From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754483AbdKJWGm (ORCPT ); Fri, 10 Nov 2017 17:06:42 -0500 Received: from mail.kernel.org ([198.145.29.99]:52028 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750932AbdKJWGl (ORCPT ); Fri, 10 Nov 2017 17:06:41 -0500 DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org A540F21998 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=luto@kernel.org X-Google-Smtp-Source: AGs4zMa8dqx3zJQVy3RMC9M817mCtGg6k3cL8J9nLJpX3q4nrABZuR+SOfQkn5V1WnJFya4eFiOx/DcWrLHRfCR/r0c= MIME-Version: 1.0 In-Reply-To: References: <20171108194646.907A1942@viggo.jf.intel.com> <20171108194731.AB5BDA01@viggo.jf.intel.com> <6871f284-b7e9-f843-608f-5345f9d03396@linux.intel.com> <27b55108-1e72-cb3d-d5d8-ffe0238245aa@linux.intel.com> <4c8c441e-d65c-fcec-7718-6997bd010971@linux.intel.com> From: Andy Lutomirski Date: Fri, 10 Nov 2017 14:06:19 -0800 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH 24/30] x86, kaiser: disable native VSYSCALL To: Dave Hansen Cc: Andy Lutomirski , "linux-kernel@vger.kernel.org" , "linux-mm@kvack.org" , moritz.lipp@iaik.tugraz.at, Daniel Gruss , michael.schwarz@iaik.tugraz.at, richard.fellner@student.tugraz.at, Linus Torvalds , Kees Cook , Hugh Dickins , X86 ML Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Nov 9, 2017 at 10:31 PM, Dave Hansen wrote: > On 11/09/2017 06:25 PM, Andy Lutomirski wrote: >> Here are two proposals to address this without breaking vsyscalls. >> >> 1. Set NX on low mappings that are _PAGE_USER. Don't set NX on high >> mappings but, optionally, warn if you see _PAGE_USER on any address >> that isn't the vsyscall page. >> >> 2. Ignore _PAGE_USER entirely and just mark the EFI mm as special so >> KAISER doesn't muck with it. > > These are totally doable. But, what's the big deal with breaking native > vsyscall? We can still do the emulation so nothing breaks: it is just slow. I have nothing against disabling native. I object to breaking the weird binary tracing behavior in the emulation mode, especially if it's tangled up with KAISER. I got all kinds of flak in an earlier version of the vsyscall emulation patches when I broke that use case. KAISER may get very widely backported -- let's not make changes that are already known to break things.