Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp7507467pxb; Thu, 18 Feb 2021 11:55:49 -0800 (PST) X-Google-Smtp-Source: ABdhPJxWCoC6GASFzBJyRbaWi1DvEdH7FHBu14C+gnFqLB5xhe8d1f7f4JfSe9inZ67hIFVRu7kz X-Received: by 2002:a17:906:b082:: with SMTP id x2mr5433520ejy.100.1613678149503; Thu, 18 Feb 2021 11:55:49 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1613678149; cv=none; d=google.com; s=arc-20160816; b=dw99ybye01nncjc7kPOX8eB2pd0lgSqNaBzB0vcxNATumyf3j14Z45Qi7ClcoBZ7RZ Lmjrxe2y72OHlUJGzco3NXDp8F9UjTuQNMojmtbgvIs5RvfBMlmNzoY+viWF/y72RJN6 sV7d6aIMDw9ak1cxbAzGXDOpAi6RHOK7hHYCxRuKY7ZvKJrk3zoGp6BHSLUdoSLkgxNs Xmc+6/Z2v5ZY9C3LVcMWuyxVwSucuYBwoJzYjwhfJNP2/yDZ4JXfWZt/m2zywgNydE0+ eyFZExGq5hDe+gTzavdBrO6IRUTER+E4ZAXoBbMIRiz7GI5TLvD0xLBMWIiIuhhlODnb rA+A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=uLppn3cLc1jFekiPh7D0/rRpmHjyzZb2ccC/YWlG5EM=; b=ny+ekgjkYktxXtfXkSC4tuudHrsYMpv5pPmGPkc31cobBNRNGSPMBWBMUQ/30jpw4B 1Cc+/ahDsaKxtr38tIBq+7PUQBXTqcC0YQntkUI3qm5A/iR57tIaKExLOaVGeAFbBest F2rDbA4L3w0eDYgSPKs5fZPHOQr6VHNhGZxPtIbulLmWQWS/nXfGXi2MBpr5DHk26Pa9 dWdfvhHcTs4Y7cuzUzajjucE8IbQKASd4+c05lShiNIGdBhp5lj5qTmUfGN3hbS0RXao c5q3JRE+gmeBVaI958NbN0sdrnYejxtjcdPPNVFEP2Uq9xbPS1UqX5ewl3p1cUaJbCDr VhBQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w5si5272308edv.513.2021.02.18.11.55.25; Thu, 18 Feb 2021 11:55:49 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231380AbhBRTwL (ORCPT + 99 others); Thu, 18 Feb 2021 14:52:11 -0500 Received: from mx2.suse.de ([195.135.220.15]:48290 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230169AbhBRTWB (ORCPT ); Thu, 18 Feb 2021 14:22:01 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id AC386AED2; Thu, 18 Feb 2021 19:21:19 +0000 (UTC) Date: Thu, 18 Feb 2021 20:21:17 +0100 From: Joerg Roedel To: Andy Lutomirski Cc: Joerg Roedel , X86 ML , stable , "H. Peter Anvin" , Dave Hansen , Peter Zijlstra , Jiri Slaby , Dan Williams , Tom Lendacky , Juergen Gross , Kees Cook , David Rientjes , Cfir Cohen , Erdem Aktas , Masami Hiramatsu , Mike Stunes , Sean Christopherson , Martin Radev , Arvind Sankar , LKML , kvm list , Linux Virtualization Subject: Re: [PATCH 2/3] x86/sev-es: Check if regs->sp is trusted before adjusting #VC IST stack Message-ID: <20210218192117.GL12716@suse.de> References: <20210217120143.6106-1-joro@8bytes.org> <20210217120143.6106-3-joro@8bytes.org> <20210218112500.GH7302@8bytes.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Feb 18, 2021 at 09:49:06AM -0800, Andy Lutomirski wrote: > I don't understand what this means. The whole entry mechanism on x86 > is structured so that we call a C function *and return from that C > function without longjmp-like magic* with the sole exception of > unwind_stack_do_exit(). This means that you can match up enters and > exits, and that unwind_stack_do_exit() needs to unwind correctly. In > the former case, it's normal C and we can use normal local variables. > In the latter case, we know exactly what state we're trying to restore > and we can restore it directly without any linked lists or similar. Okay, the unwinder will likely get confused by this logic. > What do you have in mind that requires a linked list? Cases when there are multiple IST vectors besides NMI that can hit while the #VC handler is still on its own IST stack. #MCE comes to mind, but that is broken anyway. At some point #VC itself will be one of them, but when that happens the code will kill the machine. This leaves #HV in the list, and I am not sure how that is going to be handled yet. I think the goal is that the #HV handler is not allowed to cause any #VC exception. In that case the linked-list logic will not be needed. > > I don't see how this would break, can you elaborate? > > > > What I think happens is: > > > > SYSCALL gap (RSP is from userspace and untrusted) > > > > -> #VC - Handler on #VC IST stack detects that it interrupted > > the SYSCALL gap and switches to the task stack. > > > > Can you point me to exactly what code you're referring to? I spent a > while digging through the code and macro tangle and I can't find this. See the entry code in arch/x86/entry/entry_64.S, macro idtentry_vc. It creates the assembly code for the handler. At some point it calls vc_switch_off_ist(), which is a C function in arch/x86/kernel/traps.c. This function tries to find a new stack for the #VC handler. The first thing it does is checking whether the exception came from the SYSCALL gap and just uses the task stack in that case. Then it will check for other kernel stacks which are safe to switch to. If that fails it uses the fall-back stack (VC2), which will direct the handler to a separate function which, for now, just calls panic(). Not safe are the entry or unknown stacks. The function then copies pt_regs and returns the new stack pointer to assembly code, which then writes it to %RSP. > Unless AMD is more magic than I realize, the MOV SS bug^Wfeature means > that #DB is *not* always called in safe places. You are right, forgot about this. The MOV SS bug can very well trigger a #VC(#DB) exception from the syscall gap. > > And with SNP we need to be able to at least detect a malicious HV so we > > can reliably kill the guest. Otherwise the HV could potentially take > > control over the guest's execution flow and make it reveal its secrets. > > True. But is the rest of the machinery to be secure against EFLAGS.IF > violations and such in place yet? Not sure what you mean by EFLAGS.IF violations, probably enabling IRQs while in the #VC handler? The #VC handler _must_ _not_ enable IRQs anywhere in its call-path. If that ever happens it is a bug. Regards, Joerg