Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp2696380pxb; Sun, 24 Jan 2021 17:16:40 -0800 (PST) X-Google-Smtp-Source: ABdhPJwaEDtUuiOCDNLwpErLz5xK7WZF6Xxw0X8/5cJavuttR4uDffo+FB3zI6GJz8viBbEPPvGr X-Received: by 2002:a05:6402:c9c:: with SMTP id cm28mr2986020edb.281.1611537400621; Sun, 24 Jan 2021 17:16:40 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1611537400; cv=none; d=google.com; s=arc-20160816; b=0R7SZZmbgDiQGjBJ6TghMLLy5zAnxp0CUIs0xd05kRm/pypjcp6e5I8Nwr4lLQEb63 st5Fk93FN1xLhK3zns3+OgjZQYPk9OqKxE9YIVjA2KhZh0+puZRJbuXGG8bvJ3GoNW74 KEFAgquORCXXDXnW2wnnl7WZUwHBP6hY2gB/S7K2YuDgQPGfhvTmkUbn4scdILwSR8jJ apKrIUuN589hOdETohWix6HWEY+a6YLZiloK3UGb18prlg6qe4CmI2OCXIM/ChLSHfmu EN8SUrVKMcduW1gS4dOtnCDSEtZ1zkfdjFjTmPz+kUqeAk9tYnqDLw6wU197lS9M3GcY yNoA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=kpR+LcqUG8WrnRhBIsNcli5gcV2dsTTenYMD+YFbDe4=; b=H0WjLuWJKqQGnL9S5bhUmKThyPvsYEnl8UzZdqWh7fwpC1FoGnGq1L9EfNXI5vXmp4 p6B8H09OJDuw/7KePsxyC/3es+Vxfn6u8hU4o+bTxZPA05eOjHXUEeLyj43/jgiQZarM gqxLYtuQCXFVlj0WsGnnaUT7h0G5G/HQptjkKmY2oTNRSlFfghla/mDCnMkG581wqz2j M3jTXOEo2wq/hOgZ/L5/lM7bzFMPDE1Yp4MhLLAJtmFd+12SuSYSlyaAkY+1TF7+ESuA 61jg1iklcFzGj5fx1lT0Hxf3A6YhQXHZmfxuR+rCWu1Dl2stT4WuMAo7f/FeXaaFcGq3 8Kfg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=oeHsQIH+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z1si6760514edp.150.2021.01.24.17.16.17; Sun, 24 Jan 2021 17:16:40 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=oeHsQIH+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726480AbhAYBOp (ORCPT + 99 others); Sun, 24 Jan 2021 20:14:45 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43794 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726370AbhAYBOe (ORCPT ); Sun, 24 Jan 2021 20:14:34 -0500 Received: from mail-pj1-x1031.google.com (mail-pj1-x1031.google.com [IPv6:2607:f8b0:4864:20::1031]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F2C3BC061574 for ; Sun, 24 Jan 2021 17:13:53 -0800 (PST) Received: by mail-pj1-x1031.google.com with SMTP id a20so4379060pjs.1 for ; Sun, 24 Jan 2021 17:13:53 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=kpR+LcqUG8WrnRhBIsNcli5gcV2dsTTenYMD+YFbDe4=; b=oeHsQIH+A/HOjIZkjTsKNuieUwtVwvKpJxOB8v2Krv8lA2Adpfzp4XGLMS/lE1KsqB Qji4pW/MIpGhUAySJwtv36LPpJkFN+nkuAeoekirNYD1+wTZss+UrDcoA512H/mRpTNJ qWh/rZcgmHPvUqmtt07hxIaJR8fmKApBCgAeP5pp+M+QfYzniw/TMDEK5qhxwVtrs1b+ tYM5F/Tjn0Lzm9HWbkWgObcblKbNzdzZoGWSz3iasNGYsSLeyHgZIZPu74RNkeya4IBf vzKH0MKjBl5azhhZzdvHa1tRAyEN7Eq3EFQuk2QS/4dtGqbZvByvSZWV5liZP/oF7PdF Dajw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=kpR+LcqUG8WrnRhBIsNcli5gcV2dsTTenYMD+YFbDe4=; b=uFuhSBWdYnYqNUKI/qdopyUn9feKIV0jFzJo3sCFR0hG3CyVDWNHNo0OzGSc9wEQij m3ohJdg4zvknO/6H7zQr70KBSh86ZhglYXzbTdXQWUwFmJXvhadcKTz0owECBIERmQ1s QTl7KKOL7og1gnXuWo6K1X0pJAne6wyozvwJrfRSuFd00N//17OHZOJ9VVaA2kS/bdBf Rnxx6cbQaKm/1KQDhLxQt8kO2eJCjMQHbo8o18RhILrx1RXWrIWlgowQEbFOQb71h1Lg Js6QM8fGC7GcEsFysD1WCOKHBZ1+sMI6/4+asVD3b1W8uXEWqpbmXLVF7x9IkgI7u0rh /ikw== X-Gm-Message-State: AOAM532vHP7tvUDJnmC2L0shegz2SqZYwbbg0pOg10+qcDJx+kyd52Tm /XJBKM8vYv2SrV+dYdDc5nSh3v4fUTs= X-Received: by 2002:a17:90a:17c8:: with SMTP id q66mr18729740pja.167.1611537233337; Sun, 24 Jan 2021 17:13:53 -0800 (PST) Received: from localhost ([47.251.3.230]) by smtp.gmail.com with ESMTPSA id 21sm322762pfh.56.2021.01.24.17.13.52 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Sun, 24 Jan 2021 17:13:52 -0800 (PST) From: Lai Jiangshan To: linux-kernel@vger.kernel.org Cc: Steven Rostedt , Peter Zijlstra , Lai Jiangshan , Andy Lutomirski , Thomas Gleixner , Ingo Molnar , Borislav Petkov , x86@kernel.org, "H. Peter Anvin" Subject: [PATCH] x86/entry/64: De-Xen-ify our NMI code further Date: Mon, 25 Jan 2021 10:14:35 +0800 Message-Id: <20210125021435.16646-1-jiangshanlai@gmail.com> X-Mailer: git-send-email 2.19.1.6.gb485710b MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Lai Jiangshan The commit 929bacec21478("x86/entry/64: De-Xen-ify our NMI code") simplified the NMI code by changing paravirt code into native code and left a comment about "inspecting RIP instead". But until now, "inspecting RIP instead" has not been made happened and this patch tries to complete it. Signed-off-by: Lai Jiangshan --- arch/x86/entry/entry_64.S | 46 +++++++++++---------------------------- 1 file changed, 13 insertions(+), 33 deletions(-) diff --git a/arch/x86/entry/entry_64.S b/arch/x86/entry/entry_64.S index cad08703c4ad..cb6b8a6c6652 100644 --- a/arch/x86/entry/entry_64.S +++ b/arch/x86/entry/entry_64.S @@ -1268,32 +1268,12 @@ SYM_CODE_START(asm_exc_nmi) je nested_nmi /* - * Now test if the previous stack was an NMI stack. This covers - * the case where we interrupt an outer NMI after it clears - * "NMI executing" but before IRET. We need to be careful, though: - * there is one case in which RSP could point to the NMI stack - * despite there being no NMI active: naughty userspace controls - * RSP at the very beginning of the SYSCALL targets. We can - * pull a fast one on naughty userspace, though: we program - * SYSCALL to mask DF, so userspace cannot cause DF to be set - * if it controls the kernel's RSP. We set DF before we clear - * "NMI executing". + * Now test if we interrupt an outer NMI after it clears + * "NMI executing" but before iret. */ - lea 6*8(%rsp), %rdx - /* Compare the NMI stack (rdx) with the stack we came from (4*8(%rsp)) */ - cmpq %rdx, 4*8(%rsp) - /* If the stack pointer is above the NMI stack, this is a normal NMI */ - ja first_nmi - - subq $EXCEPTION_STKSZ, %rdx - cmpq %rdx, 4*8(%rsp) - /* If it is below the NMI stack, it is a normal NMI */ - jb first_nmi - - /* Ah, it is within the NMI stack. */ - - testb $(X86_EFLAGS_DF >> 8), (3*8 + 1)(%rsp) - jz first_nmi /* RSP was user controlled. */ + movq $nmi_executing_cleared, %rdx + cmpq 8(%rsp), %rdx + jne first_nmi /* This is a nested NMI. */ @@ -1438,16 +1418,16 @@ nmi_restore: addq $6*8, %rsp /* - * Clear "NMI executing". Set DF first so that we can easily - * distinguish the remaining code between here and IRET from - * the SYSCALL entry and exit paths. - * - * We arguably should just inspect RIP instead, but I (Andy) wrote - * this code when I had the misapprehension that Xen PV supported - * NMIs, and Xen PV would break that approach. + * Clear "NMI executing". It also leaves a window after it before + * iret which should be also considered to be "NMI executing" albeit + * with "NMI executing" variable being zero. So we should also check + * the RIP after it when checking "NMI executing". See the code + * before nested_nmi. No code is allowed to be added to between + * clearing "NMI executing" and iret unless we check a larger window + * with a range of RIPs instead of currently a single-RIP window. */ - std movq $0, 5*8(%rsp) /* clear "NMI executing" */ +nmi_executing_cleared: /* * iretq reads the "iret" frame and exits the NMI stack in a -- 2.19.1.6.gb485710b