lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20d31ed9-be3d-dca6-ceef-ced35f80d131@nextfour.com>
Date:   Mon, 25 Oct 2021 11:33:05 +0300
From:   Mika Penttilä <mika.penttila@...tfour.com>
To:     "Chang S. Bae" <chang.seok.bae@...el.com>,
        linux-kernel@...r.kernel.org
Cc:     x86@...nel.org, tglx@...utronix.de, dave.hansen@...ux.intel.com,
        arjan@...ux.intel.com, ravi.v.shankar@...el.com
Subject: Re: [PATCH 15/23] x86/fpu: Add sanity checks for XFD



On 22.10.2021 1.55, Chang S. Bae wrote:
> From: Thomas Gleixner <tglx@...utronix.de>
>
> Add debug functionality to ensure that the XFD MSR is up to date for XSAVE*
> and XRSTOR* operations.
>
> Signed-off-by: Thomas Gleixner <tglx@...utronix.de>
> Signed-off-by: Chang S. Bae <chang.seok.bae@...el.com>
> ---
> Changes from the tglx tree:
> * Rename the xstate ops validation helper. (Dave Hansen)
> * Update code comments. (Dave Hansen)
> ---
>  arch/x86/kernel/fpu/core.c   |  9 +++---
>  arch/x86/kernel/fpu/signal.c |  6 ++--
>  arch/x86/kernel/fpu/xstate.c | 55 ++++++++++++++++++++++++++++++++++++
>  arch/x86/kernel/fpu/xstate.h | 34 +++++++++++++++++++---
>  4 files changed, 92 insertions(+), 12 deletions(-)
>
> diff --git a/arch/x86/kernel/fpu/core.c b/arch/x86/kernel/fpu/core.c
> index e92c9d79441c..f4b02ed47034 100644
> --- a/arch/x86/kernel/fpu/core.c
> +++ b/arch/x86/kernel/fpu/core.c
> @@ -166,7 +166,7 @@ void restore_fpregs_from_fpstate(struct fpstate *fpstate, u64 mask)
>  		 */
>  		mask = fpu_kernel_cfg.max_features & mask;
>  
> -		os_xrstor(&fpstate->regs.xsave, mask);
> +		os_xrstor(fpstate, mask);
>  	} else {
>  		if (use_fxsr())
>  			fxrstor(&fpstate->regs.fxsave);
> @@ -537,7 +537,7 @@ void fpu__drop(struct fpu *fpu)
>  static inline void restore_fpregs_from_init_fpstate(u64 features_mask)
>  {
>  	if (use_xsave())
> -		os_xrstor(&init_fpstate.regs.xsave, features_mask);
> +		os_xrstor(&init_fpstate, features_mask);
>  	else if (use_fxsr())
>  		fxrstor(&init_fpstate.regs.fxsave);
>  	else
> @@ -594,9 +594,8 @@ void fpu__clear_user_states(struct fpu *fpu)
>  	 * corresponding registers.
>  	 */
>  	if (xfeatures_mask_supervisor() &&
> -	    !fpregs_state_valid(fpu, smp_processor_id())) {
> -		os_xrstor(&fpu->fpstate->regs.xsave, xfeatures_mask_supervisor());
> -	}
> +	    !fpregs_state_valid(fpu, smp_processor_id()))
> +		os_xrstor_supervisor(fpu->fpstate);
>  
>  	/* Reset user states in registers. */
>  	restore_fpregs_from_init_fpstate(XFEATURE_MASK_USER_RESTORE);
> diff --git a/arch/x86/kernel/fpu/signal.c b/arch/x86/kernel/fpu/signal.c
> index d128eb581ffc..a937980fd02b 100644
> --- a/arch/x86/kernel/fpu/signal.c
> +++ b/arch/x86/kernel/fpu/signal.c
> @@ -261,7 +261,7 @@ static int __restore_fpregs_from_user(void __user *buf, u64 ufeatures,
>  			ret = fxrstor_from_user_sigframe(buf);
>  
>  		if (!ret && unlikely(init_bv))
> -			os_xrstor(&init_fpstate.regs.xsave, init_bv);
> +			os_xrstor(&init_fpstate, init_bv);
>  		return ret;
>  	} else if (use_fxsr()) {
>  		return fxrstor_from_user_sigframe(buf);
> @@ -322,7 +322,7 @@ static bool restore_fpregs_from_user(void __user *buf, u64 xrestore,
>  	 * been restored from a user buffer directly.
>  	 */
>  	if (test_thread_flag(TIF_NEED_FPU_LOAD) && xfeatures_mask_supervisor())
> -		os_xrstor(&fpu->fpstate->regs.xsave, xfeatures_mask_supervisor());
> +		os_xrstor_supervisor(fpu->fpstate);
>  
>  	fpregs_mark_activate();
>  	fpregs_unlock();
> @@ -432,7 +432,7 @@ static bool __fpu_restore_sig(void __user *buf, void __user *buf_fx,
>  		u64 mask = user_xfeatures | xfeatures_mask_supervisor();
>  
>  		fpregs->xsave.header.xfeatures &= mask;
> -		success = !os_xrstor_safe(&fpregs->xsave,
> +		success = !os_xrstor_safe(fpu->fpstate,
>  					  fpu_kernel_cfg.max_features);
>  	} else {
>  		success = !fxrstor_safe(&fpregs->fxsave);
> diff --git a/arch/x86/kernel/fpu/xstate.c b/arch/x86/kernel/fpu/xstate.c
> index c178aa91abb3..c2cbe14aaa00 100644
> --- a/arch/x86/kernel/fpu/xstate.c
> +++ b/arch/x86/kernel/fpu/xstate.c
> @@ -1301,6 +1301,61 @@ EXPORT_SYMBOL_GPL(fpstate_clear_xstate_component);
>  #endif
>  
>  #ifdef CONFIG_X86_64
> +
> +#ifdef CONFIG_X86_DEBUG_FPU
> +/*
> + * Ensure that a subsequent XSAVE* or XRSTOR* instruction with RFBM=@...k
> + * can safely operate on the @fpstate buffer.
> + */
> +static bool xstate_op_valid(struct fpstate *fpstate, u64 mask, bool rstor)
> +{
> +	u64 xfd = __this_cpu_read(xfd_state);
> +
> +	if (fpstate->xfd == xfd)
> +		return true;
> +
> +	/* For current's fpstate the XFD state must be correct. */
> +	if (fpstate->xfd == current->thread.fpu.fpstate->xfd)
> +		return false;
> +
Should this return true or is the comment confusing?


> +	/*
> +	 * XRSTOR(S) from init_fpstate are always correct as it will just
> +	 * bring all components into init state and not read from the
> +	 * buffer. XSAVE(S) raises #PF after init.
> +	 */
> +	if (fpstate == &init_fpstate)
> +		return rstor;
> +
> +	/*
> +	 * XSAVE(S): clone(), fpu_swap_kvm_fpu()
> +	 * XRSTORS(S): fpu_swap_kvm_fpu()
> +	 */
> +
> +	/*
> +	 * No XSAVE/XRSTOR instructions (except XSAVE itself) touch
> +	 * the buffer area for XFD-disabled state components.
> +	 */
> +	mask &= ~xfd;
> +
> +	/*
> +	 * Remove features which are valid in fpstate. They
> +	 * have space allocated in fpstate.
> +	 */
> +	mask &= ~fpstate->xfeatures;
> +
> +	/*
> +	 * Any remaining state components in 'mask' might be written
> +	 * by XSAVE/XRSTOR. Fail validation it found.
> +	 */
> +	return !mask;
> +}
> +
> +void xfd_validate_state(struct fpstate *fpstate, u64 mask, bool rstor)
> +{
> +	WARN_ON_ONCE(!xstate_op_valid(fpstate, mask, rstor));
> +}
> +#endif /* CONFIG_X86_DEBUG_FPU */
> +
>  static int validate_sigaltstack(unsigned int usize)
>  {
>  	struct task_struct *thread, *leader = current->group_leader;
> diff --git a/arch/x86/kernel/fpu/xstate.h b/arch/x86/kernel/fpu/xstate.h
> index 32a4dee4de3b..29024244965b 100644
> --- a/arch/x86/kernel/fpu/xstate.h
> +++ b/arch/x86/kernel/fpu/xstate.h
> @@ -130,6 +130,12 @@ static inline u64 xfeatures_mask_independent(void)
>  		     : "D" (st), "m" (*st), "a" (lmask), "d" (hmask)	\
>  		     : "memory")
>  
> +#if defined(CONFIG_X86_64) && defined(CONFIG_X86_DEBUG_FPU)
> +extern void xfd_validate_state(struct fpstate *fpstate, u64 mask, bool rstor);
> +#else
> +static inline void xfd_validate_state(struct fpstate *fpstate, u64 mask, bool rstor) { }
> +#endif
> +
>  /*
>   * Save processor xstate to xsave area.
>   *
> @@ -144,6 +150,7 @@ static inline void os_xsave(struct fpstate *fpstate)
>  	int err;
>  
>  	WARN_ON_FPU(!alternatives_patched);
> +	xfd_validate_state(fpstate, mask, false);
>  
>  	XSTATE_XSAVE(&fpstate->regs.xsave, lmask, hmask, err);
>  
> @@ -156,12 +163,23 @@ static inline void os_xsave(struct fpstate *fpstate)
>   *
>   * Uses XRSTORS when XSAVES is used, XRSTOR otherwise.
>   */
> -static inline void os_xrstor(struct xregs_state *xstate, u64 mask)
> +static inline void os_xrstor(struct fpstate *fpstate, u64 mask)
> +{
> +	u32 lmask = mask;
> +	u32 hmask = mask >> 32;
> +
> +	xfd_validate_state(fpstate, mask, true);
> +	XSTATE_XRESTORE(&fpstate->regs.xsave, lmask, hmask);
> +}
> +
> +/* Restore of supervisor state. Does not require XFD */
> +static inline void os_xrstor_supervisor(struct fpstate *fpstate)
>  {
> +	u64 mask = xfeatures_mask_supervisor();
>  	u32 lmask = mask;
>  	u32 hmask = mask >> 32;
>  
> -	XSTATE_XRESTORE(xstate, lmask, hmask);
> +	XSTATE_XRESTORE(&fpstate->regs.xsave, lmask, hmask);
>  }
>  
>  /*
> @@ -184,11 +202,14 @@ static inline int xsave_to_user_sigframe(struct xregs_state __user *buf)
>  	 * internally, e.g. PKRU. That's user space ABI and also required
>  	 * to allow the signal handler to modify PKRU.
>  	 */
> -	u64 mask = current->thread.fpu.fpstate->user_xfeatures;
> +	struct fpstate *fpstate = current->thread.fpu.fpstate;
> +	u64 mask = fpstate->user_xfeatures;
>  	u32 lmask = mask;
>  	u32 hmask = mask >> 32;
>  	int err;
>  
> +	xfd_validate_state(fpstate, mask, false);
> +
>  	stac();
>  	XSTATE_OP(XSAVE, buf, lmask, hmask, err);
>  	clac();
> @@ -206,6 +227,8 @@ static inline int xrstor_from_user_sigframe(struct xregs_state __user *buf, u64
>  	u32 hmask = mask >> 32;
>  	int err;
>  
> +	xfd_validate_state(current->thread.fpu.fpstate, mask, true);
> +
>  	stac();
>  	XSTATE_OP(XRSTOR, xstate, lmask, hmask, err);
>  	clac();
> @@ -217,12 +240,15 @@ static inline int xrstor_from_user_sigframe(struct xregs_state __user *buf, u64
>   * Restore xstate from kernel space xsave area, return an error code instead of
>   * an exception.
>   */
> -static inline int os_xrstor_safe(struct xregs_state *xstate, u64 mask)
> +static inline int os_xrstor_safe(struct fpstate *fpstate, u64 mask)
>  {
> +	struct xregs_state *xstate = &fpstate->regs.xsave;
>  	u32 lmask = mask;
>  	u32 hmask = mask >> 32;
>  	int err;
>  
> +	/* Must enforce XFD update here */
> +
>  	if (cpu_feature_enabled(X86_FEATURE_XSAVES))
>  		XSTATE_OP(XRSTORS, xstate, lmask, hmask, err);
>  	else

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ