Received: by 2002:a05:6a10:17d3:0:0:0:0 with SMTP id hz19csp18957pxb; Fri, 9 Apr 2021 16:50:15 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxRgQuZ1AYGkyegYEcLI7dPaYFnRIoIQAFfXGR0sVpdvjELV8nmRmutijYknk6bIdCT4sZV X-Received: by 2002:aa7:df13:: with SMTP id c19mr19641858edy.370.1618012215514; Fri, 09 Apr 2021 16:50:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1618012215; cv=none; d=google.com; s=arc-20160816; b=RcAiplMcKFTk6awyjndaCYflb/3NHCK7VieDcHXCm5l0JbUjdTHwzcNTohtjq5ahlB Z11Wlo9rUZSIFburKlQyjzcYMpVh9G6zm+UFtj67gUA6m3+E7N4MEjNlWyJLBCzBoRu8 zfbcNXaYIb2rILJvFoA2thQOJmORhDTOEIfbGEwLfRO32wD57C/Q5OEQXgJtAmFOnKui xKGLmSzWOm7GaCwC75v+kYO0jLVG2eyqWIIpWgE5STHkgzaTRGKNcdv5KD4uMpWO85zx Tse5kD2Ke5kF9JAwqr6s2ADNv29uYE1bpsstnSerDApyV3XwzXeuq221+Op59kMbTlx6 ccTw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:ironport-sdr:ironport-sdr; bh=/GXz8MWWwOec+WMHhnuwk21jaScVxBs1+t7ZU7FGFhQ=; b=ql9vAZpWT85SM8wweoK+1hw0aVtT8ehWjV39aOXPwQrGIoBbA7Eb/QitE3P1G+Q7QD OXPjXzfZH9c6xbvkJAqeRZZsDtL9dVqCd48A6i7F2/y1Ua2ahjBZwLcQHVFLqDJ3itOT GqNO1moXDuW9IMPF2Dm5WPfPQSUT38qteJfNXR8stnxBcoqDMyOxlmoW5jXSREJUZdle 4zeMGjp+5wiRWNovNBUp4vtYN5Ppp1HLjOcyxz/D3O8sAGQEkW/nTTLm8vWcU8WrKTIs a/+5FGWkaEsaynuCU2oE5pUPhKU1F8IrYHOEWh3bdazW1zBwM1vWKoNrCN9G8PtoYI+i VQBA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bo3si2813406ejb.121.2021.04.09.16.49.51; Fri, 09 Apr 2021 16:50:15 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235224AbhDIXrk (ORCPT + 99 others); Fri, 9 Apr 2021 19:47:40 -0400 Received: from mga06.intel.com ([134.134.136.31]:14587 "EHLO mga06.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235163AbhDIXri (ORCPT ); Fri, 9 Apr 2021 19:47:38 -0400 IronPort-SDR: 4oTMDTbu7ghJ1nVn9+6esl52exZ5ABLXB5jtEzUzErDqkWILSfvJN+EykT59fT/hvgMMspsEND ugC34gjrjVgQ== X-IronPort-AV: E=McAfee;i="6000,8403,9949"; a="255190796" X-IronPort-AV: E=Sophos;i="5.82,210,1613462400"; d="scan'208";a="255190796" Received: from fmsmga008.fm.intel.com ([10.253.24.58]) by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 09 Apr 2021 16:47:23 -0700 IronPort-SDR: 7kkS8Wxc9BTdMnvBz67vi/4ovTt7qmo8Sx/XhHsJNzLbHt5HqfH+DEzabiA6I67db98dmOCI/G QyDmN3Xu1ijQ== X-IronPort-AV: E=Sophos;i="5.82,210,1613462400"; d="scan'208";a="416470774" Received: from yyu32-mobl1.amr.corp.intel.com (HELO [10.212.27.140]) ([10.212.27.140]) by fmsmga008-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 09 Apr 2021 16:47:22 -0700 Subject: Re: [PATCH v24 22/30] x86/cet/shstk: Add user-mode shadow stack support To: "Kirill A. Shutemov" Cc: x86@kernel.org, "H. Peter Anvin" , Thomas Gleixner , Ingo Molnar , linux-kernel@vger.kernel.org, linux-doc@vger.kernel.org, linux-mm@kvack.org, linux-arch@vger.kernel.org, linux-api@vger.kernel.org, Arnd Bergmann , Andy Lutomirski , Balbir Singh , Borislav Petkov , Cyrill Gorcunov , Dave Hansen , Eugene Syromiatnikov , Florian Weimer , "H.J. Lu" , Jann Horn , Jonathan Corbet , Kees Cook , Mike Kravetz , Nadav Amit , Oleg Nesterov , Pavel Machek , Peter Zijlstra , Randy Dunlap , "Ravi V. Shankar" , Vedvyas Shanbhogue , Dave Martin , Weijiang Yang , Pengfei Xu , Haitao Huang References: <20210401221104.31584-1-yu-cheng.yu@intel.com> <20210401221104.31584-23-yu-cheng.yu@intel.com> <20210409155711.kxf3fjc7csvqpl33@box.shutemov.name> From: "Yu, Yu-cheng" Message-ID: Date: Fri, 9 Apr 2021 16:47:21 -0700 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.9.0 MIME-Version: 1.0 In-Reply-To: <20210409155711.kxf3fjc7csvqpl33@box.shutemov.name> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 4/9/2021 8:57 AM, Kirill A. Shutemov wrote: > On Thu, Apr 01, 2021 at 03:10:56PM -0700, Yu-cheng Yu wrote: >> Introduce basic shadow stack enabling/disabling/allocation routines. >> A task's shadow stack is allocated from memory with VM_SHADOW_STACK flag >> and has a fixed size of min(RLIMIT_STACK, 4GB). >> >> Signed-off-by: Yu-cheng Yu >> Cc: Kees Cook [...] >> diff --git a/arch/x86/kernel/shstk.c b/arch/x86/kernel/shstk.c >> new file mode 100644 >> index 000000000000..5406fdf6df3c >> --- /dev/null >> +++ b/arch/x86/kernel/shstk.c >> @@ -0,0 +1,128 @@ >> +// SPDX-License-Identifier: GPL-2.0 >> +/* >> + * shstk.c - Intel shadow stack support >> + * >> + * Copyright (c) 2021, Intel Corporation. >> + * Yu-cheng Yu >> + */ >> + >> +#include >> +#include >> +#include >> +#include >> +#include >> +#include >> +#include >> +#include >> +#include >> +#include >> +#include >> +#include >> +#include >> +#include >> + >> +static void start_update_msrs(void) >> +{ >> + fpregs_lock(); >> + if (test_thread_flag(TIF_NEED_FPU_LOAD)) >> + __fpregs_load_activate(); >> +} >> + >> +static void end_update_msrs(void) >> +{ >> + fpregs_unlock(); >> +} >> + >> +static unsigned long alloc_shstk(unsigned long size, int flags) >> +{ >> + struct mm_struct *mm = current->mm; >> + unsigned long addr, populate; >> + >> + /* VM_SHADOW_STACK requires MAP_ANONYMOUS, MAP_PRIVATE */ >> + flags |= MAP_ANONYMOUS | MAP_PRIVATE; > > Looks like all callers has flags == 0. Do I miss something. My earlier versions use this flag. I should have removed it. >> + >> + mmap_write_lock(mm); >> + addr = do_mmap(NULL, 0, size, PROT_READ, flags, VM_SHADOW_STACK, 0, >> + &populate, NULL); >> + mmap_write_unlock(mm); >> + >> + if (populate) >> + mm_populate(addr, populate); > > If all callers pass down flags==0, populate will never happen. I will fix it. >> + >> + return addr; >> +} >> + >> +int shstk_setup(void) >> +{ >> + unsigned long addr, size; >> + struct cet_status *cet = ¤t->thread.cet; >> + >> + if (!cpu_feature_enabled(X86_FEATURE_SHSTK)) >> + return -EOPNOTSUPP; >> + >> + size = round_up(min_t(unsigned long long, rlimit(RLIMIT_STACK), SZ_4G), PAGE_SIZE); >> + addr = alloc_shstk(size, 0); >> + if (IS_ERR_VALUE(addr)) >> + return PTR_ERR((void *)addr); >> + >> + cet->shstk_base = addr; >> + cet->shstk_size = size; >> + >> + start_update_msrs(); >> + wrmsrl(MSR_IA32_PL3_SSP, addr + size); >> + wrmsrl(MSR_IA32_U_CET, CET_SHSTK_EN); >> + end_update_msrs(); >> + return 0; >> +} >> + >> +void shstk_free(struct task_struct *tsk) >> +{ >> + struct cet_status *cet = &tsk->thread.cet; >> + >> + if (!cpu_feature_enabled(X86_FEATURE_SHSTK) || >> + !cet->shstk_size || >> + !cet->shstk_base) >> + return; >> + >> + if (!tsk->mm) >> + return; >> + >> + while (1) { >> + int r; >> + >> + r = vm_munmap(cet->shstk_base, cet->shstk_size); >> + >> + /* >> + * vm_munmap() returns -EINTR when mmap_lock is held by >> + * something else, and that lock should not be held for a >> + * long time. Retry it for the case. >> + */ > > Hm, no. -EINTR is not about the lock being held by somebody else. The task > got a signal and need to return to userspace. From tracing the code itself, it looks like it cannot acquire the lock. Let me dig into it. > I have not looked at the rest of the patches yet, but why do you need a > special free path for shadow stack? Why the normal unmap route doesn't > work for you? The thread's shadow stack is allocated by the kernel, so it needs to be freed when the thread exits. >> + if (r == -EINTR) { >> + cond_resched(); >> + continue; >> + } >> + break; >> + } >> + >> + cet->shstk_base = 0; >> + cet->shstk_size = 0; >> +} >> + [...] Thanks, Yu-cheng