Received: by 2002:a05:7412:f584:b0:e2:908c:2ebd with SMTP id eh4csp1928899rdb; Tue, 5 Sep 2023 09:04:50 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFKxGEWkbmuL60aWtZ7xAbeuM+VkPO+BgdGGI9q4RihFXA52n2V3zF1Bg0SsthmQGIKXxqz X-Received: by 2002:aa7:c243:0:b0:522:560d:d691 with SMTP id y3-20020aa7c243000000b00522560dd691mr193134edo.25.1693929890868; Tue, 05 Sep 2023 09:04:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1693929890; cv=none; d=google.com; s=arc-20160816; b=FGD1Yf8VteDDJpjuXZjyyKMesT8HVvJO8pjFFgDUnySEcZwxOA5jAliuAcXxWjaNvD 1T4wXUOSq7NcHwOtPnlWEFTzpQhA0NLm3Tod/8kjRq2xrMc8ifsFaiq7Q5NByMEUS+3J 2Sumqk4OWJ6wwiOUls7aMg7wGfB3cbx2lRZ9pW3bqZrGhIm5BVsOpiLmFK1wcXYJBci3 fzQn4SHYINueN+h3F7MKljSQaQ52uTnHJAGIAZf4bHwJ+0Vw/shtaH8dTEPTREWPW0Tx 45GFglt/uOUDqp3eY1CAZbkgTV2q4/5Kc+OPXFsV5O2Q63o641z1VekF7B450E1TOF// KhvA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=oEy1646/LdTkntYPfRfxD8MrrDBhc7iaLhvOs1aWaHo=; fh=PoOc7NVppSR+znlkTZ9h+SpqPZT0Sjj2wX5aRAb0PNQ=; b=oJwzSc1gTvm4oHwHfFmN1DTsYvgbxd4ojIyBTm5/lNNYqRd8u1aVqHCfr6lr731XbR xrHgMi1CSolZwdzvhdwZn8Nn/bV6WGFwa84ybnBO/3RefzvQ2sRQDOWHJUeW4hTS6sLG JeP4+klojEjshtVfjCmBhzoMB6T5hMuW3Jdl9/JMObkxsQVzTVRhM5gxkcCsjhcr3bvJ CrC57knIpW8aa4HtzZ1TVriRszJugaU1320AEBHaf2q8C/nxpRr8gNCh3gGVctUBr41J OuODIsf34co5V2D5Fkdr6SyiGFgEMqqclKqMV6gp1hyKxnXaL3fMXIptiEJBKR0mzt75 t2uQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b=nR+0NCNn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id e26-20020a50ec9a000000b00529fb3493bfsi7475863edr.287.2023.09.05.09.04.47; Tue, 05 Sep 2023 09:04:50 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b=nR+0NCNn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1347059AbjHaT2u (ORCPT + 9 others); Thu, 31 Aug 2023 15:28:50 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:32858 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238398AbjHaT2s (ORCPT ); Thu, 31 Aug 2023 15:28:48 -0400 Received: from mail-ed1-x52d.google.com (mail-ed1-x52d.google.com [IPv6:2a00:1450:4864:20::52d]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A379CE65 for ; Thu, 31 Aug 2023 12:28:44 -0700 (PDT) Received: by mail-ed1-x52d.google.com with SMTP id 4fb4d7f45d1cf-52c1d861c5eso2935a12.1 for ; Thu, 31 Aug 2023 12:28:44 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20221208; t=1693510123; x=1694114923; darn=vger.kernel.org; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=oEy1646/LdTkntYPfRfxD8MrrDBhc7iaLhvOs1aWaHo=; b=nR+0NCNnYqk8udjeOH8nLxM4N+Xa7Bkf8ZRQ1vJuPQMpUS7ya2FvN15qhfuMvr1gfR xbremoRY+ilpRTG5AVtcH0bIkaM6mfBuVamnIuBJkmDopdF1rLSjLds48pzWZeFtiCEe lNvsOL1KtzH4lgqhTyydrAMWReYwlnCfTfiQj2i7V4En99Gr57qHA4wns5KjsAVOUEOg tmiDIev5IhWsQn0GR4DzKPBxTd9guA8mUfzidDdOluJZwfNaA6TZ+ePXp9r5E3CSr+vm dHL7zj/TP9TlMArmizwcHhbWUSZ1BUxQk96Olo9QApsTBrG+ouCMBG0jviGW6LgAnCx8 S1pA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1693510123; x=1694114923; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=oEy1646/LdTkntYPfRfxD8MrrDBhc7iaLhvOs1aWaHo=; b=VxzkcwjrEHEiWOyEowBVgT3cqJK8D1e7juVwvkTNpgglhb/osmYq50QeYZIGtWRz99 BIlXzBngAtGdQkg4zYDlRThqet4aD4oPMDmKbhj+eMaAFLCU5CYa7Y5NzbxiF1B3sDRI zO9emljH6cIFXZkxOVYRqOCK/gc2Zog3+EsVt1i5LNhmAzm7+ARK0Y6urSfywTGUfvCA WKF6IMb68ZxLNSdbEVE2TUgtwqoSsIZsH9EPRQVIFTzT+KDkdjkN2oJvTkJ3B2IieIsO KwovNcp3PhPhUSOV9qTiy8/VmOsDMurvEYs/Iaa/rPNWC2DdJhQ79LjcsrswslEYn6id DJyA== X-Gm-Message-State: AOJu0Yz58r2ENXYctHakdKgt8e29G2qXy9iNCwQnfET2co9IKUuXNRCx FjvcQgEH0n6yfuf+i9hOo4eMT+joBSaK0Mk+sAG+Ng== X-Received: by 2002:a50:f60d:0:b0:506:b280:4993 with SMTP id c13-20020a50f60d000000b00506b2804993mr38886edn.2.1693510123063; Thu, 31 Aug 2023 12:28:43 -0700 (PDT) MIME-Version: 1.0 References: <20230831043228.1194256-1-jmattson@google.com> In-Reply-To: From: Jim Mattson Date: Thu, 31 Aug 2023 12:28:27 -0700 Message-ID: Subject: Re: [PATCH] x86/fpu/xstate: Fix PKRU covert channel To: Dave Hansen Cc: linux-kernel@vger.kernel.org, x86@kernel.org, Tavis Ormandy , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , "H. Peter Anvin" , Kyle Huey , "Chang S. Bae" , Feng Tang , Andrew Cooper Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Aug 31, 2023 at 12:12=E2=80=AFPM Dave Hansen wrote: > > On 8/30/23 21:32, Jim Mattson wrote: > > When XCR0[9] is set, PKRU can be read and written from userspace with > > XSAVE and XRSTOR, even when CR4.PKE is clear. > > > > Clear XCR0[9] when protection keys are disabled. > > > > Reported-by: Tavis Ormandy > > Signed-off-by: Jim Mattson > > Is there any way to trigger this other than "nopku" on the command-line? Or by configuration option: CONFIG_X86_INTEL_MEMORY_PROTECTION_KEYS=3Dn > I'm not sure how scary this particular covert channel is, but it does > make sense to do this even if it's only to avoid wasting XSAVE space on > a feature that nobody can use (for things other than covert channels). > > Acked-by: Dave Hansen