Stack switching plan of attack (Re: [PATCH v2 00/18] Entry stack switching)
From: Andy Lutomirski
Date: Thu Nov 23 2017 - 10:51:25 EST
On Tue, Nov 21, 2017 at 8:43 PM, Andy Lutomirski <luto@xxxxxxxxxx> wrote:
> This sets up stack switching, including for SYSCALL. I think it's
> in decent shape.
What's the plan of attack? is the goal to get this thing in -rc1 or
as soon as possible thereafter?
If so, I think there are two things that need fixing to make it upstream-worthy:
1. There needs to be a way to turn it off to get the performance hit
under control. I'm leaning toward a boot-time switch, and we can turn
it into a runtime switch later on. Thoughts? I don't care too much
about idtentry performance, but syscall performance matters a lot, and
my patches slow it down. I probably need to benchmark to see whether
there's any point to turning *entry* stack switching off, but we
definitely need to turn *exit* stack switching off when it's not
needed.
(Entry stack switching doesn't directly affect SYSCALL, and I've
structured the SYSCALL code so that the entry part can be turned on
and off just by changing the entry target MSR.)
2. The TSS should be RO. Otherwise I think it's just too big a
security regression.
and possibly 3: fix the existing performance regression on Atom
syscalls. That's easy-ish, but it's ugly and stupid.
I'm assuming that KAISER itself will miss the merge window and that
we'll just deal with it.