From: Daniel Borkmann <daniel@iogearbox.net>
To: Kees Cook <keescook@chromium.org>
Cc: "David S. Miller" <davem@davemloft.net>,
Network Development <netdev@vger.kernel.org>,
Fengguang Wu <fengguang.wu@intel.com>,
Laura Abbott <labbott@redhat.com>,
Alexei Starovoitov <ast@kernel.org>
Subject: Re: [PATCH net] bpf: disable broken write protection on i386
Date: Wed, 08 Mar 2017 22:21:00 +0100 [thread overview]
Message-ID: <58C075BC.8050004@iogearbox.net> (raw)
In-Reply-To: <CAGXu5jKkX6bhnFRbM5TmQU3SXrCYi2CJnywcNMsGBBvY+d4gQg@mail.gmail.com>
On 03/08/2017 07:40 PM, Kees Cook wrote:
> On Mon, Mar 6, 2017 at 10:11 AM, Kees Cook <keescook@chromium.org> wrote:
>> On Fri, Mar 3, 2017 at 7:23 PM, Daniel Borkmann <daniel@iogearbox.net> wrote:
>>> Latter shows that memory protecting the kernel seems not working either
>>> on i386 (!). Test suite output:
>>>
>>> [...]
>>> [ 12.692836] Write protecting the kernel text: 13416k
>>> [ 12.693309] Write protecting the kernel read-only data: 5292k
>>> [ 12.693802] rodata_test: test data was not read only
>>> [...]
>>>
>>> Work-around to not enable ARCH_HAS_SET_MEMORY for i386 is not optimal
>>> as it doesn't fix the issue in presumably broken set_memory_*(), but
>>> it at least avoids people avoid having to deal with random corruptions
>>> that are hard to track down for the time being until a real fix can
>>> be found.
>>
>> Wow. Uhm, so, something must be _really_ broken. i386 should have no
>> problem with using the set_memory_*() functions. The fact that
>> DEBUG_RODATA_TEST failed is also pretty crazy, but may be unrelated
>> (that test was just refactored too).
>
> I'm not able to reproduce this. I built Linus's tree and rodata_test
> passes for me on i386. I tried the .config from Fengguang (with
> RODATA_TEST=y added), but it still passes for me:
> https://lkml.org/lkml/2017/3/1/344
>
> I wonder if something change changed already in the tree? Can you
> still reproduce this?
I'll answer in a bit an will move the discussion over to the other
thread on the same topic ("[net/bpf] 3051bf36c2 BUG: unable to handle
kernel paging request at 0000a7cf" [1]) with you, Laura and Dave in
Cc as well.
[1] https://lkml.org/lkml/2017/3/8/620
prev parent reply other threads:[~2017-03-08 21:21 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-03-04 3:23 [PATCH net] bpf: disable broken write protection on i386 Daniel Borkmann
2017-03-06 18:11 ` Kees Cook
2017-03-06 18:35 ` Daniel Borkmann
2017-03-06 18:52 ` David Miller
2017-03-06 21:43 ` Daniel Borkmann
2017-03-08 18:40 ` Kees Cook
2017-03-08 21:21 ` Daniel Borkmann [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=58C075BC.8050004@iogearbox.net \
--to=daniel@iogearbox.net \
--cc=ast@kernel.org \
--cc=davem@davemloft.net \
--cc=fengguang.wu@intel.com \
--cc=keescook@chromium.org \
--cc=labbott@redhat.com \
--cc=netdev@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).