From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-pf0-f198.google.com (mail-pf0-f198.google.com [209.85.192.198]) by kanga.kvack.org (Postfix) with ESMTP id DE0A228029F for ; Fri, 10 Nov 2017 17:06:41 -0500 (EST) Received: by mail-pf0-f198.google.com with SMTP id d15so414373pfl.0 for ; Fri, 10 Nov 2017 14:06:41 -0800 (PST) Received: from mail.kernel.org (mail.kernel.org. [198.145.29.99]) by mx.google.com with ESMTPS id n15si7936448pfg.37.2017.11.10.14.06.40 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 10 Nov 2017 14:06:40 -0800 (PST) Received: from mail-io0-f180.google.com (mail-io0-f180.google.com [209.85.223.180]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 92BA221984 for ; Fri, 10 Nov 2017 22:06:40 +0000 (UTC) Received: by mail-io0-f180.google.com with SMTP id b186so15043962iof.8 for ; Fri, 10 Nov 2017 14:06:40 -0800 (PST) MIME-Version: 1.0 In-Reply-To: References: <20171108194646.907A1942@viggo.jf.intel.com> <20171108194731.AB5BDA01@viggo.jf.intel.com> <6871f284-b7e9-f843-608f-5345f9d03396@linux.intel.com> <27b55108-1e72-cb3d-d5d8-ffe0238245aa@linux.intel.com> <4c8c441e-d65c-fcec-7718-6997bd010971@linux.intel.com> From: Andy Lutomirski Date: Fri, 10 Nov 2017 14:06:19 -0800 Message-ID: Subject: Re: [PATCH 24/30] x86, kaiser: disable native VSYSCALL Content-Type: text/plain; charset="UTF-8" Sender: owner-linux-mm@kvack.org List-ID: To: Dave Hansen Cc: Andy Lutomirski , "linux-kernel@vger.kernel.org" , "linux-mm@kvack.org" , moritz.lipp@iaik.tugraz.at, Daniel Gruss , michael.schwarz@iaik.tugraz.at, richard.fellner@student.tugraz.at, Linus Torvalds , Kees Cook , Hugh Dickins , X86 ML On Thu, Nov 9, 2017 at 10:31 PM, Dave Hansen wrote: > On 11/09/2017 06:25 PM, Andy Lutomirski wrote: >> Here are two proposals to address this without breaking vsyscalls. >> >> 1. Set NX on low mappings that are _PAGE_USER. Don't set NX on high >> mappings but, optionally, warn if you see _PAGE_USER on any address >> that isn't the vsyscall page. >> >> 2. Ignore _PAGE_USER entirely and just mark the EFI mm as special so >> KAISER doesn't muck with it. > > These are totally doable. But, what's the big deal with breaking native > vsyscall? We can still do the emulation so nothing breaks: it is just slow. I have nothing against disabling native. I object to breaking the weird binary tracing behavior in the emulation mode, especially if it's tangled up with KAISER. I got all kinds of flak in an earlier version of the vsyscall emulation patches when I broke that use case. KAISER may get very widely backported -- let's not make changes that are already known to break things. -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: email@kvack.org