mirror of
https://github.com/torvalds/linux.git
synced 2024-12-11 13:41:55 +00:00
c6cfcbd8ca
The following warning is reported when frame pointers and kernel IBT are enabled: vmlinux.o: warning: objtool: ibt_selftest+0x11: sibling call from callable instruction with modified stack frame The problem is that objtool interprets the indirect branch in ibt_selftest() as a sibling call, and GCC inserts a (partial) frame pointer prologue before it: 0000 000000000003f550 <ibt_selftest>: 0000 3f550: f3 0f 1e fa endbr64 0004 3f554: e8 00 00 00 00 call 3f559 <ibt_selftest+0x9> 3f555: R_X86_64_PLT32 __fentry__-0x4 0009 3f559: 55 push %rbp 000a 3f55a: 48 8d 05 02 00 00 00 lea 0x2(%rip),%rax # 3f563 <ibt_selftest_ip> 0011 3f561: ff e0 jmp *%rax Note the inline asm is missing ASM_CALL_CONSTRAINT, so the 'push %rbp' happens before the indirect branch and the 'mov %rsp, %rbp' happens afterwards. Simplify the generated code and make it easier to understand for both tools and humans by moving the selftest to proper asm. Signed-off-by: Josh Poimboeuf <jpoimboe@kernel.org> Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org> Link: https://lkml.kernel.org/r/99a7e16b97bda97bf0a04aa141d6241cd8a839a2.1680912949.git.jpoimboe@kernel.org
132 lines
3.1 KiB
C
132 lines
3.1 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
|
|
#include <linux/ptrace.h>
|
|
#include <asm/bugs.h>
|
|
#include <asm/traps.h>
|
|
|
|
enum cp_error_code {
|
|
CP_EC = (1 << 15) - 1,
|
|
|
|
CP_RET = 1,
|
|
CP_IRET = 2,
|
|
CP_ENDBR = 3,
|
|
CP_RSTRORSSP = 4,
|
|
CP_SETSSBSY = 5,
|
|
|
|
CP_ENCL = 1 << 15,
|
|
};
|
|
|
|
static const char cp_err[][10] = {
|
|
[0] = "unknown",
|
|
[1] = "near ret",
|
|
[2] = "far/iret",
|
|
[3] = "endbranch",
|
|
[4] = "rstorssp",
|
|
[5] = "setssbsy",
|
|
};
|
|
|
|
static const char *cp_err_string(unsigned long error_code)
|
|
{
|
|
unsigned int cpec = error_code & CP_EC;
|
|
|
|
if (cpec >= ARRAY_SIZE(cp_err))
|
|
cpec = 0;
|
|
return cp_err[cpec];
|
|
}
|
|
|
|
static void do_unexpected_cp(struct pt_regs *regs, unsigned long error_code)
|
|
{
|
|
WARN_ONCE(1, "Unexpected %s #CP, error_code: %s\n",
|
|
user_mode(regs) ? "user mode" : "kernel mode",
|
|
cp_err_string(error_code));
|
|
}
|
|
|
|
static DEFINE_RATELIMIT_STATE(cpf_rate, DEFAULT_RATELIMIT_INTERVAL,
|
|
DEFAULT_RATELIMIT_BURST);
|
|
|
|
static void do_user_cp_fault(struct pt_regs *regs, unsigned long error_code)
|
|
{
|
|
struct task_struct *tsk;
|
|
unsigned long ssp;
|
|
|
|
/*
|
|
* An exception was just taken from userspace. Since interrupts are disabled
|
|
* here, no scheduling should have messed with the registers yet and they
|
|
* will be whatever is live in userspace. So read the SSP before enabling
|
|
* interrupts so locking the fpregs to do it later is not required.
|
|
*/
|
|
rdmsrl(MSR_IA32_PL3_SSP, ssp);
|
|
|
|
cond_local_irq_enable(regs);
|
|
|
|
tsk = current;
|
|
tsk->thread.error_code = error_code;
|
|
tsk->thread.trap_nr = X86_TRAP_CP;
|
|
|
|
/* Ratelimit to prevent log spamming. */
|
|
if (show_unhandled_signals && unhandled_signal(tsk, SIGSEGV) &&
|
|
__ratelimit(&cpf_rate)) {
|
|
pr_emerg("%s[%d] control protection ip:%lx sp:%lx ssp:%lx error:%lx(%s)%s",
|
|
tsk->comm, task_pid_nr(tsk),
|
|
regs->ip, regs->sp, ssp, error_code,
|
|
cp_err_string(error_code),
|
|
error_code & CP_ENCL ? " in enclave" : "");
|
|
print_vma_addr(KERN_CONT " in ", regs->ip);
|
|
pr_cont("\n");
|
|
}
|
|
|
|
force_sig_fault(SIGSEGV, SEGV_CPERR, (void __user *)0);
|
|
cond_local_irq_disable(regs);
|
|
}
|
|
|
|
static __ro_after_init bool ibt_fatal = true;
|
|
|
|
static void do_kernel_cp_fault(struct pt_regs *regs, unsigned long error_code)
|
|
{
|
|
if ((error_code & CP_EC) != CP_ENDBR) {
|
|
do_unexpected_cp(regs, error_code);
|
|
return;
|
|
}
|
|
|
|
if (unlikely(regs->ip == (unsigned long)&ibt_selftest_noendbr)) {
|
|
regs->ax = 0;
|
|
return;
|
|
}
|
|
|
|
pr_err("Missing ENDBR: %pS\n", (void *)instruction_pointer(regs));
|
|
if (!ibt_fatal) {
|
|
printk(KERN_DEFAULT CUT_HERE);
|
|
__warn(__FILE__, __LINE__, (void *)regs->ip, TAINT_WARN, regs, NULL);
|
|
return;
|
|
}
|
|
BUG();
|
|
}
|
|
|
|
static int __init ibt_setup(char *str)
|
|
{
|
|
if (!strcmp(str, "off"))
|
|
setup_clear_cpu_cap(X86_FEATURE_IBT);
|
|
|
|
if (!strcmp(str, "warn"))
|
|
ibt_fatal = false;
|
|
|
|
return 1;
|
|
}
|
|
|
|
__setup("ibt=", ibt_setup);
|
|
|
|
DEFINE_IDTENTRY_ERRORCODE(exc_control_protection)
|
|
{
|
|
if (user_mode(regs)) {
|
|
if (cpu_feature_enabled(X86_FEATURE_USER_SHSTK))
|
|
do_user_cp_fault(regs, error_code);
|
|
else
|
|
do_unexpected_cp(regs, error_code);
|
|
} else {
|
|
if (cpu_feature_enabled(X86_FEATURE_IBT))
|
|
do_kernel_cp_fault(regs, error_code);
|
|
else
|
|
do_unexpected_cp(regs, error_code);
|
|
}
|
|
}
|