All of lore.kernel.org
 help / color / mirror / Atom feed
From: Thomas Gleixner <tglx@linutronix.de>
To: speck@linutronix.de
Subject: Re: [PATCH v2] Linux Patch 1/1
Date: Fri, 27 Apr 2018 20:17:23 +0200 (CEST)	[thread overview]
Message-ID: <alpine.DEB.2.21.1804272015590.1596@nanos.tec.linutronix.de> (raw)
In-Reply-To: <20180427180944.GD75137@tassilo.jf.intel.com>

On Fri, 27 Apr 2018, speck for Andi Kleen wrote:
> On Fri, Apr 27, 2018 at 07:48:03PM +0200, speck for Thomas Gleixner wrote:
> > On Fri, 27 Apr 2018, speck for Borislav Petkov wrote:
> > 
> > > On Fri, Apr 27, 2018 at 01:13:03PM -0400, speck for Jon Masters wrote:
> > > > My opinion is this needs to be a prctl that a vulnerable application can
> > > > set. It can be a one-way thing that's set/inherited by children, etc.
> > > 
> > > If the task does prctl, it *must* at least be a one-way thing because,
> > > as jikos said, if a malicious attacker can trick it into calling prctl()
> > > again to turn MD back on, the whole dance we're doing is useless.
> > 
> > That's not the worst problem. The worst thing is that it's inherited on
> > fork and then the child can disable it again nilly-willy, which makes no
> > sense whatsoever. If it's set only then the child CANNOT do that.
> 
> If the child can execute code it itself why shouldn't it be able
> to clear this bit? After all it can do everything else to itself too.

Sure. You set it on that sandbox thing and then the thread which is spawned
of from there can disable it. Brilliant idea.

Thanks,

	tglx

  reply	other threads:[~2018-04-27 18:17 UTC|newest]

Thread overview: 46+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-04-26  0:11 [MODERATED] [PATCH v2] Linux Patch 1/1 Tim Chen
2018-04-26  3:15 ` [MODERATED] " Jon Masters
2018-04-26 17:03   ` Tim Chen
2018-04-26  3:29 ` Jon Masters
2018-04-26 12:03   ` Thomas Gleixner
2018-04-26 16:48     ` [MODERATED] " Tim Chen
2018-04-26 16:18 ` Jon Masters
2018-04-27 16:08 ` Thomas Gleixner
2018-04-27 16:47   ` [MODERATED] " Borislav Petkov
2018-04-27 17:13     ` Jon Masters
2018-04-27 17:32       ` Borislav Petkov
2018-04-27 17:48         ` Thomas Gleixner
2018-04-27 18:09           ` [MODERATED] " Andi Kleen
2018-04-27 18:17             ` Thomas Gleixner [this message]
2018-04-27 18:20               ` Thomas Gleixner
2018-04-27 18:30                 ` [MODERATED] " Linus Torvalds
2018-04-27 18:36                   ` Thomas Gleixner
2018-04-27 18:53                     ` [MODERATED] " Linus Torvalds
2018-04-27 19:14                       ` Andi Kleen
2018-04-27 19:37                       ` Jon Masters
2018-04-27 19:52                         ` Linus Torvalds
2018-04-27 20:01                           ` Jon Masters
2018-05-03 12:55                           ` Jiri Kosina
2018-05-03 16:24                             ` Linus Torvalds
2018-05-03 19:40                               ` Jiri Kosina
2018-05-04  3:51                                 ` Linus Torvalds
2018-05-04  6:00                                   ` Jiri Kosina
2018-05-04  6:03                                     ` Jiri Kosina
2018-05-07 16:40                                   ` [MODERATED] " Dave Hansen
2018-04-27 19:26                   ` [MODERATED] " Tim Chen
2018-04-27 19:57                     ` Jon Masters
2018-04-27 20:07                       ` Tim Chen
2018-04-27 20:20                         ` Thomas Gleixner
2018-04-27 20:37                       ` Thomas Gleixner
2018-04-28  3:57                         ` [MODERATED] " Tim Chen
2018-04-28 12:26                           ` Thomas Gleixner
2018-04-28 17:14                             ` [MODERATED] " Tim Chen
2018-04-27 22:52                     ` Thomas Gleixner
2018-04-27 18:45               ` [MODERATED] " Andi Kleen
2018-04-27 19:08                 ` Thomas Gleixner
2018-04-27 19:25                   ` [MODERATED] " Andi Kleen
2018-04-27 19:52                     ` Thomas Gleixner
2018-04-27 17:50         ` [MODERATED] " Andi Kleen
2018-04-27 17:58   ` Thomas Gleixner
2018-04-27 19:01   ` [MODERATED] " Tim Chen
2018-04-27 19:19     ` Thomas Gleixner

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=alpine.DEB.2.21.1804272015590.1596@nanos.tec.linutronix.de \
    --to=tglx@linutronix.de \
    --cc=speck@linutronix.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.