Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp1361149pxk; Thu, 10 Sep 2020 13:29:28 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyhKQmT/i8KzP7OAmoYPCCwA+ZWpUEwen6lWf29re3z97hCNS+v6SZoc6d7G7IF7vw63Rv1 X-Received: by 2002:a05:6402:1d0f:: with SMTP id dg15mr11662453edb.342.1599769767856; Thu, 10 Sep 2020 13:29:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1599769767; cv=none; d=google.com; s=arc-20160816; b=nxMEYazG0C/qtBzWIF2YR71PkIjb00xC5Um/JFnsAoOfveZ4TLXgmC9ofqx2ypZw/K qvAxTtzP9ZGwEj9fjv18DajbXSP40mFsuk1dtF1afP/dYL5G2/AcQeoC61YrV1B+KrbD Ofli3z926vYKaxkA4k4txeT5Vnj/8P9KdpatfZ3Vw3PlWXcs/4MmFXAEIr8x/fOnW9x9 dkmizmiMO0aI70U/bLzId9lpD160XvyhaeX0R50UiZRHprQkH8OS/+o3UH5yVLJITOwM G1HyEnBwLf+WCU/8BFp42PYZPtGyFdAIC8lvIc1EZZ0HOti7TSOcSfrVg9vP4X6jczlu q2/A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=7r1rfre30aGq4hYAj5mMZd9aKhfhtSFtGbHwMdeYlE0=; b=jhWb/1qG5zcb5muw+xrFEaJTFL8Dou27cFjwDHtcJ7hG3Bg9xfMH0bnCfQTu7K7sHL GoVKDIKyg/hjMk7Sqkv9HNok+rqGxvlPHc4p7vN5pkx/rJIaB+H+5Ed1Jp8KCVTTi1nT b8Zhc7wrMRz0lgK5N6Uc2iCH9hkPMBRWgYTQ9RBWbSDO7Ohh65AJJIXc3EnTtp7CP11j IiwIlS7toRuApPWM4r6F0+rJOtNk6iha95MG6KCq0HxWp/9vH0qbrNux1GfV4MFsa2G8 vFFy396TfgZqcdAea6x6EKZkPGHL7abmgOMMuvL4HYkmgiB+NpbYc5O2WfNU9UIvjrSi PyGA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=WSKxrRh1; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r26si4558189eja.484.2020.09.10.13.29.04; Thu, 10 Sep 2020 13:29:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=WSKxrRh1; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726800AbgIJU2U (ORCPT + 99 others); Thu, 10 Sep 2020 16:28:20 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54844 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726976AbgIJUVr (ORCPT ); Thu, 10 Sep 2020 16:21:47 -0400 Received: from mail-pg1-x544.google.com (mail-pg1-x544.google.com [IPv6:2607:f8b0:4864:20::544]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C792DC0617A2 for ; Thu, 10 Sep 2020 13:21:20 -0700 (PDT) Received: by mail-pg1-x544.google.com with SMTP id j34so4899498pgi.7 for ; Thu, 10 Sep 2020 13:21:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=7r1rfre30aGq4hYAj5mMZd9aKhfhtSFtGbHwMdeYlE0=; b=WSKxrRh1zgAfDwGMo9L1sYHyOSqjXp+wb+YwpqiJT/Zb3NKDCzaVVT0HbYRYHs8jtw syDcuriSzwueAxNmNoSgZJ3aO/+dNCwSIlBAmgYX5A9wHlOOfBJPa/yeELcCY0MiEm+v nylpABXf8ROfraF5ukN6PNGINg1dckKo/9qxQ= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=7r1rfre30aGq4hYAj5mMZd9aKhfhtSFtGbHwMdeYlE0=; b=O3dTeVxHJu1n4kFuaxR3pRlcAgoO2xchCPTFKqgH4ZJU1wTUGp86OUjoXK1Wivx0fU 9NbqAG5wEzk58+hNNsMEzTzhahsFisHdGgisFmHaVE9sipfoQov6MMReYtpC4gR1w9qg HTdrueSQPwwzoz8QQqwcRzp6IeGdEcymMmy1owCJFDakpKjBgT+eZpqSTmBZQQRqzvnZ JPNMrYzIoDj7dzVMTgA1vNt81Rg05RgFzIJj1xchEv1LX0Ac0xP9ms0OMkO4xL0pQgnk /PS4E9ffoWqIj6ZzoAzbRhR8yFOksMRBb1yGvXZql2hKBq66n8m8DdnUC1l1G1Vsvkwg Yl2g== X-Gm-Message-State: AOAM531yJSCfKHh7Iyghy1k97e5/x/+BVXARiRI4xt9lZF1hnH+Z9QIR 5jeHT+/w0g8aGMkj2p0O8f4CtQ== X-Received: by 2002:a62:7809:: with SMTP id t9mr6934123pfc.105.1599769280337; Thu, 10 Sep 2020 13:21:20 -0700 (PDT) Received: from www.outflux.net (smtp.outflux.net. [198.145.64.163]) by smtp.gmail.com with ESMTPSA id j9sm6655836pfe.170.2020.09.10.13.21.16 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 10 Sep 2020 13:21:16 -0700 (PDT) From: Kees Cook To: kernel-hardening@lists.openwall.com Cc: Kees Cook , John Wood , Matthew Wilcox , Jonathan Corbet , Alexander Viro , Ingo Molnar , Peter Zijlstra , Juri Lelli , Vincent Guittot , Dietmar Eggemann , Steven Rostedt , Ben Segall , Mel Gorman , Luis Chamberlain , Iurii Zaikin , James Morris , "Serge E. Hallyn" , linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-security-module@vger.kernel.org Subject: [RFC PATCH 4/6] security/fbfam: Add a new sysctl to control the crashing rate threshold Date: Thu, 10 Sep 2020 13:21:05 -0700 Message-Id: <20200910202107.3799376-5-keescook@chromium.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200910202107.3799376-1-keescook@chromium.org> References: <20200910202107.3799376-1-keescook@chromium.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: John Wood This is a previous step to add the detection feature. A fork brute force attack will be detected when an application crashes quickly. Since, a rate can be defined as a time per fault, add a new sysctl to control the crashing rate threshold. This way, each system can tune the detection's sensibility adjusting the milliseconds per fault. So, if the application's crashing rate falls under this threshold an attack will be detected. So, the higher this value, the faster an attack will be detected. Signed-off-by: John Wood --- include/fbfam/fbfam.h | 4 ++++ kernel/sysctl.c | 9 +++++++++ security/fbfam/Makefile | 1 + security/fbfam/fbfam.c | 11 +++++++++++ security/fbfam/sysctl.c | 20 ++++++++++++++++++++ 5 files changed, 45 insertions(+) create mode 100644 security/fbfam/sysctl.c diff --git a/include/fbfam/fbfam.h b/include/fbfam/fbfam.h index b5b7d1127a52..2cfe51d2b0d5 100644 --- a/include/fbfam/fbfam.h +++ b/include/fbfam/fbfam.h @@ -3,8 +3,12 @@ #define _FBFAM_H_ #include +#include #ifdef CONFIG_FBFAM +#ifdef CONFIG_SYSCTL +extern struct ctl_table fbfam_sysctls[]; +#endif int fbfam_fork(struct task_struct *child); int fbfam_execve(void); int fbfam_exit(void); diff --git a/kernel/sysctl.c b/kernel/sysctl.c index 09e70ee2332e..c3b4d737bef3 100644 --- a/kernel/sysctl.c +++ b/kernel/sysctl.c @@ -77,6 +77,8 @@ #include #include +#include + #ifdef CONFIG_X86 #include #include @@ -2660,6 +2662,13 @@ static struct ctl_table kern_table[] = { .extra1 = SYSCTL_ZERO, .extra2 = SYSCTL_ONE, }, +#endif +#ifdef CONFIG_FBFAM + { + .procname = "fbfam", + .mode = 0555, + .child = fbfam_sysctls, + }, #endif { } }; diff --git a/security/fbfam/Makefile b/security/fbfam/Makefile index f4b9f0b19c44..b8d5751ecea4 100644 --- a/security/fbfam/Makefile +++ b/security/fbfam/Makefile @@ -1,2 +1,3 @@ # SPDX-License-Identifier: GPL-2.0 obj-$(CONFIG_FBFAM) += fbfam.o +obj-$(CONFIG_SYSCTL) += sysctl.o diff --git a/security/fbfam/fbfam.c b/security/fbfam/fbfam.c index 0387f95f6408..9be4639b72eb 100644 --- a/security/fbfam/fbfam.c +++ b/security/fbfam/fbfam.c @@ -7,6 +7,17 @@ #include #include +/** + * sysctl_crashing_rate_threshold - Crashing rate threshold. + * + * The rate's units are in milliseconds per fault. + * + * A fork brute force attack will be detected if the application's crashing rate + * falls under this threshold. So, the higher this value, the faster an attack + * will be detected. + */ +unsigned long sysctl_crashing_rate_threshold = 30000; + /** * struct fbfam_stats - Fork brute force attack mitigation statistics. * @refc: Reference counter. diff --git a/security/fbfam/sysctl.c b/security/fbfam/sysctl.c new file mode 100644 index 000000000000..430323ad8e9f --- /dev/null +++ b/security/fbfam/sysctl.c @@ -0,0 +1,20 @@ +// SPDX-License-Identifier: GPL-2.0 +#include + +extern unsigned long sysctl_crashing_rate_threshold; +static unsigned long ulong_one = 1; +static unsigned long ulong_max = ULONG_MAX; + +struct ctl_table fbfam_sysctls[] = { + { + .procname = "crashing_rate_threshold", + .data = &sysctl_crashing_rate_threshold, + .maxlen = sizeof(sysctl_crashing_rate_threshold), + .mode = 0644, + .proc_handler = proc_doulongvec_minmax, + .extra1 = &ulong_one, + .extra2 = &ulong_max, + }, + { } +}; + -- 2.25.1