[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20180105170450.4trcy6qxr44nqglf@ast-mbp>
Date: Fri, 5 Jan 2018 09:04:52 -0800
From: Alexei Starovoitov <alexei.starovoitov@...il.com>
To: Mark Rutland <mark.rutland@....com>
Cc: linux-kernel@...r.kernel.org, linux-arch@...r.kernel.org,
dan.j.williams@...el.com, elena.reshetova@...el.com,
corbet@....net, alan@...ux.intel.com, peterz@...radead.org,
will.deacon@....com, gregkh@...uxfoundation.org,
tglx@...utronix.de, Linus Torvalds <torvalds@...ux-foundation.org>,
"David S. Miller" <davem@...emloft.net>, netdev@...r.kernel.org
Subject: Re: [RFCv2 4/4] bpf: inhibit speculated out-of-bounds pointers
On Fri, Jan 05, 2018 at 02:57:50PM +0000, Mark Rutland wrote:
> Note: this patch is an *example* use of the nospec API. It is understood
> that this is incomplete, etc.
>
> Under speculation, CPUs may mis-predict branches in bounds checks. Thus,
> memory accesses under a bounds check may be speculated even if the
> bounds check fails, providing a primitive for building a side channel.
>
> The EBPF map code has a number of such bounds-checks accesses in
> map_lookup_elem implementations. This patch modifies these to use the
> nospec helpers to inhibit such side channels.
>
> The JITted lookup_elem implementations remain potentially vulnerable,
> and are disabled (with JITted code falling back to the C
> implementations).
>
> Signed-off-by: Mark Rutland <mark.rutland@....com>
> Signed-off-by: Will Deacon <will.deacon@....com>
> Cc: Dan Williams <dan.j.williams@...el.com>
> Cc: Peter Zijlstra <peterz@...radead.org>
> ---
> kernel/bpf/arraymap.c | 20 +++++++++++++-------
> kernel/bpf/cpumap.c | 5 ++---
> kernel/bpf/devmap.c | 3 ++-
> kernel/bpf/sockmap.c | 3 ++-
> 4 files changed, 19 insertions(+), 12 deletions(-)
Mark, did you see my email with this patch yesterday ?
https://patchwork.ozlabs.org/patch/855911/
btw your patch does not fix the variant 1 exploit.
Also all of the pre-embargo patches from Elena that add lfence
in the bpf interpreter and x64 JIT also do not fix it.
The exploit works via bpf_tail_call and not via map_lookup.
I'm trying to make both safer with minimal run-time cost
with above patch.
Also as I tried to explain earlier the variant 1 is relying
on 64-bit speculative address math in bpf_tail_call
that was fixed into 32-bit math in October, so the risk is
close to zero already.
If both x64 and arm folks can test the above patch at least
we will be able to merge it and close one known hole in the tree.
In parallel we can work on adding nospec/osb primitives
and sprinkling them all over the kernel, but please do not use
bpf side as an 'example'. It's unnecessary.
Thanks
Powered by blists - more mailing lists