Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S935636AbeAHRKP (ORCPT + 1 other); Mon, 8 Jan 2018 12:10:15 -0500 Received: from wtarreau.pck.nerim.net ([62.212.114.60]:38944 "EHLO 1wt.eu" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932188AbeAHRKO (ORCPT ); Mon, 8 Jan 2018 12:10:14 -0500 Date: Mon, 8 Jan 2018 18:10:08 +0100 From: Willy Tarreau To: Thomas Gleixner Cc: linux-kernel@vger.kernel.org, x86@kernel.org, gnomes@lxorguk.ukuu.org.uk, torvalds@linux-foundation.org Subject: Re: [PATCH RFC 2/4] x86/arch_prctl: add ARCH_GET_NOPTI and ARCH_SET_NOPTI to enable/disable PTI Message-ID: <20180108171008.GF10913@1wt.eu> References: <1515427939-10999-1-git-send-email-w@1wt.eu> <1515427939-10999-3-git-send-email-w@1wt.eu> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.6.1 (2016-04-27) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Return-Path: On Mon, Jan 08, 2018 at 06:02:35PM +0100, Thomas Gleixner wrote: > On Mon, 8 Jan 2018, Willy Tarreau wrote: > > This allows to report the current state of the PTI protection and to > > enable or disable it for the current task. > > > > Signed-off-by: Willy Tarreau > > --- > > arch/x86/include/uapi/asm/prctl.h | 3 +++ > > arch/x86/kernel/process_64.c | 24 ++++++++++++++++++++++++ > > 2 files changed, 27 insertions(+) > > > > diff --git a/arch/x86/include/uapi/asm/prctl.h b/arch/x86/include/uapi/asm/prctl.h > > index 5a6aac9..1f1b5bc 100644 > > --- a/arch/x86/include/uapi/asm/prctl.h > > +++ b/arch/x86/include/uapi/asm/prctl.h > > @@ -10,6 +10,9 @@ > > #define ARCH_GET_CPUID 0x1011 > > #define ARCH_SET_CPUID 0x1012 > > > > +#define ARCH_GET_NOPTI 0x1021 > > +#define ARCH_SET_NOPTI 0x1022 > > + > > #define ARCH_MAP_VDSO_X32 0x2001 > > #define ARCH_MAP_VDSO_32 0x2002 > > #define ARCH_MAP_VDSO_64 0x2003 > > diff --git a/arch/x86/kernel/process_64.c b/arch/x86/kernel/process_64.c > > index c754662..1686d3d 100644 > > --- a/arch/x86/kernel/process_64.c > > +++ b/arch/x86/kernel/process_64.c > > @@ -654,6 +654,30 @@ long do_arch_prctl_64(struct task_struct *task, int option, unsigned long arg2) > > ret = put_user(base, (unsigned long __user *)arg2); > > break; > > } > > + case ARCH_GET_NOPTI: { > > + unsigned long flag; > > + > > + printk(KERN_DEBUG "get1: task=%p ti=%p fl=%16lx\n", task, task_thread_info(task), task_thread_info(task)->flags); > > + flag = !!(task_thread_info(task)->flags & _TIF_NOPTI); > > + ret = put_user(flag, (unsigned long __user *)arg2); > > + break; > > Per task is really an odd choice. That should be per process I think, but > that of course needs synchronization of some form. Aside of that we need to > think about fork(). I also wondered how to do it and had no idea, but I wanted to start with something, also keeping in mind that I didn't want to risk losing in extra checks what we managed to previously save. I agree that it's not the best we can have. That said, other features seem to work like this, like TIF_NOTSC and TIF_NOCPUID, so it didn't look too odd at first glance. Willy