All of lore.kernel.org
 help / color / mirror / Atom feed
From: Jon Masters <jcm@redhat.com>
To: speck@linutronix.de
Subject: [MODERATED] Re: [PATCH v2] Linux Patch 1/1
Date: Fri, 27 Apr 2018 15:37:22 -0400	[thread overview]
Message-ID: <2de93c45-9bcc-136d-3534-03d05bd6b660@redhat.com> (raw)
In-Reply-To: <alpine.LFD.2.21.999.1804271147200.11549@i7.lan>

[-- Attachment #1: Type: text/plain, Size: 1849 bytes --]

On 04/27/2018 02:53 PM, speck for Linus Torvalds wrote:
> 
> 
> On Fri, 27 Apr 2018, speck for Thomas Gleixner wrote:
> 
>> On Fri, 27 Apr 2018, speck for Linus Torvalds wrote:
> 
>>> Basically, for the store buffer bypass, the *only* worry is JIT'ed code. 
>>> I don't think people expect it to leak from supervisor to user mode, for 
>>> example, so it's not primarily a protection domain issue.
>>
>> Fair enough. I didn't look at it that way. Thanks for the clarification.
> 
> NOTE! My reading of the worry people have about the store buffer bypass 
> attack may simply be wrong. So somebody should verify this part.

The concern we have is about managed code, yeah. I didn't want to fight
too hard on the unset part if we get the set bit :) but there shouldn't
be a security issue to having the prctl go both ways (and that would be
ideal IMO). It's really about a sandboxed JavaScript or Java process (or
somesuch similar like thing) in which that JIT is not expecting the
potential for code to abuse this bypass to dump memory from the process
containing it. e.g. in JavaScript you can make a memory dumping widget
in about three lines of code that runs speculatively for that process.

> Because if the store buffer bypass is actually seen as a security issue on 
> its own, then your argument that people shouldn't be able to turn the 
> mitigation off is obviously very valid.

It /might/ be an issue for the kernel stack. This is the fear many of us
have. However, we do an lfence on entry to the kernel, so it would only
be a problem there if we can find vulnerable syscall functions, and we
haven't yet found any that contain suitable gadgets. That seems
contrived, but it's the reason for the original kernel entry/exit frob.

Jon.

-- 
Computer Architect | Sent from my Fedora powered laptop


  parent reply	other threads:[~2018-04-27 19:37 UTC|newest]

Thread overview: 46+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-04-26  0:11 [MODERATED] [PATCH v2] Linux Patch 1/1 Tim Chen
2018-04-26  3:15 ` [MODERATED] " Jon Masters
2018-04-26 17:03   ` Tim Chen
2018-04-26  3:29 ` Jon Masters
2018-04-26 12:03   ` Thomas Gleixner
2018-04-26 16:48     ` [MODERATED] " Tim Chen
2018-04-26 16:18 ` Jon Masters
2018-04-27 16:08 ` Thomas Gleixner
2018-04-27 16:47   ` [MODERATED] " Borislav Petkov
2018-04-27 17:13     ` Jon Masters
2018-04-27 17:32       ` Borislav Petkov
2018-04-27 17:48         ` Thomas Gleixner
2018-04-27 18:09           ` [MODERATED] " Andi Kleen
2018-04-27 18:17             ` Thomas Gleixner
2018-04-27 18:20               ` Thomas Gleixner
2018-04-27 18:30                 ` [MODERATED] " Linus Torvalds
2018-04-27 18:36                   ` Thomas Gleixner
2018-04-27 18:53                     ` [MODERATED] " Linus Torvalds
2018-04-27 19:14                       ` Andi Kleen
2018-04-27 19:37                       ` Jon Masters [this message]
2018-04-27 19:52                         ` Linus Torvalds
2018-04-27 20:01                           ` Jon Masters
2018-05-03 12:55                           ` Jiri Kosina
2018-05-03 16:24                             ` Linus Torvalds
2018-05-03 19:40                               ` Jiri Kosina
2018-05-04  3:51                                 ` Linus Torvalds
2018-05-04  6:00                                   ` Jiri Kosina
2018-05-04  6:03                                     ` Jiri Kosina
2018-05-07 16:40                                   ` [MODERATED] " Dave Hansen
2018-04-27 19:26                   ` [MODERATED] " Tim Chen
2018-04-27 19:57                     ` Jon Masters
2018-04-27 20:07                       ` Tim Chen
2018-04-27 20:20                         ` Thomas Gleixner
2018-04-27 20:37                       ` Thomas Gleixner
2018-04-28  3:57                         ` [MODERATED] " Tim Chen
2018-04-28 12:26                           ` Thomas Gleixner
2018-04-28 17:14                             ` [MODERATED] " Tim Chen
2018-04-27 22:52                     ` Thomas Gleixner
2018-04-27 18:45               ` [MODERATED] " Andi Kleen
2018-04-27 19:08                 ` Thomas Gleixner
2018-04-27 19:25                   ` [MODERATED] " Andi Kleen
2018-04-27 19:52                     ` Thomas Gleixner
2018-04-27 17:50         ` [MODERATED] " Andi Kleen
2018-04-27 17:58   ` Thomas Gleixner
2018-04-27 19:01   ` [MODERATED] " Tim Chen
2018-04-27 19:19     ` Thomas Gleixner

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=2de93c45-9bcc-136d-3534-03d05bd6b660@redhat.com \
    --to=jcm@redhat.com \
    --cc=speck@linutronix.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.