Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752066AbeAHRVI (ORCPT + 1 other); Mon, 8 Jan 2018 12:21:08 -0500 Received: from mail-wm0-f68.google.com ([74.125.82.68]:43172 "EHLO mail-wm0-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751843AbeAHRVG (ORCPT ); Mon, 8 Jan 2018 12:21:06 -0500 X-Google-Smtp-Source: ACJfBoscTO1T7sytNpVZNs4Fj1Oi7lSQVrBskTGF3ortoLIV6TI/tDeyfOzUL4GwBHoMBYIeFxDbFw== Date: Mon, 8 Jan 2018 18:21:02 +0100 From: Ingo Molnar To: Dave Hansen Cc: Willy Tarreau , linux-kernel@vger.kernel.org, x86@kernel.org, tglx@linutronix.de, gnomes@lxorguk.ukuu.org.uk, torvalds@linux-foundation.org, Borislav Petkov , Andy Lutomirski , Josh Poimboeuf , Peter Zijlstra Subject: Re: [PATCH RFC 3/4] x86/pti: don't mark the user PGD with _PAGE_NX. Message-ID: <20180108172102.rovxyjpscnoj4iy2@gmail.com> References: <1515427939-10999-1-git-send-email-w@1wt.eu> <1515427939-10999-4-git-send-email-w@1wt.eu> <57039ac1-efe2-2f97-386f-dab0b90f64a5@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <57039ac1-efe2-2f97-386f-dab0b90f64a5@intel.com> User-Agent: NeoMutt/20170609 (1.8.3) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Return-Path: * Dave Hansen wrote: > On 01/08/2018 08:12 AM, Willy Tarreau wrote: > > Since we're going to keep running on the same PGD when returning to > > userspace for certain performance-critical tasks, we'll need the user > > pages to be executable. So this code disables the extra protection > > that was added consisting in marking user pages _PAGE_NX so that this > > pgd remains usable for userspace. > > > > Note: it isn't necessarily the best approach, but one way or another > > if we want to be able to return to userspace from the kernel, > > we'll have to have this executable anyway. Another approach > > might consist in using another pgd for userland+kernel but > > the current core really looks like an extra careful measure > > to catch early bugs if any. > > I don't like this. > > I think the prctl() should apply to an entire process, not to a thread. > If it applies to a process, you can unpoison the PGD. I even had code > to do this in an earlier version of the (whole system) runtime PTI > on/off stuff. > > Why are you even posting half-baked hacks like this now? Is there > something super-pressing about this set that we need to lock in a new > ABI now? Arguably it was posted as an RFC patch-set, to get feedback early on. The motivation is clear enough from the announcement I think: to speed up the haproxy performance almost two-fold, without sacrificing the overall security given by PTI against the Meltdown attack. haproxy does not require PTI, as it never executes untrusted code. Thanks, Ingo