All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH] x86: correct EFLAGS.IF in SYSENTER frame
@ 2018-03-16 14:13 Jan Beulich
  2018-03-16 14:29 ` Andrew Cooper
  0 siblings, 1 reply; 5+ messages in thread
From: Jan Beulich @ 2018-03-16 14:13 UTC (permalink / raw)
  To: xen-devel; +Cc: Andrew Cooper

Commit 9d1d31ad94 ("x86: slightly reduce Meltdown band-aid overhead")
moved the STI past the PUSHF. While this isn't an active problem (as we
force EFLAGS.IF to 1 before exiting to guest context), let's not risk
internal confusion by finding a PV guest frame with interrupts
apparently off.

Signed-off-by: Jan Beulich <jbeulich@suse.com>

--- a/xen/arch/x86/x86_64/entry.S
+++ b/xen/arch/x86/x86_64/entry.S
@@ -281,6 +281,8 @@ GLOBAL(sysenter_eflags_saved)
         /* WARNING! `ret`, `call *`, `jmp *` not safe before this point. */
 
         GET_STACK_END(bx)
+        /* PUSHF above has saved EFLAGS.IF clear (the caller had it set). */
+        orl   $X86_EFLAGS_IF, UREGS_eflags(%rsp)
         mov   STACK_CPUINFO_FIELD(xen_cr3)(%rbx), %rcx
         neg   %rcx
         jz    .Lsyse_cr3_okay




_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [PATCH] x86: correct EFLAGS.IF in SYSENTER frame
  2018-03-16 14:13 [PATCH] x86: correct EFLAGS.IF in SYSENTER frame Jan Beulich
@ 2018-03-16 14:29 ` Andrew Cooper
  2018-03-16 15:04   ` Jan Beulich
  0 siblings, 1 reply; 5+ messages in thread
From: Andrew Cooper @ 2018-03-16 14:29 UTC (permalink / raw)
  To: Jan Beulich, xen-devel

On 16/03/18 14:13, Jan Beulich wrote:
> Commit 9d1d31ad94 ("x86: slightly reduce Meltdown band-aid overhead")
> moved the STI past the PUSHF. While this isn't an active problem (as we
> force EFLAGS.IF to 1 before exiting to guest context), let's not risk
> internal confusion by finding a PV guest frame with interrupts
> apparently off.
>
> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>
> --- a/xen/arch/x86/x86_64/entry.S
> +++ b/xen/arch/x86/x86_64/entry.S
> @@ -281,6 +281,8 @@ GLOBAL(sysenter_eflags_saved)
>          /* WARNING! `ret`, `call *`, `jmp *` not safe before this point. */
>  
>          GET_STACK_END(bx)
> +        /* PUSHF above has saved EFLAGS.IF clear (the caller had it set). */
> +        orl   $X86_EFLAGS_IF, UREGS_eflags(%rsp)

For the sake of a single or (which would be beside a line of adjacent
stack accesses anyway), I think it would be better to have this
immediately after sysenter_eflags_saved.  It doesn't have an impact on
speculation safety, and can't plausibly be impacted by SMAP.

It is perhaps not very important, but is it worth encoding this as:

  orb $(X86_EFLAGS_IF >> 8), UREGS_eflags+1(%rsp)

We have a similar pattern when testing the interrupt flag.

Somewhat independently of this patch, I think we should assert that
flags are in the expected state in the return-to-guest path, so we
notice accidental breakage like this more easily.

~Andrew

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [PATCH] x86: correct EFLAGS.IF in SYSENTER frame
  2018-03-16 14:29 ` Andrew Cooper
@ 2018-03-16 15:04   ` Jan Beulich
  2018-03-16 15:42     ` Andrew Cooper
  0 siblings, 1 reply; 5+ messages in thread
From: Jan Beulich @ 2018-03-16 15:04 UTC (permalink / raw)
  To: Andrew Cooper; +Cc: xen-devel

>>> On 16.03.18 at 15:29, <andrew.cooper3@citrix.com> wrote:
> On 16/03/18 14:13, Jan Beulich wrote:
>> Commit 9d1d31ad94 ("x86: slightly reduce Meltdown band-aid overhead")
>> moved the STI past the PUSHF. While this isn't an active problem (as we
>> force EFLAGS.IF to 1 before exiting to guest context), let's not risk
>> internal confusion by finding a PV guest frame with interrupts
>> apparently off.
>>
>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>>
>> --- a/xen/arch/x86/x86_64/entry.S
>> +++ b/xen/arch/x86/x86_64/entry.S
>> @@ -281,6 +281,8 @@ GLOBAL(sysenter_eflags_saved)
>>          /* WARNING! `ret`, `call *`, `jmp *` not safe before this point. */
>>  
>>          GET_STACK_END(bx)
>> +        /* PUSHF above has saved EFLAGS.IF clear (the caller had it set). */
>> +        orl   $X86_EFLAGS_IF, UREGS_eflags(%rsp)
> 
> For the sake of a single or (which would be beside a line of adjacent
> stack accesses anyway), I think it would be better to have this
> immediately after sysenter_eflags_saved.  It doesn't have an impact on
> speculation safety, and can't plausibly be impacted by SMAP.

Well, I had considered that, but that'll be yet one more separate
place to NOP out later on.

> It is perhaps not very important, but is it worth encoding this as:
> 
>   orb $(X86_EFLAGS_IF >> 8), UREGS_eflags+1(%rsp)
> 
> We have a similar pattern when testing the interrupt flag.

Aren't back to back different size writes to the same location
recommended against? Then again, the push is a qword write
already anyway, followed by (currently) a dword write. I can
certainly do that. But let's first agree on the placement.

> Somewhat independently of this patch, I think we should assert that
> flags are in the expected state in the return-to-guest path, so we
> notice accidental breakage like this more easily.

Not sure - nothing was broken here afaict, we just want to play
safe. And as said the exit paths already force EFLAGS.IF to 1.

Jan


_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [PATCH] x86: correct EFLAGS.IF in SYSENTER frame
  2018-03-16 15:04   ` Jan Beulich
@ 2018-03-16 15:42     ` Andrew Cooper
  2018-03-16 16:26       ` Jan Beulich
  0 siblings, 1 reply; 5+ messages in thread
From: Andrew Cooper @ 2018-03-16 15:42 UTC (permalink / raw)
  To: Jan Beulich; +Cc: xen-devel

On 16/03/18 15:04, Jan Beulich wrote:
>>>> On 16.03.18 at 15:29, <andrew.cooper3@citrix.com> wrote:
>> On 16/03/18 14:13, Jan Beulich wrote:
>>> Commit 9d1d31ad94 ("x86: slightly reduce Meltdown band-aid overhead")
>>> moved the STI past the PUSHF. While this isn't an active problem (as we
>>> force EFLAGS.IF to 1 before exiting to guest context), let's not risk
>>> internal confusion by finding a PV guest frame with interrupts
>>> apparently off.
>>>
>>> Signed-off-by: Jan Beulich <jbeulich@suse.com>
>>>
>>> --- a/xen/arch/x86/x86_64/entry.S
>>> +++ b/xen/arch/x86/x86_64/entry.S
>>> @@ -281,6 +281,8 @@ GLOBAL(sysenter_eflags_saved)
>>>          /* WARNING! `ret`, `call *`, `jmp *` not safe before this point. */
>>>  
>>>          GET_STACK_END(bx)
>>> +        /* PUSHF above has saved EFLAGS.IF clear (the caller had it set). */
>>> +        orl   $X86_EFLAGS_IF, UREGS_eflags(%rsp)
>> For the sake of a single or (which would be beside a line of adjacent
>> stack accesses anyway), I think it would be better to have this
>> immediately after sysenter_eflags_saved.  It doesn't have an impact on
>> speculation safety, and can't plausibly be impacted by SMAP.
> Well, I had considered that, but that'll be yet one more separate
> place to NOP out later on.
>
>> It is perhaps not very important, but is it worth encoding this as:
>>
>>   orb $(X86_EFLAGS_IF >> 8), UREGS_eflags+1(%rsp)
>>
>> We have a similar pattern when testing the interrupt flag.
> Aren't back to back different size writes to the same location
> recommended against? Then again, the push is a qword write
> already anyway, followed by (currently) a dword write. I can
> certainly do that. But let's first agree on the placement.

Acked-by: Andrew Cooper <andrew.cooper3@citrix.com>

I'm not sufficiently concerned about placement to delay the patch.

>
>> Somewhat independently of this patch, I think we should assert that
>> flags are in the expected state in the return-to-guest path, so we
>> notice accidental breakage like this more easily.
> Not sure - nothing was broken here afaict, we just want to play
> safe. And as said the exit paths already force EFLAGS.IF to 1.

It is only because of the pessimistic approach in a previous XSA fix
that this isn't an XSA itself.

Despite the safety net, I consider it a bug if such an assert could trip
(and there are several paths we do know of which want fixing).

~Andrew

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [PATCH] x86: correct EFLAGS.IF in SYSENTER frame
  2018-03-16 15:42     ` Andrew Cooper
@ 2018-03-16 16:26       ` Jan Beulich
  0 siblings, 0 replies; 5+ messages in thread
From: Jan Beulich @ 2018-03-16 16:26 UTC (permalink / raw)
  To: Andrew Cooper; +Cc: xen-devel

>>> On 16.03.18 at 16:42, <andrew.cooper3@citrix.com> wrote:
> On 16/03/18 15:04, Jan Beulich wrote:
>>>>> On 16.03.18 at 15:29, <andrew.cooper3@citrix.com> wrote:
>>> Somewhat independently of this patch, I think we should assert that
>>> flags are in the expected state in the return-to-guest path, so we
>>> notice accidental breakage like this more easily.
>> Not sure - nothing was broken here afaict, we just want to play
>> safe. And as said the exit paths already force EFLAGS.IF to 1.
> 
> It is only because of the pessimistic approach in a previous XSA fix
> that this isn't an XSA itself.

That plus the patch moving the STI didn't go anywhere other than
into staging so far.

Jan


_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2018-03-16 16:26 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-03-16 14:13 [PATCH] x86: correct EFLAGS.IF in SYSENTER frame Jan Beulich
2018-03-16 14:29 ` Andrew Cooper
2018-03-16 15:04   ` Jan Beulich
2018-03-16 15:42     ` Andrew Cooper
2018-03-16 16:26       ` Jan Beulich

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.