From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753902AbdBGLLW (ORCPT ); Tue, 7 Feb 2017 06:11:22 -0500 Received: from foss.arm.com ([217.140.101.70]:49926 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753230AbdBGLLU (ORCPT ); Tue, 7 Feb 2017 06:11:20 -0500 Date: Tue, 7 Feb 2017 11:10:12 +0000 From: Mark Rutland To: Peter Zijlstra Cc: Kees Cook , "Reshetova, Elena" , Greg KH , Arnd Bergmann , Thomas Gleixner , Ingo Molnar , "H. Peter Anvin" , Will Deacon , David Windsor , Hans Liljestrand , David Howells , LKML , "kernel-hardening@lists.openwall.com" Subject: Re: [kernel-hardening] Re: [PATCH 4/4] refcount: Report failures through CHECK_DATA_CORRUPTION Message-ID: <20170207111011.GB28790@leverpostej> References: <1486164412-7338-1-git-send-email-keescook@chromium.org> <1486164412-7338-5-git-send-email-keescook@chromium.org> <20170205154046.GF6515@twins.programming.kicks-ass.net> <20170206085739.GH6515@twins.programming.kicks-ass.net> <20170207083405.GV6500@twins.programming.kicks-ass.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20170207083405.GV6500@twins.programming.kicks-ass.net> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Feb 07, 2017 at 09:34:05AM +0100, Peter Zijlstra wrote: > On Mon, Feb 06, 2017 at 08:54:38AM -0800, Kees Cook wrote: > > > > > > Like I wrote, ideally we'd end up using something like the x86 exception > > > table with a custom handler. Just no idea how to pull that off without > > > doing a full blown arch specific implementation, so I didn't go there > > > quite yet. > > > > I haven't spent much time looking at the extable stuff. (Though > > coincidentally, I was poking at it for x86's test_nx stuff...) I > > thought there was a way to build arch-agnostic extables already? > > kernel/extable.c is unconditionally built-in, for example. > > That doesn't seem to be of much use. It only contains section sort and > search functions. > > Another problem for generic code would be to figure out what register > the relevant variable would live in at the time of exception. Here its > 'obviously' EAX because that's what cmpxchg requires, but in generic > you'd need a means of querying GCC's register allocator at the exception > point and somehow using that information for the generation of the > exception handler. I think we only need two arch-specific primitives: (a) mangle a GCC assigned register into an idx stored in the extable (b) take said index, and grab the relevant register from pt_regs Then you can have a BUG_VALUE(v, ...), where we use an input "r" (val), and mangle that into the idx in the extable. In the common case, I'd hope GCC would leave the register in-place from the cmpxchg. ... or have I misundertood? :) Thanks, Mark. From mboxrd@z Thu Jan 1 00:00:00 1970 Date: Tue, 7 Feb 2017 11:10:12 +0000 From: Mark Rutland Message-ID: <20170207111011.GB28790@leverpostej> References: <1486164412-7338-1-git-send-email-keescook@chromium.org> <1486164412-7338-5-git-send-email-keescook@chromium.org> <20170205154046.GF6515@twins.programming.kicks-ass.net> <20170206085739.GH6515@twins.programming.kicks-ass.net> <20170207083405.GV6500@twins.programming.kicks-ass.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20170207083405.GV6500@twins.programming.kicks-ass.net> Subject: Re: [kernel-hardening] Re: [PATCH 4/4] refcount: Report failures through CHECK_DATA_CORRUPTION To: Peter Zijlstra Cc: Kees Cook , "Reshetova, Elena" , Greg KH , Arnd Bergmann , Thomas Gleixner , Ingo Molnar , "H. Peter Anvin" , Will Deacon , David Windsor , Hans Liljestrand , David Howells , LKML , "kernel-hardening@lists.openwall.com" List-ID: On Tue, Feb 07, 2017 at 09:34:05AM +0100, Peter Zijlstra wrote: > On Mon, Feb 06, 2017 at 08:54:38AM -0800, Kees Cook wrote: > > > > > > Like I wrote, ideally we'd end up using something like the x86 exception > > > table with a custom handler. Just no idea how to pull that off without > > > doing a full blown arch specific implementation, so I didn't go there > > > quite yet. > > > > I haven't spent much time looking at the extable stuff. (Though > > coincidentally, I was poking at it for x86's test_nx stuff...) I > > thought there was a way to build arch-agnostic extables already? > > kernel/extable.c is unconditionally built-in, for example. > > That doesn't seem to be of much use. It only contains section sort and > search functions. > > Another problem for generic code would be to figure out what register > the relevant variable would live in at the time of exception. Here its > 'obviously' EAX because that's what cmpxchg requires, but in generic > you'd need a means of querying GCC's register allocator at the exception > point and somehow using that information for the generation of the > exception handler. I think we only need two arch-specific primitives: (a) mangle a GCC assigned register into an idx stored in the extable (b) take said index, and grab the relevant register from pt_regs Then you can have a BUG_VALUE(v, ...), where we use an input "r" (val), and mangle that into the idx in the extable. In the common case, I'd hope GCC would leave the register in-place from the cmpxchg. ... or have I misundertood? :) Thanks, Mark.