Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp56885ybt; Tue, 7 Jul 2020 15:59:45 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw3MVUuzrNN79vC6JDpU0xYliZ4hungoCwf4PfSRMj762ok0qiw7lDptXV9G0Pb1czUEBZv X-Received: by 2002:a05:6402:b72:: with SMTP id cb18mr26274745edb.352.1594162785408; Tue, 07 Jul 2020 15:59:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594162785; cv=none; d=google.com; s=arc-20160816; b=00ce/2J9GZZqhlCL8a8ykVxp6NgpqrpajjsmmH3uhcUoakvOzKIvGDUEY+pNpsUp1r Oujs6SW6SfYUearK8O/MjKpe4StehT4Sl2N//F9tBtZydhYKx0roHCwkde+8cVV2TWb9 mXJ/TwoonidongzjsDQn/PchKQxNzjvmU4s0Yfv7XAxuLnX6GnJZv3rhvoZnew09aDWq r2lLgnMawYnygUT9+JD6DGb7QjRU+t+qziIDbgcKxIbX0JSB26OOQ1tDA4ymtmPIz6A7 AuoK8ZPzYBDJ4vIPaI8lSVoK8e150pJFwtf79yxC8AEAl1s7daUUO8eqFLhxHoQ3tMRH SxEg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id:ironport-sdr:ironport-sdr; bh=WxclYtkjlj5XeaX8yGkH3fdZmS+FBSHRXb9gA89/udk=; b=thkXpBp1D5G/xG6YU0xlL0c/dhiMzp/yIcK52LUc0VY73gTKZjHuqXa6H0KfAbj8vw sJ+80JTddMJ0JKryX9zMcFd6SxpG6TYCQywSxXR9XrwaML24FIElFfYhboER9c7EHC0p ngtCYzBiov/NjYjxsia+OsgD+zOmAn+8361pi92ddsFwyGUAvLcJR1oqa4iBOE2xWoiS Z7MJULg/5rdetoDlxeaTV/Lpv7YJNFXyKA7m10NKVKodezO1fn4Z1QQzinlL7Djed1d9 iP/8XRl9jqmggSIH973skDAMBwKJFBmf/aSJqwmVVYutj01p6fmASF/UAurLRSHXBKtO DT1w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e26si15886615edv.66.2020.07.07.15.59.21; Tue, 07 Jul 2020 15:59:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728210AbgGGW7K (ORCPT + 99 others); Tue, 7 Jul 2020 18:59:10 -0400 Received: from mga05.intel.com ([192.55.52.43]:44289 "EHLO mga05.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728001AbgGGW7K (ORCPT ); Tue, 7 Jul 2020 18:59:10 -0400 IronPort-SDR: njiIe/hR6AqryvIbVoNnzpMoTWOieO1vI/1grdc1868UagSVYgfdzFCQMfESYbHCAYRGU/J/ZJ qrsm44IV5uJw== X-IronPort-AV: E=McAfee;i="6000,8403,9675"; a="232568651" X-IronPort-AV: E=Sophos;i="5.75,325,1589266800"; d="scan'208";a="232568651" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by fmsmga105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 07 Jul 2020 15:59:10 -0700 IronPort-SDR: zJTFtT0zBohAXOSTzQGE4XlaG93nyDVLb8PBhgXhcEd/uiDrgUyG2rAC5qqDtpygsRZLRYmLJK LRBohlc9fUvA== X-IronPort-AV: E=Sophos;i="5.75,325,1589266800"; d="scan'208";a="305827517" Received: from kcaccard-mobl.amr.corp.intel.com (HELO kcaccard-mobl1.jf.intel.com) ([10.212.104.224]) by fmsmga004-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 07 Jul 2020 15:59:03 -0700 Message-ID: Subject: Re: [PATCH v3 09/10] kallsyms: Hide layout From: Kristen Carlson Accardi To: Kees Cook , Jann Horn Cc: Thomas Gleixner , Ingo Molnar , Borislav Petkov , Arjan van de Ven , the arch/x86 maintainers , kernel list , Kernel Hardening , Rick Edgecombe , Tony Luck Date: Tue, 07 Jul 2020 15:58:57 -0700 In-Reply-To: <202006240815.45AAD55@keescook> References: <20200623172327.5701-1-kristen@linux.intel.com> <20200623172327.5701-10-kristen@linux.intel.com> <202006240815.45AAD55@keescook> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.30.5 (3.30.5-1.fc29) MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 2020-06-24 at 08:18 -0700, Kees Cook wrote: > On Wed, Jun 24, 2020 at 12:21:16PM +0200, Jann Horn wrote: > > On Tue, Jun 23, 2020 at 7:26 PM Kristen Carlson Accardi > > wrote: > > > This patch makes /proc/kallsyms display alphabetically by symbol > > > name rather than sorted by address in order to hide the newly > > > randomized address layout. > > [...] > > > +static int sorted_show(struct seq_file *m, void *p) > > > +{ > > > + struct list_head *list = m->private; > > > + struct kallsyms_iter_list *iter; > > > + int rc; > > > + > > > + if (list_empty(list)) > > > + return 0; > > > + > > > + iter = list_first_entry(list, struct kallsyms_iter_list, > > > next); > > > + > > > + m->private = iter; > > > + rc = s_show(m, p); > > > + m->private = list; > > > + > > > + list_del(&iter->next); > > > + kfree(iter); > > > > Does anything like this kfree() happen if someone only reads the > > start > > of kallsyms and then closes the file? IOW, does "while true; do > > head > > -n1 /proc/kallsyms; done" leak memory? > > Oop, nice catch. It seems the list would need to be walked on s_stop. > > > > + return rc; > > > +} > > [...] > > > +static int kallsyms_list_cmp(void *priv, struct list_head *a, > > > + struct list_head *b) > > > +{ > > > + struct kallsyms_iter_list *iter_a, *iter_b; > > > + > > > + iter_a = list_entry(a, struct kallsyms_iter_list, next); > > > + iter_b = list_entry(b, struct kallsyms_iter_list, next); > > > + > > > + return strcmp(iter_a->iter.name, iter_b->iter.name); > > > +} > > > > This sorts only by name, but kallsyms prints more information > > (module > > names and types). This means that if there are elements whose names > > are the same, but whose module names or types are different, then > > some > > amount of information will still be leaked by the ordering of > > elements > > with the same name. In practice, since list_sort() is stable, this > > means you can see the ordering of many modules, and you can see the > > ordering of symbols with same name but different visibility (e.g. > > "t > > user_read" from security/selinux/ss/policydb.c vs "T user_read" > > from > > security/keys/user_defined.c, and a couple other similar cases). > > i.e. sub-sort by visibility? > > > [...] > > > +#if defined(CONFIG_FG_KASLR) > > > +/* > > > + * When fine grained kaslr is enabled, we need to > > > + * print out the symbols sorted by name rather than by > > > + * by address, because this reveals the randomization order. > > > + */ > > > +static int kallsyms_open(struct inode *inode, struct file *file) > > > +{ > > > + int ret; > > > + struct list_head *list; > > > + > > > + list = __seq_open_private(file, &kallsyms_sorted_op, > > > sizeof(*list)); > > > + if (!list) > > > + return -ENOMEM; > > > + > > > + INIT_LIST_HEAD(list); > > > + > > > + ret = kallsyms_on_each_symbol(get_all_symbol_name, list); > > > + if (ret != 0) > > > + return ret; > > > + > > > + list_sort(NULL, list, kallsyms_list_cmp); > > > > This permits running an algorithm (essentially mergesort) with > > secret-dependent branches and memory addresses on essentially > > secret > > data, triggerable and arbitrarily repeatable (although with partly > > different addresses on each run) by the attacker, and probably a > > fairly low throughput (comparisons go through indirect function > > calls, > > which are slowed down by retpolines, and linked list iteration > > implies > > slow pointer chases). Those are fairly favorable conditions for > > typical side-channel attacks. > > > > Do you have estimates of how hard it would be to leverage such side > > channels to recover function ordering (both on old hardware that > > only > > has microcode fixes for Spectre and such, and on newer hardware > > with > > enhanced IBRS and such)? > > I wonder, instead, if sorting should be just done once per module > load/unload? That would make the performance and memory management > easier too. > I've been thinking about something like the below instead - I was thinking that there was no reason to sort kallsyms at all, so instead I just randomly shuffle an index list. Do you see any issues with this approach? (I guess I need to rename my functions at least...) From 2e8eb63c957f469af047dd4b056e54aa93f6fe35 Mon Sep 17 00:00:00 2001 From: Kristen Carlson Accardi Date: Mon, 3 Feb 2020 12:06:44 -0800 Subject: [PATCH 1/2] kallsyms: Hide layout This patch makes /proc/kallsyms display in a random order, rather than sorted by address in order to hide the newly randomized address layout. Signed-off-by: Kristen Carlson Accardi Reviewed-by: Tony Luck Tested-by: Tony Luck --- kernel/kallsyms.c | 117 ++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 117 insertions(+) diff --git a/kernel/kallsyms.c b/kernel/kallsyms.c index 16c8c605f4b0..7e4939b9ed61 100644 --- a/kernel/kallsyms.c +++ b/kernel/kallsyms.c @@ -25,6 +25,7 @@ #include #include #include +#include /* * These will be re-linked against their real values @@ -446,6 +447,17 @@ struct kallsym_iter { int show_value; }; +struct kallsyms_iter_list { + struct kallsym_iter iter; + struct list_head next; +}; + +struct kallsyms_sorted_iter { + struct kallsym_iter iter; + loff_t total_syms; + loff_t shuffled_index[]; +}; + int __weak arch_get_kallsym(unsigned int symnum, unsigned long *value, char *type, char *name) { @@ -660,6 +672,110 @@ int kallsyms_show_value(void) } } +static void *sorted_start(struct seq_file *m, loff_t *pos) +{ + struct kallsyms_sorted_iter *s_iter = m->private; + + if (*pos >= s_iter->total_syms) + return NULL; + + return s_start(m, &s_iter->shuffled_index[*pos]); +} + +static void *sorted_next(struct seq_file *m, void *p, loff_t *pos) +{ + struct kallsyms_sorted_iter *s_iter = m->private; + + (*pos)++; + + if (*pos >= s_iter->total_syms) + return NULL; + + if (!update_iter(m->private, s_iter->shuffled_index[*pos])) + return NULL; + + return p; +} + +static const struct seq_operations kallsyms_sorted_op = { + .start = sorted_start, + .next = sorted_next, + .stop = s_stop, + .show = s_show +}; + +/* + * shuffle_text_list() + * Use a Fisher Yates algorithm to shuffle a list of text sections. + */ +static void shuffle_index_list(loff_t *indexes, int size) +{ + int i; + unsigned int j; + loff_t temp; + + for (i = size - 1; i > 0; i--) { + /* pick a random index from 0 to i */ + get_random_bytes(&j, sizeof(j)); + j = j % (i + 1); + + temp = indexes[i]; + indexes[i] = indexes[j]; + indexes[j] = temp; + } +} + +#if defined(CONFIG_FG_KASLR) +/* + * When fine grained kaslr is enabled, we need to + * print out the symbols sorted by name rather than by + * by address, because this reveals the randomization order. + */ +static int kallsyms_open(struct inode *inode, struct file *file) +{ + loff_t pos; + struct kallsyms_sorted_iter *sorted_iter; + struct kallsym_iter iter; + + /* + * we need to figure out how many extra symbols there are + * to print out past kallsyms_num_syms + */ + pos = kallsyms_num_syms; + reset_iter(&iter, 0); + do { + if (!update_iter(&iter, pos)) + break; + pos++; + } while (1); + + /* + * add storage space for an array of loff_t equal to the size + * of the total number of symbols we need to print + */ + sorted_iter = __seq_open_private(file, &kallsyms_sorted_op, + sizeof(*sorted_iter) + + (sizeof(pos) * pos)); + if (!sorted_iter) + return -ENOMEM; + + reset_iter(&sorted_iter->iter, 0); + sorted_iter->iter.show_value = kallsyms_show_value(); + sorted_iter->total_syms = pos; + + /* + * initialize the array with all possible pos values, then + * shuffle the array so that the values will display in a random + * order. + */ + for (pos = 0; pos < sorted_iter->total_syms; pos++) + sorted_iter->shuffled_index[pos] = pos; + + shuffle_index_list(sorted_iter->shuffled_index, sorted_iter- >total_syms); + + return 0; +} +#else static int kallsyms_open(struct inode *inode, struct file *file) { /* @@ -676,6 +792,7 @@ static int kallsyms_open(struct inode *inode, struct file *file) iter->show_value = kallsyms_show_value(); return 0; } +#endif /* CONFIG_FG_KASLR */ #ifdef CONFIG_KGDB_KDB const char *kdb_walk_kallsyms(loff_t *pos) -- 2.20.1