[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20090530182113.GA25237@elte.hu>
Date: Sat, 30 May 2009 20:21:13 +0200
From: Ingo Molnar <mingo@...e.hu>
To: "Larry H." <research@...reption.com>
Cc: Pekka Enberg <penberg@...helsinki.fi>,
Alan Cox <alan@...rguk.ukuu.org.uk>,
Rik van Riel <riel@...hat.com>, linux-kernel@...r.kernel.org,
Linus Torvalds <torvalds@...l.org>, linux-mm@...ck.org,
Ingo Molnar <mingo@...hat.com>, pageexec@...email.hu,
Linus Torvalds <torvalds@...ux-foundation.org>
Subject: Re: [patch 0/5] Support for sanitization flag in low-level page
allocator
* Larry H. <research@...reption.com> wrote:
> On 19:34 Sat 30 May , Ingo Molnar wrote:
> > You need to provide a more sufficient and more constructive answer
> > than that, if you propose upstream patches that impact the SLAB
> > subsystem.
>
> Impact? If you mean introducing changes, definitely. If the word
> has negative connotations in this context, definitely not ;)
i mean its most obvious meaning: if you change the SLAB subsystem,
it goes via Pekka. Also, changes to the page allocator impact the
SLAB subsystem too (which is the most common front-end to the page
allocator) so he has a say there too obviously ...
> > FYI Pekka is one of the SLAB subsystem maintainers so you need
> > to convince him that your patches are the right approach. Trying
> > to teach Pekka about SLAB internals in a condescending tone will
> > only cause your patches to be ignored.
>
> I've never tried to teach you anything but security matters, so
> far. And I've been quite unsuccessful at it, apparently. That
> said, please let me explain why kzfree was broken (as of 2.6.29.4,
> I've been told 30-rc2 already has users of it).
>
> The first issue is that SLOB has a broken ksize, which won't take
> into consideration compound pages AFAIK. To fix this you will need
> to introduce some changes in the way the slob_page structure is
> handled, and add real size tracking to it. You will find these
> problems if you try to implement a reliable kmem_ptr_validate for
> SLOB, too.
SLOB is a rarely used (and high overhead) allocator. But the right
answer there: fix kzalloc().
> The second is that I've experienced issues with kzfree on
> 2.6.29.4, in which something (apparently the freelist pointer) is
> overwritten and leads to a NULL pointer deference in the next
> allocation in the affected cache. I didn't fully analyze what was
> broken, besides that for sanitizing the objects on kfree I needed
> to rely on the inuse size and not the one reported by ksize, if I
> wanted to avoid hitting that trailing meta-data.
>
> I just noticed Johannes Weiner's patch from February 16.
if kzfree() is broken then a number of places in the kernel that
currently rely on it are potentially broken as well.
So as far as i'm concerned, your patchset is best expressed in the
following form: Cryto, WEP and other sensitive places should be
updated to use kzfree() to free keys.
This can be done unconditionally (without any Kconfig flag), as it's
all in slow-paths - and because there's a real security value in
sanitizing buffers that held sensitive keys, when they are freed.
Regarding a whole-sale 'clear everything on free' approach - that's
both pointless security wise (sensitive information can still leak
indefinitely [if you disagree i can provide an example]) and has a
very high cost so it's not acceptable to normal Linux distros.
> BTW, talking about branches and call depth, you are proposing
> using kzfree() which involves further test and call branches
> (including those inside the specific ksize implementation of the
> allocator being used) and it duplicates the check for
> ZERO_SIZE_PTR/NULL too. The function is so simple that it should
> be a static inline declared in slab.h. It also lacks any
> validation checks as performed in kfree (besides the zero
> size/null ptr one).
>
> Also, users of unconditional sanitization would see unnecessary
> duplication of the clearing, causing a real performance hit (which
> would be almost non existent otherwise). That will make kzfree
> unsuitable for most hot spots like the crypto api and the mac80211
> wep code.
>
> Honestly your proposed approach seems a little weak.
Unconditional honesty is definitely welcome ;-)
Freeing keys is an utter slow-path (if not then the clearing is the
least of our performance worries), so any clearing cost is in the
noise. Furthermore, kzfree() is an existing facility already in use.
If it's reused by your patches that brings further advantages:
kzfree(), if it has any bugs, will be fixed. While if you add a
parallel facility kzfree() stays broken.
So your examples about real or suspected kzfree() breakages only
strengthen the point that your patches should be using it. Keeping a
rarely used kernel facility (like kzfree) correct is hard -
splintering it by creating a parallel facility is actively harmful
for that reason.
Ingo
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists