Received: by 2002:a05:6a10:a852:0:0:0:0 with SMTP id d18csp516490pxy; Fri, 30 Apr 2021 10:05:20 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz/1s35g8gaOSGcRMkDNJZpElpnleVbjcc0Chj6iZ0FB2AKuAOB2WUreUyH94t7Jm4OfYnY X-Received: by 2002:a50:d782:: with SMTP id w2mr7111959edi.346.1619802320187; Fri, 30 Apr 2021 10:05:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619802320; cv=none; d=google.com; s=arc-20160816; b=BmYblRyWkTzhmN81VBy5dEJF5d51fI4Gr7DfrXxJAy3VGs3y8v3ICVD4+CT2l5lmRp O1JpSyOyGnFjA0qZ1dm55caXjb4G6bOkXp7E/23cTo1OBx0hl7cO/j6EJvx2qsc4+FX3 /FabxD2uuDsV7hLIXRqj/1d9SP5UKVQgMnHSQogvc+gWIqul39bVy4C6GQcA2TzMjZNq fxR4I/AtP79dxiZfxUVZF+jkbTJwMOtILdUjBn2/JjZYQ1wufcHGfkkimApx9rJ0kHX6 JVE1fmcuukHTfSPprvUMpcU4PBBg5d0tz3MTv3LT131jR05MTXtsCvGQ+hAgz6rs7rhR vb4Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:ironport-sdr:ironport-sdr; bh=VyhR4427lGtEQacLbngkQYDsx92Ssgxr13CS5LjRv/8=; b=nUXBz+pSPlxWlbwaUWBRzmBIMeaoGNLKicUUrfdykYGTS/Y6k/d81oLUnkeU7QqwML XaYDsksBhoG61D2AlFQStYZxYLMX0U+RNvZGm0/jls0aNJe+UF11Q9Wc9HT4zlbA8gt1 aIuwb+qXF1geqNuZzBd8FwNkLkR0GFeGHw1PUTPLcBxmyS8O14+A5WuJUd+6XG9vQIq1 m9QXUS2eHw7Pn9lWdpn9l4TnMSWgjCNA2kTY9FqTt3HgLCP8Y67h3/JSWxH/+dK26ODv LJDaAwtr86EoC5GWWVyFuQMfbcowJ79/ICmja6ipHff7cb+PB0On+11JkQYyPBZGomUE Vefw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id cs15si3544440ejc.258.2021.04.30.10.04.55; Fri, 30 Apr 2021 10:05:20 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230496AbhD3RBr (ORCPT + 99 others); Fri, 30 Apr 2021 13:01:47 -0400 Received: from mga09.intel.com ([134.134.136.24]:13918 "EHLO mga09.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230428AbhD3RBq (ORCPT ); Fri, 30 Apr 2021 13:01:46 -0400 IronPort-SDR: BUr2MuC7xgLryPzhQ8P/UovGTsKvhRLcCoL+7fjQ+sv72kAoCFqRi5lVN/v09M1ToPd7HPFKsZ N4mGQ1HwyBlw== X-IronPort-AV: E=McAfee;i="6200,9189,9970"; a="197416939" X-IronPort-AV: E=Sophos;i="5.82,263,1613462400"; d="scan'208";a="197416939" Received: from orsmga003.jf.intel.com ([10.7.209.27]) by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 30 Apr 2021 10:00:53 -0700 IronPort-SDR: 8QwAOLtabmDg1mS99F3nT1I95E80eSon+n2uG3kTLCjmvDOMM2JY0oOq8/UUMTvEHLSRha/Wyl nljC4lygAejw== X-IronPort-AV: E=Sophos;i="5.82,263,1613462400"; d="scan'208";a="387423627" Received: from yyu32-mobl1.amr.corp.intel.com (HELO [10.212.119.226]) ([10.212.119.226]) by orsmga003-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 30 Apr 2021 10:00:49 -0700 Subject: Re: extending ucontext (Re: [PATCH v26 25/30] x86/cet/shstk: Handle signals for shadow stack) To: Andy Lutomirski , linux-arch Cc: X86 ML , "H. Peter Anvin" , Thomas Gleixner , Ingo Molnar , LKML , "open list:DOCUMENTATION" , Linux-MM , Linux API , Arnd Bergmann , Balbir Singh , Borislav Petkov , Cyrill Gorcunov , Dave Hansen , Eugene Syromiatnikov , Florian Weimer , "H.J. Lu" , Jann Horn , Jonathan Corbet , Kees Cook , Mike Kravetz , Nadav Amit , Oleg Nesterov , Pavel Machek , Peter Zijlstra , Randy Dunlap , "Ravi V. Shankar" , Vedvyas Shanbhogue , Dave Martin , Weijiang Yang , Pengfei Xu , Haitao Huang References: <20210427204315.24153-1-yu-cheng.yu@intel.com> <20210427204315.24153-26-yu-cheng.yu@intel.com> From: "Yu, Yu-cheng" Message-ID: <8fd86049-930d-c9b7-379c-56c02a12cd77@intel.com> Date: Fri, 30 Apr 2021 10:00:47 -0700 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.10.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 4/28/2021 4:03 PM, Andy Lutomirski wrote: > On Tue, Apr 27, 2021 at 1:44 PM Yu-cheng Yu wrote: >> >> When shadow stack is enabled, a task's shadow stack states must be saved >> along with the signal context and later restored in sigreturn. However, >> currently there is no systematic facility for extending a signal context. >> There is some space left in the ucontext, but changing ucontext is likely >> to create compatibility issues and there is not enough space for further >> extensions. >> >> Introduce a signal context extension struct 'sc_ext', which is used to save >> shadow stack restore token address. The extension is located above the fpu >> states, plus alignment. The struct can be extended (such as the ibt's >> wait_endbr status to be introduced later), and sc_ext.total_size field >> keeps track of total size. > > I still don't like this. > > Here's how the signal layout works, for better or for worse: > > The kernel has: > > struct rt_sigframe { > char __user *pretcode; > struct ucontext uc; > struct siginfo info; > /* fp state follows here */ > }; > > This is roughly the actual signal frame. But userspace does not have > this struct declared, and user code does not know the sizes of the > fields. So it's accessed in a nonsensical way. The signal handler > function is passed a pointer to the whole sigframe implicitly in RSP, > a pointer to &frame->info in RSI, anda pointer to &frame->uc in RDX. > User code can *find* the fp state by following a pointer from > mcontext, which is, in turn, found via uc: > > struct ucontext { > unsigned long uc_flags; > struct ucontext *uc_link; > stack_t uc_stack; > struct sigcontext uc_mcontext; <-- fp pointer is in here > sigset_t uc_sigmask; /* mask last for extensibility */ > }; > > The kernel, in sigreturn, works a bit differently. The sigreturn > variants know the base address of the frame but don't have the benefit > of receiving pointers to the fields. So instead the kernel takes > advantage of the fact that it knows the offset to uc and parses uc > accordingly. And the kernel follows the pointer in mcontext to find > the fp state. The latter bit is quite important later. The kernel > does not parse info at all. > > The fp state is its own mess. When XSAVE happened, Intel kindly (?) > gave us a software defined area between the "legacy" x87 region and > the modern supposedly extensible part. Linux sticks the following > structure in that hole: > > struct _fpx_sw_bytes { > /* > * If set to FP_XSTATE_MAGIC1 then this is an xstate context. > * 0 if a legacy frame. > */ > __u32 magic1; > > /* > * Total size of the fpstate area: > * > * - if magic1 == 0 then it's sizeof(struct _fpstate) > * - if magic1 == FP_XSTATE_MAGIC1 then it's sizeof(struct _xstate) > * plus extensions (if any) > */ > __u32 extended_size; > > /* > * Feature bit mask (including FP/SSE/extended state) that is present > * in the memory layout: > */ > __u64 xfeatures; > > /* > * Actual XSAVE state size, based on the xfeatures saved in the layout. > * 'extended_size' is greater than 'xstate_size': > */ > __u32 xstate_size; > > /* For future use: */ > __u32 padding[7]; > }; > > > That's where we are right now upstream. The kernel has a parser for > the FPU state that is bugs piled upon bugs and is going to have to be > rewritten sometime soon. On top of all this, we have two upcoming > features, both of which require different kinds of extensions: > > 1. AVX-512. (Yeah, you thought this story was over a few years ago, > but no. And AMX makes it worse.) To make a long story short, we > promised user code many years ago that a signal frame fit in 2048 > bytes with some room to spare. With AVX-512 this is false. With AMX > it's so wrong it's not even funny. The only way out of the mess > anyone has come up with involves making the length of the FPU state > vary depending on which features are INIT, i.e. making it more compact > than "compact" mode is. This has a side effect: it's no longer > possible to modify the state in place, because enabling a feature with > no space allocated will make the structure bigger, and the stack won't > have room. Fortunately, one can relocate the entire FPU state, update > the pointer in mcontext, and the kernel will happily follow the > pointer. So new code on a new kernel using a super-compact state > could expand the state by allocating new memory (on the heap? very > awkwardly on the stack?) and changing the pointer. For all we know, > some code already fiddles with the pointer. This is great, except > that your patch sticks more data at the end of the FPU block that no > one is expecting, and your sigreturn code follows that pointer, and > will read off into lala land. > Then, what about we don't do that at all. Is it possible from now on we don't stick more data at the end, and take the relocating-fpu approach? > 2. CET. CET wants us to find a few more bytes somewhere, and those > bytes logically belong in ucontext, and here we are. > Fortunately, we can spare CET the need of ucontext extension. When the kernel handles sigreturn, the user-mode shadow stack pointer is right at the restore token. There is no need to put that in ucontext. However, the WAIT_ENDBR status needs to be saved/restored for signals. Since IBT is now dependent on shadow stack, we can use a spare bit of the shadow stack restore token for that. I have tested the change, and will send out another version of the whole series. > This is *almost*, but not quite, easy: struct ucontext is already > variable length! Unfortunately, the whole variable length portion is > used up by uc_sigmask. So I propose that we introduce a brand new > bona fide extension mechanism. It works like this: > > First, we add a struct ucontext_extension at the end. It looks like: > > struct ucontext_extension { > u64 length; /* sizeof(struct ucontext_extension) */ > u64 flags; /* we will want this some day */ > [CET stuff here] > [future stuff here] > }; > > And we locate it by scrounging a word somewhere in ucontext to give > the offset from the beginning of struct ucontext to > ucontext_extension. We indicate the presence of this feature using a > new uc_flags bit. I can think of a couple of vaguely reasonable > places: > > a) the reserved word in sigcontext. This is fine for x86 but not so > great if other architectures want to do this. > > b) uc_link. Fine everywhere but powerpc. Oops. > > c) use the high bits of uc_flags. After all, once we add extensions, > we don't need new flags, so we can steal 16 high bits of uc_flags for > this. > > I think I'm in favor of (c). We do: > > (uc_flags & 0xffff0000) == 0: extension not present > > Otherwise the extension region is at ucontext + (uc_flags >> 16). > > And sigreturn finds the extension the same way, because CRIU can > already migrate a signal frame from one kernel to another, your patch > breaks this, and having sigreturn hardcode the offset would also break > it. > > What do you think? >