Received: by 2002:a05:7412:b995:b0:f9:9502:5bb8 with SMTP id it21csp6808104rdb; Tue, 2 Jan 2024 14:25:30 -0800 (PST) X-Google-Smtp-Source: AGHT+IGfT4lLHKj9x8hYxSY/1sH2KdRnC/cTQft+ua3W9+UrQ3GmrxD9Fk6Olqk8sNcD2dXaGdMB X-Received: by 2002:a05:620a:2689:b0:781:2b9d:f155 with SMTP id c9-20020a05620a268900b007812b9df155mr23267067qkp.29.1704234330490; Tue, 02 Jan 2024 14:25:30 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1704234330; cv=none; d=google.com; s=arc-20160816; b=Cpw/aTVXw9hdFm04GACXbsVs4CWSdE2gxeeyfR511YzSNdxhTqctacGZadVVy90Cvs 40bQx2pbmbTIghOMw7y+KkuULe5JUu376lkKPUcOcj6UubXVWhOLcEJEIJ9yX6kQtMCI jSt12ak41MBw1ZelOsXhb7Zul8RNB+9tQ6pmLwD93ihQHOLo2YBcl0KzQZF2ina5/ntm 64dh24OghnJs/P2fWp9/VdPZcrTlfMdJ2OOJQJby3iGMOH3G4lzstV/uoB60WiNSx1Pb TtC6zInkIj5Y3MhgVtvoxkoM12+QJ6Vk8260x6wUNW3Wl+cwLnAIkFeNaqI9AZ3XCoFU O99w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:user-agent:references:in-reply-to :date:cc:to:from:subject:message-id:dkim-signature; bh=CYn/vUM+/4R41HRwQ17+oVSWatSqLcOgnz5S4r/6JAc=; fh=qm/3G+Adpj/B7TaijAEJbs/udoUfJHgp4MqQlWOh7ts=; b=wbJriLVNJ4827iXK97lElFrhIsLx8kWRVwju+jk9rUgrlvfs/FN8/At/5CbGbK6EuY cM0+6YnPbVivT50V4VytqhXWabWnd56m6t0n9SA6YlGGA4Im1OeochwOXWvJf6YHbm8s dOpn6mcN/Tg0Ian5Fn5lpSuvFEIKqRP7EUJC2mYyecbq2QIqKQ7hfF/KQ6Mo/NZW6bkD nf2SPbZ5lHLw/UA6iR+DgGpgktr7Y4MB5PzaboEWDvNnFAFYAI7TQ6JtstGrmw4jErNn 9+g+/tPQYMkXNVbxpOo6/wP1mU2jDEUnHP+VBfEm+mq7eGNEl+dRoDliztLc4xIuqSru h9/w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=grqLAdEn; spf=pass (google.com: domain of linux-kernel+bounces-14936-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-14936-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id pi30-20020a05620a379e00b00781cb2e8277si4350653qkn.133.2024.01.02.14.25.30 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 02 Jan 2024 14:25:30 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-14936-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=grqLAdEn; spf=pass (google.com: domain of linux-kernel+bounces-14936-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-14936-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 1BC1E1C20355 for ; Tue, 2 Jan 2024 22:25:30 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 7D7DF1799C; Tue, 2 Jan 2024 22:24:52 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b="grqLAdEn" X-Original-To: linux-kernel@vger.kernel.org Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 376E517986 for ; Tue, 2 Jan 2024 22:24:49 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=redhat.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1704234289; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=CYn/vUM+/4R41HRwQ17+oVSWatSqLcOgnz5S4r/6JAc=; b=grqLAdEnKi5sHwKjdLVrmIZHZlhPyta1TYXG8GRXRfasCYdJqE2b0VD3xAIIzmb+gFkHCF +qdjori3eIp9jRvbyZKCiVJUYaJLn1Y1eljX+w0XHFfCnNgzjbhlhJStMV0U5Uw2hkreE/ Dlj+iFIxCDI9YdPaGiYi8g52mealqlw= Received: from mail-wm1-f72.google.com (mail-wm1-f72.google.com [209.85.128.72]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-622-BvSn8r_QPzyFVGBSd96hOg-1; Tue, 02 Jan 2024 17:24:47 -0500 X-MC-Unique: BvSn8r_QPzyFVGBSd96hOg-1 Received: by mail-wm1-f72.google.com with SMTP id 5b1f17b1804b1-40d38c09797so92605725e9.0 for ; Tue, 02 Jan 2024 14:24:47 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1704234286; x=1704839086; h=content-transfer-encoding:mime-version:user-agent:references :in-reply-to:date:cc:to:from:subject:message-id:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=CYn/vUM+/4R41HRwQ17+oVSWatSqLcOgnz5S4r/6JAc=; b=G2/69x5R9InDgCmZhHb3FuGfRcyrYtSiHd+T6vVBuHNML3RVI6a09Q53riZ0bZlFMx Z4cqnk2sAnJUO1n19mavm4i1kJA9ZVfbHWIPEdJ7dAZMOQHMdU/Og1uJwENmcAYzB0F5 LxE3Wing+CKn930ZzD4n51OKGGkZ0BWY/N0wKoAzD+bXON4fwQmE/irgzIBepQR14qgD jXfq4gCOt+c+qfUUYLrhVwrjdHB85CU65PhlkOtUD/IDNoEuysPxWodXiFnSfrPTOQ/P whSRjSb3HncWe0xQuaqLfWWjGTqszsA/qqdjL7BEZT/AtSz2XULu8h9j/PPQKyZmb+K7 qqzA== X-Gm-Message-State: AOJu0Ywt9oyi4ejhgVQ1CxzmGCK/R+j+jw5jI6SHU9oih+8D4jPF0ee7 gazDSY1C6dmXi3f66IIuG9FQvvvU+nHjyd/m/faMpqiB4kNJoo9yKMA1qK1m4AgHcQv46UcN45t EixfXrw6+JL0Tw0PbSypw77xZLwscz3uQ X-Received: by 2002:a05:600c:2d84:b0:40b:5e59:ccb3 with SMTP id i4-20020a05600c2d8400b0040b5e59ccb3mr9117491wmg.148.1704234286768; Tue, 02 Jan 2024 14:24:46 -0800 (PST) X-Received: by 2002:a05:600c:2d84:b0:40b:5e59:ccb3 with SMTP id i4-20020a05600c2d8400b0040b5e59ccb3mr9117479wmg.148.1704234286495; Tue, 02 Jan 2024 14:24:46 -0800 (PST) Received: from starship ([147.235.223.38]) by smtp.gmail.com with ESMTPSA id w13-20020a05600c474d00b0040c46719966sm315706wmo.25.2024.01.02.14.24.45 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 02 Jan 2024 14:24:46 -0800 (PST) Message-ID: <5c71c27f0730fc6edcf7d19036d1226786c30364.camel@redhat.com> Subject: Re: [PATCH v8 02/26] x86/fpu/xstate: Refine CET user xstate bit enabling From: Maxim Levitsky To: Yang Weijiang , seanjc@google.com, pbonzini@redhat.com, dave.hansen@intel.com, kvm@vger.kernel.org, linux-kernel@vger.kernel.org Cc: peterz@infradead.org, chao.gao@intel.com, rick.p.edgecombe@intel.com, john.allen@amd.com Date: Wed, 03 Jan 2024 00:24:44 +0200 In-Reply-To: <20231221140239.4349-3-weijiang.yang@intel.com> References: <20231221140239.4349-1-weijiang.yang@intel.com> <20231221140239.4349-3-weijiang.yang@intel.com> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.36.5 (3.36.5-2.fc32) Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 7bit On Thu, 2023-12-21 at 09:02 -0500, Yang Weijiang wrote: > Remove XFEATURE_CET_USER entry from dependency array as the entry doesn't > reflect true dependency between CET features and the user xstate bit. > Enable the bit in fpu_kernel_cfg.max_features when either SHSTK or IBT is > available. > > Both user mode shadow stack and indirect branch tracking features depend > on XFEATURE_CET_USER bit in XSS to automatically save/restore user mode > xstate registers, i.e., IA32_U_CET and IA32_PL3_SSP whenever necessary. > > Note, the issue, i.e., CPUID only enumerates IBT but no SHSTK is resulted > from CET KVM series which synthesizes guest CPUIDs based on userspace > settings,in real world the case is rare. In other words, the existing > dependency check is correct when only user mode SHSTK is available. > > Signed-off-by: Yang Weijiang > Reviewed-by: Rick Edgecombe > Tested-by: Rick Edgecombe > --- > arch/x86/kernel/fpu/xstate.c | 9 ++++++++- > 1 file changed, 8 insertions(+), 1 deletion(-) > > diff --git a/arch/x86/kernel/fpu/xstate.c b/arch/x86/kernel/fpu/xstate.c > index 07911532b108..f6b98693da59 100644 > --- a/arch/x86/kernel/fpu/xstate.c > +++ b/arch/x86/kernel/fpu/xstate.c > @@ -73,7 +73,6 @@ static unsigned short xsave_cpuid_features[] __initdata = { > [XFEATURE_PT_UNIMPLEMENTED_SO_FAR] = X86_FEATURE_INTEL_PT, > [XFEATURE_PKRU] = X86_FEATURE_OSPKE, > [XFEATURE_PASID] = X86_FEATURE_ENQCMD, > - [XFEATURE_CET_USER] = X86_FEATURE_SHSTK, > [XFEATURE_XTILE_CFG] = X86_FEATURE_AMX_TILE, > [XFEATURE_XTILE_DATA] = X86_FEATURE_AMX_TILE, > }; > @@ -798,6 +797,14 @@ void __init fpu__init_system_xstate(unsigned int legacy_size) > fpu_kernel_cfg.max_features &= ~BIT_ULL(i); > } > > + /* > + * CET user mode xstate bit has been cleared by above sanity check. > + * Now pick it up if either SHSTK or IBT is available. Either feature > + * depends on the xstate bit to save/restore user mode states. > + */ > + if (boot_cpu_has(X86_FEATURE_SHSTK) || boot_cpu_has(X86_FEATURE_IBT)) > + fpu_kernel_cfg.max_features |= BIT_ULL(XFEATURE_CET_USER); > + I am still not convinced that this is not a workaround for a bug in the sanity check code, and I don't really like this, but whatever, as long as the code works, I don't intend to fight over this. Let it be. Best regards, Maxim Levitsky > if (!cpu_feature_enabled(X86_FEATURE_XFD)) > fpu_kernel_cfg.max_features &= ~XFEATURE_MASK_USER_DYNAMIC; >