Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp5265182ybi; Sun, 7 Jul 2019 01:40:56 -0700 (PDT) X-Google-Smtp-Source: APXvYqzjvnRh1BROzEo3IoEdV6JAVmHjRpxhFBSyWbg8RjJN9NK0sz0kVdy8WSULo82spFBbr8od X-Received: by 2002:a17:902:b70e:: with SMTP id d14mr15680141pls.309.1562488856585; Sun, 07 Jul 2019 01:40:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1562488856; cv=none; d=google.com; s=arc-20160816; b=c3gZQO8ZYxum3XHPDuznvdPJJ1OMmA5H5XUBmRsJOXGMYo7FEGNwCW5mjh2841cASj FD4PK0/9GCvmaUJpSaahyAyokBZCqvDx0IQxLlyrGDXskCX30VfNJx6gRBVUIdhjhAn7 VqZbehlhIXyW4C0sZsh3yRhrWX5LT8oxER+yNx+rBWhIGrSk/JW+wLc5i5Apn7xYYWmw 3Uhrr4lpfaBgcXR8S+pUFvtNKluhAxCOP+KWHRYBRAp3K+dmgrB0/YxOp164cB1S4zMn kZtjmjuuVMUvhMHqz5Fy4fBsLdxxqVKp+plaTIn9UZedk5V3GXBT8kUAHpMAfAPx5cTy HXiQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date; bh=fsMoMH7Qbum/TYCQokO8+bmPk5AoDoNjBSa8hrsxY/8=; b=lHtl7g8RbPxL8A/Vj1ZRmvCluKZBvwtOrW+WnbSG8zCGF9rJnMnin97hs+EJl4JVgO /iI/4WZCEHSKsLDmFoUPu15Evih038o2xIedbQxR2hOFIdOfHsDMhV37rUOyWtYeyaK7 1SfFJeXFONEi3bn69ptrTXalaxMnzd844NPH9Pxkw8OYaCCtHElPdFbAJC+OfISLl2Re UHRYpSTe3VbMlZqA39OtZSoeREsb7p2nGCvwLh4IjKEm+4yJWQWD0pfGafmmrrFkMBON 0blXGIfxkBp2DiB1PqNLbjxh3HfRLxRZQgYbSiloowWqRMQXuR29yNWIeGmZsWn2/ovY OYBg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s18si14099196pgj.541.2019.07.07.01.40.41; Sun, 07 Jul 2019 01:40:56 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727189AbfGGI1l (ORCPT + 99 others); Sun, 7 Jul 2019 04:27:41 -0400 Received: from Galois.linutronix.de ([193.142.43.55]:37524 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726325AbfGGI1l (ORCPT ); Sun, 7 Jul 2019 04:27:41 -0400 Received: from pd9ef1cb8.dip0.t-ipconnect.de ([217.239.28.184] helo=nanos) by Galois.linutronix.de with esmtpsa (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1hk2WA-0002bP-AD; Sun, 07 Jul 2019 10:27:30 +0200 Date: Sun, 7 Jul 2019 10:27:29 +0200 (CEST) From: Thomas Gleixner To: Andy Lutomirski cc: Andrew Cooper , Josh Poimboeuf , Peter Zijlstra , LKML , X86 ML , Nadav Amit , Ricardo Neri , Stephane Eranian , Feng Tang Subject: Re: [patch V2 04/25] x86/apic: Make apic_pending_intr_clear() more robust In-Reply-To: Message-ID: References: <20190704155145.617706117@linutronix.de> <20190704155608.636478018@linutronix.de> <958a67c2-4dc0-52e6-43b2-1ebd25a59232@citrix.com> User-Agent: Alpine 2.21 (DEB 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII X-Linutronix-Spam-Score: -1.0 X-Linutronix-Spam-Level: - X-Linutronix-Spam-Status: No , -1.0 points, 5.0 required, ALL_TRUSTED=-1,SHORTCIRCUIT=-0.0001 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 5 Jul 2019, Andy Lutomirski wrote: > On Fri, Jul 5, 2019 at 1:36 PM Thomas Gleixner wrote: > > No. We can map the APIC into the user space visible page tables for PTI > > without compromising the PTI isolation and it can be read very early on > > before SWAPGS. All you need is a register to clobber not more. It the ISR > > is set, then go into an error path, yell loudly, issue EOI and return. > > The only issue I can see is: It's slow :) > > > I think this will be really extremely slow. If we can restrict this > to x2apic machines, then maybe it's not so awful. x2apic machines have working iommu/interrupt remapping. > FWIW, if we just patch up the GS thing, then we are still vulnerable: > the bad guy can arrange for a privileged process to have register > state corresponding to a dangerous syscall and then send an int $0x80 > via the APIC. Right, that's why you want to read the APIC:ISR to check where that thing came from. Thanks, tglx