Date: Wed, 31 Jan 2018 15:21:38 +0100 From: Greg KH <gregkh@...uxfoundation.org> To: "Van De Ven, Arjan" <arjan.van.de.ven@...el.com> Cc: Ingo Molnar <mingo@...nel.org>, "Williams, Dan J" <dan.j.williams@...el.com>, Linus Torvalds <torvalds@...ux-foundation.org>, Thomas Gleixner <tglx@...utronix.de>, linux-arch <linux-arch@...r.kernel.org>, Cyril Novikov <cnovikov@...x.com>, Kernel Hardening <kernel-hardening@...ts.openwall.com>, Peter Zijlstra <peterz@...radead.org>, Catalin Marinas <catalin.marinas@....com>, X86 ML <x86@...nel.org>, Will Deacon <will.deacon@....com>, Russell King <linux@...linux.org.uk>, Ingo Molnar <mingo@...hat.com>, "H. Peter Anvin" <hpa@...or.com>, Alan Cox <alan@...ux.intel.com>, Linux Kernel Mailing List <linux-kernel@...r.kernel.org>, Peter Zijlstra <a.p.zijlstra@...llo.nl> Subject: Re: [PATCH v5 02/12] array_idx: sanitize speculative array de-references On Wed, Jan 31, 2018 at 02:13:45PM +0000, Van De Ven, Arjan wrote: > > > short term there was some extremely rudimentary static analysis done. clearly > > > that has extreme limitations both in insane rate of false positives, and missing > > > cases. > > > > What was the output roughly, how many suspect places that need > > array_idx_nospec() > > handling: a few, a few dozen, a few hundred or a few thousand? > > > > I'm guessing 'static tool emitted hundreds of sites with many false positives > > included, but the real sites are probably a few dozen' - but that's really just a > > very, very wild guess. > > your guess is pretty accurate; we ended up with some 15 or so places > (the first patch kit Dan mailed out) But in looking at that first patch set, I don't see many, if any, that could be solved with your proposal of copy_from_user_struct(). The two networking patches couldn't, the scsi one was just bizarre (seriously, you had to trust the input from the hardware, if not, there's worse things happening), and the networking drivers were dealing with other data streams I think. So while I love the idea of copy_from_user_struct(), I don't see it as any type of "this will solve the issues we are trying to address here" solution :( I've been emailing the Coverity people recently about this, and they say they are close to having a ruleset/test that can identify this data pattern better than the original tool that Intel and others came up with. But as I haven't seen the output of it yet, I have no idea if that's true or not. Hopefully they will release it in a few days so we can get an idea of if this is even going to be possible to automatically scan for at all with their tool. Other than Coverity, I don't know of any other tool that is trying to even identify this pattern :( > > Also, IMHO any tooling should very much be open source: this isn't the kind of > > bug > > that can be identified via code review, so there's no fall-back detection method > > like we have for buffer overflows. > > we absolutely need some good open source tooling; my personal > preference will be a compiler plugin; that way you can use all the > fancy logic inside the compilers for analysis, and you can make a "I > don't care just fix it" option in addition to flagging for human > inspection as the kernel would. I thought gcc plugins were going to enable this type of analysis, or maybe clang plugins, but I have yet to hear of anyone working on this. thanks, greg k-h
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.