Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S935491AbeAHRFv (ORCPT + 1 other); Mon, 8 Jan 2018 12:05:51 -0500 Received: from Galois.linutronix.de ([146.0.238.70]:50304 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S934560AbeAHRFh (ORCPT ); Mon, 8 Jan 2018 12:05:37 -0500 Date: Mon, 8 Jan 2018 18:05:35 +0100 (CET) From: Thomas Gleixner To: Willy Tarreau cc: linux-kernel@vger.kernel.org, x86@kernel.org, gnomes@lxorguk.ukuu.org.uk, torvalds@linux-foundation.org Subject: Re: [PATCH RFC 3/4] x86/pti: don't mark the user PGD with _PAGE_NX. In-Reply-To: <1515427939-10999-4-git-send-email-w@1wt.eu> Message-ID: References: <1515427939-10999-1-git-send-email-w@1wt.eu> <1515427939-10999-4-git-send-email-w@1wt.eu> User-Agent: Alpine 2.20 (DEB 67 2015-01-07) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Return-Path: On Mon, 8 Jan 2018, Willy Tarreau wrote: > Since we're going to keep running on the same PGD when returning to > userspace for certain performance-critical tasks, we'll need the user > pages to be executable. So this code disables the extra protection > that was added consisting in marking user pages _PAGE_NX so that this > pgd remains usable for userspace. > > Note: it isn't necessarily the best approach, but one way or another > if we want to be able to return to userspace from the kernel, > we'll have to have this executable anyway. Another approach > might consist in using another pgd for userland+kernel but > the current core really looks like an extra careful measure > to catch early bugs if any. I surely want to keep that as a safety measure. The entry code is simple to get wrong and running with the wrong pagetables by a silly mistake and thereby undoing the protection is surely not what we want. Need to find a free time slot to think about that. Thanks, tglx