lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20171208174841.ylx26jym5kpbrsta@hirez.programming.kicks-ass.net>
Date:   Fri, 8 Dec 2017 18:48:41 +0100
From:   Peter Zijlstra <peterz@...radead.org>
To:     Andy Lutomirski <luto@...nel.org>
Cc:     Ingo Molnar <mingo@...nel.org>,
        Thomas Gleixner <tglx@...utronix.de>,
        Borislav Petkov <bp@...en8.de>, X86 ML <x86@...nel.org>,
        "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
        Brian Gerst <brgerst@...il.com>,
        David Laight <David.Laight@...lab.com>,
        Kees Cook <keescook@...omium.org>
Subject: Re: [PATCH] LDT improvements

On Fri, Dec 08, 2017 at 08:38:26AM -0800, Andy Lutomirski wrote:

> 4. In an actual vma.  I don't see the benefit of doing this at all --
> it's just like #2 except way more error prone.  Hell, you have to make
> sure that you can't munmap or mremap it, which isn't a consideration
> at all with the other choices.

mremap is trivially disabled. I've not tried munmap() yet, as long as it
just kills the process doing it we're good of course. Otherwise we need
an extra callback in do_munmap() which isn't too hard.

> Why all the effort to make #4 work?

Seemed like a sensible approach; I really dislike wasting an entire pmd
or whatever on a feature 'nobody' ever uses anyway.

> #1 is working fine right now

doesn't work for pti in its current form.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ