public inbox for stable@vger.kernel.org
 help / color / mirror / Atom feed
From: Jiri Slaby <jirislaby@kernel.org>
To: Pawan Gupta <pawan.kumar.gupta@linux.intel.com>
Cc: Dave Hansen <dave.hansen@linux.intel.com>,
	stable@vger.kernel.org, Alyssa Milburn <alyssa.milburn@intel.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	Peter Zijlstra <peterz@infradead.org>
Subject: Re: [PATCH 6.7.y 1/6] x86/bugs: Add asm helpers for executing VERW
Date: Tue, 27 Feb 2024 09:41:55 +0100	[thread overview]
Message-ID: <abc65c4d-4731-4234-b8a2-5eaa4e5a52e7@kernel.org> (raw)
In-Reply-To: <20240227082755.yl7ny34o33uotqww@desk>

On 27. 02. 24, 9:27, Pawan Gupta wrote:
> On Tue, Feb 27, 2024 at 08:40:26AM +0100, Jiri Slaby wrote:
>> ...
>>> --- a/arch/x86/include/asm/nospec-branch.h
>>> +++ b/arch/x86/include/asm/nospec-branch.h
>>> @@ -315,6 +315,17 @@
>>>    #endif
>>>    .endm
>>> +/*
>>> + * Macro to execute VERW instruction that mitigate transient data sampling
>>> + * attacks such as MDS. On affected systems a microcode update overloaded VERW
>>> + * instruction to also clear the CPU buffers. VERW clobbers CFLAGS.ZF.
>>> + *
>>> + * Note: Only the memory operand variant of VERW clears the CPU buffers.
>>> + */
>>> +.macro CLEAR_CPU_BUFFERS
>>> +	ALTERNATIVE "", __stringify(verw mds_verw_sel), X86_FEATURE_CLEAR_CPU_BUF
>>
>> Why is not rip-relative preserved here?
> 
> Because Nikolay reported that it was creating a problem for backports on
> kernels that don't support relocations in alternatives. More on this
> here:
> 
>    https://lore.kernel.org/lkml/20558f89-299b-472e-9a96-171403a83bd6@suse.com/

Sure, I know about the issue.

> Also, RIP-relative addressing was a requirement only for the initial
> versions of the series, where the VERW operand was pointing within the
> macro. For performance gains, later versions switched to the
> implementation in which all VERW sites were pointing to single memory
> location. With that, RIP-relative addressing could be droped in favor of
> fixed addresses.
> 
>> Will this work at all (it looks like verw would now touch random
>> memory)?
> 
> AFAIK, all memory operand variants of VERW have the CPU buffer clearing
> behavior. I will confirm this with the CPU architects.

I might be too dumb to understand this, so sorry if the below does not 
make sense. Neither I cannot see "why it works" in the minor patch you 
sent (and incorporated here). You only explain it's easier for backports 
and "was needed in earlier versions".

But verw can #PF (and actually used to before Nik invented the jmp 
workaround in the SUSE backport). I assume it's the case when the store 
of the segment (mds_verw_sel) cannot be accessed/read. Now, with fixed 
addressing this works unless KASLR is employed. If it is, the fixed 
address of mds_verw_sel no longer points to the correct memory. Or what 
am I missing?

>> In any way, should you do any changes during the backport, you shall
>> document that.
> 
> Sorry, I missed to mention this change in 6.7.y backport. I did include
> this info in the other backports I sent:
> 
>    https://lore.kernel.org/stable/20240226-delay-verw-backport-6-6-y-v1-0-aa17b2922725@linux.intel.com/T/
>    https://lore.kernel.org/stable/20240226-delay-verw-backport-6-1-y-v1-0-b3a2c5b9b0cb@linux.intel.com/T/

I am sure you are aware you need NOT doing this very change in 6.6 and 
6.7 ;). It somehow confused me too.

thanks,
-- 
js
suse labs


  reply	other threads:[~2024-02-27  8:41 UTC|newest]

Thread overview: 13+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-02-27  5:00 [PATCH 6.7.y 0/6] Delay VERW - 6.7.y backport Pawan Gupta
2024-02-27  5:00 ` [PATCH 6.7.y 1/6] x86/bugs: Add asm helpers for executing VERW Pawan Gupta
2024-02-27  7:40   ` Jiri Slaby
2024-02-27  7:47     ` Greg KH
2024-02-27  8:29       ` Pawan Gupta
2024-02-27  8:27     ` Pawan Gupta
2024-02-27  8:41       ` Jiri Slaby [this message]
2024-02-27  9:42         ` Jiri Slaby
2024-02-27  5:01 ` [PATCH 6.7.y 2/6] x86/entry_64: Add VERW just before userspace transition Pawan Gupta
2024-02-27  5:01 ` [PATCH 6.7.y 3/6] x86/entry_32: " Pawan Gupta
2024-02-27  5:01 ` [PATCH 6.7.y 4/6] x86/bugs: Use ALTERNATIVE() instead of mds_user_clear static key Pawan Gupta
2024-02-27  5:01 ` [PATCH 6.7.y 5/6] KVM/VMX: Use BT+JNC, i.e. EFLAGS.CF to select VMRESUME vs. VMLAUNCH Pawan Gupta
2024-02-27  5:01 ` [PATCH 6.7.y 6/6] KVM/VMX: Move VERW closer to VMentry for MDS mitigation Pawan Gupta

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=abc65c4d-4731-4234-b8a2-5eaa4e5a52e7@kernel.org \
    --to=jirislaby@kernel.org \
    --cc=alyssa.milburn@intel.com \
    --cc=andrew.cooper3@citrix.com \
    --cc=dave.hansen@linux.intel.com \
    --cc=pawan.kumar.gupta@linux.intel.com \
    --cc=peterz@infradead.org \
    --cc=stable@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox