Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp696831pxb; Thu, 12 Nov 2020 14:06:36 -0800 (PST) X-Google-Smtp-Source: ABdhPJyM9tWY9NeXhjxKaFecCaBQeAzzpB2hoTq/Xe76CWtThVJvywDghLZArg754/bXfOLLBCs3 X-Received: by 2002:a17:907:c14:: with SMTP id ga20mr1402869ejc.526.1605218796440; Thu, 12 Nov 2020 14:06:36 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605218796; cv=none; d=google.com; s=arc-20160816; b=Ga28e86bwLsvhT5jOBY850hSOCkUGKDw7Fpzueoag/JjaFmxEv2FZLV3MAQjs5QqTn YNkqAxEJTuytHpeaTEvIp8PxnQB3zYuTaXatkKPh9IUyH9xOXCtBjuBP+Tkj9Lr8GazW c4TNxXAvzDoaEQQOQvtqInN1iMU2vnojnGoAVA2zAi5zerC3ZVW285wsbHUXmpvJN3vn gFi5eWBTIp0hJGQGt1/SlhYAtaLxkNqmzamAx0Z3hGzYNzNSAEzNVS480BhGjfHf0DDO B9lKYvP4nryTkK4lJTioE1Ct6rkBj2qyAccCDbGQ8MLu25ZQ0qQ5IESq2r5DX1ObR1p9 1ViQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=AudgYKUcGfPtQBohpp1I6SWMnu5MCAdE0VXvL1BuzyI=; b=zKeuTxIVXhNy3RmXNOTbEWlFsj4yZTdZ57if5sfLnvP8lsEOUInWcRSIDzs0z9KgUq Gg3J6kB+1MPtbmJoiWZfJce6QG6LDpyYtu4HirdYyzjUmi7QgzpgIYFo7oztIbpXKqoC HGT2Rx2tqYlAgxt64cee2l2budyXaSw1z5LFFeLztPE7frCpIN3dtnvfkt6FuGLj2BYF gbbcQIxcNCDHANDM6aaIoqS2Ci0zxR9/pxe89qFgbpbd5oSvV+mC7IJNddr7mDU/VYDt DFoc+vTleiFcysv9gH2MgFEYgnmH73UGzKNqjAVqIAr56WotHEhJNKWDd6A/W0oxpGsE Pg2Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=xsFIWfXb; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dp1si5123499ejc.167.2020.11.12.14.06.13; Thu, 12 Nov 2020 14:06:36 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=xsFIWfXb; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727799AbgKLWDo (ORCPT + 99 others); Thu, 12 Nov 2020 17:03:44 -0500 Received: from mail.kernel.org ([198.145.29.99]:52052 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727554AbgKLWDm (ORCPT ); Thu, 12 Nov 2020 17:03:42 -0500 Received: from suppilovahvero.lan (83-245-197-237.elisa-laajakaista.fi [83.245.197.237]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 7418822201; Thu, 12 Nov 2020 22:03:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1605218621; bh=lLJtR/mdQCowNqyjs2YNNv1DQVf9RP/EXQXZ1D9VcIk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=xsFIWfXbERY7UtUK5bJJT0cPArkrboG02Jj+9VztyFzI9XBLXjuLCTzuk1TY4kuXz 2dzae4rxXi/ImWvmzTV1qXB9dwRU8VrK/Sfe1jeqY53K+F9w52FkQ58+uu9XkNIZkW 2lkfMIau/4B4jdj/QbCn7nYw5YpKvOZwK9U08qEM= From: Jarkko Sakkinen To: x86@kernel.org, linux-sgx@vger.kernel.org Cc: linux-kernel@vger.kernel.org, Sean Christopherson , Andy Lutomirski , Jethro Beekman , Jarkko Sakkinen , akpm@linux-foundation.org, andriy.shevchenko@linux.intel.com, asapek@google.com, bp@alien8.de, cedric.xing@intel.com, chenalexchen@google.com, conradparker@google.com, cyhanish@google.com, dave.hansen@intel.com, haitao.huang@intel.com, kai.huang@intel.com, kai.svahn@intel.com, kmoy@google.com, ludloff@google.com, luto@kernel.org, nhorman@redhat.com, npmccallum@redhat.com, puiterwijk@redhat.com, rientjes@google.com, tglx@linutronix.de, yaozhangx@google.com, mikko.ylinen@intel.com Subject: [PATCH v41 18/24] x86/traps: Attempt to fixup exceptions in vDSO before signaling Date: Fri, 13 Nov 2020 00:01:29 +0200 Message-Id: <20201112220135.165028-19-jarkko@kernel.org> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20201112220135.165028-1-jarkko@kernel.org> References: <20201112220135.165028-1-jarkko@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Sean Christopherson vDSO functions can now leverage an exception fixup mechanism similar to kernel exception fixup. For vDSO exception fixup, the initial user is Intel's Software Guard Extensions (SGX), which will wrap the low-level transitions to/from the enclave, i.e. EENTER and ERESUME instructions, in a vDSO function and leverage fixup to intercept exceptions that would otherwise generate a signal. This allows the vDSO wrapper to return the fault information directly to its caller, obviating the need for SGX applications and libraries to juggle signal handlers. Attempt to fixup vDSO exceptions immediately prior to populating and sending signal information. Except for the delivery mechanism, an exception in a vDSO function should be treated like any other exception in userspace, e.g. any fault that is successfully handled by the kernel should not be directly visible to userspace. Although it's debatable whether or not all exceptions are of interest to enclaves, defer to the vDSO fixup to decide whether to do fixup or generate a signal. Future users of vDSO fixup, if there ever are any, will undoubtedly have different requirements than SGX enclaves, e.g. the fixup vs. signal logic can be made function specific if/when necessary. Suggested-by: Andy Lutomirski Acked-by: Jethro Beekman # v40 # Signed-off-by: Sean Christopherson Signed-off-by: Jarkko Sakkinen --- arch/x86/kernel/traps.c | 10 ++++++++++ arch/x86/mm/fault.c | 7 +++++++ 2 files changed, 17 insertions(+) diff --git a/arch/x86/kernel/traps.c b/arch/x86/kernel/traps.c index e1b78829d909..fb55981f2a0d 100644 --- a/arch/x86/kernel/traps.c +++ b/arch/x86/kernel/traps.c @@ -60,6 +60,7 @@ #include #include #include +#include #ifdef CONFIG_X86_64 #include @@ -117,6 +118,9 @@ do_trap_no_signal(struct task_struct *tsk, int trapnr, const char *str, tsk->thread.error_code = error_code; tsk->thread.trap_nr = trapnr; die(str, regs, error_code); + } else { + if (fixup_vdso_exception(regs, trapnr, error_code, 0)) + return 0; } /* @@ -550,6 +554,9 @@ DEFINE_IDTENTRY_ERRORCODE(exc_general_protection) tsk->thread.error_code = error_code; tsk->thread.trap_nr = X86_TRAP_GP; + if (fixup_vdso_exception(regs, X86_TRAP_GP, error_code, 0)) + return; + show_signal(tsk, SIGSEGV, "", desc, regs, error_code); force_sig(SIGSEGV); goto exit; @@ -1049,6 +1056,9 @@ static void math_error(struct pt_regs *regs, int trapnr) if (!si_code) goto exit; + if (fixup_vdso_exception(regs, trapnr, 0, 0)) + return; + force_sig_fault(SIGFPE, si_code, (void __user *)uprobe_get_trap_addr(regs)); exit: diff --git a/arch/x86/mm/fault.c b/arch/x86/mm/fault.c index 0161d4acf3ad..f1f1b5a0956a 100644 --- a/arch/x86/mm/fault.c +++ b/arch/x86/mm/fault.c @@ -30,6 +30,7 @@ #include /* exception stack */ #include /* VMALLOC_START, ... */ #include /* kvm_handle_async_pf */ +#include /* fixup_vdso_exception() */ #define CREATE_TRACE_POINTS #include @@ -814,6 +815,9 @@ __bad_area_nosemaphore(struct pt_regs *regs, unsigned long error_code, sanitize_error_code(address, &error_code); + if (fixup_vdso_exception(regs, X86_TRAP_PF, error_code, address)) + return; + if (likely(show_unhandled_signals)) show_signal_msg(regs, error_code, address, tsk); @@ -933,6 +937,9 @@ do_sigbus(struct pt_regs *regs, unsigned long error_code, unsigned long address, sanitize_error_code(address, &error_code); + if (fixup_vdso_exception(regs, X86_TRAP_PF, error_code, address)) + return; + set_signal_archinfo(address, error_code); #ifdef CONFIG_MEMORY_FAILURE -- 2.27.0