Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp2593934rdb; Fri, 8 Dec 2023 12:46:08 -0800 (PST) X-Google-Smtp-Source: AGHT+IFAArZWCdCsRRYyd3EtkBV7lp0lDlgZObqAp1UZLE0ddy0oMaaow43MVMEGL04DtssxOj1l X-Received: by 2002:a05:6a00:23c1:b0:6cb:68d7:b163 with SMTP id g1-20020a056a0023c100b006cb68d7b163mr846811pfc.23.1702068367980; Fri, 08 Dec 2023 12:46:07 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1702068367; cv=none; d=google.com; s=arc-20160816; b=ZCnWpKf9tuHiFajfAzoPp1qYAKALetrle+EuHmgfwtwuWBSIMyVKvdtp7rSezZrsTw V7D/QLsEkEn4WpNKKhSp5+2X4KBslsvoTjguF7vV18pxSyySQ/XJC6h4yNEdZfoMf3qU 2uRYxwhgc0X/1ivTz7HzT2Vay8O3FAf0NVRVdenizve23qJCqaq6wUZ0myRr1UaMbtP2 7xIp4NyLcko0ZrfhZV6mB+VBfGM6ZOKX6dvuu4oedUH20cAqyvDv+BHW82s11+O/Vtyi fxEy7CoXNIyqmt4VquTr9PMg9qbdc4/QKGmSe6OjmSnHnwwxLgqXm/q/CzLEf3kEGjuH 0o8w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=uuulqJ0udjp/ONQs9URiRO2kRC7WLgYyKoN4bKlDxU8=; fh=ghGROxT4ofSPk2GyoHXJ5ayTcr9G6Y47j8PpS0InPHw=; b=dsI/9knoaaw6Jw/660ap7x9qmkn1DzbQoSeEM/2a7PDxC23CwsUCfhGm3Tvy7n+Fqt eqWpJ/Vrgu4GovKjcDbyMJZZdO8Fn0eyp4LCS2BdmzLN8LfrT9pwyrRZZHZP/H0/09ju axZNYDjCosfavViu/jcoUWsObS6BNFxoBYfW9jq64jMbxr+WcK8BGJepHgzr4YxoyrLU SiJwZwHn87wX6pmTa482Cdp2R8FwKWSeho8xT8xAqTH6Z8Uv4nPcpyLendrGfM5xgyOw ojGz9YP6gCPUWEQEfX/TguJ8BihnrNl2p39sDjwQwNQ1OlrDKpzJ6UjQbSjz3roVG7Be P1Pw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@infradead.org header.s=casper.20170209 header.b=DHsdeOTE; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from pete.vger.email (pete.vger.email. [23.128.96.36]) by mx.google.com with ESMTPS id eb14-20020a056a004c8e00b0068fe12b361dsi2049908pfb.249.2023.12.08.12.46.07 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 08 Dec 2023 12:46:07 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) client-ip=23.128.96.36; Authentication-Results: mx.google.com; dkim=pass header.i=@infradead.org header.s=casper.20170209 header.b=DHsdeOTE; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by pete.vger.email (Postfix) with ESMTP id 3E67C80755A3; Fri, 8 Dec 2023 12:45:23 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at pete.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234078AbjLHUpJ (ORCPT + 99 others); Fri, 8 Dec 2023 15:45:09 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52870 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229913AbjLHUpH (ORCPT ); Fri, 8 Dec 2023 15:45:07 -0500 Received: from casper.infradead.org (casper.infradead.org [IPv6:2001:8b0:10b:1236::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2A44A1706; Fri, 8 Dec 2023 12:45:14 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=casper.20170209; h=In-Reply-To:Content-Type:MIME-Version: References:Message-ID:Subject:Cc:To:From:Date:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description; bh=uuulqJ0udjp/ONQs9URiRO2kRC7WLgYyKoN4bKlDxU8=; b=DHsdeOTEek3iQwO3tU1lWqjYnS 9WZO8OJd9l0ESCow217XyrKQiBE9yJ0zqWFYzWFH6tZ5f/h1C9LssraIN5kD9BA4dyQq7v4x37Xdw 4ATU9AmTFnjE4CjDlsFrzIdD89OMEh9th3HFZkJ99AlxbYJ36wbZEGFlr9rOWWU5LvRttecpWRhgm gHKRKjJhs98U7yUBoCTZL0Hd5MdQ7z4hTOmisqmM11jTmT1dh9Tcf3ueDE7NV4WmIpVLhUEjA6gZc 3lC2lmyClXm6ovkVeLx7RMlUAuZzX0afZAKs+yy1bBdeFK43C67PvE8GINv0rnlHAwzn8dQhRhopr YE6cD9zQ==; Received: from j130084.upc-j.chello.nl ([24.132.130.84] helo=noisy.programming.kicks-ass.net) by casper.infradead.org with esmtpsa (Exim 4.94.2 #2 (Red Hat Linux)) id 1rBhiX-006YEc-S1; Fri, 08 Dec 2023 20:45:01 +0000 Received: by noisy.programming.kicks-ass.net (Postfix, from userid 1000) id 7EC053003F0; Fri, 8 Dec 2023 21:45:01 +0100 (CET) Date: Fri, 8 Dec 2023 21:45:01 +0100 From: Peter Zijlstra To: Kees Cook Cc: Miguel Ojeda , Alice Ryhl , Miguel Ojeda , Alex Gaynor , Wedson Almeida Filho , Boqun Feng , Gary Guo , =?iso-8859-1?Q?Bj=F6rn?= Roy Baron , Benno Lossin , Andreas Hindborg , Alexander Viro , Christian Brauner , Greg Kroah-Hartman , Arve =?iso-8859-1?B?SGr4bm5lduVn?= , Todd Kjos , Martijn Coenen , Joel Fernandes , Carlos Llamas , Suren Baghdasaryan , Dan Williams , Matthew Wilcox , Thomas Gleixner , Daniel Xu , linux-kernel@vger.kernel.org, rust-for-linux@vger.kernel.org, linux-fsdevel@vger.kernel.org Subject: Re: [PATCH v2 5/7] rust: file: add `Kuid` wrapper Message-ID: <20231208204501.GJ28727@noisy.programming.kicks-ass.net> References: <20231206-alice-file-v2-0-af617c0d9d94@google.com> <20231206-alice-file-v2-5-af617c0d9d94@google.com> <20231206123402.GE30174@noisy.programming.kicks-ass.net> <20231206134041.GG30174@noisy.programming.kicks-ass.net> <20231208165702.GI28727@noisy.programming.kicks-ass.net> <202312080947.674CD2DC7@keescook> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <202312080947.674CD2DC7@keescook> X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on pete.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (pete.vger.email [0.0.0.0]); Fri, 08 Dec 2023 12:45:23 -0800 (PST) On Fri, Dec 08, 2023 at 10:18:47AM -0800, Kees Cook wrote: > Even if we look at the prerequisites for mounting an attack here, we've > already got things in place to help mitigate arbitrary code execution > (KCFI, BTI, etc). Nothing is perfect, but speculation gadgets are > pretty far down on the list of concerns, IMO. We have no real x86 ROP > defense right now in the kernel, so that's a much lower hanging fruit > for attackers. Supervisor shadow stacks, as they exist today, just can't work on Linux. Should get fixed with FRED, but yeah, this is all somewhat unfortunate. > As another comparison, on x86 there are so many direct execution gadgets > present in middle-of-instruction code patterns that worrying about a > speculation gadget seems silly to me. FineIBT (or even IBT) limits the middle of function gadgets significantly.