Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp3941116pxj; Mon, 21 Jun 2021 09:50:31 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwaYHBUI4TRiOr0Cl4UdPj1iKuIRWW+5p2ibdj6lqTNDK+X9ysPvGUc/G/50gGaL+X7txk8 X-Received: by 2002:a17:906:ccc3:: with SMTP id ot3mr25813743ejb.475.1624294230985; Mon, 21 Jun 2021 09:50:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1624294230; cv=none; d=google.com; s=arc-20160816; b=bnPTgIAr+8CWaubrvWeKFuGDOHxrBG/3rwgfwjYqGzxdc0yH/NTqHvfsnegPwO7HJA w18aVzgglSr4RYzVBOSEtSOPbrsmf+fmuPskWzgsihLYNYNMC8dqf7aYoM3rUH57raEP ntn9MOexsqe+fBKWUrm1jEPdBWP2DW3//ISNRRiV3PK/tuFj7ydUDX3N88K6hemti5hP Ep3sdt61HL/ZgxTrvvMFBZef6+ieqdMtBbV9f+bsCoycmySWeMCuS2YmKOWHZ86jTx9a oNNaPXJwgljv7BbL2ci+MxMt+L+96rQkSY1GydpHhBikV8WIOzr2mg2w1u+W745fM2wC m3vw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=VJaE14NQg4IhLuOHbDLXSgAtP3/GUf2TVebox0Y7f8A=; b=lJrM0n/P/6XlS/Ss6Pmkll5J23n3mukcdkrD61t9/rXG+88CcnlfpAIGokBbHVYuCL 4WJuFzKoQNKsIYCVXapSjXHCayJ2kXk1PelL8e2DdFNfsSE1kCdQAyVppnrHch3g6+x/ zlUVYNriPsvWB40cUIihX2DS9v3MF5mF2/IDZx9mUViryW6UNKuF9PK+qD8pQfZGn3T3 L36A1SxFqF8kEyCqnSC39bzYJcFQpWSbjorUQnXfc+x9humM+oplvfm5KaGWl22/Ffk+ XHyuYKyZZ9fsegvLKOJhXbtNrR4nIwIbHhZ4rf9EkFGACjRc4rGw2uyE/3syHbW1BYbp TrMQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=SbaLhk0I; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id be3si2137202edb.568.2021.06.21.09.50.08; Mon, 21 Jun 2021 09:50:30 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=SbaLhk0I; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232609AbhFUQvO (ORCPT + 99 others); Mon, 21 Jun 2021 12:51:14 -0400 Received: from mail.kernel.org ([198.145.29.99]:38074 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232536AbhFUQro (ORCPT ); Mon, 21 Jun 2021 12:47:44 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 7A780611CE; Mon, 21 Jun 2021 16:33:39 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1624293220; bh=dqoV1TNWUCbUUOS9goSmit/ypve9i2to0VkDscJk+cY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=SbaLhk0I5kiHLF/eAJ4RykyM7aaNvb5/nFPyX3vwtbjC4ZkC7GJHmpJ4R2wyHkAmS Bg9d1OZCXcGuaas9MyuVv1ZU27NcXZtkSxiCW5QfWvH9+wHPWyu2ukysZq327Z86NP 2Fm/HndKj2L5zqNRPhlutg8E6XsT/iBhBDcqBv3U= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Thomas Gleixner , Borislav Petkov , Dave Hansen , Rik van Riel , Babu Moger Subject: [PATCH 5.12 143/178] x86/pkru: Write hardware init value to PKRU when xstate is init Date: Mon, 21 Jun 2021 18:15:57 +0200 Message-Id: <20210621154927.644071487@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210621154921.212599475@linuxfoundation.org> References: <20210621154921.212599475@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Thomas Gleixner commit 510b80a6a0f1a0d114c6e33bcea64747d127973c upstream. When user space brings PKRU into init state, then the kernel handling is broken: T1 user space xsave(state) state.header.xfeatures &= ~XFEATURE_MASK_PKRU; xrstor(state) T1 -> kernel schedule() XSAVE(S) -> T1->xsave.header.xfeatures[PKRU] == 0 T1->flags |= TIF_NEED_FPU_LOAD; wrpkru(); schedule() ... pk = get_xsave_addr(&T1->fpu->state.xsave, XFEATURE_PKRU); if (pk) wrpkru(pk->pkru); else wrpkru(DEFAULT_PKRU); Because the xfeatures bit is 0 and therefore the value in the xsave storage is not valid, get_xsave_addr() returns NULL and switch_to() writes the default PKRU. -> FAIL #1! So that wrecks any copy_to/from_user() on the way back to user space which hits memory which is protected by the default PKRU value. Assumed that this does not fail (pure luck) then T1 goes back to user space and because TIF_NEED_FPU_LOAD is set it ends up in switch_fpu_return() __fpregs_load_activate() if (!fpregs_state_valid()) { load_XSTATE_from_task(); } But if nothing touched the FPU between T1 scheduling out and back in, then the fpregs_state is still valid which means switch_fpu_return() does nothing and just clears TIF_NEED_FPU_LOAD. Back to user space with DEFAULT_PKRU loaded. -> FAIL #2! The fix is simple: if get_xsave_addr() returns NULL then set the PKRU value to 0 instead of the restrictive default PKRU value in init_pkru_value. [ bp: Massage in minor nitpicks from folks. ] Fixes: 0cecca9d03c9 ("x86/fpu: Eager switch PKRU state") Signed-off-by: Thomas Gleixner Signed-off-by: Borislav Petkov Acked-by: Dave Hansen Acked-by: Rik van Riel Tested-by: Babu Moger Cc: stable@vger.kernel.org Link: https://lkml.kernel.org/r/20210608144346.045616965@linutronix.de Signed-off-by: Greg Kroah-Hartman --- arch/x86/include/asm/fpu/internal.h | 11 +++++++++-- 1 file changed, 9 insertions(+), 2 deletions(-) --- a/arch/x86/include/asm/fpu/internal.h +++ b/arch/x86/include/asm/fpu/internal.h @@ -579,9 +579,16 @@ static inline void switch_fpu_finish(str * return to userland e.g. for a copy_to_user() operation. */ if (!(current->flags & PF_KTHREAD)) { + /* + * If the PKRU bit in xsave.header.xfeatures is not set, + * then the PKRU component was in init state, which means + * XRSTOR will set PKRU to 0. If the bit is not set then + * get_xsave_addr() will return NULL because the PKRU value + * in memory is not valid. This means pkru_val has to be + * set to 0 and not to init_pkru_value. + */ pk = get_xsave_addr(&new_fpu->state.xsave, XFEATURE_PKRU); - if (pk) - pkru_val = pk->pkru; + pkru_val = pk ? pk->pkru : 0; } __write_pkru(pkru_val); }