Date: Tue, 29 Aug 2017 12:54:43 -0700 From: Kees Cook <keescook@...omium.org> To: Thomas Gleixner <tglx@...utronix.de>, Thomas Garnier <thgarnie@...gle.com>, Russell King <linux@...linux.org.uk> Cc: Al Viro <viro@...iv.linux.org.uk>, Dave Hansen <dave.hansen@...el.com>, Arnd Bergmann <arnd@...db.de>, Yonghong Song <yhs@...com>, David Howells <dhowells@...hat.com>, Andy Lutomirski <luto@...capital.net>, Will Drewry <wad@...omium.org>, Dave Martin <Dave.Martin@....com>, Catalin Marinas <catalin.marinas@....com>, Will Deacon <will.deacon@....com>, Linux API <linux-api@...r.kernel.org>, LKML <linux-kernel@...r.kernel.org>, Linux ARM <linux-arm-kernel@...ts.infradead.org>, Kernel Hardening <kernel-hardening@...ts.openwall.com>, Lothar Waßmann <LW@...o-electronics.de> Subject: Re: [PATCH v3 3/4] arm/syscalls: Optimize address limit check On Tue, Aug 29, 2017 at 7:32 AM, Thomas Garnier <thgarnie@...gle.com> wrote: > On Tue, Aug 22, 2017 at 9:42 AM, Thomas Garnier <thgarnie@...gle.com> wrote: >> On Mon, Aug 14, 2017 at 2:37 PM, Thomas Garnier <thgarnie@...gle.com> wrote: >>> Disable the generic address limit check in favor of an architecture >>> specific optimized implementation. The generic implementation using >>> pending work flags did not work well with ARM and alignment faults. >>> >>> The address limit is checked on each syscall return path to user-mode >>> path as well as the irq user-mode return function. If the address limit >>> was changed, a function is called to report data corruption (stopping >>> the kernel or process based on configuration). >>> >>> The address limit check has to be done before any pending work because >>> they can reset the address limit and the process is killed using a >>> SIGKILL signal. For example the lkdtm address limit check does not work >>> because the signal to kill the process will reset the user-mode address >>> limit. >>> >>> Signed-off-by: Thomas Garnier <thgarnie@...gle.com> >> >> Any feedback? > > CCing LW@...o-electronics.de who experienced the same issue this patch > proposal fix. > > Russell: Any feedback? These implement Russell's suggestion. An Ack here would be nice. :) I can't throw these into the ARM patch tracker because they depend on stuff in -next (and the commit that needs to be reverted is in tglx's tree). Regardless, these all test out correctly for me, so: Reviewed-by: Kees Cook <keescook@...omium.org> Tested-by: Kees Cook <keescook@...omium.org> In a perfect world, these 4 patches should go together with the other address limit check patches in tglx's tree. Thomas (Gleixner), can you update your tree for the merge window? At the very least, we need to revert 73ac5d6a2b6ac ("arm/syscalls: Check address limit on user-mode return"), which has caused infinite loops in some cases. Better to take all 4 patches in this series, though. Thanks! -Kees -- Kees Cook Pixel Security
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.