Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp16242imu; Thu, 6 Dec 2018 15:10:13 -0800 (PST) X-Google-Smtp-Source: AFSGD/U5UtjcQIOEDri/60l2ki+0iaSD7g3KI4dzoGtgP4MDVEknmh9V3wAMVOA6loHCkeysKhQ2 X-Received: by 2002:a17:902:7d82:: with SMTP id a2mr30275289plm.163.1544137813273; Thu, 06 Dec 2018 15:10:13 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544137813; cv=none; d=google.com; s=arc-20160816; b=sShhRPZrauWXnJbd3uMy8Bu0JUCiEjvMPcSuh7CmCdBKE5DQ+3CCC8hNnSOtmngePd q99miJh2AZ9XVw/l6Qi1aA5H853YvlSUrZNEiix3LEWTtEReoEOUGQF8VTVdeQqOvXbL f3mpr8mvL2n+pSf6Ze4sSvK7x/TQKACK/qL6L/2pd8Cx62tKbeVVvsgXAH7zg8lBcOHh gwfIyXxXU433ypI+rqC+x45HRl/i0Zbx3WbZNPhYJKXLg+uOIGbBTnuForkslSeamopW 2SPwGFWeOzyvpbE/lK8zT5rGkxG1pph7K3UEN9T0Pixp9BGCKfAo7XWymvnFGsijJ8m0 d8Mw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:to:references:message-id :content-transfer-encoding:cc:date:in-reply-to:from:subject :mime-version:dkim-signature; bh=ezkaT4Ec4xBLAgz7aCF1tAyDAzze9Mk68K5AmyOWWvk=; b=jdad7eh+PPT2k6VD5OwpajzPc5NG+hTZl45QWVYS9mntXmt6XNsS/nqwrglF7XZy7Z +zgumfjsWXhe+kO3wAXu3fIx6WHbvFraMWWOY+hSf2DsXBhrtlWGntS1/e1OOF34dn/b DbV29/hByDFvEnQfKBnM5uLUwsKsyLvL3WlCzWMiBS2ErVMwBwF9OeHbbjBBqETgBHMC pJ4BiUTWSrHL0AlorVe/ALnQckb0HqMEQgloTgcQeHCI9OUEnSd3lus8rvp/oK3mYdTP TrLDv6o+PhQRf1wr9L4y7nFMWSozVun8mKKPr/lzI3XtvRVymHIjDJEvbITX20oT4eFH xTEA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=exBlxDSj; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f81si1483212pfh.33.2018.12.06.15.09.36; Thu, 06 Dec 2018 15:10:13 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=exBlxDSj; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726219AbeLFXII (ORCPT + 99 others); Thu, 6 Dec 2018 18:08:08 -0500 Received: from mail-pg1-f195.google.com ([209.85.215.195]:33152 "EHLO mail-pg1-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726119AbeLFXIH (ORCPT ); Thu, 6 Dec 2018 18:08:07 -0500 Received: by mail-pg1-f195.google.com with SMTP id z11so821345pgu.0; Thu, 06 Dec 2018 15:08:06 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=ezkaT4Ec4xBLAgz7aCF1tAyDAzze9Mk68K5AmyOWWvk=; b=exBlxDSjH2x+GL/xdqSaTqexl4UeRqZQEjUbXYwRbCOK2VFF6NZqF45OYm1nqknbCH sy0qvR8j0a4F5rSZaPcrhvQOyYvTOuz5T7JVhJMqaboOumZfE/hs5uJrWF2cIWNc/FuS ZtnqIfAYXe0nq6Q0HBIKxTDYIOUycxHjQMofML1eefUHoQt2/8INLOvpw93PKsY5GcsO gJw/ZNk08L9DxgxjqqnGX+D1sYGrQBqZtU7ePeo5vaCf56C31kXJtDxQOQl8Pt1Qiazb axeU724Wy0fOKF6drWxzpTDQn3Ihmo2xkNQRnLr8GsDyJGHWvYQPw26/ignPVMbzAgwM 0/Ng== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=ezkaT4Ec4xBLAgz7aCF1tAyDAzze9Mk68K5AmyOWWvk=; b=ub0LTHmy7aak02gmPu0+AS6zOrKw8RlF+rwfoI1eBpI0uX1ddAzU5WTECqHMM85LVu 9k5qyJv6Jm5p/po5AP3/8X1bpRKl+R7KoKzJZBn+tbrWBjDY+GpY3+h5bcPymdfDXBIH 8BfTATNrrst5HWVGUjFbwMONAHe5QwIaClJfWvb2wHsMpL8NhMLE5eMAhyoYZLBMYbEo a7X5l/yBiVczhopXrChm+0fTbOUEGyxeHyYNcBvsPsYWFDW3NgiMaZ4JRXVQfJeo1sUV RIHymptS9IPWn0T8Y5OrmmHr8WR8o6fip7PIbfzybPf3PF4kJdwMWmDCVZ9LTQk+XEqC T/ag== X-Gm-Message-State: AA+aEWYCqlDvzTCCCPF8K+2iJiQtzAHuHkeUmIZtMaWYumvmFWO2ys0K HaPR1/6+7Si5pGIdNifyMpM= X-Received: by 2002:a63:ef47:: with SMTP id c7mr26098089pgk.386.1544137686022; Thu, 06 Dec 2018 15:08:06 -0800 (PST) Received: from [10.2.19.70] ([208.91.2.1]) by smtp.gmail.com with ESMTPSA id e128sm1807995pfe.67.2018.12.06.15.08.03 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 06 Dec 2018 15:08:04 -0800 (PST) Content-Type: text/plain; charset=utf-8 Mime-Version: 1.0 (Mac OS X Mail 12.1 \(3445.101.1\)) Subject: Re: [PATCH 1/2] vmalloc: New flag for flush before releasing pages From: Nadav Amit In-Reply-To: Date: Thu, 6 Dec 2018 15:08:02 -0800 Cc: Tycho Andersen , Ard Biesheuvel , Will Deacon , Rick Edgecombe , LKML , Daniel Borkmann , Jessica Yu , Steven Rostedt , Alexei Starovoitov , Linux-MM , Jann Horn , "Dock, Deneen T" , Peter Zijlstra , Kristen Carlson Accardi , Andrew Morton , Ingo Molnar , Anil S Keshavamurthy , Kernel Hardening , Masami Hiramatsu , "Naveen N . Rao" , "David S. Miller" , Network Development , Dave Hansen , Igor Stoppa Content-Transfer-Encoding: quoted-printable Message-Id: References: <20181128000754.18056-1-rick.p.edgecombe@intel.com> <20181128000754.18056-2-rick.p.edgecombe@intel.com> <4883FED1-D0EC-41B0-A90F-1A697756D41D@gmail.com> <20181204160304.GB7195@arm.com> <51281e69a3722014f718a6840f43b2e6773eed90.camel@intel.com> <20181205114148.GA15160@arm.com> <20181206190115.GC10086@cisco> To: Andy Lutomirski X-Mailer: Apple Mail (2.3445.101.1) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > On Dec 6, 2018, at 12:17 PM, Andy Lutomirski wrote: >=20 > On Thu, Dec 6, 2018 at 11:39 AM Nadav Amit = wrote: >>> On Dec 6, 2018, at 11:19 AM, Andy Lutomirski = wrote: >>>=20 >>> On Thu, Dec 6, 2018 at 11:01 AM Tycho Andersen = wrote: >>>> On Thu, Dec 06, 2018 at 10:53:50AM -0800, Andy Lutomirski wrote: >>>>>> If we are going to unmap the linear alias, why not do it at = vmalloc() >>>>>> time rather than vfree() time? >>>>>=20 >>>>> That=E2=80=99s not totally nuts. Do we ever have code that expects = __va() to >>>>> work on module data? Perhaps crypto code trying to encrypt static >>>>> data because our APIs don=E2=80=99t understand virtual addresses. = I guess if >>>>> highmem is ever used for modules, then we should be fine. >>>>>=20 >>>>> RO instead of not present might be safer. But I do like the idea = of >>>>> renaming Rick's flag to something like VM_XPFO or VM_NO_DIRECT_MAP = and >>>>> making it do all of this. >>>>=20 >>>> Yeah, doing it for everything automatically seemed like it was/is >>>> going to be a lot of work to debug all the corner cases where = things >>>> expect memory to be mapped but don't explicitly say it. And in >>>> particular, the XPFO series only does it for user memory, whereas = an >>>> additional flag like this would work for extra paranoid allocations >>>> of kernel memory too. >>>=20 >>> I just read the code, and I looks like vmalloc() is already using >>> highmem (__GFP_HIGH) if available, so, on big x86_32 systems, for >>> example, we already don't have modules in the direct map. >>>=20 >>> So I say we go for it. This should be quite simple to implement -- >>> the pageattr code already has almost all the needed logic on x86. = The >>> only arch support we should need is a pair of functions to remove a >>> vmalloc address range from the address map (if it was present in the >>> first place) and a function to put it back. On x86, this should = only >>> be a few lines of code. >>>=20 >>> What do you all think? This should solve most of the problems we = have. >>>=20 >>> If we really wanted to optimize this, we'd make it so that >>> module_alloc() allocates memory the normal way, then, later on, we >>> call some function that, all at once, removes the memory from the >>> direct map and applies the right permissions to the vmalloc alias = (or >>> just makes the vmalloc alias not-present so we can add permissions >>> later without flushing), and flushes the TLB. And we arrange for >>> vunmap to zap the vmalloc range, then put the memory back into the >>> direct map, then free the pages back to the page allocator, with the >>> flush in the appropriate place. >>>=20 >>> I don't see why the page allocator needs to know about any of this. >>> It's already okay with the permissions being changed out from under = it >>> on x86, and it seems fine. Rick, do you want to give some variant = of >>> this a try? >>=20 >> Setting it as read-only may work (and already happens for the = read-only >> module data). I am not sure about setting it as non-present. >>=20 >> At some point, a discussion about a threat-model, as Rick indicated, = would >> be required. I presume ROP attacks can easily call = set_all_modules_text_rw() >> and override all the protections. >=20 > I am far from an expert on exploit techniques, but here's a > potentially useful model: let's assume there's an attacker who can > write controlled data to a controlled kernel address but cannot > directly modify control flow. It would be nice for such an attacker > to have a very difficult time of modifying kernel text or of > compromising control flow. So we're assuming a feature like kernel > CET or that the attacker finds it very difficult to do something like > modifying some thread's IRET frame. >=20 > Admittedly, for the kernel, this is an odd threat model, since an > attacker can presumably quite easily learn the kernel stack address of > one of their tasks, do some syscall, and then modify their kernel > thread's stack such that it will IRET right back to a fully controlled > register state with RSP pointing at an attacker-supplied kernel stack. > So this threat model gives very strong ROP powers. unless we have > either CET or some software technique to harden all the RET > instructions in the kernel. >=20 > I wonder if there's a better model to use. Maybe with stack-protector > we get some degree of protection? Or is all of this is rather weak > until we have CET or a RAP-like feature. I believe that seeing the end-goal would make reasoning about patches easier, otherwise the complaint =E2=80=9Cbut anyhow it=E2=80=99s all = insecure=E2=80=9D keeps popping up. I=E2=80=99m not sure CET or other CFI would be enough even with this = threat-model. The page-tables (the very least) need to be write-protected, as = otherwise controlled data writes may just modify them. There are various possible solutions I presume: write_rare for page-tables, hypervisor-assisted security to obtain physical level NX/RO (a-la Microsoft VBS) or some = sort of hardware enclave. What do you think?=