From mboxrd@z Thu Jan 1 00:00:00 1970 From: Andy Lutomirski Subject: Re: [PATCH v4 15/29] x86/mm/64: Enable vmapped stacks Date: Mon, 27 Jun 2016 10:30:31 -0700 Message-ID: References: Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Return-path: Received: from mail-vk0-f51.google.com ([209.85.213.51]:35472 "EHLO mail-vk0-f51.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751673AbcF0Raw (ORCPT ); Mon, 27 Jun 2016 13:30:52 -0400 Received: by mail-vk0-f51.google.com with SMTP id j2so241257631vkg.2 for ; Mon, 27 Jun 2016 10:30:51 -0700 (PDT) In-Reply-To: Sender: linux-arch-owner@vger.kernel.org List-ID: To: Linus Torvalds Cc: Brian Gerst , Andy Lutomirski , the arch/x86 maintainers , Linux Kernel Mailing List , linux-arch , Borislav Petkov , Nadav Amit , Kees Cook , "kernel-hardening@lists.openwall.com" , Josh Poimboeuf , Jann Horn , Heiko Carstens On Mon, Jun 27, 2016 at 10:28 AM, Linus Torvalds wrote: > On Mon, Jun 27, 2016 at 8:54 AM, Andy Lutomirski wrote: >> >> How about: >> >> tsk_stack = (unsigned long)task_stack_page(tsk); >> if (regs->rsp <= tsk_stack + 7*8 && regs->rsp > tsk_stack - PAGE_SIZE) { > > I'm not at all convinced that regs->rsp will be all that reliable > under a double-fault scenario either. I'd be more inclined to trusr > cr2 than the register state. > > It's true that double faults can happen for *other* reasons entirely, > and as such it's not clear that %cr2 is reliable either, but since > this is all just about a printout, I'd rather go that way anyway. Fair enough. The chance that we get #GP-in-#GP or similar while CR2 coincidentally points to the guard page is quite low. I'll add all the details to the comment but I'll leave the code alone. FWIW, the manual only says that CS and RIP are untrustworthy, not that RSP is untrustworthy, but it doesn't specify *what* RSP would contain anywhere I can find. I don't think this is important enough to start harassing the Intel and AMD folks over. --Andy