Received: by 10.213.65.68 with SMTP id h4csp1696946imn; Mon, 26 Mar 2018 12:46:55 -0700 (PDT) X-Google-Smtp-Source: AG47ELsfesJ47NKMiIE8cwKbTNhI11LCDDrP22hWBPBd4DAOTsz45P3Qtzm19Y+2Fik5hXwZjvwF X-Received: by 10.99.170.70 with SMTP id x6mr27292014pgo.114.1522093615344; Mon, 26 Mar 2018 12:46:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1522093615; cv=none; d=google.com; s=arc-20160816; b=0KqJ170mibOjeZTjAJJw1ZnpvQ58Iqo5OMToa6rnIyVHNT+FCNBOK8ewJv4iBDhAvc QSaCfLSlhVN1njdz5m1mOI8TT840WuX6dCYcQO9K4hllGdvRnG3wf6rJ/VHc8hQ0Zw17 gr8EgzV6LYC9vCfeBfKlBmRODUOm8b2L8CTxdo8/PJPD0mCk06W5YHJ37m1t/qhVR5Mq 8ekE/6ekTQDjQ/tSoAuxOQZuikpS4IHZE4C0+ylBf2k9OtbbCUnOfXTpQv/eoWhqIJv1 6yXgY/BSQyMCEU17XebstZMOrRszltT9JHqnrw3jm+ZHfeQV1EKbzr1y8m004kzXyEuo G0nQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:to:references:message-id :content-transfer-encoding:cc:date:in-reply-to:from:subject :mime-version:dkim-signature:arc-authentication-results; bh=S9O5DCef4JN4Csb5MyH8I2J1Wv04nrFco3PatjlWPkU=; b=V+s4yWJW9IjZtLjKpmMLMli7+/JDQHILFuqMaeyfRbhZ/Z5TSPZ8bZciUhtPtfZWWN lI+6/UKVLITA4jlAem5YHQTDs7ZGAISuJDWflwfcOtnkl1vOchnlsNp/eduUFg1yn68W vOlOP9ZCRIMHloJX/E+X0wvn6rTRgBC0M6BC1HaGqBdrVHz0J+Lo4pxZWw5p97nQUASI 86/7Bjhr+BSfFCE0+bXGY1KzXzWiFIkyKm2aKiueakma4JFAuZnnklIqXGhVoQ5vaeIT VEhiIJytdZHNmTjNl+l8VKYCwVby16eM/Rp1ybG71zEvknB8BB3uQrO5a4vf3y6zHQa/ s9ZA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=qB2uC9R3; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 4-v6si15187574plh.540.2018.03.26.12.46.40; Mon, 26 Mar 2018 12:46:55 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=qB2uC9R3; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751901AbeCZTpo (ORCPT + 99 others); Mon, 26 Mar 2018 15:45:44 -0400 Received: from mail-lf0-f65.google.com ([209.85.215.65]:41087 "EHLO mail-lf0-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751107AbeCZTph (ORCPT ); Mon, 26 Mar 2018 15:45:37 -0400 Received: by mail-lf0-f65.google.com with SMTP id o102-v6so29882052lfg.8; Mon, 26 Mar 2018 12:45:35 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=S9O5DCef4JN4Csb5MyH8I2J1Wv04nrFco3PatjlWPkU=; b=qB2uC9R3GQamk5ZHa6D74ooUCtnGaafclLwMkabw2jn2e2tbvlYToCvnHbUmCNQKbr TQgd8lIExYcq6M8I3OlqSulxNndIAtVnKWSfhTaSPV6Wh0SkO6pGm+0al/ckp6M1Ecv6 QRYa4VYLX/2jMzzLAUuR6MA0NPXz7SlJQD1aJHKiHNd4UkOf3MRCG+QF5eutJhwBVKp1 ylaDjJK+YXvLe6OoCRjCXCpsgwNjlmrwHD+S8PXZO1d0ZjjioSI5X5OFLQ+SxEK7bAZT iv1nzVsaCza7bXYTdufZuNzi7CeGIZzRH/pIlP72zAq+fU1SJ7aV2qAOXl2LWi9QVww2 Gjrw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=S9O5DCef4JN4Csb5MyH8I2J1Wv04nrFco3PatjlWPkU=; b=ON4AXF1MSeAvWy+S4Q4A0Wjlzw2bLyE2euiPd0/Xiguo10lsrw8zbgxJCLA+F2UiUA Rb5iRh4H8xfg+HdxCXxx4fY06U2wai5K6N+sQ202PyyE9m9HQkSaGx6V970OADmJickW BuU5Q5NS1K/gPzkE8WcqOTx4e2B2XoA+6qTVo+Ls2q/oaP+K/QPI+lQak2B+V0QNfvTu ap0OoLmVGDTlLJbUdq8r+t4CT5nLqG1gwAiz86jzN7YWGfGjxEWmLOWYOM/13FTQvxuP UEHsTCEyfP9i2XkpfTcoQ0IdGXWreSQT465dByabjb/0xN7RNj76ZeHH6scYtnExW9jH +W+A== X-Gm-Message-State: AElRT7FUb5+jGi6fQLwHYYgaY2TVguHQoX3z3JRqc0ydMGYkgNbWqBwo OdIDjq6zpNTxoaBCSR/nwNw= X-Received: by 10.46.156.81 with SMTP id t17mr10079546ljj.58.1522093534800; Mon, 26 Mar 2018 12:45:34 -0700 (PDT) Received: from [192.168.1.3] (broadband-188-255-70-164.moscow.rt.ru. [188.255.70.164]) by smtp.gmail.com with ESMTPSA id i62-v6sm3971155lfa.45.2018.03.26.12.45.32 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 26 Mar 2018 12:45:33 -0700 (PDT) Content-Type: text/plain; charset=utf-8 Mime-Version: 1.0 (Mac OS X Mail 11.2 \(3445.5.20\)) Subject: Re: [RFC PATCH v2 0/2] Randomization of address chosen by mmap. From: Ilya Smith In-Reply-To: <20180326084650.GC5652@dhcp22.suse.cz> Date: Mon, 26 Mar 2018 22:45:31 +0300 Cc: Matthew Wilcox , rth@twiddle.net, ink@jurassic.park.msu.ru, mattst88@gmail.com, vgupta@synopsys.com, linux@armlinux.org.uk, tony.luck@intel.com, fenghua.yu@intel.com, ralf@linux-mips.org, jejb@parisc-linux.org, Helge Deller , benh@kernel.crashing.org, paulus@samba.org, mpe@ellerman.id.au, schwidefsky@de.ibm.com, heiko.carstens@de.ibm.com, ysato@users.sourceforge.jp, dalias@libc.org, davem@davemloft.net, tglx@linutronix.de, mingo@redhat.com, hpa@zytor.com, x86@kernel.org, nyc@holomorphy.com, viro@zeniv.linux.org.uk, arnd@arndb.de, gregkh@linuxfoundation.org, deepa.kernel@gmail.com, Hugh Dickins , kstewart@linuxfoundation.org, pombredanne@nexb.com, Andrew Morton , steve.capper@arm.com, punit.agrawal@arm.com, aneesh.kumar@linux.vnet.ibm.com, npiggin@gmail.com, Kees Cook , bhsharma@redhat.com, riel@redhat.com, nitin.m.gupta@oracle.com, "Kirill A. Shutemov" , Dan Williams , Jan Kara , ross.zwisler@linux.intel.com, Jerome Glisse , Andrea Arcangeli , Oleg Nesterov , linux-alpha@vger.kernel.org, LKML , linux-snps-arc@lists.infradead.org, linux-ia64@vger.kernel.org, linux-metag@vger.kernel.org, linux-mips@linux-mips.org, linux-parisc@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, linux-s390@vger.kernel.org, linux-sh@vger.kernel.org, sparclinux@vger.kernel.org, Linux-MM Content-Transfer-Encoding: quoted-printable Message-Id: <01A133F4-27DF-4AE2-80D6-B0368BF758CD@gmail.com> References: <1521736598-12812-1-git-send-email-blackzert@gmail.com> <20180323124806.GA5624@bombadil.infradead.org> <651E0DB6-4507-4DA1-AD46-9C26ED9792A8@gmail.com> <20180326084650.GC5652@dhcp22.suse.cz> To: Michal Hocko X-Mailer: Apple Mail (2.3445.5.20) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > On 26 Mar 2018, at 11:46, Michal Hocko wrote: >=20 > On Fri 23-03-18 20:55:49, Ilya Smith wrote: >>=20 >>> On 23 Mar 2018, at 15:48, Matthew Wilcox = wrote: >>>=20 >>> On Thu, Mar 22, 2018 at 07:36:36PM +0300, Ilya Smith wrote: >>>> Current implementation doesn't randomize address returned by mmap. >>>> All the entropy ends with choosing mmap_base_addr at the process >>>> creation. After that mmap build very predictable layout of address >>>> space. It allows to bypass ASLR in many cases. This patch make >>>> randomization of address on any mmap call. >>>=20 >>> Why should this be done in the kernel rather than libc? libc is = perfectly >>> capable of specifying random numbers in the first argument of mmap. >> Well, there is following reasons: >> 1. It should be done in any libc implementation, what is not possible = IMO; >=20 > Is this really so helpful? Yes, ASLR is one of very important mitigation techniques which are = really used=20 to protect applications. If there is no ASLR, it is very easy to exploit=20= vulnerable application and compromise the system. We can=E2=80=99t just = fix all the=20 vulnerabilities right now, thats why we have mitigations - techniques = which are=20 makes exploitation more hard or impossible in some cases. Thats why it is helpful. >=20 >> 2. User mode is not that layer which should be responsible for = choosing >> random address or handling entropy; >=20 > Why? Because of the following reasons: 1. To get random address you should have entropy. These entropy = shouldn=E2=80=99t be=20 exposed to attacker anyhow, the best case is to get it from kernel. So = this is a syscall. 2. You should have memory map of your process to prevent remapping or = big fragmentation. Kernel already has this map. You will got another one in = libc. And any non-libc user of mmap (via syscall, etc) will make hole in your = map. This one also decrease performance cause you any way call syscall_mmap=20= which will try to find some address for you in worst case, but after you = already did some computing on it. 3. The more memory you use in userland for these proposal, the easier = for attacker to leak it or use in exploitation techniques. 4. It is so easy to fix Kernel function and so hard to support memory management from userspace. >=20 >> 3. Memory fragmentation is unpredictable in this case >>=20 >> Off course user mode could use random =E2=80=98hint=E2=80=99 address, = but kernel may >> discard this address if it is occupied for example and allocate just = before >> closest vma. So this solution doesn=E2=80=99t give that much security = like=20 >> randomization address inside kernel. >=20 > The userspace can use the new MAP_FIXED_NOREPLACE to probe for the > address range atomically and chose a different range on failure. >=20 This algorithm should track current memory. If he doesn=E2=80=99t he may = cause infinite loop while trying to choose memory. And each iteration increase = time needed on allocation new memory, what is not preferred by any libc = library developer. Thats why I did this patch. Thanks, Ilya