Received: by 2002:a05:6a10:6d10:0:0:0:0 with SMTP id gq16csp233721pxb; Tue, 12 Apr 2022 00:07:10 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxtZJ410tn+5LJDar5VxGJPYWrqZ7g/Ok9o/xwMxJQw17U2z/pUpKrLL58AuYx/i1Wn5Cih X-Received: by 2002:a17:90b:1e43:b0:1c7:46bf:ba29 with SMTP id pi3-20020a17090b1e4300b001c746bfba29mr3449213pjb.100.1649747216657; Tue, 12 Apr 2022 00:06:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649747216; cv=none; d=google.com; s=arc-20160816; b=IVeIyYP75BtcY7xXNFnHvSSYN0SlzkqtzfImP2mokLOqAe+Tl9jaefy8U5671el5bH EQFVpJY9oSuIf5Si6NGx422idLHNfj+Yzz1RMyWJOKLbAkmMlALTvbtFsERyXn/dMw6X W4IZUGRHvOMLWCSjlYaw+igvxYkqH14Cw7plZQlczbp0ruRBZMF0CPrGT0BKsfzoPg9+ UJyFY1Jj3nbHoUpEPqmDxSmGUz0cFQ5ZFCg8uXR96mJ88UNQj+yG/YFfxfGKkv32Bs3p Jn59jHFtXLsAMbGj8z4QakBJO41p9Ex8U8pvrNWC0BDyCZghJQI0xk9SD7mOCyiIsY6L XVvw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=+LhYda+cmIn8q1A1uU3vwVrmBL0jRQW3uRpR0JGl/ek=; b=Gy42kzmsc4n47WpvmRmsA/EuLZrLVLIyz/d7Eg2Xj9h8TFFNSj/ZMuT5xhJ8mNV3lM qOQqQdpHcKL78LvdOJUr72hn+64hMA2G5hdnGkK0+g8aWAGTRs5om4O5UnuQ5V0YBwav Q6vL1QVTVeMYI7EqJGQeN3SE1rmLXyrz15QLHcO2ydaegr0xTwvxVFCV9LCT5wzrw5Zm PF7Gpe772goKx17/yfJk8Kt5R0wITKNRRi0/qjhcGAAy5lHJAht2dTpCNRT8TCs+togj NJrQCWvawAScO6dZ38uM9twB2laVKR9jQa+1me6YbhlzZL1cuiu6OZzpTQgECgtarzED s3dg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=WohqsiUt; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id d20-20020a056a0010d400b005057a0d266asi11694170pfu.212.2022.04.12.00.06.37; Tue, 12 Apr 2022 00:06:56 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=WohqsiUt; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229926AbiDHQXv (ORCPT + 99 others); Fri, 8 Apr 2022 12:23:51 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39180 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229767AbiDHQXu (ORCPT ); Fri, 8 Apr 2022 12:23:50 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 67249DF2E for ; Fri, 8 Apr 2022 09:21:46 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id F3F40620A6 for ; Fri, 8 Apr 2022 16:21:45 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id E86FDC385A1; Fri, 8 Apr 2022 16:21:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1649434905; bh=sp8YSgjJ9qp4rTSo+9/IQUyqWZQ2MCM4EJ7wecIecVc=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=WohqsiUtwM3ulQrXXgDuUJAdWWe4VpJB0EAV+ON4okCh67hN1k5Gt/NZOAapG+/hK ObiO6p9lzJryOZmLbqL2+aHuWPxi5CikQaeeBIOFGJEDbBVyLCD8QriP7bsSRqXeO8 oaivFrKMARXOfe5da+6mpO8Y1FyzuR5eSBxQQP204hVHMYwBfH32bn33NGQwkh5nQ2 z1g4K+YyE4ev8xKvhDa5xj3OUH6UDjlFyxmKDlN2zt5rAAW1k5NOc/TVx9wkxFgH+p TrHbiflPwHAxNLq0ybWzLOiPVEn0vjolmGKK5cHADdEGFUPMEq0HamDiDs7bgkNmUd 3xClnzPS5667w== Date: Fri, 8 Apr 2022 17:21:40 +0100 From: Will Deacon To: James Morse Cc: linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, gregkh@linuxfoundation.org, maz@kernel.org, catalin.marinas@arm.com, mark.rutland@arm.com Subject: Re: arm64 spectre-bhb backports break boot on stable kernels <= v5.4 Message-ID: <20220408162139.GB28108@willie-the-truck> References: <20220408120041.GB27685@willie-the-truck> <1a44f42c-0391-7428-ac85-1e27aaf0be14@arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1a44f42c-0391-7428-ac85-1e27aaf0be14@arm.com> User-Agent: Mutt/1.10.1 (2018-07-13) X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi James, On Fri, Apr 08, 2022 at 05:08:00PM +0100, James Morse wrote: > On 08/04/2022 13:00, Will Deacon wrote: > > Booting stable kernels <= v5.4 on arm64 with CONFIG_HARDEN_BRANCH_PREDICTOR=n > > results in a NULL pointer dereference during boot due to kvm_get_hyp_vector() > > dereferencing a NULL pointer from arm64_get_bp_hardening_data(): > > > > [ 2.384444] Internal error: Oops: 96000004 [#1] PREEMPT SMP > > [ 2.384461] pstate: 20400085 (nzCv daIf +PAN -UAO) > > [ 2.384472] pc : cpu_hyp_reinit+0x114/0x30c > > [ 2.384476] lr : cpu_hyp_reinit+0x80/0x30c > > [ 2.384477] sp : ffff800010013e20 > > [ 2.384479] x29: ffff800010013e20 x28: ffff0000df033f00 > > [ 2.384484] x27: ffff800011caa000 x26: ffff0000de58e000 > > [ 2.384487] x25: ffff800011e57000 x24: ffff800011caad90 > > [ 2.384490] x23: ffff800011c778e0 x22: ffff800011a56000 > > [ 2.384494] x21: ffff800011a56000 x20: 0000b471121a6000 > > [ 2.384497] x19: 00000000de588000 x18: 0000000000000000 > > [ 2.384500] x17: 0000000000000000 x16: 0000000000000400 > > [ 2.384503] x15: 0000000000001000 x14: 00000000000007f2 > > [ 2.384507] x13: 0000000000000004 x12: 0000000000000002 > > [ 2.384510] x11: 0000000000000000 x10: 00000000121a6000 > > [ 2.384513] x9 : ffff800011c77fd8 x8 : 0000000000000010 > > [ 2.384516] x7 : 4f422effff306b64 x6 : 0000008080000000 > > [ 2.384519] x5 : 0000008080000000 x4 : ffff800011fabc94 > > [ 2.384522] x3 : ffff800011f5bde0 x2 : 0000000000000001 > > [ 2.384526] x1 : 00000000121a0000 x0 : ffff8000118f962d > > [ 2.384529] Call trace: > > [ 2.384533] cpu_hyp_reinit+0x114/0x30c > > [ 2.384537] _kvm_arch_hardware_enable+0x30/0x54 > > [ 2.384541] flush_smp_call_function_queue+0xe4/0x154 > > [ 2.384544] generic_smp_call_function_single_interrupt+0x10/0x18 > > [ 2.384549] ipi_handler+0x170/0x2b0 > > [ 2.384555] handle_percpu_devid_fasteoi_ipi+0x120/0x1cc > > [ 2.384560] __handle_domain_irq+0x9c/0xf4 > > [ 2.384563] gic_handle_irq+0x6c/0xe4 > > [ 2.384566] el1_irq+0xf0/0x1c0 > > [ 2.384570] arch_cpu_idle+0x28/0x44 > > [ 2.384574] do_idle+0x100/0x2a8 > > [ 2.384577] cpu_startup_entry+0x20/0x24 > > [ 2.384581] secondary_start_kernel+0x1b0/0x1cc > > [ 2.384589] Code: b9469d08 7100011f 540003ad 52800208 (f9400108) > > [ 2.384600] ---[ end trace 266d08dbf96ff143 ]--- > > [ 2.385171] Kernel panic - not syncing: Fatal exception in interrupt > > Yikes! > > Interesting to know that stuff behind CONFIG_EXPERT has someone who cares about it. > (I was going to propose dropping the Kconfig option after a while). Yup! FWIW, the hardening options are enabled in Android (GKI), but this was reported to us externally by somebody using a custom config. > > I can bodge this as below (untested), but it's pretty grotty. > > I wanted to keep the detection code even if the feature is disabled so the sysfs reporting > is always correct. Makes sense. Another option is to check for ARM64_HARDEN_BRANCH_PREDICTOR in spectre_bhb_enable_mitigation(), but then I think the KVM code would need to query the mitigation state rather than just the cap. > > Please can you take a look? > > Ugh, arm64_get_bp_hardening_data() returns NULL with that Kconfig setup. > > > For v5.4, this fixes it for me: > --------------------%<-------------------- > diff --git a/arch/arm64/include/asm/kvm_mmu.h b/arch/arm64/include/asm/kvm_mmu.h > index 78d110667c0c..ffe0aad96b17 100644 > --- a/arch/arm64/include/asm/kvm_mmu.h > +++ b/arch/arm64/include/asm/kvm_mmu.h > @@ -479,7 +479,8 @@ static inline void *kvm_get_hyp_vector(void) > int slot = -1; > > if ((cpus_have_const_cap(ARM64_HARDEN_BRANCH_PREDICTOR) || > - cpus_have_const_cap(ARM64_SPECTRE_BHB)) && data->template_start) { > + cpus_have_const_cap(ARM64_SPECTRE_BHB)) && > + data && data->template_start) { > vect = kern_hyp_va(kvm_ksym_ref(__bp_harden_hyp_vecs_start)); > slot = data->hyp_vectors_slot; > } That'll work, but will sysfs report that BHB is mitigated even if !ARM64_HARDEN_BRANCH_PREDICTOR? > --------------------%<-------------------- > > I'll check the other versions and post patches to the stable list. Earlier stable > backports grew a dependency between these features as it wasn't possible to unpick the > dependencies. Cheers. I know 4.19 is busted too, but I didn't check 4.14. Will