Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp2592624iob; Mon, 16 May 2022 01:29:38 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx1alnr73pETnmPf1CugkLxNIncpZOCiCc4Sfw2CVNmbrefVOfpqxJgH9mMiRIUJkcYNOBU X-Received: by 2002:a05:6402:ea8:b0:42a:8b26:3a77 with SMTP id h40-20020a0564020ea800b0042a8b263a77mr10066587eda.154.1652689778618; Mon, 16 May 2022 01:29:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1652689778; cv=none; d=google.com; s=arc-20160816; b=Xfzcyc1bERIQ65JTzTzZoDgxQfxoij0GgLfbzsPafpgLfphRmlwU5oZiq+jcuQeNFd IE++RwOt3p6MEuTjTWJC3FNVs4wKVETvw52r8wNToLegr0unH8pV5890gqqPIEBpPY8+ 2f+Ud7Vk1IOChsOk36gMRUih2SxhOapUSefrNX7gzXvHSsSUsU3iKUEyFPl8HAD2eeHQ wep5wvVoBVzx2vjK5CHxicBlKlA3kutlpFuYMXo/JTtUfpTqxBnL+Sx1xjGwxTZDQTHy fmHcqDSgfADKQGy1vqefBEpTZyKXB07hdzFO4PJqiNvnGdSVapy7A1tJ2VZs7QdvqHx0 v3FA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:reply-to:user-agent :mime-version:date:message-id; bh=m+papEz+RWVYQ4erdcb0O46hSO9mcyw8EdGsK52iQDQ=; b=YkkvQ+1SAsKtdlv4NXGgn6ZRKTq5Z87kSA7mSyYRNXLcAD92t+96vg2BzIfN+42pe4 A6eQU23b9VhaxRHXsjDtuHSnaRSuMFC3nk8Swt7cRFHt8tu16hC3nvaOsl6VtoX6JXxp 3t+E7miDQqakClEMwYFzPT8iCNTVM0HV69poFZ/C3BZkdwBkNkVgEEQnh4lTDVCaJvUj TLnZPpBJ+IwYkanTEWkrVYCJIwXHAlm9HJfATqErqtfKbB95AhA0eINJj58RAJlV2sxN u/ccCmzOP7NjEiPjhumQIS0KhydF+gR/14qQd6b3ECcp45P2zvqmdANNM8WMhBDOwTZ4 w7xA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id f21-20020a0564021e9500b00425c6ad47edsi10757033edf.291.2022.05.16.01.29.12; Mon, 16 May 2022 01:29:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237653AbiEOQR0 (ORCPT + 99 others); Sun, 15 May 2022 12:17:26 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49808 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231624AbiEOQRY (ORCPT ); Sun, 15 May 2022 12:17:24 -0400 Received: from mail-ed1-f54.google.com (mail-ed1-f54.google.com [209.85.208.54]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C3F4CDF65 for ; Sun, 15 May 2022 09:17:22 -0700 (PDT) Received: by mail-ed1-f54.google.com with SMTP id c12so1725277eds.10 for ; Sun, 15 May 2022 09:17:22 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:message-id:date:mime-version:user-agent:reply-to :subject:content-language:to:cc:references:from:in-reply-to :content-transfer-encoding; bh=m+papEz+RWVYQ4erdcb0O46hSO9mcyw8EdGsK52iQDQ=; b=W51tJtXEwpTJ1OHl3shN+SwRTSodR/sf9c+Bb1f3Ep0oeMZz5vEwC7ZhWtQOrfa/e1 BbcO4GwAtIiusCde8YnQdC0DcQ+ypL1wmkHiKxRVDvCaw5Cstk0rFV2Xjza0m8O1MAV3 91/imL8gqoKl6E0Fc21GJmhvh7Whe32ha6WNUjOo8Vq3TDUjxU11qKEkOMxviKuJPSKQ X3Tjs8dq3RS+kCKNWRNOS1Ge5F4yN+kNGciiMUr0L3UtZxhxgR/3GA/BcRM7Qlt2NgAX jlXsBjS1XO9TMLJz0t1j/zLppklWrEOWDuuIg6PC9MmG06BBrKpGvfXu1ND3PR1NsCEi Mrfg== X-Gm-Message-State: AOAM531XTr92C5d8ZCoXj1wqerfOCu/SsDcEbB2v3XCDYWTXLYG8j1XD 6t1vsgsRAYnU8r8GYrYr1gk= X-Received: by 2002:a05:6402:84a:b0:423:fe99:8c53 with SMTP id b10-20020a056402084a00b00423fe998c53mr8842690edz.195.1652631441184; Sun, 15 May 2022 09:17:21 -0700 (PDT) Received: from [10.9.0.34] ([46.166.133.199]) by smtp.gmail.com with ESMTPSA id o23-20020a50fd97000000b0042aaaf3f41csm1171934edt.4.2022.05.15.09.17.19 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sun, 15 May 2022 09:17:20 -0700 (PDT) Message-ID: <8d8061c4-2a3e-cb3a-00c9-677fa8899058@linux.com> Date: Sun, 15 May 2022 19:17:16 +0300 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.7.0 Reply-To: alex.popov@linux.com Subject: Re: [PATCH v2 03/13] stackleak: remove redundant check Content-Language: en-US To: Mark Rutland , Kees Cook Cc: linux-arm-kernel@lists.infradead.org, akpm@linux-foundation.org, catalin.marinas@arm.com, linux-kernel@vger.kernel.org, luto@kernel.org, will@kernel.org References: <20220427173128.2603085-1-mark.rutland@arm.com> <20220427173128.2603085-4-mark.rutland@arm.com> <202205101958.2A33DE20@keescook> <33711C66-BB24-4A75-8756-3CDDA02BC0CD@chromium.org> From: Alexander Popov In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00, FREEMAIL_ENVFROM_END_DIGIT,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,NICE_REPLY_A,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 12.05.2022 12:14, Mark Rutland wrote: > On Wed, May 11, 2022 at 07:44:41AM -0700, Kees Cook wrote: >> >> >> On May 11, 2022 1:02:45 AM PDT, Mark Rutland wrote: >>> On Tue, May 10, 2022 at 08:00:38PM -0700, Kees Cook wrote: >>>> On Tue, May 10, 2022 at 12:46:48PM +0100, Mark Rutland wrote: >>>>> On Sun, May 08, 2022 at 09:17:01PM +0300, Alexander Popov wrote: >>>>>> On 27.04.2022 20:31, Mark Rutland wrote: >>>>>>> In __stackleak_erase() we check that the `erase_low` value derived from >>>>>>> `current->lowest_stack` is above the lowest legitimate stack pointer >>>>>>> value, but this is already enforced by stackleak_track_stack() when >>>>>>> recording the lowest stack value. >>>>>>> >>>>>>> Remove the redundant check. >>>>>>> >>>>>>> There should be no functional change as a result of this patch. >>>>>> >>>>>> Mark, I can't agree here. I think this check is important. >>>>>> The performance profit from dropping it is less than the confidence decrease :) >>>>>> >>>>>> With this check, if the 'lowest_stack' value is corrupted, stackleak doesn't >>>>>> overwrite some wrong kernel memory, but simply clears the whole thread >>>>>> stack, which is safe behavior. >>>>> >>>>> If you feel strongly about it, I can restore the check, but I struggle to >>>>> believe that it's worthwhile. The `lowest_stack` value lives in the >>>>> task_struct, and if you have the power to corrupt that you have the power to do >>>>> much more interesting things. >>>>> >>>>> If we do restore it, I'd like to add a big fat comment explaining the >>>>> rationale (i.e. that it only matter if someone could corrupt >>>>> `current->lowest_stack`, as otherwise that's guarnateed to be within bounds). >>>> >>>> Yeah, let's restore it and add the comment. While I do agree it's likely >>>> that such an corruption would likely mean an attacker had significant >>>> control over kernel memory already, it is not uncommon that an attack >>>> only has a limited index from a given address, etc. Or some manipulation >>>> is possible via weird gadgets, etc. It's unlikely, but not impossible, >>>> and a bounds-check for that value is cheap compared to the rest of the >>>> work happening. :) >>> >>> Fair enough; I can go spin a patch restoring this. I'm somewhat unhappy with >>> silently fixing that up, though -- IMO it'd be better to BUG() or similar in >>> that case. >> >> I share your desires, and this was exactly what Alexander originally proposed, but Linus rejected it violently. :( >> https://lore.kernel.org/lkml/CA+55aFy6jNLsywVYdGp83AMrXBo_P-pkjkphPGrO=82SPKCpLQ@mail.gmail.com/ > > I see. :/ > > Thinking about this some more, if we assume someone can corrupt *some* word of > memory, then we need to consider that instead of corrupting > task_struct::lowest_stack, they could corrupt task_struct::stack (or x86's > cpu_current_top_of_stack prior to this series). > > With that in mind, if we detect that task_struct::lowest_stack is > out-of-bounds, we have no idea whether it has been corrupted or the other bound > values have been corrupted, and so we can't do the erase safely anyway. :) IMO, even if a kernel thread stack is moved somewhere for any weird reason, stackleak must erase it at the end of syscall and do its job. > So AFAICT we must *avoid* erasing when that goes wrong. Maybe we could WARN() > instead of BUG()? Mark, I think security features must not go out of service. The 'lowest_stack' value is for making stackleak faster. I believe if the 'lowest_stack' value is invalid, stackleak must not skip its main job and should erase the whole kernel thread stack. When I developed 'stackleak_erase()' I tried adding 'WARN_ON()', but it didn't work properly there, as I remember. Warning handling code is very complex. So I dropped that fragile part. Best regards, Alexander