From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id C6765C433EF for ; Fri, 4 Mar 2022 19:13:27 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 553438D0002; Fri, 4 Mar 2022 14:13:27 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 503058D0001; Fri, 4 Mar 2022 14:13:27 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 37DD98D0002; Fri, 4 Mar 2022 14:13:27 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0203.hostedemail.com [216.40.44.203]) by kanga.kvack.org (Postfix) with ESMTP id 27AFA8D0001 for ; Fri, 4 Mar 2022 14:13:27 -0500 (EST) Received: from smtpin30.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay01.hostedemail.com (Postfix) with ESMTP id D04E0181C9D45 for ; Fri, 4 Mar 2022 19:13:26 +0000 (UTC) X-FDA: 79207652412.30.0FC9A1F Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by imf02.hostedemail.com (Postfix) with ESMTP id 28F3D8000E for ; Fri, 4 Mar 2022 19:13:25 +0000 (UTC) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id ABBBBB82A4D; Fri, 4 Mar 2022 19:13:24 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id CF926C340E9; Fri, 4 Mar 2022 19:13:20 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1646421203; bh=qL6iqVP9OuyTm0GEY6s+DvIkOVU6QwersrNGlp/pNAQ=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From; b=qXFhsWwdJChSBrDiMNOy0W8bhNXVxM23uT12zfeia9Z23pQeNq4I5Uyrn1kQyQlIW kVtJ0+0yktLFpXWeTdWJz/Ef7ePZgmYXnhrh8pxGYaUTUYvD7JfZLCFWySSAtZxBb9 HptwyzSm1L3GGbPU5l0sYvjP7ENIid06nY9cz3lAmiUAYX0wcl++MiSOwpwhVRxRYS PKnSglCpB63Tld61KR1bHnvp+avLCEt8V3GMXDhSOpH/fN9LXooTP2A5dYnpO9eNc0 Z2xTgl8l0O4ojStWwDFwQ0mhdYxGSLlRl1qdptva51LvsQXc98hh4BXaeO/AwCke01 MGyu/FC5Db62Q== Message-ID: <40a3500c-835a-60b0-15bf-40c6622ad013@kernel.org> Date: Fri, 4 Mar 2022 11:13:19 -0800 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.5.0 Subject: Re: [PATCH 00/35] Shadow stacks for userspace Content-Language: en-US To: "Edgecombe, Rick P" , "rppt@kernel.org" Cc: "bsingharora@gmail.com" , "hpa@zytor.com" , "Syromiatnikov, Eugene" , "peterz@infradead.org" , "rdunlap@infradead.org" , "keescook@chromium.org" , "0x7f454c46@gmail.com" <0x7f454c46@gmail.com>, "Eranian, Stephane" , "kirill.shutemov@linux.intel.com" , "dave.hansen@linux.intel.com" , "linux-mm@kvack.org" , "adrian@lisas.de" , "fweimer@redhat.com" , "nadav.amit@gmail.com" , "jannh@google.com" , "avagin@gmail.com" , "kcc@google.com" , "linux-arch@vger.kernel.org" , "pavel@ucw.cz" , "oleg@redhat.com" , "hjl.tools@gmail.com" , "bp@alien8.de" , "linux-doc@vger.kernel.org" , "arnd@arndb.de" , "Moreira, Joao" , "tglx@linutronix.de" , "mike.kravetz@oracle.com" , "x86@kernel.org" , "Yang, Weijiang" , "dave.martin@arm.com" , "john.allen@amd.com" , "mingo@redhat.com" , "Hansen, Dave" , "corbet@lwn.net" , "linux-kernel@vger.kernel.org" , "gorcunov@gmail.com" , "Shankar, Ravi V" , "linux-api@vger.kernel.org" References: <357664de-b089-4617-99d1-de5098953c80@www.fastmail.com> <8e36f20723ca175db49ed3cc73e42e8aa28d2615.camel@intel.com> <9d664c91-2116-42cc-ef8d-e6d236de43d0@kernel.org> <5a792e77-0072-4ded-9f89-e7fcc7f7a1d6@www.fastmail.com> <05df964f-552e-402e-981c-a8bea11c555c@www.fastmail.com> From: Andy Lutomirski In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Rspamd-Server: rspam09 X-Rspamd-Queue-Id: 28F3D8000E X-Stat-Signature: hcigcx89cdcdf99htsxqbj6tfdtgwz4x Authentication-Results: imf02.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=qXFhsWwd; spf=pass (imf02.hostedemail.com: domain of luto@kernel.org designates 145.40.68.75 as permitted sender) smtp.mailfrom=luto@kernel.org; dmarc=pass (policy=none) header.from=kernel.org X-Rspam-User: X-HE-Tag: 1646421205-960843 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On 3/3/22 17:30, Edgecombe, Rick P wrote: > On Thu, 2022-03-03 at 15:00 -0800, Andy Lutomirski wrote: >>>> The intent of PTRACE_CALL_FUNCTION_SIGFRAME is push a signal >>>> frame onto >>>> the stack and call a function. That function should then be able >>>> to call >>>> sigreturn just like any normal signal handler. >>> >>> Ok, let me reiterate. >>> >>> We have a seized and stopped tracee, use >>> PTRACE_CALL_FUNCTION_SIGFRAME >>> to push a signal frame onto the tracee's stack so that sigreturn >>> could use >>> that frame, then set the tracee %rip to the function we'd like to >>> call and >>> then we PTRACE_CONT the tracee. Tracee continues to execute the >>> parasite >>> code that calls sigreturn to clean up and restore the tracee >>> process. >>> >>> PTRACE_CALL_FUNCTION_SIGFRAME also pushes a restore token to the >>> shadow >>> stack, just like setup_rt_frame() does, so that sys_rt_sigreturn() >>> won't >>> bail out at restore_signal_shadow_stack(). >> >> That is the intent. >> >>> >>> The only thing that CRIU actually needs is to push a restore token >>> to the >>> shadow stack, so for us a ptrace call that does that would be >>> ideal. >>> >> >> That seems fine too. The main benefit of the SIGFRAME approach is >> that, AIUI, CRIU eventually constructs a signal frame anyway, and >> getting one ready-made seems plausibly helpful. But if it's not >> actually that useful, then there's no need to do it. > > I guess pushing a token to the shadow stack could be done like GDB does > calls, with just the basic CET ptrace support. So do we even need a > specific push token operation? > > I suppose if CRIU already used some kernel encapsulation of a seized > call/return operation it would have been easier to make CRIU work with > the introduction of CET. But the design of CRIU seems to be to have the > kernel expose just enough and then tie it all together in userspace. > > Andy, did you have any other usages for PTRACE_CALL_FUNCTION in mind? I > couldn't find any other CRIU-like users of sigreturn in the debian > source search (but didn't read all 819 pages that come up with > "sigreturn"). It seemed to be mostly seccomp sandbox references. I don't see a benefit compelling enough to justify the added complexity, given that existing mechanisms can do it. The sigframe thing, OTOH, seems genuinely useful if CRIU would actually use it to save the full register state. Generating a signal frame from scratch is a pain. That being said, if CRIU isn't excited, then don't bother.