Re: [PATCH 24/30] x86, kaiser: disable native VSYSCALL
From: Andy Lutomirski
Date: Thu Nov 09 2017 - 19:53:41 EST
On Thu, Nov 9, 2017 at 11:26 AM, Dave Hansen
<dave.hansen@xxxxxxxxxxxxxxx> wrote:
> On 11/09/2017 11:04 AM, Andy Lutomirski wrote:
>> On Wed, Nov 8, 2017 at 11:47 AM, Dave Hansen
>> <dave.hansen@xxxxxxxxxxxxxxx> wrote:
>>>
>>> From: Dave Hansen <dave.hansen@xxxxxxxxxxxxxxx>
>>>
>>> The VSYSCALL page is mapped by kernel page tables at a kernel address.
>>> It is troublesome to support with KAISER in place, so disable the
>>> native case.
>>>
>>> Also add some help text about how KAISER might affect the emulation
>>> case as well.
>>
>> Can you re-explain why this is helpful?
>
> How about this?
>
> The KAISER code attempts to "poison" the user portion of the kernel page
> tables. It detects the entries pages that it wants that it wants to
> poison in two ways:
> * Looking for addresses >= PAGE_OFFSET
> * Looking for entries without _PAGE_USER set
What do you mean "poison"?
Anyway, the stuff here:
https://git.kernel.org/pub/scm/linux/kernel/git/luto/linux.git/log/?h=x86/entry_stack
is an attempt to create the infrastructure needed to move (almost?)
everything needed in the user tables into the fixmap. If that ends up
working well, then perhaps the fixmap should just be completely
special-cased, in which case I think this issue goes away. What I
have in mind is something like:
set_user_fixmap(index, pa, prot);
that sets an entry in the *user* fixmap. All user mms would get the
same PGD entry for the user fixmap.
(And yes, it quite correctly fails kbuild bot right now. That's why I
haven't emailed out the patches yet.)