Received: by 10.213.65.68 with SMTP id h4csp678333imn; Tue, 27 Mar 2018 06:52:34 -0700 (PDT) X-Google-Smtp-Source: AG47ELvUwmEazIOKXUdDU5rbrMh2c8nvGXIsNvSXyBzTSYa79jDX6JyyyeYGAzBV6zl6fTHifHQ8 X-Received: by 10.101.102.24 with SMTP id w24mr30511805pgv.326.1522158754776; Tue, 27 Mar 2018 06:52:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1522158754; cv=none; d=google.com; s=arc-20160816; b=fdaARormzwIn8xr2MKJo+lKb+ficUKE0QQHTmyc51TstVdv9whQSyEpFvi28EPLECG G+nu6LW8Fgxv7D7K8/iOp7ZGgW+FAY7qXCLIoTF2Cl9DgZmRMWQ/foy1qIaJE/zB7ueb bzjf+b6Z5p2Fif4z4YLdErNxSgd87qwiSqRi2WScdiifa5nWgblfF3Mzk16IpON+og4v gR1h8jSQrxlINPafSbl3nyN/mCcyGNPAPWXMXl0eAoLLKHlEK0sw360uwIu+jUrhduvP HF7CiIbgIzBcNqxlp0HHKgQQ/8E7xGlRlj35f864qtWKc+EyvfaHLR2k3hwY0j+agWaY 2PfA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:to:references:message-id :content-transfer-encoding:cc:date:in-reply-to:from:subject :mime-version:dkim-signature:arc-authentication-results; bh=y6PiAbP+0RgCdplau6Qz9CsZc8YXQN1l/gRCGxg/XVE=; b=P8MDpiQqE+2s7iAfAH2fY0kEJO667QucOFfNllOFd2zzifBKy/OoV/5hhSQ4xchFJj XBvJB56F5fb3ekTGOjYrY5FrDUyrnZwHVR5sRbR4pUh8uhPB9gQv9x3vjb21atI44x3q xLaAfJTl5562j3RSPcOFeUdQK1Y4ueM1lpwN173mbK3YBzuDODQrLMH9SNfs+MaEitRM pxKaFuZrFK04kqHM3NRzHhmIAxrXTG0UpzWLsweXGT+P4t8B83kyEAS8Vb11qrITHdde aTXN3A2gCXZXblIiPUqHU5/4p8u2Twcc1UlPkoWN7koFUrL4o/vBsdHslf9c0A3m6l0P pqdw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=uqr24jU4; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b124si477372pgc.614.2018.03.27.06.52.19; Tue, 27 Mar 2018 06:52:34 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=uqr24jU4; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752695AbeC0NvR (ORCPT + 99 others); Tue, 27 Mar 2018 09:51:17 -0400 Received: from mail-lf0-f65.google.com ([209.85.215.65]:33521 "EHLO mail-lf0-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752124AbeC0NvP (ORCPT ); Tue, 27 Mar 2018 09:51:15 -0400 Received: by mail-lf0-f65.google.com with SMTP id x205-v6so33451526lfa.0; Tue, 27 Mar 2018 06:51:12 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=y6PiAbP+0RgCdplau6Qz9CsZc8YXQN1l/gRCGxg/XVE=; b=uqr24jU4sVyHw0e/+PkE0RYys0+iT9CSSRkD5S4Oe6cHbxqd7hFjhA4ZEsRlGandlz QMEMxdLUUqf5ag21KZK1oKaYNFUoXhsL2mCyaFcJRa419ptJAdLKmlub8SXXHaNEtJ2L Pt8SCbAWRYHlNhZ6Ny3te/pXLbcXNhvLPdgvpfi2K0G17WDRxSsR2QmicTUe5BGJQ0Ps 7OzXh5W/lPNYy0ZGO6L7rdgP8I1ReIF6mHlH7JwkItuxcH5XMljBxRbBFWUbUJsPMCEe Gh2ynCColLCPcSuZ7oLVLxl1120K2NmpspMoO3JKR6kUUjF1Sty3ofZVWGE5ldb6fNNG Pl0g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=y6PiAbP+0RgCdplau6Qz9CsZc8YXQN1l/gRCGxg/XVE=; b=ennHzJAtcuGhxhN24x4IPovP+ve89RVq8KD090XVOUqWpdARfsB2hrP3lLU84m2jIZ LbSM0fXq3aIAQnvhn9z0RTDpEmcuYeKZLLzUFemBvMunqQAIv2k0vQnl28Eh6uaAXClq tsEk0juti3O2U57MwbumoOyaJBuHrf1S9r6r2zoJHFbsetxd2C9cNsexhDTCBqaprgCF Eotwvu9tl1V7mhwzMT7xkP5cCaXZJG4ugtvkfbXFaf7EMMzXs46f2Mgg1O87ndYhorp9 OwfINJr6VweCzFulomiA1CxG1pIaseoATBHEYk64Kr5n3x/w5gxAYRTCRyGnm18B1mwN kV5Q== X-Gm-Message-State: AElRT7ESkm1u05eVLXpePudj8RaOWqBJTDb0J0JRD8hNjvVHlHchi4I0 P1+wZsBKXMkjwIBD/6jG+Dc= X-Received: by 2002:a19:fe2:: with SMTP id 95-v6mr30490583lfp.13.1522158672115; Tue, 27 Mar 2018 06:51:12 -0700 (PDT) Received: from [10.0.36.227] ([31.44.93.2]) by smtp.gmail.com with ESMTPSA id y70-v6sm249076lfk.24.2018.03.27.06.51.09 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 27 Mar 2018 06:51:11 -0700 (PDT) Content-Type: text/plain; charset=utf-8 Mime-Version: 1.0 (Mac OS X Mail 11.2 \(3445.5.20\)) Subject: Re: [RFC PATCH v2 0/2] Randomization of address chosen by mmap. From: Ilya Smith In-Reply-To: <20180327072432.GY5652@dhcp22.suse.cz> Date: Tue, 27 Mar 2018 16:51:08 +0300 Cc: Matthew Wilcox , rth@twiddle.net, ink@jurassic.park.msu.ru, mattst88@gmail.com, vgupta@synopsys.com, linux@armlinux.org.uk, tony.luck@intel.com, fenghua.yu@intel.com, ralf@linux-mips.org, jejb@parisc-linux.org, Helge Deller , benh@kernel.crashing.org, paulus@samba.org, mpe@ellerman.id.au, schwidefsky@de.ibm.com, heiko.carstens@de.ibm.com, ysato@users.sourceforge.jp, dalias@libc.org, davem@davemloft.net, tglx@linutronix.de, mingo@redhat.com, hpa@zytor.com, x86@kernel.org, nyc@holomorphy.com, viro@zeniv.linux.org.uk, arnd@arndb.de, gregkh@linuxfoundation.org, deepa.kernel@gmail.com, Hugh Dickins , kstewart@linuxfoundation.org, pombredanne@nexb.com, Andrew Morton , steve.capper@arm.com, punit.agrawal@arm.com, aneesh.kumar@linux.vnet.ibm.com, npiggin@gmail.com, Kees Cook , bhsharma@redhat.com, riel@redhat.com, nitin.m.gupta@oracle.com, "Kirill A. Shutemov" , Dan Williams , Jan Kara , ross.zwisler@linux.intel.com, Jerome Glisse , Andrea Arcangeli , Oleg Nesterov , linux-alpha@vger.kernel.org, LKML , linux-snps-arc@lists.infradead.org, linux-ia64@vger.kernel.org, linux-metag@vger.kernel.org, linux-mips@linux-mips.org, linux-parisc@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, linux-s390@vger.kernel.org, linux-sh@vger.kernel.org, sparclinux@vger.kernel.org, Linux-MM Content-Transfer-Encoding: quoted-printable Message-Id: <0549F29C-12FC-4401-9E85-A430BC11DA78@gmail.com> References: <1521736598-12812-1-git-send-email-blackzert@gmail.com> <20180323124806.GA5624@bombadil.infradead.org> <651E0DB6-4507-4DA1-AD46-9C26ED9792A8@gmail.com> <20180326084650.GC5652@dhcp22.suse.cz> <01A133F4-27DF-4AE2-80D6-B0368BF758CD@gmail.com> <20180327072432.GY5652@dhcp22.suse.cz> To: Michal Hocko X-Mailer: Apple Mail (2.3445.5.20) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > On 27 Mar 2018, at 10:24, Michal Hocko wrote: >=20 > On Mon 26-03-18 22:45:31, Ilya Smith wrote: >>=20 >>> On 26 Mar 2018, at 11:46, Michal Hocko wrote: >>>=20 >>> On Fri 23-03-18 20:55:49, Ilya Smith wrote: >>>>=20 >>>>> On 23 Mar 2018, at 15:48, Matthew Wilcox = wrote: >>>>>=20 >>>>> On Thu, Mar 22, 2018 at 07:36:36PM +0300, Ilya Smith wrote: >>>>>> Current implementation doesn't randomize address returned by = mmap. >>>>>> All the entropy ends with choosing mmap_base_addr at the process >>>>>> creation. After that mmap build very predictable layout of = address >>>>>> space. It allows to bypass ASLR in many cases. This patch make >>>>>> randomization of address on any mmap call. >>>>>=20 >>>>> Why should this be done in the kernel rather than libc? libc is = perfectly >>>>> capable of specifying random numbers in the first argument of = mmap. >>>> Well, there is following reasons: >>>> 1. It should be done in any libc implementation, what is not = possible IMO; >>>=20 >>> Is this really so helpful? >>=20 >> Yes, ASLR is one of very important mitigation techniques which are = really used=20 >> to protect applications. If there is no ASLR, it is very easy to = exploit=20 >> vulnerable application and compromise the system. We can=E2=80=99t = just fix all the=20 >> vulnerabilities right now, thats why we have mitigations - techniques = which are=20 >> makes exploitation more hard or impossible in some cases. >>=20 >> Thats why it is helpful. >=20 > I am not questioning ASLR in general. I am asking whether we really = need > per mmap ASLR in general. I can imagine that some environments want to > pay the additional price and other side effects, but considering this > can be achieved by libc, why to add more code to the kernel? I believe this is the only one right place for it. Adding these 200+ = lines of=20 code we give this feature for any user - on desktop, on server, on IoT = device,=20 on SCADA, etc. But if only glibc will implement =E2=80=98user-mode-aslr=E2= =80=99 IoT and SCADA=20 devices will never get it. >>>=20 >>>> 2. User mode is not that layer which should be responsible for = choosing >>>> random address or handling entropy; >>>=20 >>> Why? >>=20 >> Because of the following reasons: >> 1. To get random address you should have entropy. These entropy = shouldn=E2=80=99t be=20 >> exposed to attacker anyhow, the best case is to get it from kernel. = So this is >> a syscall. >=20 > /dev/[u]random is not sufficient? Using /dev/[u]random makes 3 syscalls - open, read, close. This is a = performance issue. >=20 >> 2. You should have memory map of your process to prevent remapping or = big >> fragmentation. Kernel already has this map. >=20 > /proc/self/maps? Not any system has /proc and parsing /proc/self/maps is robust so it is = the=20 performance issue. libc will have to do it on any mmap. And there is a = possible=20 race here - application may mmap/unmap memory with native syscall during = other=20 thread reading maps. >> You will got another one in libc. >> And any non-libc user of mmap (via syscall, etc) will make hole in = your map. >> This one also decrease performance cause you any way call = syscall_mmap=20 >> which will try to find some address for you in worst case, but after = you already >> did some computing on it. >=20 > I do not understand. a) you should be prepared to pay an additional > price for an additional security measures and b) how would anybody = punch > a hole into your mapping?=20 >=20 I was talking about any code that call mmap directly without libc = wrapper. >> 3. The more memory you use in userland for these proposal, the easier = for >> attacker to leak it or use in exploitation techniques. >=20 > This is true in general, isn't it? I fail to see how kernel chosen and > user chosen ranges would make any difference. My point here was that libc will have to keep memory representation as a = tree=20 and this tree increase attack surface. It could be hidden in kernel as = it is right now. >=20 >> 4. It is so easy to fix Kernel function and so hard to support memory >> management from userspace. >=20 > Well, on the other hand the new layout mode will add a maintenance > burden on the kernel and will have to be maintained for ever because = it > is a user visible ABI. Thats why I made this patch as RFC and would like to discuss this ABI = here. I=20 made randomize_va_space parameter to allow disable randomisation per = whole=20 system. PF_RANDOMIZE flag may disable randomization for concrete process = (or=20 process groups?). For architecture I=E2=80=99ve made info.random_shift =3D= 0 , so if your=20 arch has small address space you may disable shifting. I also would like = to add=20 some sysctl to allow process/groups to change this value and allow some=20= processes to have shifts bigger then another. Lets discuss it, please. >=20 >>>> 3. Memory fragmentation is unpredictable in this case >>>>=20 >>>> Off course user mode could use random =E2=80=98hint=E2=80=99 = address, but kernel may >>>> discard this address if it is occupied for example and allocate = just before >>>> closest vma. So this solution doesn=E2=80=99t give that much = security like=20 >>>> randomization address inside kernel. >>>=20 >>> The userspace can use the new MAP_FIXED_NOREPLACE to probe for the >>> address range atomically and chose a different range on failure. >>>=20 >>=20 >> This algorithm should track current memory. If he doesn=E2=80=99t he = may cause >> infinite loop while trying to choose memory. And each iteration = increase time >> needed on allocation new memory, what is not preferred by any libc = library >> developer. >=20 > Well, I am pretty sure userspace can implement proper free ranges > tracking=E2=80=A6 I think we need to know what libc developers will say on implementing = ASLR in=20 user-mode. I am pretty sure they will say =E2=80=98nether=E2=80=99 or = =E2=80=98some-day=E2=80=99. And problem=20 of ASLR will stay forever. Thanks, Ilya