Joerg Roedel
2021-Feb-17 12:01 UTC
[PATCH 0/3] x86/sev-es: Check for trusted regs->sp in __sev_es_ist_enter()
From: Joerg Roedel <jroedel at suse.de> Hi, here are some changes to the Linux SEV-ES code to check whether the value in regs->sp can be trusted, before checking whether it points to the #VC IST stack. Andy Lutomirski reported that it is entirely possible to reach this function with a regs->sp value which was set by user-space. So check for this condition and don't use regs->sp if it can't be trusted. Also improve the comments around __sev_es_ist_enter/exit() to better explain what these function do and why they are there. Please review. Thanks, Joerg Joerg Roedel (3): x86/sev-es: Introduce from_syscall_gap() helper x86/sev-es: Check if regs->sp is trusted before adjusting #VC IST stack x86/sev-es: Improve comments in and around __sev_es_ist_enter/exit() arch/x86/include/asm/ptrace.h | 8 ++++++++ arch/x86/kernel/sev-es.c | 27 +++++++++++++++++++-------- arch/x86/kernel/traps.c | 3 +-- 3 files changed, 28 insertions(+), 10 deletions(-) -- 2.30.0
Joerg Roedel
2021-Feb-17 12:01 UTC
[PATCH 1/3] x86/sev-es: Introduce from_syscall_gap() helper
From: Joerg Roedel <jroedel at suse.de> Introduce a helper to check whether an exception came from the syscall gap and use it in the SEV-ES code Fixes: 315562c9af3d5 ("x86/sev-es: Adjust #VC IST Stack on entering NMI handler") Cc: stable at vger.kernel.org # 5.10+ Signed-off-by: Joerg Roedel <jroedel at suse.de> --- arch/x86/include/asm/ptrace.h | 8 ++++++++ arch/x86/kernel/traps.c | 3 +-- 2 files changed, 9 insertions(+), 2 deletions(-) diff --git a/arch/x86/include/asm/ptrace.h b/arch/x86/include/asm/ptrace.h index d8324a236696..14854b2c4944 100644 --- a/arch/x86/include/asm/ptrace.h +++ b/arch/x86/include/asm/ptrace.h @@ -94,6 +94,8 @@ struct pt_regs { #include <asm/paravirt_types.h> #endif +#include <asm/proto.h> + struct cpuinfo_x86; struct task_struct; @@ -175,6 +177,12 @@ static inline bool any_64bit_mode(struct pt_regs *regs) #ifdef CONFIG_X86_64 #define current_user_stack_pointer() current_pt_regs()->sp #define compat_user_stack_pointer() current_pt_regs()->sp + +static inline bool from_syscall_gap(struct pt_regs *regs) +{ + return (regs->ip >= (unsigned long)entry_SYSCALL_64 && + regs->ip < (unsigned long)entry_SYSCALL_64_safe_stack); +} #endif static inline unsigned long kernel_stack_pointer(struct pt_regs *regs) diff --git a/arch/x86/kernel/traps.c b/arch/x86/kernel/traps.c index 7f5aec758f0e..b4f2b4e9066d 100644 --- a/arch/x86/kernel/traps.c +++ b/arch/x86/kernel/traps.c @@ -694,8 +694,7 @@ asmlinkage __visible noinstr struct pt_regs *vc_switch_off_ist(struct pt_regs *r * In the SYSCALL entry path the RSP value comes from user-space - don't * trust it and switch to the current kernel stack */ - if (regs->ip >= (unsigned long)entry_SYSCALL_64 && - regs->ip < (unsigned long)entry_SYSCALL_64_safe_stack) { + if (from_syscall_gap(regs)) { sp = this_cpu_read(cpu_current_top_of_stack); goto sync; } -- 2.30.0
Joerg Roedel
2021-Feb-17 12:01 UTC
[PATCH 2/3] x86/sev-es: Check if regs->sp is trusted before adjusting #VC IST stack
From: Joerg Roedel <jroedel at suse.de> The code in the NMI handler to adjust the #VC handler IST stack is needed in case an NMI hits when the #VC handler is still using its IST stack. But the check for this condition also needs to look if the regs->sp value is trusted, meaning it was not set by user-space. Extend the check to not use regs->sp when the NMI interrupted user-space code or the SYSCALL gap. Reported-by: Andy Lutomirski <luto at kernel.org> Fixes: 315562c9af3d5 ("x86/sev-es: Adjust #VC IST Stack on entering NMI handler") Cc: stable at vger.kernel.org # 5.10+ Signed-off-by: Joerg Roedel <jroedel at suse.de> --- arch/x86/kernel/sev-es.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/arch/x86/kernel/sev-es.c b/arch/x86/kernel/sev-es.c index 84c1821819af..0df38b185d53 100644 --- a/arch/x86/kernel/sev-es.c +++ b/arch/x86/kernel/sev-es.c @@ -144,7 +144,9 @@ void noinstr __sev_es_ist_enter(struct pt_regs *regs) old_ist = __this_cpu_read(cpu_tss_rw.x86_tss.ist[IST_INDEX_VC]); /* Make room on the IST stack */ - if (on_vc_stack(regs->sp)) + if (on_vc_stack(regs->sp) && + !user_mode(regs) && + !from_syscall_gap(regs)) new_ist = ALIGN_DOWN(regs->sp, 8) - sizeof(old_ist); else new_ist = old_ist - sizeof(old_ist); -- 2.30.0
Joerg Roedel
2021-Feb-17 12:01 UTC
[PATCH 3/3] x86/sev-es: Improve comments in and around __sev_es_ist_enter/exit()
From: Joerg Roedel <jroedel at suse.de> Better explain why this code is necessary and what it is doing. Signed-off-by: Joerg Roedel <jroedel at suse.de> --- arch/x86/kernel/sev-es.c | 23 ++++++++++++++++------- 1 file changed, 16 insertions(+), 7 deletions(-) diff --git a/arch/x86/kernel/sev-es.c b/arch/x86/kernel/sev-es.c index 0df38b185d53..79241bc45f25 100644 --- a/arch/x86/kernel/sev-es.c +++ b/arch/x86/kernel/sev-es.c @@ -127,14 +127,20 @@ static __always_inline bool on_vc_stack(unsigned long sp) } /* - * This function handles the case when an NMI is raised in the #VC exception - * handler entry code. In this case, the IST entry for #VC must be adjusted, so - * that any subsequent #VC exception will not overwrite the stack contents of the - * interrupted #VC handler. + * This function handles the case when an NMI is raised in the #VC + * exception handler entry code, before the #VC handler has switched off + * its IST stack. In this case, the IST entry for #VC must be adjusted, + * so that any nested #VC exception will not overwrite the stack + * contents of the interrupted #VC handler. * * The IST entry is adjusted unconditionally so that it can be also be - * unconditionally adjusted back in sev_es_ist_exit(). Otherwise a nested - * sev_es_ist_exit() call may adjust back the IST entry too early. + * unconditionally adjusted back in __sev_es_ist_exit(). Otherwise a + * nested sev_es_ist_exit() call may adjust back the IST entry too + * early. + * + * The __sev_es_ist_enter() and __sev_es_ist_exit() functions always run + * on the NMI IST stack, as they are only called from NMI handling code + * right now. */ void noinstr __sev_es_ist_enter(struct pt_regs *regs) { @@ -143,7 +149,10 @@ void noinstr __sev_es_ist_enter(struct pt_regs *regs) /* Read old IST entry */ old_ist = __this_cpu_read(cpu_tss_rw.x86_tss.ist[IST_INDEX_VC]); - /* Make room on the IST stack */ + /* + * Make room on the IST stack - Reserve 8 bytes to store the old + * IST entry. + */ if (on_vc_stack(regs->sp) && !user_mode(regs) && !from_syscall_gap(regs)) -- 2.30.0