stable.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH v2] x86/fpu: Avoid writing LBR bit to IA32_XSS unless supported
@ 2024-08-09 20:53 Mitchell Levy via B4 Relay
  2024-08-10 23:08 ` Thomas Gleixner
  0 siblings, 1 reply; 4+ messages in thread
From: Mitchell Levy via B4 Relay @ 2024-08-09 20:53 UTC (permalink / raw)
  To: Thomas Gleixner, Ingo Molnar, Borislav Petkov, Dave Hansen, x86,
	H. Peter Anvin, Kan Liang, Peter Zijlstra (Intel)
  Cc: stable, Borislav Petkov, linux-kernel, Dave Hansen, Mitchell Levy

From: Mitchell Levy <levymitchell0@gmail.com>

When computing which xfeatures are available, make sure that LBR is only
present if both LBR is supported in general, as well as by XSAVES.

There are two distinct CPU features related to the use of XSAVES as it
applies to LBR: whether LBR is itself supported (strictly speaking, I'm
not sure that this is necessary to check though it's certainly a good
sanity check), and whether XSAVES supports LBR (see sections 13.2 and
13.5.12 of the Intel 64 and IA-32 Architectures Software Developer's
Manual, Volume 1). Currently, the LBR subsystem correctly checks both
(see intel_pmu_arch_lbr_init), however the xstate initialization
subsystem does not.

When calculating what value to place in the IA32_XSS MSR,
xfeatures_mask_independent only checks whether LBR support is present,
not whether XSAVES supports LBR. If XSAVES does not support LBR, this
write causes #GP, leaving the state of IA32_XSS unchanged (i.e., set to
zero, as its not written with other values, and its default value is
zero out of RESET per section 13.3 of the arch manual).

Then, the next time XRSTORS is used to restore supervisor state, it will
fail with #GP (because the RFBM has zero for all supervisor features,
which does not match the XCOMP_BV field). In particular,
XFEATURE_MASK_FPSTATE includes supervisor features, so setting up the FPU
will cause a #GP. This results in a call to fpu_reset_from_exception_fixup,
which by the same process results in another #GP. Eventually this causes
the kernel to run out of stack space and #DF.

Fixes: f0dccc9da4c0 ("x86/fpu/xstate: Support dynamic supervisor feature for LBR")
Cc: stable@vger.kernel.org

Signed-off-by: Mitchell Levy <levymitchell0@gmail.com>
---
Changes in v2:
- Corrected Fixes tag (thanks tglx)
- Properly check for XSAVES support of LBR (thanks tglx)
- Link to v1: https://lore.kernel.org/r/20240808-xsave-lbr-fix-v1-1-a223806c83e7@gmail.com
---
 arch/x86/include/asm/fpu/types.h | 7 +++++++
 arch/x86/kernel/fpu/xstate.c     | 3 +++
 arch/x86/kernel/fpu/xstate.h     | 4 ++--
 3 files changed, 12 insertions(+), 2 deletions(-)

diff --git a/arch/x86/include/asm/fpu/types.h b/arch/x86/include/asm/fpu/types.h
index eb17f31b06d2..de16862bf230 100644
--- a/arch/x86/include/asm/fpu/types.h
+++ b/arch/x86/include/asm/fpu/types.h
@@ -591,6 +591,13 @@ struct fpu_state_config {
 	 * even without XSAVE support, i.e. legacy features FP + SSE
 	 */
 	u64 legacy_features;
+	/*
+	 * @independent_features:
+	 *
+	 * Features that are supported by XSAVES, but not managed as part of
+	 * the FPU core, such as LBR
+	 */
+	u64 independent_features;
 };
 
 /* FPU state configuration information */
diff --git a/arch/x86/kernel/fpu/xstate.c b/arch/x86/kernel/fpu/xstate.c
index c5a026fee5e0..1339f8328db5 100644
--- a/arch/x86/kernel/fpu/xstate.c
+++ b/arch/x86/kernel/fpu/xstate.c
@@ -788,6 +788,9 @@ void __init fpu__init_system_xstate(unsigned int legacy_size)
 		goto out_disable;
 	}
 
+	fpu_kernel_cfg.independent_features = fpu_kernel_cfg.max_features &
+					      XFEATURE_MASK_INDEPENDENT;
+
 	/*
 	 * Clear XSAVE features that are disabled in the normal CPUID.
 	 */
diff --git a/arch/x86/kernel/fpu/xstate.h b/arch/x86/kernel/fpu/xstate.h
index 2ee0b9c53dcc..afb404cd2059 100644
--- a/arch/x86/kernel/fpu/xstate.h
+++ b/arch/x86/kernel/fpu/xstate.h
@@ -62,9 +62,9 @@ static inline u64 xfeatures_mask_supervisor(void)
 static inline u64 xfeatures_mask_independent(void)
 {
 	if (!cpu_feature_enabled(X86_FEATURE_ARCH_LBR))
-		return XFEATURE_MASK_INDEPENDENT & ~XFEATURE_MASK_LBR;
+		return fpu_kernel_cfg.independent_features & ~XFEATURE_MASK_LBR;
 
-	return XFEATURE_MASK_INDEPENDENT;
+	return fpu_kernel_cfg.independent_features;
 }
 
 /* XSAVE/XRSTOR wrapper functions */

---
base-commit: de9c2c66ad8e787abec7c9d7eff4f8c3cdd28aed
change-id: 20240807-xsave-lbr-fix-02d52f641653

Best regards,
-- 
Mitchell Levy <levymitchell0@gmail.com>



^ permalink raw reply related	[flat|nested] 4+ messages in thread

* Re: [PATCH v2] x86/fpu: Avoid writing LBR bit to IA32_XSS unless supported
  2024-08-09 20:53 [PATCH v2] x86/fpu: Avoid writing LBR bit to IA32_XSS unless supported Mitchell Levy via B4 Relay
@ 2024-08-10 23:08 ` Thomas Gleixner
  2024-08-11  0:30   ` Mitchell Levy
  0 siblings, 1 reply; 4+ messages in thread
From: Thomas Gleixner @ 2024-08-10 23:08 UTC (permalink / raw)
  To: Mitchell Levy via B4 Relay, Ingo Molnar, Borislav Petkov,
	Dave Hansen, x86, H. Peter Anvin, Kan Liang,
	Peter Zijlstra (Intel)
  Cc: stable, Borislav Petkov, linux-kernel, Dave Hansen, Mitchell Levy

On Fri, Aug 09 2024 at 13:53, Mitchell Levy via wrote:
> From: Mitchell Levy <levymitchell0@gmail.com>

...

> Signed-off-by: Mitchell Levy <levymitchell0@gmail.com>
> ---
> Changes in v2:
> - Corrected Fixes tag (thanks tglx)
> - Properly check for XSAVES support of LBR (thanks tglx)

IOW. I provided you the proper fix and now you are reposting it and
claiming authorship for it?

May I ask you to read Documentation/process/ ?

Thanks,

        tglx

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [PATCH v2] x86/fpu: Avoid writing LBR bit to IA32_XSS unless supported
  2024-08-10 23:08 ` Thomas Gleixner
@ 2024-08-11  0:30   ` Mitchell Levy
  2024-08-11  7:50     ` Thomas Gleixner
  0 siblings, 1 reply; 4+ messages in thread
From: Mitchell Levy @ 2024-08-11  0:30 UTC (permalink / raw)
  To: Thomas Gleixner
  Cc: Mitchell Levy via B4 Relay, Ingo Molnar, Borislav Petkov,
	Dave Hansen, x86, H. Peter Anvin, Kan Liang,
	Peter Zijlstra (Intel), stable, Borislav Petkov, linux-kernel,
	Dave Hansen

On Sun, Aug 11, 2024 at 01:08:18AM +0200, Thomas Gleixner wrote:
> On Fri, Aug 09 2024 at 13:53, Mitchell Levy via wrote:
> > From: Mitchell Levy <levymitchell0@gmail.com>
> 
> ...
> 
> > Signed-off-by: Mitchell Levy <levymitchell0@gmail.com>
> > ---
> > Changes in v2:
> > - Corrected Fixes tag (thanks tglx)
> > - Properly check for XSAVES support of LBR (thanks tglx)
> 
> IOW. I provided you the proper fix and now you are reposting it and
> claiming authorship for it?
Apologies, I did not consider authorship implications when resubmitting,
as I haven't encountered the situation where a patch is essentially
rewritten during the review process before. I will be much more mindful
of issues of authorship in future, and I appreciate you pointing this
out to me.

> May I ask you to read Documentation/process/ ?
Yes, I have now more thoroughly covered these docs. On second look, it
appears there's no Signed-off-by in your reply to my v1. I can send the
patch with you properly listed as the author and the proper
Signed-off-by lines if I have your permission to add your signoff.
Alternatively, feel free to reuse part/all of my commit message if you'd
rather submit the patch directly; it's quite understandable if you feel
unenthusiastic about me being involved with code you've authored.

> Thanks,
> 
>         tglx

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [PATCH v2] x86/fpu: Avoid writing LBR bit to IA32_XSS unless supported
  2024-08-11  0:30   ` Mitchell Levy
@ 2024-08-11  7:50     ` Thomas Gleixner
  0 siblings, 0 replies; 4+ messages in thread
From: Thomas Gleixner @ 2024-08-11  7:50 UTC (permalink / raw)
  To: Mitchell Levy
  Cc: Mitchell Levy via B4 Relay, Ingo Molnar, Borislav Petkov,
	Dave Hansen, x86, H. Peter Anvin, Kan Liang,
	Peter Zijlstra (Intel), stable, Borislav Petkov, linux-kernel,
	Dave Hansen

On Sat, Aug 10 2024 at 17:30, Mitchell Levy wrote:
> On Sun, Aug 11, 2024 at 01:08:18AM +0200, Thomas Gleixner wrote:
>> May I ask you to read Documentation/process/ ?
> Yes, I have now more thoroughly covered these docs. On second look, it
> appears there's no Signed-off-by in your reply to my v1. I can send the
> patch with you properly listed as the author and the proper
> Signed-off-by lines if I have your permission to add your signoff.
> Alternatively, feel free to reuse part/all of my commit message if you'd
> rather submit the patch directly; it's quite understandable if you feel
> unenthusiastic about me being involved with code you've authored.

Don't worry. Just add: Suggested-by: Thomas Gleixner <tglx@linutronix.de>

and be done with it.

Thanks,

        tglx

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2024-08-11  7:50 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2024-08-09 20:53 [PATCH v2] x86/fpu: Avoid writing LBR bit to IA32_XSS unless supported Mitchell Levy via B4 Relay
2024-08-10 23:08 ` Thomas Gleixner
2024-08-11  0:30   ` Mitchell Levy
2024-08-11  7:50     ` Thomas Gleixner

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).