From nobody Wed Nov 27 15:51:42 2024 Received: from galois.linutronix.de (Galois.linutronix.de [193.142.43.55]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id BEC75186E38; Wed, 9 Oct 2024 07:52:24 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=193.142.43.55 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1728460346; cv=none; b=iOEaX2+f+hXTa6hqIxjlUCNHN0iO2CR8+N6RMhX0WeVJBRKCsWNHi1Db/jnw5+NApBF4/oo3DyOO1t5fkyKrcvpRJZxNf+YSibSbG5itmjcU1160Q6PpCGeRE97y49TMNFwQrPVWa0SoA88kvjeJRM+Wh4y70aIvGuJKiNPaUb4= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1728460346; c=relaxed/simple; bh=+lQ/l892jccd9NoS20UHoY5c0TozqbdXnZZgZ8BEqsI=; h=Date:From:To:Subject:Cc:MIME-Version:Message-ID:Content-Type; b=BIphiG9Z/ihxgKS5wB+zmn3xmHXgI1ZMQr0zJptlMYfko/couVvaHscFRDb+FToyf2ORChForEZfREjiTF8S4yfKkymCKdkiNN8IRjo/ThahJm6qwLHzaE+sujLF63vP7tUGC1zH2qfwEEDHYLK2IUkFD1j5Etr8ZsVE+d/TB1w= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linutronix.de; spf=pass smtp.mailfrom=linutronix.de; dkim=pass (2048-bit key) header.d=linutronix.de header.i=@linutronix.de header.b=xKJ2BZCu; dkim=permerror (0-bit key) header.d=linutronix.de header.i=@linutronix.de header.b=CosEm8UN; arc=none smtp.client-ip=193.142.43.55 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linutronix.de Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=linutronix.de Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=linutronix.de header.i=@linutronix.de header.b="xKJ2BZCu"; dkim=permerror (0-bit key) header.d=linutronix.de header.i=@linutronix.de header.b="CosEm8UN" Date: Wed, 09 Oct 2024 07:52:21 -0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020; t=1728460342; h=from:from:sender:sender:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=gmtfUeTpS6PXG6kQuHt8C9RWoMWssM85Cme4gY2Rc8o=; b=xKJ2BZCu3J08yv3DCa4k2zKeGHCHjCPhgoPjylZLwmwb+PFE7aDWLRKsYBZiPxZedJ7MFE 5HQ3D+QJSkMzxJ6yPJVqZlpgRbkG6AC1RqxDPVdKjggAbqpws49XUO/ObtvD8XsDDlsTOl pbIpqIwaOlUCE1iLmx4N1xLNDoLuqwWxmgD9c5AhyjPkHlSImsZDOSQBSD65GW5dI6urt7 Q+Ni2COO3Ypq0VUwPsXd9WEYNsTjv/CIM36Gby1G4BN+YbCxcv6VZ5tQUYaqG3AmbcW7IS ewyDL2p+1Gi5oOb+5iEkqqq1LZKlgsr214wGHsoV4CVMMyl6/MhwmYJov0dYJQ== DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020e; t=1728460342; h=from:from:sender:sender:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=gmtfUeTpS6PXG6kQuHt8C9RWoMWssM85Cme4gY2Rc8o=; b=CosEm8UN5/BIYAe4nKoZc4cxUoemhQEf76rozYRM/D2Cxwv1J5q0R/DWd3fod8QOJb7YWx SsF17v038L0gsLDg== From: "tip-bot2 for Pawan Gupta" Sender: tip-bot2@linutronix.de Reply-to: linux-kernel@vger.kernel.org To: linux-tip-commits@vger.kernel.org Subject: [tip: x86/urgent] x86/bugs: Use code segment selector for VERW operand Cc: Robert Gill , Andrew Cooper , stable@vger.kernel.org, #@tip-bot2.tec.linutronix.de, 5.10+@tip-bot2.tec.linutronix.de, Dave Hansen , Brian Gerst , Pawan Gupta , Ingo Molnar , x86@kernel.org, linux-kernel@vger.kernel.org Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Message-ID: <172846034177.1442.4656176308179548613.tip-bot2@tip-bot2> Robot-ID: Robot-Unsubscribe: Contact to get blacklisted from these emails Precedence: bulk Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable The following commit has been merged into the x86/urgent branch of tip: Commit-ID: e4d2102018542e3ae5e297bc6e229303abff8a0f Gitweb: https://git.kernel.org/tip/e4d2102018542e3ae5e297bc6e229303a= bff8a0f Author: Pawan Gupta AuthorDate: Thu, 26 Sep 2024 09:10:31 -07:00 Committer: Ingo Molnar CommitterDate: Wed, 09 Oct 2024 09:42:30 +02:00 x86/bugs: Use code segment selector for VERW operand Robert Gill reported below #GP in 32-bit mode when dosemu software was executing vm86() system call: general protection fault: 0000 [#1] PREEMPT SMP CPU: 4 PID: 4610 Comm: dosemu.bin Not tainted 6.6.21-gentoo-x86 #1 Hardware name: Dell Inc. PowerEdge 1950/0H723K, BIOS 2.7.0 10/30/2010 EIP: restore_all_switch_stack+0xbe/0xcf EAX: 00000000 EBX: 00000000 ECX: 00000000 EDX: 00000000 ESI: 00000000 EDI: 00000000 EBP: 00000000 ESP: ff8affdc DS: 0000 ES: 0000 FS: 0000 GS: 0033 SS: 0068 EFLAGS: 00010046 CR0: 80050033 CR2: 00c2101c CR3: 04b6d000 CR4: 000406d0 Call Trace: show_regs+0x70/0x78 die_addr+0x29/0x70 exc_general_protection+0x13c/0x348 exc_bounds+0x98/0x98 handle_exception+0x14d/0x14d exc_bounds+0x98/0x98 restore_all_switch_stack+0xbe/0xcf exc_bounds+0x98/0x98 restore_all_switch_stack+0xbe/0xcf This only happens in 32-bit mode when VERW based mitigations like MDS/RFDS are enabled. This is because segment registers with an arbitrary user value can result in #GP when executing VERW. Intel SDM vol. 2C documents the following behavior for VERW instruction: #GP(0) - If a memory operand effective address is outside the CS, DS, ES, FS, or GS segment limit. CLEAR_CPU_BUFFERS macro executes VERW instruction before returning to user space. Use %cs selector to reference VERW operand. This ensures VERW will not #GP for an arbitrary user %ds. [ mingo: Fixed the SOB chain. ] Fixes: a0e2dab44d22 ("x86/entry_32: Add VERW just before userspace transiti= on") Reported-by: Robert Gill Reviewed-by: Andrew Cooper Suggested-by: Brian Gerst Signed-off-by: Pawan Gupta Signed-off-by: Dave Hansen Signed-off-by: Ingo Molnar --- arch/x86/include/asm/nospec-branch.h | 11 ++++++++++- 1 file changed, 10 insertions(+), 1 deletion(-) diff --git a/arch/x86/include/asm/nospec-branch.h b/arch/x86/include/asm/no= spec-branch.h index ff5f1ec..96b410b 100644 --- a/arch/x86/include/asm/nospec-branch.h +++ b/arch/x86/include/asm/nospec-branch.h @@ -323,7 +323,16 @@ * Note: Only the memory operand variant of VERW clears the CPU buffers. */ .macro CLEAR_CPU_BUFFERS - ALTERNATIVE "", __stringify(verw _ASM_RIP(mds_verw_sel)), X86_FEATURE_CLE= AR_CPU_BUF +#ifdef CONFIG_X86_64 + ALTERNATIVE "", "verw mds_verw_sel(%rip)", X86_FEATURE_CLEAR_CPU_BUF +#else + /* + * In 32bit mode, the memory operand must be a %cs reference. The data + * segments may not be usable (vm86 mode), and the stack segment may not + * be flat (ESPFIX32). + */ + ALTERNATIVE "", "verw %cs:mds_verw_sel", X86_FEATURE_CLEAR_CPU_BUF +#endif .endm =20 #ifdef CONFIG_X86_64