From: Austin S Hemmelgarn <ahferroin7@gmail.com>
To: Stas Sergeev <stsp@list.ru>, Andy Lutomirski <luto@amacapital.net>
Cc: Josh Boyer <jwboyer@fedoraproject.org>,
"linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>,
"Andrew Bird (Sphere Systems)" <ajb@spheresystems.co.uk>,
Linus Torvalds <torvalds@linux-foundation.org>,
Ingo Molnar <mingo@kernel.org>, Kees Cook <keescook@chromium.org>,
Brian Gerst <brgerst@gmail.com>
Subject: Re: stop breaking dosemu (Re: x86/kconfig/32: Rename CONFIG_VM86 and default it to 'n')
Date: Thu, 3 Sep 2015 08:11:18 -0400 [thread overview]
Message-ID: <55E838E6.8060205@gmail.com> (raw)
In-Reply-To: <55E76FCB.7090304@list.ru>
[-- Attachment #1: Type: text/plain, Size: 3739 bytes --]
On 2015-09-02 17:53, Stas Sergeev wrote:
> 03.09.2015 00:40, Andy Lutomirski пишет:
>> On Wed, Sep 2, 2015 at 2:12 PM, Stas Sergeev <stsp@list.ru> wrote:
>>> 02.09.2015 23:55, Andy Lutomirski пишет:
>>>
>>>> On Wed, Sep 2, 2015 at 1:47 PM, Stas Sergeev <stsp@list.ru> wrote:
>>>>> 02.09.2015 23:22, Josh Boyer пишет:
>>>>>> On Wed, Sep 2, 2015 at 1:50 PM, Stas Sergeev <stsp@list.ru> wrote:
>>>>>>> 02.09.2015 20:46, Josh Boyer пишет:
>>>>>>>> On Wed, Sep 2, 2015 at 10:08 AM, Andy Lutomirski
>>>>>>>> <luto@amacapital.net>
>>>>>>>> wrote:
>>>>>>>>> I'd be amenable to switching the default back to y and perhaps
>>>>>>>>> adding
>>>>>>>>> a sysctl to make the distros more comfortable. Ingo, Kees, Brian,
>>>>>>>>> what do you think?
>>>>>>>> Can you please leave the default as N, and have a sysctl option to
>>>>>>>> enable it instead? While dosemu might still be in use, it isn't
>>>>>>>> going
>>>>>>>> to be the common case at all. So from a distro perspective, I
>>>>>>>> think
>>>>>>>> we'd probably rather have the default match the common case.
>>>>>>> The fact that fedora doesn't package dosemu, doesn't automatically
>>>>>>> mean all other distros do not too. Since when kernel defaults should
>>>>>>> match the ones of fedora?
>>>>>> I didn't say that.
>>>>> What you said was:
>>>>> ---
>>>>>
>>>>> While dosemu might still be in use, it isn't going
>>>>> to be the common case at all. So from a distro perspective
>>>>>
>>>>> ---
>>>>> ... which is likely true only in fedora circe.
>>>>>
>>>>>> The default right now is N.
>>>>> In a not yet released kernel, unless I am mistaken.
>>>>> If fedora already provides that kernel, other distros likely not.
>>>>>
>>>>>> I asked it be left
>>>>>> that way. That's all.
>>>>> Lets assume its not yet N, unless there was a kernel release already.
>>>>> Its easy to get back if its not too late.
>>>> How about CONFIG_SYSCTL_VM86_DEFAULT which defaults to Y? Fedora
>>>> could set it to N.
>>> Sorry, I don't understand this sysctl proposal.
>>> Could you please educate me what is it all about?
>>> This sysctl will disable or enable the vm86() syscall at run-time,
>>> right? What does it give us? If you disable something in the
>>> config, this gives you, say, smaller kernel image. If OTOH you
>>> add the run-time switch, it gives you a bigger image, regardless
>>> of its default value.
>>> I might be missing something, but I don't understand what
>>> problem will this solve? Have I missed some earlier message
>>> in this thread?
>> For the 99%+ of users who don't use dosemu, it prevents exploits that
>> target vm86 from attacking their kernel.
> I don't think the attack scenario was satisfactory explained.
> IIRC you only said that
> ---
>
> The mark_screen_rdonly thing is still kind of scary. It changes PTEs
> on arbitrary mappings behind the vm's back.
>
> ---
> Just go ahead and remove mark_screen_rdonly, big deal.
> Is this all of the threat?
> Or do we treat _every_ syscall as the potential attack target?
Anything that messes with the VM subsystem (doubly if it does so without
actually calling into the VM subsystem) is a potential target, as is
anything that messes with execution mode or privilege level (as in,
possibly messes with which ring (or whatevere equivalent metaphor other
processors use) execution is happening in). This does potentially all
three (depending on how it's called). Just because there are no known
working exploits doesn't mean it's not possible, and in the case of this
code, I'd say there is almost certainly some way to exploit it either to
crash the system or gain root-equivalent privileges.
[-- Attachment #2: S/MIME Cryptographic Signature --]
[-- Type: application/pkcs7-signature, Size: 3019 bytes --]
next prev parent reply other threads:[~2015-09-03 12:11 UTC|newest]
Thread overview: 40+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-09-02 9:37 stop breaking dosemu (Re: x86/kconfig/32: Rename CONFIG_VM86 and default it to 'n') Stas Sergeev
2015-09-02 14:08 ` Andy Lutomirski
2015-09-02 15:31 ` Kees Cook
2015-09-02 17:30 ` Stas Sergeev
2015-09-02 17:46 ` Josh Boyer
2015-09-02 17:50 ` Stas Sergeev
2015-09-02 20:22 ` Josh Boyer
2015-09-02 20:47 ` Stas Sergeev
2015-09-02 20:55 ` Andy Lutomirski
2015-09-02 20:59 ` Josh Boyer
2015-09-02 21:12 ` Stas Sergeev
2015-09-02 21:40 ` Andy Lutomirski
2015-09-02 21:53 ` Stas Sergeev
2015-09-03 12:11 ` Austin S Hemmelgarn [this message]
2015-09-03 12:15 ` Stas Sergeev
2015-09-03 15:44 ` Austin S Hemmelgarn
2015-09-03 16:34 ` Stas Sergeev
2015-09-03 18:51 ` Austin S Hemmelgarn
2015-09-03 21:28 ` Stas Sergeev
2015-09-04 10:09 ` Chuck Ebbert
2015-09-04 10:46 ` Stas Sergeev
2015-09-04 12:34 ` Austin S Hemmelgarn
2015-09-04 13:06 ` Stas Sergeev
2015-09-04 19:51 ` Austin S Hemmelgarn
2015-09-04 21:16 ` Stas Sergeev
2015-09-04 21:30 ` Stas Sergeev
2015-09-04 22:46 ` Raymond Jennings
2015-09-04 23:18 ` Stas Sergeev
2015-09-03 22:39 ` Stas Sergeev
2015-09-03 16:57 ` Linus Torvalds
2015-09-03 17:19 ` Stas Sergeev
2015-09-03 17:21 ` Andy Lutomirski
2015-09-03 17:34 ` Stas Sergeev
2015-09-03 17:13 ` Stas Sergeev
2015-09-03 12:01 ` Austin S Hemmelgarn
2015-09-03 12:09 ` Stas Sergeev
2015-09-02 17:52 ` Kees Cook
2015-09-02 20:25 ` Josh Boyer
2015-09-02 18:19 ` Andy Lutomirski
2015-09-02 20:26 ` Josh Boyer
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=55E838E6.8060205@gmail.com \
--to=ahferroin7@gmail.com \
--cc=ajb@spheresystems.co.uk \
--cc=brgerst@gmail.com \
--cc=jwboyer@fedoraproject.org \
--cc=keescook@chromium.org \
--cc=linux-kernel@vger.kernel.org \
--cc=luto@amacapital.net \
--cc=mingo@kernel.org \
--cc=stsp@list.ru \
--cc=torvalds@linux-foundation.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).