Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp2849534pxa; Tue, 25 Aug 2020 05:13:49 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx5MSvPKuu/j+suUT4RU2xvkhDR6uokmJloCbKyxWg1FasjdkAHVn/FR4f+T+ir3/olVi6w X-Received: by 2002:a17:906:2296:: with SMTP id p22mr10131196eja.510.1598357629668; Tue, 25 Aug 2020 05:13:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1598357629; cv=none; d=google.com; s=arc-20160816; b=z+RJx8N5GSr66oBTmXOE6+dSeespxVgY/UaZ0UYN7QG1ZGk0QPXtTEDmKym+B2piN6 Edd4mdaUcom52jDasIc9BXQkPlSOYSbBuc4xN8ZDi4lrhcKRHtNbUPHtQo+9tg6Evf5r IMZfa8iDfwLvCgsR0ABYAsoF9r57j8+1MSrtSj7vLzne0gQZVoAhqO+Ey1zrziFY9Itk jVscKVBu7YO2VzeuDsVfcme51cFDl/AdyU/SStGf9BjYmkvpcDFU3+6/YaCkGpLdhIvE OIPjIEf0XzSvU8JoSoANffv7MOh10h1tWkRPpaJkFeNewG9WkmmRAyUbPLuLIsx10gwp rTfA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:message-id :in-reply-to:date:references:subject:cc:to:from:dkim-signature; bh=92i+0YUtQgEC4ia+7x4FHZS4hUNlAuigR1V4PDLFWpU=; b=MLmSw/2RWbAu4tMnkwh9LcjvcIIEGe367/I3TnXyDPRwuwOE/vtLw7xrsV1+wVpCG+ EqtlIvI5qgW0/FrrCMvIo82X+OL4eU4Qf2sGr/IYYBEOifam6Yp1Pgh+9d7CmIHbjXQK HrrL5YAvklat1Z/2LY2mKz5weshSqGzMEHawtY51BhIThh/EN1+bCgWFVQp8LZxWZWFm VCYogZCVj8ygvzKWk14+4O/gM7RXtgcRrBjdB74SBDqTF3nzzLrGUhYN7QVG+hA0Opmv uHqZnHok5lcdKQhBPbuGzqN4X9XzL2/yRejLIYVIqtaumndbHDmpc8FxRiq/LnNPl4yy wXNw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=dXID83x2; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ay17si9477749ejb.345.2020.08.25.05.13.26; Tue, 25 Aug 2020 05:13:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=dXID83x2; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726365AbgHYJPN (ORCPT + 99 others); Tue, 25 Aug 2020 05:15:13 -0400 Received: from us-smtp-2.mimecast.com ([207.211.31.81]:24718 "EHLO us-smtp-delivery-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1729036AbgHYJPD (ORCPT ); Tue, 25 Aug 2020 05:15:03 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1598346900; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=92i+0YUtQgEC4ia+7x4FHZS4hUNlAuigR1V4PDLFWpU=; b=dXID83x2aRkxAWfQMPZWk/vI0Qh6hxbzpf47lTeb+tvwUuSj24TdgkBRIgaD3YGlKDHCvj SX0gBQ3rs/KB+oGq+tV6STleCJU2EMW74zeeqTsUIgHcgFv0Gbs6KFrUuNrUir9FoGGTcZ CrwCG66NpsxslHzCJrVNy5/sTPOAUQQ= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-493-qjGmojjQPt2LSoxrEMPg0A-1; Tue, 25 Aug 2020 05:14:56 -0400 X-MC-Unique: qjGmojjQPt2LSoxrEMPg0A-1 Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.phx2.redhat.com [10.5.11.15]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id C7438100746B; Tue, 25 Aug 2020 09:14:52 +0000 (UTC) Received: from oldenburg2.str.redhat.com (ovpn-112-37.ams2.redhat.com [10.36.112.37]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 5353C808AB; Tue, 25 Aug 2020 09:14:39 +0000 (UTC) From: Florian Weimer To: Andy Lutomirski Cc: Yu-cheng Yu , X86 ML , "H. Peter Anvin" , Thomas Gleixner , Ingo Molnar , LKML , "open list\:DOCUMENTATION" , Linux-MM , linux-arch , Linux API , Arnd Bergmann , Balbir Singh , Borislav Petkov , Cyrill Gorcunov , Dave Hansen , Eugene Syromiatnikov , "H.J. Lu" , Jann Horn , Jonathan Corbet , Kees Cook , Mike Kravetz , Nadav Amit , Oleg Nesterov , Pavel Machek , Peter Zijlstra , Randy Dunlap , "Ravi V. Shankar" , Vedvyas Shanbhogue , Dave Martin , Weijiang Yang Subject: Re: [PATCH v11 9/9] x86: Disallow vsyscall emulation when CET is enabled References: <20200825002645.3658-1-yu-cheng.yu@intel.com> <20200825002645.3658-10-yu-cheng.yu@intel.com> Date: Tue, 25 Aug 2020 11:14:37 +0200 In-Reply-To: (Andy Lutomirski's message of "Mon, 24 Aug 2020 17:32:35 -0700") Message-ID: <87pn7f9jeq.fsf@oldenburg2.str.redhat.com> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/26.3 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain X-Scanned-By: MIMEDefang 2.79 on 10.5.11.15 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org * Andy Lutomirski: > On Mon, Aug 24, 2020 at 5:30 PM Yu-cheng Yu wrote: >> >> From: "H.J. Lu" >> >> Emulation of the legacy vsyscall page is required by some programs built >> before 2013. Newer programs after 2013 don't use it. Disallow vsyscall >> emulation when Control-flow Enforcement (CET) is enabled to enhance >> security. > > NAK. > > By all means disable execute emulation if CET-IBT is enabled at the > time emulation is attempted, and maybe even disable the vsyscall page > entirely if you can magically tell that CET-IBT will be enabled when a > process starts, but you don't get to just disable it outright on a > CET-enabled kernel. Yeah, we definitely would have to revert/avoid this downstream. People definitely want to run glibc-2.12-era workloads on current kernels. Thanks for catching it. Florian