Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp4140647pxk; Tue, 8 Sep 2020 11:41:05 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz7ZGW481lMhl9lO8JSlPs6NIfsxGNpFnFQz4ACtlSMDSo2AwSELZ3NP0wA2dht91DL9G3X X-Received: by 2002:a50:fd10:: with SMTP id i16mr390014eds.54.1599590465587; Tue, 08 Sep 2020 11:41:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1599590465; cv=none; d=google.com; s=arc-20160816; b=CSJygw4YRgHbDW5yfo5i8AVUCk4osWiYUJ6MKZYuV6SK+1kXzDhVxmRFykUeNo3X0X xo+URNZq7MofRMyskgvrKkyblCEBo9Fpc32bdJnAbS5dV6Km+VovHkDxoG/VPOwsSZRm LmvegybQCMQBjjyBQEIhAUPq8i2vOF6UL5lqaatMS7eXEFrSQsEH3gnmWmbEa+8uLPtV 2zgEDdfyVvh29ol8L5PnIOmYdDP1DGYQfg3Jqco43cSZjNKgVF8m2FrLiwumJQVuJKLi W7hZb2SQ8S1Pk0yBFkkplHYaW1wOcBBl2TR43gLrDB9VUGLK/n3jAyyxRZ4LXXVxdZ9R Fzgw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:date:from :dkim-signature; bh=TQ1kE8zjkXsEOKgpDnRJ81WMBnwwGE+DuFfJR40oSM0=; b=AkXMHdyfDlDQNPWm1ipimsMzsYMy3TvLXAGuOtlhXwjtX4sBxpEqoVdRdKZm3rfZ+l ct50JIgwd2RIhQd1Hbp9jkJI2pANCCOG1oiiy8jJpF+xyGaZt5KC6jPGYlXVd44zZXs1 VNeZ/vaGTD3qu2YuAKcRrRE0H76vHVryuPTvPPLZCwY4bBqNm29ZUjug1yLWu9f5/AY7 pdgquGZSvz/fErrqnnBllYT1kHHuViN1LEXbBlUAJgs5ChDPFcQUr5t7VVEprvFewUu/ MFu3hQKFrsn127SsDqEzIyTZ/vbNghNQejUWI4zO6FtUIBGeuC48JG3i6k7F3yYrVRgp SzrA== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=bhGN0zBc; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d16si989882edr.309.2020.09.08.11.40.42; Tue, 08 Sep 2020 11:41:05 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=bhGN0zBc; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731734AbgIHSkK (ORCPT + 99 others); Tue, 8 Sep 2020 14:40:10 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51506 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726229AbgIHSkH (ORCPT ); Tue, 8 Sep 2020 14:40:07 -0400 Received: from mail-qk1-x741.google.com (mail-qk1-x741.google.com [IPv6:2607:f8b0:4864:20::741]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D50ADC061573 for ; Tue, 8 Sep 2020 11:40:06 -0700 (PDT) Received: by mail-qk1-x741.google.com with SMTP id 16so72002qkf.4 for ; Tue, 08 Sep 2020 11:40:06 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:from:date:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=TQ1kE8zjkXsEOKgpDnRJ81WMBnwwGE+DuFfJR40oSM0=; b=bhGN0zBcrt+gY4WhwAYlKbNe6tCr4xWwY834aSV6x/szEYoQAY2wkX1Kmcarwrsbox VhiPpze+0fXPoctJ9RfCtojWm91ejXN+5kmBHEElPQ7FHwcqYU5si8dGh7Av5XN2WxRn W1Ex1oiSgFRWDGg6BW80oGpueWsz3AS2yD6cMsXN9Ejn9kMjJQcHOIKJ2EGpVHs2zSBU Lp67or52EMsd4GXQqvAlDnuRUP2BFPXgIIRpA3OaJ6XTBnmmlGIghsPldqOOngVNfdJx Mf9BqBpIVWso3ngDStmV/SwT2WA5ITIJdvPKKxTb0P0DC0Abq9syvi9JwueWMvrAkiPq XfnA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:from:date:to:cc:subject:message-id :references:mime-version:content-disposition:in-reply-to; bh=TQ1kE8zjkXsEOKgpDnRJ81WMBnwwGE+DuFfJR40oSM0=; b=WsgqkU2F6oJs4n2Hz77/yxNnzcNqVuQt9qM1MzLzwxygunXyVbxYZbIblO3GzcfFvy oN4gee4p9oTre+1Uj58Cx4YMSWu5+UxX7ualWdSjspqqh4eTLjq2fL9fUKBiM5mkwg55 gKTlqUBjt8o2O58BhuHLv/4aWVa1FQ87Q3OReXirb+ofZJbXmQK8pADM201PKU3siW97 Lx/z+ReGIfj1Zq0rC+90ImNDlxtdDzgVXla7hMc/yZbVHxY4otIZu9xarDXO2mRmFgyv QUSC4Ob7o3ZKB6VfFVW7OuaQI65lahTkAmKRo71MQR2oKsLCM0wvEUmzimXxdTKIWGgG TGcg== X-Gm-Message-State: AOAM530g6KdLo3JPZBFt4CbO+7vJmFuCP2kbTSzffPnhSLxcaxdnDECj RdWBbwZr672RkiYsWWnT05EKvOi2qo4= X-Received: by 2002:a37:d41:: with SMTP id 62mr1323744qkn.444.1599590405983; Tue, 08 Sep 2020 11:40:05 -0700 (PDT) Received: from rani.riverdale.lan ([2001:470:1f07:5f3::b55f]) by smtp.gmail.com with ESMTPSA id k72sm45511qke.121.2020.09.08.11.40.04 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 08 Sep 2020 11:40:05 -0700 (PDT) From: Arvind Sankar X-Google-Original-From: Arvind Sankar Date: Tue, 8 Sep 2020 14:40:03 -0400 To: Kees Cook Cc: Marco Elver , Arvind Sankar , the arch/x86 maintainers , kasan-dev , LKML , Andrey Konovalov , Dmitry Vyukov , Alexander Potapenko Subject: Re: [RFC PATCH 1/2] lib/string: Disable instrumentation Message-ID: <20200908184003.GA4164124@rani.riverdale.lan> References: <20200905222323.1408968-1-nivedita@alum.mit.edu> <20200905222323.1408968-2-nivedita@alum.mit.edu> <202009081021.8E5957A1F@keescook> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <202009081021.8E5957A1F@keescook> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Sep 08, 2020 at 10:21:32AM -0700, Kees Cook wrote: > On Tue, Sep 08, 2020 at 11:39:11AM +0200, Marco Elver wrote: > > On Sun, 6 Sep 2020 at 00:23, Arvind Sankar wrote: > > > > > > String functions can be useful in early boot, but using instrumented > > > versions can be problematic: eg on x86, some of the early boot code is > > > executing out of an identity mapping rather than the kernel virtual > > > addresses. Accessing any global variables at this point will lead to a > > > crash. > > > > > > > Ouch. > > > > We have found manifestations of bugs in lib/string.c functions, e.g.: > > https://groups.google.com/forum/#!msg/syzkaller-bugs/atbKWcFqE9s/x7AtoVoBAgAJ > > https://groups.google.com/forum/#!msg/syzkaller-bugs/iGBUm-FDhkM/chl05uEgBAAJ > > > > Is there any way this can be avoided? > > Agreed: I would like to keep this instrumentation; it's a common place > to find bugs, security issues, etc. > > -- > Kees Cook Ok, understood. I'll revise to open-code the strscpy instead. Is instrumentation supported on x86-32? load_ucode_bsp() on 32-bit is called before paging is enabled, and load_ucode_bsp() itself, along with eg lib/earlycpio and lib/string that it uses, don't have anything to disable instrumentation. kcov, kasan, kcsan are unsupported already on 32-bit, but the others like gcov and PROFILE_ALL_BRANCHES look like they would just cause a crash if microcode loading is enabled.