lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAFA6WYMzhjDW46Qm0hBxmbE=_rdjG7ibEYtM9Rgq-gwQ1GU20w@mail.gmail.com>
Date:   Thu, 5 Oct 2023 10:39:07 +0530
From:   Sumit Garg <sumit.garg@...aro.org>
To:     Linus Torvalds <torvalds@...ux-foundation.org>,
        Jarkko Sakkinen <jarkko@...nel.org>,
        Peter Zijlstra <peterz@...radead.org>
Cc:     Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
        Mimi Zohar <zohar@...ux.ibm.com>,
        James Bottomley <jejb@...ux.ibm.com>,
        Hyeonggon Yoo <42.hyeyoo@...il.com>,
        David Kaplan <David.Kaplan@....com>,
        Borislav Petkov <bp@...en8.de>, Ingo Molnar <mingo@...nel.org>,
        x86@...nel.org
Subject: Re: Linux 6.6-rc3 (DEBUG_VIRTUAL is unhappy on x86)

On Thu, 5 Oct 2023 at 06:16, Linus Torvalds
<torvalds@...ux-foundation.org> wrote:
>
> On Tue, 3 Oct 2023 at 05:06, Sumit Garg <sumit.garg@...aro.org> wrote:
> >
> > However, on the flip side I think there are security benefits here. We
> > wouldn't like any indirect branch speculation attack to leak the trusted
> > key material contents here.
>
> No. Turning *one* indirect call static isn't a security benefit. That
> argument is just bogus.

Okay I guess there is some confusion here. I was referring to
following calls in my prior reply:

static_call(trusted_key_get_random)
static_call(trusted_key_seal)
static_call(trusted_key_unseal)

but it looks like you are only concerned about:

static_call(trusted_key_init)
static_call_cond(trusted_key_exit)

So I agree with you as I can't envision an attack which can be carried
out by trusted_key_init() and trusted_key_exit() indirect calls.

@Jarkko, if you agree then I can convert these two callbacks to use
indirect calls instead.

>
> This code needs to be fixed. No static call rewriting for call-sites
> that are just used once.

@Peter, can we have a policy enforced for module __init and __exit
functions somehow at compile time? If not then can we have it
documented somewhere to mention static call invocations aren't
supported from these functions?

-Sumit

>
>                Linus

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ