Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp4395670rwd; Tue, 30 May 2023 05:03:15 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ5qkdD+VYEiVz5gzHKu9HbXsxXpNoP0e8a0JU6LmA+KLqgSVcS0RgI+SMPh8CYFtGcGXkKw X-Received: by 2002:a05:6a20:3cab:b0:103:377e:439e with SMTP id b43-20020a056a203cab00b00103377e439emr2311517pzj.60.1685448194838; Tue, 30 May 2023 05:03:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1685448194; cv=none; d=google.com; s=arc-20160816; b=lr23Y/MhUCQmz4stpsyYWfkO5jEwHMgwbNY6v9qFCd0zF/Ijk39YLKmFFEzQzr5yZE aWbFIjWl/5EzfThaGJJ+Cx4lbHlhA0CkAwxzr0YLG98+wp8G0aoGFu8P8wtNtwfsn8qC bwTGl/HGAJr1tPpCU5Wk3ZW1Kpst68L3+VRszhVMWNSd6HAoOmKqlFPDBY5OIcSIUtTq hu04F68CsgPPB2ay+5ekE1di+0CkP+syV2VuIhG6Eo7kA94WX3GkZjGSM8C/O4zK1U8R RGPIsWTSl0QwYNJPTOVTIZs4CO9RDko4qMOzPtFGqup6IY/TGTrkXojP6/XlBxlhx2go p3Iw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:to:from :dkim-signature; bh=NrbQgNKvC+Km7rjL55qAjWx1ob3gwRNH/jH3SDy4wD4=; b=A+n3dzdGhL+906ziSLn+uavgb0bG8lxjkZEQq/bIBEeCYzCgbJEFEg2KgGBH5M1u7v upuqCahGXOCfrVEGsMvyB6xrWjkt6h55eVMrgP6r75FA5wDzGtbgcxbzxjTR8LNu/CRY irztcRVSMblS9ET9+kAEJUT7zXp4MGMZ+Sl8UWP+js1SFPO8LcMUwQ+Kz/B7L6hNnyrD P3IHiBge+HIbrffBgOKoEeszu9cAW+omCVPuXepCPzWgSdO8/9/o63AwijSl3hEE8lcm C7js/OHeUbyue72e3nUPYI/XenBuZFdYbJu6u6jiCfpGTcGu0ouSJxjIgU+QlY7zeNS5 PL+Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=BSphozwy; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id n4-20020a632704000000b005346b8dae84si8065946pgn.787.2023.05.30.05.03.00; Tue, 30 May 2023 05:03:14 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=BSphozwy; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231334AbjE3Loc (ORCPT + 99 others); Tue, 30 May 2023 07:44:32 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47062 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231558AbjE3Lnx (ORCPT ); Tue, 30 May 2023 07:43:53 -0400 Received: from mga01.intel.com (mga01.intel.com [192.55.52.88]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 44206D9 for ; Tue, 30 May 2023 04:43:45 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1685447025; x=1716983025; h=from:to:subject:date:message-id:in-reply-to:references: mime-version:content-transfer-encoding; bh=gvJTTiJQPueT57YJhcau7miaCzoaYCvVoo9At4Pni/s=; b=BSphozwyPcGocoBFxHvJo5aOWSmGBQ6ZzVQ1uMeUEKp1cRd2X19aJkfl Wf4YAhXsx8TBRNDzMccqvO7/cRNtexYmlynV5qNWt6PkCcXHbacsPXuSk 6FnPccwVKpI3UAr51P/ROkiUKFbWZ2i0cm3GrGasd4/sz8AXzDVqnxJcb cQySVcqvFKr9qxgqMGUAXq2nANL27SiCCtLQekZhAHcz2I84XujggiBjk I9yYLMLoIq6QymzjSjo5X+8sDNUpMRqPKD3e4UGqyOpp8a8vpSR+tQ4cf FxwaK9oQ20KYxvgct2b3WGz6S8LKsZnFSix3LfNrT1iALOlddSKxBBaaE Q==; X-IronPort-AV: E=McAfee;i="6600,9927,10725"; a="383145391" X-IronPort-AV: E=Sophos;i="6.00,204,1681196400"; d="scan'208";a="383145391" Received: from orsmga007.jf.intel.com ([10.7.209.58]) by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 30 May 2023 04:43:20 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10725"; a="700588756" X-IronPort-AV: E=Sophos;i="6.00,204,1681196400"; d="scan'208";a="700588756" Received: from black.fi.intel.com (HELO black.fi.intel.com.) ([10.237.72.28]) by orsmga007.jf.intel.com with ESMTP; 30 May 2023 04:43:17 -0700 From: Alexander Shishkin To: linux-kernel@vger.kernel.org, x86@kernel.org, Andy Lutomirski , Dave Hansen , Ravi Shankar , Tony Luck , Sohil Mehta , Paul Lai Subject: [PATCH v2 09/12] x86/vsyscall: Disable LASS if vsyscall mode is set to EMULATE Date: Tue, 30 May 2023 14:42:44 +0300 Message-Id: <20230530114247.21821-10-alexander.shishkin@linux.intel.com> X-Mailer: git-send-email 2.39.2 In-Reply-To: <20230530114247.21821-1-alexander.shishkin@linux.intel.com> References: <20230530114247.21821-1-alexander.shishkin@linux.intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-4.5 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_NONE, T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Sohil Mehta The EMULATE mode of vsyscall maps the vsyscall page into user address space which can be read directly by the user application. This mode has been deprecated recently and can only be enabled from a special command line parameter vsyscall=emulate. See commit bf00745e7791 ("x86/vsyscall: Remove CONFIG_LEGACY_VSYSCALL_EMULATE") Fixing the LASS violations during the EMULATE mode would need complex instruction decoding since the resulting #GP fault does not include any useful error information and the vsyscall address is not readily available in the RIP. At this point, no one is expected to be using the insecure and deprecated EMULATE mode. The rare usages that need support probably don't care much about security anyway. Disable LASS when EMULATE mode is requested during command line parsing to avoid breaking user software. LASS will be supported if vsyscall mode is set to XONLY or NONE. Signed-off-by: Sohil Mehta --- arch/x86/entry/vsyscall/vsyscall_64.c | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/arch/x86/entry/vsyscall/vsyscall_64.c b/arch/x86/entry/vsyscall/vsyscall_64.c index 76e1344997d2..edd58eda8f50 100644 --- a/arch/x86/entry/vsyscall/vsyscall_64.c +++ b/arch/x86/entry/vsyscall/vsyscall_64.c @@ -36,6 +36,7 @@ #include #include #include +#include #include #include @@ -63,6 +64,13 @@ static int __init vsyscall_setup(char *str) else return -EINVAL; + if (cpu_feature_enabled(X86_FEATURE_LASS) && + vsyscall_mode == EMULATE) { + cr4_clear_bits(X86_CR4_LASS); + setup_clear_cpu_cap(X86_FEATURE_LASS); + pr_info_once("x86/cpu: Disabling LASS support due to vsyscall=emulate\n"); + } + return 0; } -- 2.39.2