[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <201404101902.38639.vda.linux@googlemail.com>
Date: Thu, 10 Apr 2014 19:02:38 +0200
From: Denys Vlasenko <vda.linux@...glemail.com>
To: Denys Vlasenko <dvlasenk@...hat.com>
Cc: Oleg Nesterov <oleg@...hat.com>,
Jim Keniston <jkenisto@...ux.vnet.ibm.com>,
Ingo Molnar <mingo@...e.hu>,
Srikar Dronamraju <srikar@...ux.vnet.ibm.com>,
Ananth N Mavinakayanahalli <ananth@...ibm.com>,
Anton Arapov <aarapov@...hat.com>,
David Long <dave.long@...aro.org>,
"Frank Ch. Eigler" <fche@...hat.com>,
Jonathan Lebon <jlebon@...hat.com>,
Masami Hiramatsu <masami.hiramatsu.pt@...achi.com>,
linux-kernel@...r.kernel.org
Subject: Re: [RFC PATCH 4/6] uprobes/x86: Emulate rip-relative call's
On Thursday 10 April 2014 16:30, Denys Vlasenko wrote:
> On 04/10/2014 04:18 PM, Oleg Nesterov wrote:
> > On 04/10, Denys Vlasenko wrote:
> >>
> >> There is this monstrosity, "16-bit override for branches" in 64-mode:
> >>
> >> 66 e8 nn nn callw <offset16>
> >>
> >> Nobody sane uses it because it truncates instruction pointer.
> >>
> >> Or rather, *I think* it should truncate it (i.e. zero-extend to full width),
> >> but conceivably some CPUs can be buggy wrt that:
> >> they can decide to modify only lower 16 bits of IP,
> >> or even they can decided to use signed <offset16> but apply it
> >> to full-width RIP.
> >>
> >> AMD manuals are not clear on what exactly should happen.
> >>
> >> I am sure no one sane uses this form of branch instructions
> >> in 32-bit and 64-bit code.
> >>
> >> I don't think we should be trying to support it "correctly"
> >> (we can just let program crash with SIGILL or something),
> >> we only need to make sure we don't overlook its existence
> >> and thus are not tricked into touching or modifying unrelated data.
> >
> > And after the quick check it seems that lib/insn.c doesn't parse
> > "66 e8 nn nn" correctly. It treats the next 2 bytes as the part
> > of 32bit offset.
>
> I didn't run-test it yet. By code inspection, it seems to work...
>
> x86-opcode-map.txt:
> e8: CALL Jz (f64)
>
> gen-insn-attr-x86.awk:
> imm_flag["Jz"] = "INAT_MAKE_IMM(INAT_IMM_VWORD32)"
>
>
> insn.c:
> case INAT_IMM_VWORD32:
> if (!__get_immv32(insn))
> goto err_out;
> ...
> static int __get_immv32(struct insn *insn)
> {
> switch (insn->opnd_bytes) {
> case 2:
> insn->immediate.value = get_next(short, insn);
> insn->immediate.nbytes = 2;
> break;
> case 4:
> case 8:
> insn->immediate.value = get_next(int, insn);
> insn->immediate.nbytes = 4;
> break;
>
>
> ...until I notice this code:
>
> void insn_get_modrm(struct insn *insn)
> {
> ...
> if (insn->x86_64 && inat_is_force64(insn->attr))
> insn->opnd_bytes = 8;
>
>
> The (f64) modifier in x86-opcode-map.txt means that inat_is_force64()
> is true for call opcode. So we won't reach "case 2:" in __get_immv32():
> insn_get_prefixes() did set insn->opnd_bytes to 2 when it saw 0x66 prefix,
> but it was before we reach this place, and here we overrode it.
> This is a bug in insn decoder.
I tested it on both Intel and AMD CPUs and my worst fears came true:
this instruction has different widths on different CPUs.
This program:
# compile with: gcc -nostartfiles -nostdlib -o int3 int3.S
_start: .globl _start
.byte 0x66,0xe9,0,0
.byte 0,0
1: jmp 1b
compiles to this:
00000000004000b0 <_start>:
4000b0: 66 e9 00 00 jmpw b4 <_start-0x3ffffc>
4000b4: 00 00 add %al,(%rax)
4000b6: eb fe jmp 4000b6 <_start+0x6>
and it will reach 0x4000b6 on Intel CPU.
IOW, Intel SandyBridge CPU thinks that insn is in fact 66 e9 00 00 00 00,
no RIP truncation occurs.
On AMD K10 CPU, the very same binary jumps to 0x00b4
and gets SIGSEGV with MAPERR.
AMD thinks that the insn is 66 e9 00 00 as shown above.
Thus, insn.c decoder implements Intel's idea of this insn
while binutils (objdump, gdb) implement AMD decode.
This same program can be compiled to 32-bit code,
in this mode both CPUs treat insn as 66 e9 00 00.
Oleg, I'm sure you are very sympathetic by now to the idea
of just not supporting this insn at all. ;)
You can check whether insn had any prefix by checking
insn->prefixes->nbytes != 0...
..but there is a problem with that. P4 introduced branch hints,
which are implemented using segment prefixes on conditional jumps.
Meaning that some compilers produce
2e 0f 82 nn nn nn nn
as (hint not taken) JB <offset32> insn.
2e is CS segment prefix. insn->prefixes->nbytes == 1 for this insn.
DS prefix (3e) hints that branch is taken.
They were nearly useless on P4 anyway and ignored by all CPUs
before or since, but they can be seen in some programs.
Looks like we'll need this:
/*
* 16-bit overrides such as CALLW (66 e8 nn nn) are not supported.
* Intel and AMD behavior differ in 64-bit mode: Intel ignores 66 prefix.
* No one uses these insns.
* To filter them out, reject any branch insns with prefixes...
*/
if (insn->prefixes->nbytes > 1)
bail_out;
/*
* ...Except a single 3e or 2e "branch taken/not taken" hint prefix.
* These are (rarely) used, but ignored by any CPU except P4.
* Example: 2e 0f 82 nn nn nn nn is JB,PN <offset32>
*/
if (insn->prefixes->nbytes == 1 && (insn->prefixes->bytes[0] | 0x10) != 0x3e))
bail_out;
--
vda
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists