Received: by 2002:a05:6a10:1a4d:0:0:0:0 with SMTP id nk13csp197057pxb; Mon, 31 Jan 2022 19:27:26 -0800 (PST) X-Google-Smtp-Source: ABdhPJw6XkST4Hx8w2iBHGWlIx1FZ96ou51cH7i1wBDKhP13hyrhsoLg3eTu08p1y117AKdWx93N X-Received: by 2002:a62:d143:: with SMTP id t3mr22928761pfl.52.1643686045783; Mon, 31 Jan 2022 19:27:25 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643686045; cv=none; d=google.com; s=arc-20160816; b=sbPtybQ5nyAfQFthjTf2qJ/w0nUxLj82tSvt1I0FWJ0De/j4bGQkz8IDPN62Y85w0H C36W+yI4ntmhrJK7cJfOZv4rd0KTL38uJAPrPB1AmjxgRSqg36Dzf5AIWQcdmMCj5IC6 lZTKwdRckHXkqXqtPd8GTCnaEktE1/rEMTJlfZhyAzJDDP/RzhlfeijKuXrQ5y4leWJc 96ovboaXM6+YvvF4sZIRCjUKEm0a4+prRSpR2TBAApoebapgDZu2gEI+JKJEDtXqUsV2 9+fZ1jCUIRzf3QZ6LslREvsLcFto+lVBnfYGBHsnODrziYAi5/J228b/4SWL1pHL9uhz oQWA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:date:subject:cc:to:from :dkim-signature; bh=E6g6DVazQtBH1JyQNRc+PF3SpEgv1pxfNELmVH+VrOM=; b=gojGHrZBFZzRfcrM2n++tHBLoJGKs8ztBFoLkk/YzLvXpU6/gsAi7sWNXCh6QWWhdC ZdwghAZiP+Es0PZO2mvKhpj3hsWzkaPuwhutSFTjMtT42eog2RKl327axoU/nmpdjczb UfLIYZr8Jd5OYbUd/DiGzNZisjHD47TwG6Id5MVUU5FDvQLOwI0W9Uwy7IfkbsAGp+be OZjiCTsSp9ib6JqzX764JkQXktTzt5LiBApZV4iK8NW5eBuTFVvdRCEBLzUKOexL/756 c93S5SEwRLXp1egzbihpEqxYG5a8YCi6oqYMwCjfsUqIrwYPjPOZJQl+NInO0zEj0tIj 71RQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=bSna36si; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b11si17865271pgi.186.2022.01.31.19.27.14; Mon, 31 Jan 2022 19:27:25 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=bSna36si; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1350448AbiA2Rof (ORCPT + 99 others); Sat, 29 Jan 2022 12:44:35 -0500 Received: from mga06.intel.com ([134.134.136.31]:54626 "EHLO mga06.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S243991AbiA2Rod (ORCPT ); Sat, 29 Jan 2022 12:44:33 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1643478273; x=1675014273; h=from:to:cc:subject:date:message-id; bh=2wWplLq1RV7SAfSe6hbCZJmVoZzG7Tnpl3tf9z4L0m0=; b=bSna36simwKOHFNdB1Ezj3QmzFOcvaGq0e8VrZcJLkuW5aYQauBqO7pl wCtICJ+plmreDpGSTFaSUekbhNpeKLGfWGB14Idu41CCIySGcoxEate4a IPhoR+h4I8yBTKNidDPT3RHXS43nuivtgyFvGlnI9fTc/EADiGVf3p3ZU ExSlnVajwyE6jsXtkUkod0P4fIMnOIyEC0IvfVS92seYkQBTlcrV/B+WH Lzczw862rvUl5TibNskqO2uX9cP5I6qYvRBdyhJRewVP8arm2QAvcoF/9 c0IGAzgfLEwXg47wJorPVpshWZ6zPjhwFUUuEfyYRAJiMh968VkIisYsy w==; X-IronPort-AV: E=McAfee;i="6200,9189,10242"; a="308016819" X-IronPort-AV: E=Sophos;i="5.88,327,1635231600"; d="scan'208";a="308016819" Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 29 Jan 2022 09:44:33 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.88,327,1635231600"; d="scan'208";a="675370398" Received: from chang-linux-3.sc.intel.com ([172.25.66.175]) by fmsmga001.fm.intel.com with ESMTP; 29 Jan 2022 09:44:32 -0800 From: "Chang S. Bae" To: linux-kernel@vger.kernel.org, x86@kernel.org, tglx@linutronix.de, bp@alien8.de, dave.hansen@linux.intel.com, mingo@redhat.com Cc: yang.zhong@intel.com, ravi.v.shankar@intel.com, chang.seok.bae@intel.com Subject: [PATCH v4 0/2] x86: Fix ARCH_REQ_XCOMP_PERM and update the test Date: Sat, 29 Jan 2022 09:36:45 -0800 Message-Id: <20220129173647.27981-1-chang.seok.bae@intel.com> X-Mailer: git-send-email 2.17.1 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Changes from V3: * Rebased onto 5.17-rc1. V3: https://lore.kernel.org/lkml/20211110003209.21666-1-chang.seok.bae@intel.com/ --- The recent x86 dynamic state support incorporates the arch_prctl option to request permission before using a dynamic state. It was designed to add the requested feature in the group leader's permission bitmask so that every thread can reference this master bitmask. The group leader is assumed to be unchanged here. The mainline is the case as a group leader is identified at fork() or exec() time only. This master bitmask should include non-dynamic features always, as they are permitted by default. Users may check them via ARCH_GET_XCOMP_PERM. But, in hindsight, the implementation does overwrite the bitmask with the requested bit only, instead of adding the bit to the existing one. This overwrite effectively revokes the permission that is granted already. Fix the code and also update the selftest to disclose the issue if there is. Chang S. Bae (1): selftests/x86/amx: Update the ARCH_REQ_XCOMP_PERM test Yang Zhong (1): x86/arch_prctl: Fix the ARCH_REQ_XCOMP_PERM implementation arch/x86/kernel/fpu/xstate.c | 2 +- tools/testing/selftests/x86/amx.c | 16 ++++++++++++++-- 2 files changed, 15 insertions(+), 3 deletions(-) base-commit: e783362eb54cd99b2cac8b3a9aeac942e6f6ac07 -- 2.17.1