From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-wr1-f69.google.com (mail-wr1-f69.google.com [209.85.221.69]) by kanga.kvack.org (Postfix) with ESMTP id 9F4D86B50DD for ; Thu, 30 Aug 2018 11:56:06 -0400 (EDT) Received: by mail-wr1-f69.google.com with SMTP id g36-v6so6332719wrd.9 for ; Thu, 30 Aug 2018 08:56:06 -0700 (PDT) Received: from mail-sor-f65.google.com (mail-sor-f65.google.com. [209.85.220.65]) by mx.google.com with SMTPS id n198-v6sor580472wmd.1.2018.08.30.08.56.05 for (Google Transport Security); Thu, 30 Aug 2018 08:56:05 -0700 (PDT) MIME-Version: 1.0 In-Reply-To: References: <20180830143904.3168-1-yu-cheng.yu@intel.com> <20180830143904.3168-20-yu-cheng.yu@intel.com> From: Andy Lutomirski Date: Thu, 30 Aug 2018 08:55:44 -0700 Message-ID: Subject: Re: [RFC PATCH v3 19/24] x86/cet/shstk: Introduce WRUSS instruction Content-Type: text/plain; charset="UTF-8" Sender: owner-linux-mm@kvack.org List-ID: To: Jann Horn Cc: Yu-cheng Yu , the arch/x86 maintainers , "H . Peter Anvin" , Thomas Gleixner , Ingo Molnar , kernel list , linux-doc@vger.kernel.org, Linux-MM , linux-arch , Linux API , Arnd Bergmann , Balbir Singh , Cyrill Gorcunov , Dave Hansen , Florian Weimer , "H. J. Lu" , Jonathan Corbet , Kees Cook , Mike Kravetz , Nadav Amit , Oleg Nesterov , Pavel Machek , Peter Zijlstra , "Ravi V. Shankar" , "Shanbhogue, Vedvyas" On Thu, Aug 30, 2018 at 8:39 AM, Jann Horn wrote: > On Thu, Aug 30, 2018 at 4:44 PM Yu-cheng Yu wrote: >> >> WRUSS is a new kernel-mode instruction but writes directly >> to user shadow stack memory. This is used to construct >> a return address on the shadow stack for the signal >> handler. >> >> This instruction can fault if the user shadow stack is >> invalid shadow stack memory. In that case, the kernel does >> fixup. >> >> Signed-off-by: Yu-cheng Yu > [...] >> +static inline int write_user_shstk_64(unsigned long addr, unsigned long val) >> +{ >> + int err = 0; >> + >> + asm volatile("1: wrussq %1, (%0)\n" >> + "2:\n" >> + _ASM_EXTABLE_HANDLE(1b, 2b, ex_handler_wruss) >> + : >> + : "r" (addr), "r" (val)); >> + >> + return err; >> +} > > What's up with "err"? You set it to zero, and then you return it, but > nothing can ever set it to non-zero, right? > >> +__visible bool ex_handler_wruss(const struct exception_table_entry *fixup, >> + struct pt_regs *regs, int trapnr) >> +{ >> + regs->ip = ex_fixup_addr(fixup); >> + regs->ax = -1; >> + return true; >> +} > > And here you just write into regs->ax, but your "asm volatile" doesn't > reserve that register. This looks wrong to me. > > I think you probably want to add something like an explicit > `"+&a"(err)` output to the asm statements. We require asm goto support these days. How about using that? You won't even need a special exception handler. Also, please change the BUG to WARN in the you-did-it-wrong 32-bit case. And return -EFAULT. --Andy