[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <8eb12a75-4957-d5eb-9a14-387788728b8a@huawei.com>
Date: Fri, 26 Jan 2018 14:28:11 +0200
From: Igor Stoppa <igor.stoppa@...wei.com>
To: Jerome Glisse <jglisse@...hat.com>,
Boris Lukashev <blukashev@...pervictus.com>
CC: Jann Horn <jannh@...gle.com>, Kees Cook <keescook@...omium.org>,
"Michal Hocko" <mhocko@...nel.org>,
Laura Abbott <labbott@...hat.com>,
"Christoph Hellwig" <hch@...radead.org>,
Matthew Wilcox <willy@...radead.org>,
"Christoph Lameter" <cl@...ux.com>,
linux-security-module <linux-security-module@...r.kernel.org>,
Linux-MM <linux-mm@...ck.org>,
kernel list <linux-kernel@...r.kernel.org>,
Kernel Hardening <kernel-hardening@...ts.openwall.com>
Subject: Re: [kernel-hardening] [PATCH 4/6] Protectable Memory
On 25/01/18 17:38, Jerome Glisse wrote:
> On Thu, Jan 25, 2018 at 10:14:28AM -0500, Boris Lukashev wrote:
>> On Thu, Jan 25, 2018 at 6:59 AM, Igor Stoppa <igor.stoppa@...wei.com> wrote:
>
> [...]
>
>> DMA/physmap access coupled with a knowledge of which virtual mappings
>> are in the physical space should be enough for an attacker to bypass
>> the gating mechanism this work imposes. Not trivial, but not
>> impossible. Since there's no way to prevent that sort of access in
>> current hardware (especially something like a NIC or GPU working
>> independently of the CPU altogether)
[...]
> I am not saying that this can not happen but that we are trying our best
> to avoid it.
How about an opt-in verification, similar to what proposed by Boris
Lukashev?
When reading back the data, one could access the pointer directly and
bypass the verification, or could use a function that explicitly checks
the integrity of the data.
Starting from an unprotected kmalloc allocation, even just turning the
data into R/O is an improvement, but if one can afford the overhead of
performing the verification, why not?
It would still be better if the service was provided by the library,
instead than implemented by individual users, I think.
--
igor
Powered by blists - more mailing lists