From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-17.0 required=3.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_CR_TRAILER,INCLUDES_PATCH, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 05F2AC07E9C for ; Sat, 10 Jul 2021 13:10:00 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id E010A613E4 for ; Sat, 10 Jul 2021 13:09:59 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232014AbhGJNMn (ORCPT ); Sat, 10 Jul 2021 09:12:43 -0400 Received: from mga03.intel.com ([134.134.136.65]:52358 "EHLO mga03.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231490AbhGJNL4 (ORCPT ); Sat, 10 Jul 2021 09:11:56 -0400 X-IronPort-AV: E=McAfee;i="6200,9189,10040"; a="209867325" X-IronPort-AV: E=Sophos;i="5.84,229,1620716400"; d="scan'208";a="209867325" Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by orsmga103.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Jul 2021 06:09:09 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.84,229,1620716400"; d="scan'208";a="488742399" Received: from chang-linux-3.sc.intel.com ([172.25.66.175]) by FMSMGA003.fm.intel.com with ESMTP; 10 Jul 2021 06:09:09 -0700 From: "Chang S. Bae" To: bp@suse.de, luto@kernel.org, tglx@linutronix.de, mingo@kernel.org, x86@kernel.org Cc: len.brown@intel.com, dave.hansen@intel.com, thiago.macieira@intel.com, jing2.liu@intel.com, ravi.v.shankar@intel.com, linux-kernel@vger.kernel.org, chang.seok.bae@intel.com Subject: [PATCH v7 17/26] x86/fpu/xstate: Disable XSTATE support if an inconsistent state is detected Date: Sat, 10 Jul 2021 06:03:04 -0700 Message-Id: <20210710130313.5072-18-chang.seok.bae@intel.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20210710130313.5072-1-chang.seok.bae@intel.com> References: <20210710130313.5072-1-chang.seok.bae@intel.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The kernel has a sanity check between two methods to calculate XSTATE size. In the unlikely event that they disagree, disable the use of XSTATE. Suggested-by: Thomas Gleixner Signed-off-by: Chang S. Bae Reviewed-by: Len Brown Cc: x86@kernel.org Cc: linux-kernel@vger.kernel.org --- Changes from v4: * Added as a new patch. (Thomas Gleixner) --- arch/x86/kernel/fpu/xstate.c | 40 ++++++++++++++++++++++++------------ 1 file changed, 27 insertions(+), 13 deletions(-) diff --git a/arch/x86/kernel/fpu/xstate.c b/arch/x86/kernel/fpu/xstate.c index 353125a18274..eda70bdca45c 100644 --- a/arch/x86/kernel/fpu/xstate.c +++ b/arch/x86/kernel/fpu/xstate.c @@ -654,11 +654,11 @@ static void __xstate_dump_leaves(void) } while (0) #define XCHECK_SZ(sz, nr, nr_macro, __struct) do { \ - if ((nr == nr_macro) && \ - WARN_ONCE(sz != sizeof(__struct), \ - "%s: struct is %zu bytes, cpu state %d bytes\n", \ - __stringify(nr_macro), sizeof(__struct), sz)) { \ + if ((nr == nr_macro) && (sz != sizeof(__struct))) { \ + pr_err("%s: struct is %zu bytes, cpu state %d bytes\n", \ + __stringify(nr_macro), sizeof(__struct), sz); \ __xstate_dump_leaves(); \ + return -EINVAL; \ } \ } while (0) @@ -667,7 +667,7 @@ static void __xstate_dump_leaves(void) * that our software representation matches what the CPU * tells us about the state's size. */ -static void check_xstate_against_struct(int nr) +static int check_xstate_against_struct(int nr) { /* * Ask the CPU for the size of the state. @@ -695,9 +695,12 @@ static void check_xstate_against_struct(int nr) (nr >= XFEATURE_MAX) || (nr == XFEATURE_PT_UNIMPLEMENTED_SO_FAR) || ((nr >= XFEATURE_RSRVD_COMP_11) && (nr <= XFEATURE_LBR))) { - WARN_ONCE(1, "no structure for xstate: %d\n", nr); + pr_err("no structure for xstate: %d\n", nr); XSTATE_WARN_ON(1); + return -EINVAL; } + + return 0; } /** @@ -707,13 +710,14 @@ static void check_xstate_against_struct(int nr) * excluded. Only the size of the buffer for task->fpu is checked here. * * @include_dynamic_states: A knob to include dynamic states or not. + * @size: A pointer to record the size. * - * Return: The calculated xstate size. + * Return: 0 if successful; otherwise, error code. */ -static unsigned int calculate_xstate_size(bool include_dynamic_states) +static int calculate_xstate_size(bool include_dynamic_states, unsigned int *size) { unsigned int xstate_size = FXSAVE_SIZE + XSAVE_HDR_SIZE; - int i; + int i, err; for (i = FIRST_EXTENDED_XFEATURE; i < XFEATURE_MAX; i++) { if (!xfeature_enabled(i)) @@ -722,7 +726,10 @@ static unsigned int calculate_xstate_size(bool include_dynamic_states) if (!include_dynamic_states && (xfeatures_mask_user_dynamic & BIT_ULL(i))) continue; - check_xstate_against_struct(i); + err = check_xstate_against_struct(i); + if (err) + return err; + /* * Supervisor state components can be managed only by * XSAVES. @@ -748,7 +755,9 @@ static unsigned int calculate_xstate_size(bool include_dynamic_states) xstate_size += xfeature_size(i); } - return xstate_size; + if (size) + *size = xstate_size; + return 0; } @@ -835,6 +844,7 @@ static int __init init_xstate_size(void) /* Recompute the context size for enabled features: */ unsigned int possible_xstate_size, xstate_size; unsigned int xsave_size; + int err; xsave_size = get_xsave_size(); @@ -848,7 +858,9 @@ static int __init init_xstate_size(void) * 'true' to include dynamic states. Cross-check with the CPUID- * provided size and record it. */ - xstate_size = calculate_xstate_size(true); + err = calculate_xstate_size(true, &xstate_size); + if (err) + return err; XSTATE_WARN_ON(possible_xstate_size != xstate_size); set_xstate_config(XSTATE_MAX_SIZE, possible_xstate_size); @@ -857,7 +869,9 @@ static int __init init_xstate_size(void) * 'false' to exclude dynamic states. Ensure the size fits in * the statically-allocated buffer and record it. */ - xstate_size = calculate_xstate_size(false); + err = calculate_xstate_size(false, &xstate_size); + if (err) + return err; if (!is_supported_xstate_size(xstate_size)) return -EINVAL; set_xstate_config(XSTATE_MIN_SIZE, xstate_size); -- 2.17.1