From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id DE98AC54ED0 for ; Fri, 23 May 2025 05:32:25 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 7D6406B00B6; Fri, 23 May 2025 01:32:25 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 786866B00B7; Fri, 23 May 2025 01:32:25 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 64E016B00B8; Fri, 23 May 2025 01:32:25 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id 456A16B00B6 for ; Fri, 23 May 2025 01:32:25 -0400 (EDT) Received: from smtpin24.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay03.hostedemail.com (Postfix) with ESMTP id 0A3F8BF394 for ; Fri, 23 May 2025 05:32:25 +0000 (UTC) X-FDA: 83473052250.24.A2EAD6C Received: from mail-pf1-f174.google.com (mail-pf1-f174.google.com [209.85.210.174]) by imf29.hostedemail.com (Postfix) with ESMTP id 2E730120002 for ; Fri, 23 May 2025 05:32:22 +0000 (UTC) Authentication-Results: imf29.hostedemail.com; dkim=pass header.d=rivosinc-com.20230601.gappssmtp.com header.s=20230601 header.b=2tUs3lOm; dmarc=none; spf=pass (imf29.hostedemail.com: domain of debug@rivosinc.com designates 209.85.210.174 as permitted sender) smtp.mailfrom=debug@rivosinc.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1747978343; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=yRnM3kLgnOCZeIzQJIruoz3P2oluX6HqxU/D24zp/GY=; b=fBMmFbBL5G8Q7QOiSxc4hQ48PknOEH+UN+N1n57/zj06eyFaitUa0yt9pSXlzb5pC+FJlK Lqh18yUnsAtTBPPPrym0cO4Ods4RvxoTS/coVwHmQJ1fk8Y9VpB5vEEwGxHxTyN9ta0GFL i1JAwtzoJGw3tUzKmFTBUhQy5VPPcQM= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1747978343; a=rsa-sha256; cv=none; b=XjTELaRnEkN7njObMvsuPRs6baqP5ill0UisZSpnKss1HLaNwIwpgzOdOR1zcZUHqZ/EtX IGYaxhhc1CzJ5Wg1sh4KPYyNoqRXsWgfQAalp2XRXk4HUf1Ecqrcqigz/TNLzbnPMknNk+ NxrfwIMBcj9TtEfJxE8p9F06zaFXJvk= ARC-Authentication-Results: i=1; imf29.hostedemail.com; dkim=pass header.d=rivosinc-com.20230601.gappssmtp.com header.s=20230601 header.b=2tUs3lOm; dmarc=none; spf=pass (imf29.hostedemail.com: domain of debug@rivosinc.com designates 209.85.210.174 as permitted sender) smtp.mailfrom=debug@rivosinc.com Received: by mail-pf1-f174.google.com with SMTP id d2e1a72fcca58-7376dd56f8fso9953023b3a.2 for ; Thu, 22 May 2025 22:32:22 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rivosinc-com.20230601.gappssmtp.com; s=20230601; t=1747978342; x=1748583142; darn=kvack.org; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:from:to:cc:subject:date:message-id :reply-to; bh=yRnM3kLgnOCZeIzQJIruoz3P2oluX6HqxU/D24zp/GY=; b=2tUs3lOm5c9bTRB2rIUHnFULRiAi+ffede8urorm+dEERkms3atlZIFcQTCCnYrZuH KsVpl88zmUrJyNuKYh3gVL6Uy8ISAH1nXfX3VxyzLOEBiYOXq/eoHDhXL0mI4UjTAvEm zmnAf5lNaAr3YBRIP1MPAelGd2E8becYU+nq6rDpED0v4hC5H0Ui7LJRaip1qIMqs1kM nTy4G8p2xkNbIoIeM97RRiutiszJjSdI/kRksDGiqKvJgiYj9aDGg+NKYGb7skNl7Hdf w+y6mSbktsZ6B5Uz0T+fszVPXK0l1eG4YMmWqVfV9CoXZaPzXI6e98rD0YbZl6vOEsYe NfLw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1747978342; x=1748583142; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=yRnM3kLgnOCZeIzQJIruoz3P2oluX6HqxU/D24zp/GY=; b=dWGFq93U9hGGAXE4UPP2AdJAD5jUZq0gXrYVkSVByMKopbg+2CSVx8zvdVEW3XERzb xEOZJ0kCErJuv3YO+Zh4ZXgViDyOe0I3dVqIE1L9Hv4kX3MBTtqL6YVGZkb463If3Fy8 dlk5vvtB4LNSgYlti4UUaaOP6MTNqT+8XgeIIrm0JT2RffGNrw6bqt6JlwN7VdIM0UuA M0hb40853aAAxc1SFAWFDAQFcF6rpHFrGG3LTlM7hnLIip/3LvnFFqyaMYfRfUIOr1ZH jq4HLZ/u7f29xss7/UDPO8Dhslp22mUjURaeJA71lbHAZODlShjsSy3xykuQXUBubE2Z cNjw== X-Forwarded-Encrypted: i=1; AJvYcCUYk/BhFPnV/VV3LMAV9+2RDGQwV/P+LOxet1dsKPzcG6rl3urBZ5n2yzWcLp/GeqMVbtM8xsQD0g==@kvack.org X-Gm-Message-State: AOJu0Ywm6hZ2N/fTyv+TNSYdQx1TUNQ2iTQv5UIyXESmLldnxJwifRI1 hvX8vsZTHEsS/FlK7RVUAcMLIoNMUnWNMIuZGkxbXpD4bV9oDb1pzHe49t2MQ/PVLnc= X-Gm-Gg: ASbGncu/OISFPrEoGyuidtYnr8zLENltjag8JsHPoqSpb74OWKN7TXELnnhux5ftv5X R9v7eUOr9UuFHi8P3NmuZjCH7VO+9CZesodm3wpjZ3jDSJPiRgIrLA8uVMAyWKypy5SqeGxf+E6 qHJ0VOhIgC+XbdrHQ7TE6T5I4EeBNq3YF1k1ZgxvPdZqCd5P7ZLjJX06+vdcucmtmz2RB7kw9ut h3+efDKaGXxCI7hy+r/Tc9bf+krwU5tidIgvdqMrfEz7mAj98R7JTVVVBqK3lRbECQBADWajVsB jBbIoUKDkqzMXb8UyxgUu875Bha3NYNWwYb6LT3T4Y8NCk2p8JOmREP6l/ZzcQ== X-Google-Smtp-Source: AGHT+IHT5r7hZsDBKWFrZf2/jQ/WeyhEySzx8zSoqslIYKuUifsHvwAL5L/j5ttAw0PGjlFuVr8d3w== X-Received: by 2002:a05:6a20:6a10:b0:1f5:769a:a4b2 with SMTP id adf61e73a8af0-216218a508bmr37531257637.17.1747978341980; Thu, 22 May 2025 22:32:21 -0700 (PDT) Received: from debug.ba.rivosinc.com ([64.71.180.162]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-742a982a0a4sm12474336b3a.101.2025.05.22.22.32.18 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 22 May 2025 22:32:21 -0700 (PDT) From: Deepak Gupta Date: Thu, 22 May 2025 22:31:24 -0700 Subject: [PATCH v16 21/27] riscv: kernel command line option to opt out of user cfi MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Message-Id: <20250522-v5_user_cfi_series-v16-21-64f61a35eee7@rivosinc.com> References: <20250522-v5_user_cfi_series-v16-0-64f61a35eee7@rivosinc.com> In-Reply-To: <20250522-v5_user_cfi_series-v16-0-64f61a35eee7@rivosinc.com> To: Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , x86@kernel.org, "H. Peter Anvin" , Andrew Morton , "Liam R. Howlett" , Vlastimil Babka , Lorenzo Stoakes , Paul Walmsley , Palmer Dabbelt , Albert Ou , Conor Dooley , Rob Herring , Krzysztof Kozlowski , Arnd Bergmann , Christian Brauner , Peter Zijlstra , Oleg Nesterov , Eric Biederman , Kees Cook , Jonathan Corbet , Shuah Khan , Jann Horn , Conor Dooley , Miguel Ojeda , Alex Gaynor , Boqun Feng , Gary Guo , =?utf-8?q?Bj=C3=B6rn_Roy_Baron?= , Benno Lossin , Andreas Hindborg , Alice Ryhl , Trevor Gross Cc: linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-mm@kvack.org, linux-riscv@lists.infradead.org, devicetree@vger.kernel.org, linux-arch@vger.kernel.org, linux-doc@vger.kernel.org, linux-kselftest@vger.kernel.org, alistair.francis@wdc.com, richard.henderson@linaro.org, jim.shu@sifive.com, andybnac@gmail.com, kito.cheng@sifive.com, charlie@rivosinc.com, atishp@rivosinc.com, evan@rivosinc.com, cleger@rivosinc.com, alexghiti@rivosinc.com, samitolvanen@google.com, broonie@kernel.org, rick.p.edgecombe@intel.com, rust-for-linux@vger.kernel.org, Deepak Gupta X-Mailer: b4 0.13.0 X-Rspamd-Server: rspam10 X-Rspamd-Queue-Id: 2E730120002 X-Stat-Signature: dsmyrqzdns3ca5mih5hwue5egzuopdos X-Rspam-User: X-HE-Tag: 1747978342-6119 X-HE-Meta: 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 EUJ4OHeD cb4coAyw2uuSUo/Z32xWSUTZ72yZUow5EfvzFFBvskY1mF6adlDfC222Fppe0H1DoCHoYZbrJHJP7k1gRLgka79P2CXZPf/Emmt/QA2UpiYDuhF1YrLDZxwyt5wkjrqz56jg57WXV0y6Evia7sJxmGWBjprgmkj8EOg7oFquilhSx2uXTkQYHysUkVoLTOwalIwLpFlhvOqM61lo4TkYBCwH6ZgpRnfKT3ajLhRRaIunFx/Px7tBTguQj5ye0D/8NsF6CXFcUYIkE+/PMUQ/utbEGiNIIImuXyHnlUelSciBzG7ErltZ7f3aJd3asEzEKekBHGobaJW0zJpT+F5COkL/nj1QjMX46xP22dofpSyyWvGY+VwwC4YL8aF3Z3iXhj2MaUHjqtKNGT7gH7ooidvgR4stSyck8LWOQwDCQ4vdig3aLcBfBUQl0iYXvE7+jh+jrgPSk5MURQfAoj4UZq25o+g== X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: This commit adds a kernel command line option using which user cfi can be disabled. User backward cfi and forward cfi can be enabled independently. Kernel command line parameter "riscv_nousercfi" can take below values: - "all" : Disable forward and backward cfi both. - "bcfi" : Disable backward cfi. - "fcfi" : Disable forward cfi Signed-off-by: Deepak Gupta --- Documentation/admin-guide/kernel-parameters.txt | 8 ++++ arch/riscv/include/asm/usercfi.h | 7 +++ arch/riscv/kernel/cpufeature.c | 9 +++- arch/riscv/kernel/usercfi.c | 59 ++++++++++++++++++++----- 4 files changed, 70 insertions(+), 13 deletions(-) diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt index 76e538c77e31..f75d50420a56 100644 --- a/Documentation/admin-guide/kernel-parameters.txt +++ b/Documentation/admin-guide/kernel-parameters.txt @@ -6237,6 +6237,14 @@ replacement properties are not found. See the Kconfig entry for RISCV_ISA_FALLBACK. + riscv_nousercfi= + all Disable user cfi ABI to userspace even if cpu extension + are available. + bcfi Disable user backward cfi ABI to userspace even if + shadow stack extension is available. + fcfi Disable user forward cfi ABI to userspace even if landing + pad extension is available. + ro [KNL] Mount root device read-only on boot rodata= [KNL,EARLY] diff --git a/arch/riscv/include/asm/usercfi.h b/arch/riscv/include/asm/usercfi.h index 68da5b7b79fd..6867ba6bd5a5 100644 --- a/arch/riscv/include/asm/usercfi.h +++ b/arch/riscv/include/asm/usercfi.h @@ -5,6 +5,10 @@ #ifndef _ASM_RISCV_USERCFI_H #define _ASM_RISCV_USERCFI_H +#define CMDLINE_DISABLE_RISCV_USERCFI_FCFI 1 +#define CMDLINE_DISABLE_RISCV_USERCFI_BCFI 2 +#define CMDLINE_DISABLE_RISCV_USERCFI 3 + #ifndef __ASSEMBLY__ #include #include @@ -83,6 +87,9 @@ void set_indir_lp_lock(struct task_struct *task); #endif /* CONFIG_RISCV_USER_CFI */ +bool is_user_shstk_enabled(void); +bool is_user_lpad_enabled(void); + #endif /* __ASSEMBLY__ */ #endif /* _ASM_RISCV_USERCFI_H */ diff --git a/arch/riscv/kernel/cpufeature.c b/arch/riscv/kernel/cpufeature.c index c54de1bbe206..bf2035c0c136 100644 --- a/arch/riscv/kernel/cpufeature.c +++ b/arch/riscv/kernel/cpufeature.c @@ -28,6 +28,7 @@ #include #include #include +#include #define NUM_ALPHA_EXTS ('z' - 'a' + 1) @@ -44,6 +45,8 @@ struct riscv_isainfo hart_isa[NR_CPUS]; u32 thead_vlenb_of; +extern unsigned int riscv_nousercfi; + /** * riscv_isa_extension_base() - Get base extension word * @@ -261,7 +264,8 @@ static int riscv_ext_svadu_validate(const struct riscv_isa_ext_data *data, static int riscv_cfilp_validate(const struct riscv_isa_ext_data *data, const unsigned long *isa_bitmap) { - if (!IS_ENABLED(CONFIG_RISCV_USER_CFI)) + if (!IS_ENABLED(CONFIG_RISCV_USER_CFI) || + (riscv_nousercfi & CMDLINE_DISABLE_RISCV_USERCFI_FCFI)) return -EINVAL; return 0; @@ -270,7 +274,8 @@ static int riscv_cfilp_validate(const struct riscv_isa_ext_data *data, static int riscv_cfiss_validate(const struct riscv_isa_ext_data *data, const unsigned long *isa_bitmap) { - if (!IS_ENABLED(CONFIG_RISCV_USER_CFI)) + if (!IS_ENABLED(CONFIG_RISCV_USER_CFI) || + (riscv_nousercfi & CMDLINE_DISABLE_RISCV_USERCFI_BCFI)) return -EINVAL; return 0; diff --git a/arch/riscv/kernel/usercfi.c b/arch/riscv/kernel/usercfi.c index 8bc3e1e3f712..5ef357f43ad7 100644 --- a/arch/riscv/kernel/usercfi.c +++ b/arch/riscv/kernel/usercfi.c @@ -17,6 +17,8 @@ #include #include +unsigned int riscv_nousercfi; + #define SHSTK_ENTRY_SIZE sizeof(void *) bool is_shstk_enabled(struct task_struct *task) @@ -59,7 +61,7 @@ unsigned long get_active_shstk(struct task_struct *task) void set_shstk_status(struct task_struct *task, bool enable) { - if (!cpu_supports_shadow_stack()) + if (!is_user_shstk_enabled()) return; task->thread_info.user_cfi_state.ubcfi_en = enable ? 1 : 0; @@ -89,7 +91,7 @@ bool is_indir_lp_locked(struct task_struct *task) void set_indir_lp_status(struct task_struct *task, bool enable) { - if (!cpu_supports_indirect_br_lp_instr()) + if (!is_user_lpad_enabled()) return; task->thread_info.user_cfi_state.ufcfi_en = enable ? 1 : 0; @@ -259,7 +261,7 @@ SYSCALL_DEFINE3(map_shadow_stack, unsigned long, addr, unsigned long, size, unsi bool set_tok = flags & SHADOW_STACK_SET_TOKEN; unsigned long aligned_size = 0; - if (!cpu_supports_shadow_stack()) + if (!is_user_shstk_enabled()) return -EOPNOTSUPP; /* Anything other than set token should result in invalid param */ @@ -306,7 +308,7 @@ unsigned long shstk_alloc_thread_stack(struct task_struct *tsk, unsigned long addr, size; /* If shadow stack is not supported, return 0 */ - if (!cpu_supports_shadow_stack()) + if (!is_user_shstk_enabled()) return 0; /* @@ -352,7 +354,7 @@ void shstk_release(struct task_struct *tsk) { unsigned long base = 0, size = 0; /* If shadow stack is not supported or not enabled, nothing to release */ - if (!cpu_supports_shadow_stack() || !is_shstk_enabled(tsk)) + if (!is_user_shstk_enabled() || !is_shstk_enabled(tsk)) return; /* @@ -381,7 +383,7 @@ int arch_get_shadow_stack_status(struct task_struct *t, unsigned long __user *st { unsigned long bcfi_status = 0; - if (!cpu_supports_shadow_stack()) + if (!is_user_shstk_enabled()) return -EINVAL; /* this means shadow stack is enabled on the task */ @@ -395,7 +397,7 @@ int arch_set_shadow_stack_status(struct task_struct *t, unsigned long status) unsigned long size = 0, addr = 0; bool enable_shstk = false; - if (!cpu_supports_shadow_stack()) + if (!is_user_shstk_enabled()) return -EINVAL; /* Reject unknown flags */ @@ -448,7 +450,7 @@ int arch_lock_shadow_stack_status(struct task_struct *task, unsigned long arg) { /* If shtstk not supported or not enabled on task, nothing to lock here */ - if (!cpu_supports_shadow_stack() || + if (!is_user_shstk_enabled() || !is_shstk_enabled(task) || arg != 0) return -EINVAL; @@ -461,7 +463,7 @@ int arch_get_indir_br_lp_status(struct task_struct *t, unsigned long __user *sta { unsigned long fcfi_status = 0; - if (!cpu_supports_indirect_br_lp_instr()) + if (!is_user_lpad_enabled()) return -EINVAL; /* indirect branch tracking is enabled on the task or not */ @@ -474,7 +476,7 @@ int arch_set_indir_br_lp_status(struct task_struct *t, unsigned long status) { bool enable_indir_lp = false; - if (!cpu_supports_indirect_br_lp_instr()) + if (!is_user_lpad_enabled()) return -EINVAL; /* indirect branch tracking is locked and further can't be modified by user */ @@ -498,7 +500,7 @@ int arch_lock_indir_br_lp_status(struct task_struct *task, * If indirect branch tracking is not supported or not enabled on task, * nothing to lock here */ - if (!cpu_supports_indirect_br_lp_instr() || + if (!is_user_lpad_enabled() || !is_indir_lp_enabled(task) || arg != 0) return -EINVAL; @@ -506,3 +508,38 @@ int arch_lock_indir_br_lp_status(struct task_struct *task, return 0; } + +bool is_user_shstk_enabled(void) +{ + return (cpu_supports_shadow_stack() && + !(riscv_nousercfi & CMDLINE_DISABLE_RISCV_USERCFI_BCFI)); +} + +bool is_user_lpad_enabled(void) +{ + return (cpu_supports_indirect_br_lp_instr() && + !(riscv_nousercfi & CMDLINE_DISABLE_RISCV_USERCFI_FCFI)); +} + +static int __init setup_global_riscv_enable(char *str) +{ + if (strcmp(str, "all") == 0) + riscv_nousercfi = CMDLINE_DISABLE_RISCV_USERCFI; + + if (strcmp(str, "fcfi") == 0) + riscv_nousercfi |= CMDLINE_DISABLE_RISCV_USERCFI_FCFI; + + if (strcmp(str, "bcfi") == 0) + riscv_nousercfi |= CMDLINE_DISABLE_RISCV_USERCFI_BCFI; + + if (riscv_nousercfi) + pr_info("riscv user cfi disabled via cmdline" + "shadow stack status : %s, landing pad status : %s\n", + (riscv_nousercfi & CMDLINE_DISABLE_RISCV_USERCFI_BCFI) ? "disabled" : + "enabled", (riscv_nousercfi & CMDLINE_DISABLE_RISCV_USERCFI_FCFI) ? + "disabled" : "enabled"); + + return 1; +} + +__setup("riscv_nousercfi=", setup_global_riscv_enable); -- 2.43.0