Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp4872497iog; Wed, 22 Jun 2022 07:25:51 -0700 (PDT) X-Google-Smtp-Source: AGRyM1vG/HirT6kp3Y/BKVQUDl3OJGIlt9fTCb5R/u9pRaiZXevr0MRe13TGP1COLcyJuRSjP3cz X-Received: by 2002:a17:907:1b14:b0:6ef:a5c8:afbd with SMTP id mp20-20020a1709071b1400b006efa5c8afbdmr3374904ejc.151.1655907951102; Wed, 22 Jun 2022 07:25:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1655907951; cv=none; d=google.com; s=arc-20160816; b=UmsSLQ06Lvm9RSLuKMBz96oZVN2LBb2jRxPjidXHPATYRcvUZ7K0Cjq5Lfl/xjTJD+ vY/uUsvo9EYBDvNsRLdUD73MovAv40l4pMAXxpwSr8amrOULXSUpd9e307DhV1N5bHta whYMHlPQxV8t1HMdGrya0B7LZA8XuYJzhBTTwHfqMl75yVPUlKPlAstYB5vPQzl8PSht ljbUkhn4m6lIa047SXLsPnvI1xQW78yRcgmgwPkVzjQ/E60+iwuRzuL9ktZaorYmrD94 YMNwX7Qx6czvhkQX4iUZX3SWZ3WEdfKskXG8wfLvwnkic8e2w8CKAUk1iCcw0hzI8BuF amfA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=3ENuE7ZIyq9YkE5vwMgxUVDePxbUMaFRu0H/WNcpiNg=; b=gxRL54AkaRQC3HZaB/E7fn4OMD0IQ0iq8YGXpFdnMlo4dhyISK7i6gRvi1KqoykrSr 1gS6q3M/1zkZ16bWh2SVUZaJPuRUPlY3MWx7Cob5w/FB6LIrA/7c5gphpbWPKTDeR5xW MNI1cSBCfv3Zoalfn60Va6xe6bYHrt70pHlUeasJj6IiDeAqjLfoaltA6eVV8KAGvyVz zHIU8ZqWP4jk5Yf+q8IdMqX7WXhKl9bXi++48E5TJKyL6unl+wPpQZzVbhje+1xjkUA7 9rF+zVzT9mEipv0DrVInh/m6WkCcjjlbHF0tfmGTd6Hb+LTKJmpN8safnt02XT0z0tQv 1gzw== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail (test mode) header.i=@armlinux.org.uk header.s=pandora-2019 header.b=uIvvUh8u; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=armlinux.org.uk Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id g8-20020a1709065d0800b006feb18c72bfsi18448236ejt.126.2022.06.22.07.25.18; Wed, 22 Jun 2022 07:25:51 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=fail (test mode) header.i=@armlinux.org.uk header.s=pandora-2019 header.b=uIvvUh8u; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=armlinux.org.uk Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1357819AbiFVOEM (ORCPT + 99 others); Wed, 22 Jun 2022 10:04:12 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54230 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1345399AbiFVOEL (ORCPT ); Wed, 22 Jun 2022 10:04:11 -0400 Received: from pandora.armlinux.org.uk (pandora.armlinux.org.uk [IPv6:2001:4d48:ad52:32c8:5054:ff:fe00:142]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C6C8EF58D for ; Wed, 22 Jun 2022 07:04:09 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=armlinux.org.uk; s=pandora-2019; h=Sender:In-Reply-To:Content-Type: MIME-Version:References:Message-ID:Subject:Cc:To:From:Date:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=3ENuE7ZIyq9YkE5vwMgxUVDePxbUMaFRu0H/WNcpiNg=; b=uIvvUh8unc6lyoAZCEJKRvG+L8 +fNcE3us301CT1YpI0qhy6qah/kSoll3KuQ5q5Y/c9BgAfgBDoEvxJw1CQivqHijv0lreIpg1cRaP 2xCXm0sWnW7rL/8jrpHHErn7yU0oVbeGodMTb9M8wXagY+onNXF77/feKw2bBnR9Gs7jc3czW03a4 snKOJsRVIOlfTzd8ZFAXcVBQH/p7+8mS8kQ4SMLe3vC6DxroSRSrwJlUFU3QsRAFuUHfzOSEUvI2N AHeCEURQSw//43zTmdzSUoMMilz9B9RFRB0IpqQ0kwBLrOYTk/kvi3SDYEjVf8fZi7Evq0V896ifa szoAjKuQ==; Received: from shell.armlinux.org.uk ([fd8f:7570:feb6:1:5054:ff:fe00:4ec]:32984) by pandora.armlinux.org.uk with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from ) id 1o40xi-0003fA-AW; Wed, 22 Jun 2022 15:04:05 +0100 Received: from linux by shell.armlinux.org.uk with local (Exim 4.94.2) (envelope-from ) id 1o40xh-0007U0-0L; Wed, 22 Jun 2022 15:04:05 +0100 Date: Wed, 22 Jun 2022 15:04:04 +0100 From: "Russell King (Oracle)" To: Marc Zyngier Cc: Tetsuo Handa , Tony Lindgren , LKML , Linux ARM Subject: Re: [PATCH] ARM: spectre-v2: fix smp_processor_id() warning Message-ID: References: <795c9463-452e-bf64-1cc0-c318ccecb1da@I-love.SAKURA.ne.jp> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Sender: Russell King (Oracle) X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE,SPF_NONE, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jun 22, 2022 at 02:50:15PM +0100, Marc Zyngier wrote: > On 2022-06-22 07:49, Tetsuo Handa wrote: > > syzbot complains smp_processor_id() from harden_branch_predictor() > > from page fault path [1]. Explicitly disable preemption and use > > raw_smp_processor_id(). > > > > Link: https://syzkaller.appspot.com/bug?extid=a7ee43e564223f195c84 [1] > > Reported-by: syzbot > > > > Fixes: f5fe12b1eaee220c ("ARM: spectre-v2: harden user aborts in kernel > > space") > > Signed-off-by: Tetsuo Handa > > --- > > This patch is completely untested. > > > > arch/arm/include/asm/system_misc.h | 7 +++++-- > > 1 file changed, 5 insertions(+), 2 deletions(-) > > > > diff --git a/arch/arm/include/asm/system_misc.h > > b/arch/arm/include/asm/system_misc.h > > index 98b37340376b..a92446769acd 100644 > > --- a/arch/arm/include/asm/system_misc.h > > +++ b/arch/arm/include/asm/system_misc.h > > @@ -20,8 +20,11 @@ typedef void (*harden_branch_predictor_fn_t)(void); > > DECLARE_PER_CPU(harden_branch_predictor_fn_t, > > harden_branch_predictor_fn); > > static inline void harden_branch_predictor(void) > > { > > - harden_branch_predictor_fn_t fn = per_cpu(harden_branch_predictor_fn, > > - smp_processor_id()); > > + harden_branch_predictor_fn_t fn; > > + > > + preempt_disable_notrace(); > > + fn = per_cpu(harden_branch_predictor_fn, raw_smp_processor_id()); > > + preempt_enable_no_resched_notrace(); > > if (fn) > > fn(); > > } > > I don't think that's required. > > harden_branch_predictor() is always called on the fault path, > from __do_user_fault(), and that's always non-preemptible. > > My hunch is that we're missing some tracking that indicates > to the kernel that we're already non-preemptible by virtue > of being in an exception handler. > > Russell, what do you think? There is one path that we can hit this while we're preemptible - a page fault (handled via do_page_fault) at an address in kernel space triggered by user space (e.g. userspace trying to access vmalloc or module space). I suppose, since we know that's never going to be fixed up, we could detect that the address >= TASK_SIZE and we're entering from usespace before enabling interrupts, and do the hardening early in that path. We'd need to move the other cases where we call the hardening as well. The down side is more tests in the page fault fast-path... so there will be a performance penalty to be paid just to shut up this warning - a warning that is "userspace is trying to do real bad stuff" that basically means userspace is trying to run an exploit... Which makes me think... having the loud complaint from the kernel there is actually a good thing, it makes people sit up and notice that something is wrong. -- RMK's Patch system: https://www.armlinux.org.uk/developer/patches/ FTTP is here! 40Mbps down 10Mbps up. Decent connectivity at last!