Received: by 2002:a05:6358:bb9e:b0:b9:5105:a5b4 with SMTP id df30csp4187140rwb; Tue, 6 Sep 2022 04:04:27 -0700 (PDT) X-Google-Smtp-Source: AA6agR7oLcpEEB2AVRbtF9wzaezReh3G2ggLgT9op6PArXySaN9tJOqshG6YCvxWN3tAeb+v3ole X-Received: by 2002:a17:907:7254:b0:731:61c6:ecf9 with SMTP id ds20-20020a170907725400b0073161c6ecf9mr39853103ejc.101.1662462267609; Tue, 06 Sep 2022 04:04:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1662462267; cv=none; d=google.com; s=arc-20160816; b=TbeUlD87zaBoxsCdHIWydjaEc2Bz4einf5Y2vvCyp+VNAnC3/EWGer/lzia0Cu2FJU mvusOE+jPxQsbL9jbJW+VTpAS0YUKTtRJzXz+GgecPdE37vkFlaOKdmgK+BZrEVE8/Df N0KCzo+48oQazpKvMv7WQ39RqCw30g3U1EGuVolHGRxoek3PnJBoJeag3FCATMFfNbep 33nZbkGCuHqIwiUNKCkA3M9BqohcKgYvk/Df8WMY9lnAh6SDAsQzicM6bWwhH6hZjQig YTp3ZpE0EUW2Sij36ZprW61SkRFK0HqiJxKojHp9CbNS0as9cU/du7z3uerHl/6i+c0i D3AQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=tKOV1feOZ6yZjoJOs+N72CQpFiR5Uyu8N6KaRP5JRmw=; b=rhP7PwYRbltijn1ElsN2Bh9+AzKwB+6cSmmqqM9n0w+h8HOyToBDJJF04CKheFF003 GSy9zfsM5KHSFb+H6P71Gu8zysAk+Evm0pqtRvIfJgTvji6spRhOpEEFuSI3lFEv/w/H NhS2bKsoX72Regnd66sJsmvIZYnfXrog2L54GqoCfe9ruPmR0XAO2zB7+lb4CT8DniSt arEH/itEeIGTY0wGQuhUoIzHH7jKDrHQZ/aQmGnzrDMXrlKJnQz4+se7AZv+zmp/N21X MxZgKsDd5sEmdq0yGbEzexyGMKWCSfw9FdDymgxe56N8632z6GgcaUksYnoVeyPdQ9PB F3rg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ispras.ru Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id ne25-20020a1709077b9900b00726d03899basi564715ejc.344.2022.09.06.04.04.00; Tue, 06 Sep 2022 04:04:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ispras.ru Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239646AbiIFKmU (ORCPT + 99 others); Tue, 6 Sep 2022 06:42:20 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56896 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234182AbiIFKl5 (ORCPT ); Tue, 6 Sep 2022 06:41:57 -0400 Received: from mail.ispras.ru (mail.ispras.ru [83.149.199.84]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7217B5FF6B; Tue, 6 Sep 2022 03:41:47 -0700 (PDT) Received: from localhost.localdomain (unknown [83.149.199.65]) by mail.ispras.ru (Postfix) with ESMTPSA id 107C4407625A; Tue, 6 Sep 2022 10:41:39 +0000 (UTC) From: Evgeniy Baskov To: Ard Biesheuvel Cc: Evgeniy Baskov , Borislav Petkov , Andy Lutomirski , Dave Hansen , Ingo Molnar , Peter Zijlstra , Thomas Gleixner , Alexey Khoroshilov , lvc-project@linuxtesting.org, x86@kernel.org, linux-efi@vger.kernel.org, linux-kernel@vger.kernel.org, linux-hardening@vger.kernel.org Subject: [PATCH 08/16] x86/boot: Remove mapping from page fault handler Date: Tue, 6 Sep 2022 13:41:12 +0300 Message-Id: X-Mailer: git-send-email 2.35.1 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org After every implicit mapping is removed, this code is no longer needed. Remove memory mapping from page fault handler to ensure that there are no hidden invalid memory accesses. Signed-off-by: Evgeniy Baskov --- arch/x86/boot/compressed/ident_map_64.c | 26 ++++++++++--------------- 1 file changed, 10 insertions(+), 16 deletions(-) diff --git a/arch/x86/boot/compressed/ident_map_64.c b/arch/x86/boot/compressed/ident_map_64.c index 880e08293023..c20cd31e665f 100644 --- a/arch/x86/boot/compressed/ident_map_64.c +++ b/arch/x86/boot/compressed/ident_map_64.c @@ -385,27 +385,21 @@ void do_boot_page_fault(struct pt_regs *regs, unsigned long error_code) { unsigned long address = native_read_cr2(); unsigned long end; - bool ghcb_fault; + char *msg; - ghcb_fault = sev_es_check_ghcb_fault(address); + if (sev_es_check_ghcb_fault(address)) + msg = "Page-fault on GHCB page:"; + else + msg = "Unexpected page-fault:"; address &= PMD_MASK; end = address + PMD_SIZE; /* - * Check for unexpected error codes. Unexpected are: - * - Faults on present pages - * - User faults - * - Reserved bits set - */ - if (error_code & (X86_PF_PROT | X86_PF_USER | X86_PF_RSVD)) - do_pf_error("Unexpected page-fault:", error_code, address, regs->ip); - else if (ghcb_fault) - do_pf_error("Page-fault on GHCB page:", error_code, address, regs->ip); - - /* - * Error code is sane - now identity map the 2M region around - * the faulting address. + * Since all memory allocations are made explicit + * now, every page fault at this stage is an + * error and the error handler is there only + * for debug purposes. */ - kernel_add_identity_map(address, end, MAP_WRITE); + do_pf_error(msg, error_code, address, regs->ip); } -- 2.35.1