Received: by 2002:a05:6a10:a852:0:0:0:0 with SMTP id d18csp398035pxy; Wed, 5 May 2021 05:06:07 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwflKI/6kg5daTHYVsO6daq9//PmyeLIMBuTKIrQKrcHecwIjfY3EoRzH++sShPc/HeWFh2 X-Received: by 2002:a17:90a:4406:: with SMTP id s6mr33192160pjg.93.1620216366896; Wed, 05 May 2021 05:06:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620216366; cv=none; d=google.com; s=arc-20160816; b=jsuofv3g0fb9fzUEGy/w4XWfhYorWskgZmdAYRCU5wXbLpRDkxi3H4nTSEWllJTT6K KkuxE4DleJE6xooEPpXBkSWO2J4OOq6wq7vgxqm71jcs08/M10WhoulfLPEYhOJf79fU 9hRVLXbXEfzHRGbGrGDFvifTOk7s6J3UFIwvxoPWqwdlKDDQElvHUj1l4+qcGO3874+x qj0ip8L6hTL9axLQdHPADJ+ElZ+hm2zMhA76vidmwLvEHNO8YaaOB2feZDmagh5keQy0 qjRsvBtrAnGlvSa92dqIASn+LW9DOZC+MmbVrUCdxlDTUk5jnn1K+jgsKfIGIVO0vyXV fhSw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:subject:from :references:cc:to; bh=nb0S/9OVGWeT6dyXXvsmDWE2zX3e3X2qXqhSGcWkFWA=; b=EODv6TzredAaniQjJFJ85JRnIZim+vU1M10viPHqzqlenczwUTrPbW29cjGd2Ly448 IcTx5O2yi2InRQL6/knL0MqUcH5tC5gDynYD9tJax7DHPL2kD8i/BhwutXY6PiJ6QEWQ P6aCQjNnhs6xAUaztT5KWQXQ0iAG9RQ2Z/DbuT38pRf9c6uLhE4PMGB7SDn/fhjir0Sh fNJZCfKhJuvD96ItfRvVHNlBm39oLgF6AehAOvts5EXxdwM8yrL/axiJsiqQak526Fs1 IfX6aSg9WYg3V4R8A8uFhPq7kSf6zN2fapkGnO9VUbBYDsp/hpC0TbS+XSXAg83OGDa4 Awig== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f7si22065264pfj.32.2021.05.05.05.05.48; Wed, 05 May 2021 05:06:06 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232704AbhEELJf (ORCPT + 99 others); Wed, 5 May 2021 07:09:35 -0400 Received: from mx2.suse.de ([195.135.220.15]:36586 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232642AbhEELJd (ORCPT ); Wed, 5 May 2021 07:09:33 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id 4C0F0B168; Wed, 5 May 2021 11:08:36 +0000 (UTC) To: Rick Edgecombe , dave.hansen@intel.com, luto@kernel.org, peterz@infradead.org, linux-mm@kvack.org, x86@kernel.org, akpm@linux-foundation.org, linux-hardening@vger.kernel.org, kernel-hardening@lists.openwall.com Cc: ira.weiny@intel.com, rppt@kernel.org, dan.j.williams@intel.com, linux-kernel@vger.kernel.org References: <20210505003032.489164-1-rick.p.edgecombe@intel.com> From: Vlastimil Babka Subject: Re: [PATCH RFC 0/9] PKS write protected page tables Message-ID: Date: Wed, 5 May 2021 13:08:35 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.10.0 MIME-Version: 1.0 In-Reply-To: <20210505003032.489164-1-rick.p.edgecombe@intel.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 5/5/21 2:30 AM, Rick Edgecombe wrote: > This is a POC for write protecting page tables with PKS (Protection Keys for > Supervisor) [1]. The basic idea is to make the page tables read only, except > temporarily on a per-cpu basis when they need to be modified. I’m looking for > opinions on whether people like the general direction of this in terms of > value and implementation. > > Why would people want this? > =========================== > Page tables are the basis for many types of protections and as such, are a > juicy target for attackers. Mapping them read-only will make them harder to > use in attacks. > > This protects against an attacker that has acquired the ability to write to > the page tables. It's not foolproof because an attacker who can execute > arbitrary code can either disable PKS directly, or simply call the same > functions that the kernel uses for legitimate page table writes. Yeah, it's a good idea. I've once used a similar approach locally during debugging a problem that appeared to be stray writes hitting page tables, and without PKS I indeed made the whole pages read-only when not touched by the designated code. > Why use PKS for this? > ===================== > PKS is an upcoming CPU feature that allows supervisor virtual memory > permissions to be changed without flushing the TLB, like PKU does for user > memory. Protecting page tables would normally be really expensive because you > would have to do it with paging itself. PKS helps by providing a way to toggle > the writability of the page tables with just a per-cpu MSR. I can see in patch 8/9 that you are flipping the MSR around individual operations on page table entries. In my patch I hooked making the page table writable to obtaining the page table lock (IIRC I had only the PTE level fully handled though). Wonder if that would be better tradeoff even for your MSR approach? Vlastimil > Performance impacts > =================== > Setting direct map permissions on whatever random page gets allocated for a > page table would result in a lot of kernel range shootdowns and direct map > large page shattering. So the way the PKS page table memory is created is > similar to this module page clustering series[2], where a cache of pages is > replenished from 2MB pages such that the direct map permissions and associated > breakage is localized on the direct map. In the PKS page tables case, a PKS > key is pre-applied to the direct map for pages in the cache. > > There would be some costs of memory overhead in order to protect the direct > map page tables. There would also be some extra kernel range shootdowns to > replenish the cache on occasion, from setting the PKS key on the direct map of > the new pages. I don’t have any actual performance data yet. > > This is based on V6 [1] of the core PKS infrastructure patches. PKS > infrastructure follow-on’s are planned to enable keys to be set to the same > permissions globally. Since this usage needs a key to be set globally > read-only by default, a small temporary solution is hacked up in patch 8. Long > term, PKS protected page tables would use a better and more generic solution > to achieve this. > > [1] > https://lore.kernel.org/lkml/20210401225833.566238-1-ira.weiny@intel.com/ > [2] > https://lore.kernel.org/lkml/20210405203711.1095940-1-rick.p.edgecombe@intel.com > / > > Thanks, > > Rick > > > Rick Edgecombe (9): > list: Support getting most recent element in list_lru > list: Support list head not in object for list_lru > x86/mm/cpa: Add grouped page allocations > mm: Explicitly zero page table lock ptr > x86, mm: Use cache of page tables > x86/mm/cpa: Add set_memory_pks() > x86/mm/cpa: Add perm callbacks to grouped pages > x86, mm: Protect page tables with PKS > x86, cpa: PKS protect direct map page tables > > arch/x86/boot/compressed/ident_map_64.c | 5 + > arch/x86/include/asm/pgalloc.h | 6 + > arch/x86/include/asm/pgtable.h | 26 +- > arch/x86/include/asm/pgtable_64.h | 33 ++- > arch/x86/include/asm/pkeys_common.h | 8 +- > arch/x86/include/asm/set_memory.h | 23 ++ > arch/x86/mm/init.c | 40 +++ > arch/x86/mm/pat/set_memory.c | 312 +++++++++++++++++++++++- > arch/x86/mm/pgtable.c | 144 ++++++++++- > include/asm-generic/pgalloc.h | 42 +++- > include/linux/list_lru.h | 26 ++ > include/linux/mm.h | 7 + > mm/Kconfig | 6 +- > mm/list_lru.c | 38 ++- > mm/memory.c | 1 + > mm/swap.c | 7 + > mm/swap_state.c | 6 + > 17 files changed, 705 insertions(+), 25 deletions(-) >