 2020 at 9:59 AM Yu-cheng Yu wrote: > >> > >> On Fri, 2020-09-25 at 09:51 -0700, Andy Lutomirski wrote: > >>>> On Sep 25, 2020, at 9:48 AM, Yu, Yu-cheng wrote: > >> + > >> + cet = get_xsave_addr(&fpu->state.xsave, XFEATURE_CET_USER); > >> + if (!cet) { > >> + /* > >> + * This is an unlikely case where the task is > >> + * CET-enabled, but CET xstate is in INIT. > >> + */ > >> + WARN_ONCE(1, "CET is enabled, but no xstates"); > > > > "unlikely" doesn't really cover this. > > > >> + fpregs_unlock(); > >> + goto sigsegv; > >> + } > >> + > >> + if (cet->user_ssp && ((cet->user_ssp + 8) < TASK_SIZE_MAX)) > >> + cet->user_ssp += 8; > > > > This looks buggy. The condition should be "if SHSTK is on, then add 8 > > to user_ssp". If the result is noncanonical, then some appropriate > > exception should be generated, probably by the FPU restore code -- see > > below. You should be checking the SHSTK_EN bit, not SSP. > > Updated. Is this OK? I will resend the whole series later. > > Thanks, > Yu-cheng > > ====== > > From 09803e66dca38d7784e32687d0693550948199ed Mon Sep 17 00:00:00 2001 > From: Yu-cheng Yu > Date: Thu, 29 Nov 2018 14:15:38 -0800 > Subject: [PATCH v13 8/8] x86/vsyscall/64: Fixup Shadow Stack and > Indirect Branch > Tracking for vsyscall emulation > > Vsyscall entry points are effectively branch targets. Mark them with > ENDBR64 opcodes. When emulating the RET instruction, unwind shadow stack > and reset IBT state machine. > > Signed-off-by: Yu-cheng Yu > --- > v13: > - Check shadow stack address is canonical. > - Change from writing to MSRs to writing to CET xstate. > > arch/x86/entry/vsyscall/vsyscall_64.c | 34 +++++++++++++++++++++++ > arch/x86/entry/vsyscall/vsyscall_emu_64.S | 9 ++++++ > arch/x86/entry/vsyscall/vsyscall_trace.h | 1 + > 3 files changed, 44 insertions(+) > > diff --git a/arch/x86/entry/vsyscall/vsyscall_64.c > b/arch/x86/entry/vsyscall/vsyscall_64.c > index 44c33103a955..30b166091d46 100644 > --- a/arch/x86/entry/vsyscall/vsyscall_64.c > +++ b/arch/x86/entry/vsyscall/vsyscall_64.c > @@ -38,6 +38,9 @@ > #include > #include > #include > +#include > +#include > +#include > > #define CREATE_TRACE_POINTS > #include "vsyscall_trace.h" > @@ -286,6 +289,44 @@ bool emulate_vsyscall(unsigned long error_code, > /* Emulate a ret instruction. */ > regs->ip = caller; > regs->sp += 8; > + > +#ifdef CONFIG_X86_CET > + if (tsk->thread.cet.shstk_size || tsk->thread.cet.ibt_enabled) { > + struct cet_user_state *cet; > + struct fpu *fpu; > + > + fpu = &tsk->thread.fpu; > + fpregs_lock(); > + > + if (!test_thread_flag(TIF_NEED_FPU_LOAD)) { > + copy_fpregs_to_fpstate(fpu); > + set_thread_flag(TIF_NEED_FPU_LOAD); > + } > + > + cet = get_xsave_addr(&fpu->state.xsave, XFEATURE_CET_USER); > + if (!cet) { > + /* > + * This should not happen. The task is > + * CET-enabled, but CET xstate is in INIT. > + */ Can the comment explain better, please? I would say something like: If the kernel thinks this task has CET enabled (because tsk->thread.cet has one of the features enabled), then the corresponding bits must also be set in the CET XSAVES region. If the CET XSAVES region is in the INIT state, then the kernel's concept of the task's CET state is corrupt. > + WARN_ONCE(1, "CET is enabled, but no xstates"); > + fpregs_unlock(); > + goto sigsegv; > + } > + > + if (cet->user_cet & CET_SHSTK_EN) { > + if (cet->user_ssp && (cet->user_ssp + 8 < TASK_SIZE_MAX)) > + cet->user_ssp += 8; > + } This makes so sense to me. Also, the vsyscall emulation code is intended to be as rigid as possible to minimize the chance that it gets used as an exploit gadget. So we should not silently corrupt anything. Moreover, this code seems quite dangerous -- you've created a gadget that does RET without actually verifying the SHSTK token. If SHSTK and some form of strong indirect branch/call CFI is in use, then the existance of a CFI-bypassing return primitive at a fixed address seems quite problematic. So I think you need to write a function that reasonably accurately emulates a usermode RET. --Andy