From: Will Deacon <will@kernel.org>
To: Mark Rutland <mark.rutland@arm.com>
Cc: linux-arm-kernel@lists.infradead.org, broonie@kernel.org,
catalin.marinas@arm.com, daniel.kiss@arm.com,
david.spickett@arm.com, luis.machado@arm.com, maz@kernel.org,
richard.sandiford@arm.com, sander.desmalen@arm.com,
tabba@google.com, tamas.petz@arm.com, tkjos@google.com,
yury.khrustalev@arm.com
Subject: Re: [PATCH 19/20] arm64/fpsimd: ptrace: Gracefully handle errors
Date: Wed, 7 May 2025 17:32:43 +0100 [thread overview]
Message-ID: <20250507163242.GD2580@willie-the-truck> (raw)
In-Reply-To: <20250506152523.1107431-20-mark.rutland@arm.com>
On Tue, May 06, 2025 at 04:25:22PM +0100, Mark Rutland wrote:
> Within sve_set_common() we do not handle error conditions correctly:
>
> * When writing to NT_ARM_SSVE, if sme_alloc() fails, the task will be
> left with task->thread.sme_state==NULL, but TIF_SME will be set and
> task->thread.fp_type==FP_STATE_SVE. This will result in a subsequent
> null pointer dereference when the task's state is loaded or otherwise
> manipulated.
>
> * When writing to NT_ARM_SSVE, if sve_alloc() fails, the task will be
> left with task->thread.sve_state==NULL, but TIF_SME will be set,
> PSTATE.SM will be set, and task->thread.fp_type==FP_STATE_FPSIMD.
> This is not a legitimate state, and can result in various problems,
> including a subsequent null pointer dereference and/or the task
> inheriting stale streaming mode register state the next time its state
> is loaded into hardware.
>
> * When writing to NT_ARM_SSVE, if the VL is changed but the resultign VL
> differs from that in the header, the task will be left with TIF_SME
> set, PSTATE.SM set, but task->thread.fp_type==FP_STATE_FPSIMD. This is
> not a legitimate state, and can result in various problems as
> described above.
>
> Avoid these problems by allocating memory earlier, and by changing the
> task's saved fp_type to FP_STATE_SVE before skipping register writes due
> to a change of VL. To make this simpler I've pulled the flushing of task
> state earlier and moved the setting of TIF_SVE earlier -- this will be
> cleared when loading FPSIMD-only state, and so moving this has no
> resulting functional change.
Doesn't flushing the state earlier mean that passing a count smaller than
the header size is now potentially destructive to the fpsimd state?
> When changlnig the
This ends mid-sentence and 'changlnig' sounds like a Doors tune.
Will
next prev parent reply other threads:[~2025-05-07 17:26 UTC|newest]
Thread overview: 44+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-05-06 15:25 [PATCH 00/20] arm64: FPSIMD/SVE/SME fixes + re-eanble SME Mark Rutland
2025-05-06 15:25 ` [PATCH 01/20] kselftest/arm64: fp-ptrace: Fix expected FPMR value when PSTATE.SM is changed Mark Rutland
2025-05-06 15:25 ` [PATCH 02/20] arm64/fpsimd: Do not discard modified SVE state Mark Rutland
2025-05-06 15:25 ` [PATCH 03/20] arm64/fpsimd: signal: Clear PSTATE.SM when restoring FPSIMD frame only Mark Rutland
2025-05-07 12:46 ` Will Deacon
2025-05-07 14:01 ` Mark Rutland
2025-05-07 14:39 ` Will Deacon
2025-05-06 15:25 ` [PATCH 04/20] arm64/fpsimd: signal: Mandate SVE payload for streaming-mode state Mark Rutland
2025-05-07 0:59 ` Mark Brown
2025-05-07 12:59 ` Will Deacon
2025-05-07 14:21 ` Mark Rutland
2025-05-07 14:29 ` Will Deacon
2025-05-07 15:02 ` Mark Rutland
2025-05-07 16:14 ` Will Deacon
2025-05-06 15:25 ` [PATCH 05/20] arm64/fpsimd: ptrace: Consistently handle partial writes to NT_ARM_(S)SVE Mark Rutland
2025-05-06 15:25 ` [PATCH 06/20] arm64/fpsimd: Clarify sve_sync_*() functions Mark Rutland
2025-05-06 15:25 ` [PATCH 07/20] arm64/fpsimd: Factor out {sve,sme}_state_size() helpers Mark Rutland
2025-05-06 15:25 ` [PATCH 08/20] arm64/fpsimd: Add task_smstop_sm() Mark Rutland
2025-05-06 15:25 ` [PATCH 09/20] arm64/fpsimd: signal: Use SMSTOP behaviour in setup_return() Mark Rutland
2025-05-06 15:25 ` [PATCH 10/20] arm64/fpsimd: Remove redundant task->mm check Mark Rutland
2025-05-06 15:25 ` [PATCH 11/20] arm64/fpsimd: Consistently preserve FPSIMD state during clone() Mark Rutland
2025-05-06 15:25 ` [PATCH 12/20] arm64/fpsimd: Clear PSTATE.SM " Mark Rutland
2025-05-06 15:25 ` [PATCH 13/20] arm64/fpsimd: Make clone() compatible with ZA lazy saving Mark Rutland
2025-05-07 14:58 ` Will Deacon
2025-05-07 15:22 ` Mark Rutland
2025-05-07 16:11 ` Will Deacon
2025-05-07 17:21 ` Mark Rutland
2025-05-07 15:57 ` Yury Khrustalev
2025-05-06 15:25 ` [PATCH 14/20] arm64/fpsimd: ptrace/prctl: Ensure VL changes do not resurrect stale data Mark Rutland
2025-05-06 15:25 ` [PATCH 15/20] arm64/fpsimd: ptrace/prctl: Ensure VL changes leave task in a valid state Mark Rutland
2025-05-07 16:12 ` Will Deacon
2025-05-07 17:10 ` Mark Rutland
2025-05-08 10:31 ` Will Deacon
2025-05-06 15:25 ` [PATCH 16/20] arm64/fpsimd: ptrace: Save task state before generating SVE header Mark Rutland
2025-05-06 15:25 ` [PATCH 17/20] arm64/fpsimd: ptrace: Do not present register data for inactive mode Mark Rutland
2025-05-06 15:25 ` [PATCH 18/20] arm64/fpsimd: ptrace: Mandate SVE payload for streaming-mode state Mark Rutland
2025-05-07 1:09 ` Mark Brown
2025-05-06 15:25 ` [PATCH 19/20] arm64/fpsimd: ptrace: Gracefully handle errors Mark Rutland
2025-05-07 16:32 ` Will Deacon [this message]
2025-05-08 12:12 ` Mark Rutland
2025-05-06 15:25 ` [PATCH 20/20] arm64/fpsimd: Allow CONFIG_ARM64_SME to be selected Mark Rutland
2025-05-07 1:48 ` [PATCH 00/20] arm64: FPSIMD/SVE/SME fixes + re-eanble SME Mark Brown
2025-05-07 9:56 ` Mark Rutland
2025-05-07 11:26 ` Mark Brown
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20250507163242.GD2580@willie-the-truck \
--to=will@kernel.org \
--cc=broonie@kernel.org \
--cc=catalin.marinas@arm.com \
--cc=daniel.kiss@arm.com \
--cc=david.spickett@arm.com \
--cc=linux-arm-kernel@lists.infradead.org \
--cc=luis.machado@arm.com \
--cc=mark.rutland@arm.com \
--cc=maz@kernel.org \
--cc=richard.sandiford@arm.com \
--cc=sander.desmalen@arm.com \
--cc=tabba@google.com \
--cc=tamas.petz@arm.com \
--cc=tkjos@google.com \
--cc=yury.khrustalev@arm.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox