From: Jiri Slaby <jirislaby@kernel.org>
To: Pawan Gupta <pawan.kumar.gupta@linux.intel.com>
Cc: Dave Hansen <dave.hansen@linux.intel.com>,
stable@vger.kernel.org, Alyssa Milburn <alyssa.milburn@intel.com>,
Andrew Cooper <andrew.cooper3@citrix.com>,
Peter Zijlstra <peterz@infradead.org>
Subject: Re: [PATCH 6.7.y 1/6] x86/bugs: Add asm helpers for executing VERW
Date: Tue, 27 Feb 2024 09:41:55 +0100 [thread overview]
Message-ID: <abc65c4d-4731-4234-b8a2-5eaa4e5a52e7@kernel.org> (raw)
In-Reply-To: <20240227082755.yl7ny34o33uotqww@desk>
On 27. 02. 24, 9:27, Pawan Gupta wrote:
> On Tue, Feb 27, 2024 at 08:40:26AM +0100, Jiri Slaby wrote:
>> ...
>>> --- a/arch/x86/include/asm/nospec-branch.h
>>> +++ b/arch/x86/include/asm/nospec-branch.h
>>> @@ -315,6 +315,17 @@
>>> #endif
>>> .endm
>>> +/*
>>> + * Macro to execute VERW instruction that mitigate transient data sampling
>>> + * attacks such as MDS. On affected systems a microcode update overloaded VERW
>>> + * instruction to also clear the CPU buffers. VERW clobbers CFLAGS.ZF.
>>> + *
>>> + * Note: Only the memory operand variant of VERW clears the CPU buffers.
>>> + */
>>> +.macro CLEAR_CPU_BUFFERS
>>> + ALTERNATIVE "", __stringify(verw mds_verw_sel), X86_FEATURE_CLEAR_CPU_BUF
>>
>> Why is not rip-relative preserved here?
>
> Because Nikolay reported that it was creating a problem for backports on
> kernels that don't support relocations in alternatives. More on this
> here:
>
> https://lore.kernel.org/lkml/20558f89-299b-472e-9a96-171403a83bd6@suse.com/
Sure, I know about the issue.
> Also, RIP-relative addressing was a requirement only for the initial
> versions of the series, where the VERW operand was pointing within the
> macro. For performance gains, later versions switched to the
> implementation in which all VERW sites were pointing to single memory
> location. With that, RIP-relative addressing could be droped in favor of
> fixed addresses.
>
>> Will this work at all (it looks like verw would now touch random
>> memory)?
>
> AFAIK, all memory operand variants of VERW have the CPU buffer clearing
> behavior. I will confirm this with the CPU architects.
I might be too dumb to understand this, so sorry if the below does not
make sense. Neither I cannot see "why it works" in the minor patch you
sent (and incorporated here). You only explain it's easier for backports
and "was needed in earlier versions".
But verw can #PF (and actually used to before Nik invented the jmp
workaround in the SUSE backport). I assume it's the case when the store
of the segment (mds_verw_sel) cannot be accessed/read. Now, with fixed
addressing this works unless KASLR is employed. If it is, the fixed
address of mds_verw_sel no longer points to the correct memory. Or what
am I missing?
>> In any way, should you do any changes during the backport, you shall
>> document that.
>
> Sorry, I missed to mention this change in 6.7.y backport. I did include
> this info in the other backports I sent:
>
> https://lore.kernel.org/stable/20240226-delay-verw-backport-6-6-y-v1-0-aa17b2922725@linux.intel.com/T/
> https://lore.kernel.org/stable/20240226-delay-verw-backport-6-1-y-v1-0-b3a2c5b9b0cb@linux.intel.com/T/
I am sure you are aware you need NOT doing this very change in 6.6 and
6.7 ;). It somehow confused me too.
thanks,
--
js
suse labs
next prev parent reply other threads:[~2024-02-27 8:41 UTC|newest]
Thread overview: 13+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-02-27 5:00 [PATCH 6.7.y 0/6] Delay VERW - 6.7.y backport Pawan Gupta
2024-02-27 5:00 ` [PATCH 6.7.y 1/6] x86/bugs: Add asm helpers for executing VERW Pawan Gupta
2024-02-27 7:40 ` Jiri Slaby
2024-02-27 7:47 ` Greg KH
2024-02-27 8:29 ` Pawan Gupta
2024-02-27 8:27 ` Pawan Gupta
2024-02-27 8:41 ` Jiri Slaby [this message]
2024-02-27 9:42 ` Jiri Slaby
2024-02-27 5:01 ` [PATCH 6.7.y 2/6] x86/entry_64: Add VERW just before userspace transition Pawan Gupta
2024-02-27 5:01 ` [PATCH 6.7.y 3/6] x86/entry_32: " Pawan Gupta
2024-02-27 5:01 ` [PATCH 6.7.y 4/6] x86/bugs: Use ALTERNATIVE() instead of mds_user_clear static key Pawan Gupta
2024-02-27 5:01 ` [PATCH 6.7.y 5/6] KVM/VMX: Use BT+JNC, i.e. EFLAGS.CF to select VMRESUME vs. VMLAUNCH Pawan Gupta
2024-02-27 5:01 ` [PATCH 6.7.y 6/6] KVM/VMX: Move VERW closer to VMentry for MDS mitigation Pawan Gupta
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=abc65c4d-4731-4234-b8a2-5eaa4e5a52e7@kernel.org \
--to=jirislaby@kernel.org \
--cc=alyssa.milburn@intel.com \
--cc=andrew.cooper3@citrix.com \
--cc=dave.hansen@linux.intel.com \
--cc=pawan.kumar.gupta@linux.intel.com \
--cc=peterz@infradead.org \
--cc=stable@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox