lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20150220212223.GH15980@treble.redhat.com>
Date:	Fri, 20 Feb 2015 15:22:23 -0600
From:	Josh Poimboeuf <jpoimboe@...hat.com>
To:	Ingo Molnar <mingo@...nel.org>
Cc:	Jiri Kosina <jkosina@...e.cz>, Vojtech Pavlik <vojtech@...e.com>,
	Peter Zijlstra <peterz@...radead.org>,
	Andrew Morton <akpm@...ux-foundation.org>,
	Ingo Molnar <mingo@...hat.com>,
	Seth Jennings <sjenning@...hat.com>,
	linux-kernel@...r.kernel.org,
	Linus Torvalds <torvalds@...ux-foundation.org>
Subject: Re: [PATCH 1/3] sched: add sched_task_call()

On Fri, Feb 20, 2015 at 09:08:49PM +0100, Ingo Molnar wrote:
> * Josh Poimboeuf <jpoimboe@...hat.com> wrote:
> > On Fri, Feb 20, 2015 at 10:50:03AM +0100, Ingo Molnar wrote:
> > > * Jiri Kosina <jkosina@...e.cz> wrote:
> > > 
> > > > Alright, so to sum it up:
> > > > 
> > > > - current stack dumping (even looking at /proc/<pid>/stack) is not 
> > > >   guaranteed to yield "correct" results in case the task is running at the 
> > > >   time the stack is being examined
> > > 
> > > Don't even _think_ about trying to base something as 
> > > dangerous as live patching the kernel image on the concept 
> > > of:
> > > 
> > >   'We can make all stack backtraces reliably correct all 
> > >    the time, with no false positives, with no false
> > >    negatives, 100% of the time, and quickly discover and
> > >    fix bugs in that'.
> > > 
> > > It's not going to happen:
> > > 
> > >  - The correctness of stacktraces partially depends on
> > >    tooling and we don't control those.
> > 
> > What tooling are you referring to?
> > 
> > Sure, we rely on the compiler to produce the correct 
> > assembly for putting frame pointers on the stack. [...]
> 
> We also rely on all assembly code to have valid frames all 
> the time - and this is far from a given, we've had many 
> bugs in that area.

Are you talking about kernel bugs or compiler bugs?  Either way, would
those bugs not be caught by the stack unwinding validation improvements
I proposed?

> > [...]  But that's pretty straightforward. The kernel 
> > already relies on the compiler to do plenty of things 
> > which are much more complex than that.
> 
> So this claim scares me because it's such nonsense:
> 
> We rely on the compiler to create _functional code_ for us.  
> If the compiler messes up then functionality, actual code 
> breaks.
> 
> 'Valid stack frame' is not functional code, it's in essence 
> debug info.

Only because we _treat_ it like debug info.  I'm proposing that we treat
it like functional code.  So that yes, if the compiler messes up frame
pointers, actual code breaks.  (But we could detect that before we do
the patch, so it doesn't destabilize the system.)

If gcc can't do frame pointers right, it's a *major* gcc bug.  It's
nothing more than:

   push   %rbp
   mov    %rsp,%rbp

at the beginning of the function, and:

   pop    %rbp

right before the function returns.

If you really think the compiler could possibly mess that up, I can
probably write a simple script, executed by the Makefile, which
validates that every C function in the kernel has the above pattern.

> If a backtrace is wrong in some rare, racy case 
> then that won't break the kernel, it just gives slightly 
> misleading debug info in most cases.
> 
> Now you want to turn 'debug info' to have functional 
> relevance, for something as intrusive as patching the 
> kernel code.
> 
> You really need to accept this distinction!

Yes, I already realize that this would be the first time the kernel
relies on stack traces being 100% correct.  Peter and I had already some
discussion about it already elsewhere in this thread.

Just because we haven't relied on its correctness in the past doesn't
mean we can't rely on it in the future.

> > >  - More importantly, there's no strong force that ensures
> > >    we can rely on stack backtraces: correcting bad 
> > >    stack traces depends on people hitting those 
> > >    functions and situations that generate them, seeing 
> > >    a bad stack trace, noticing that it's weird and 
> > >    correcting whatever code or tooling quirk causes the 
> > >    stack entry to be incorrect.
> > >
> > > Essentially unlike other kernel code which breaks stuff 
> > > if it's incorrect, there's no _functional_ dependence 
> > > on stack traces, so live patching would be the first 
> > > (and pretty much only) thing that breaks on bad stack 
> > > traces ...
> > 
> > First, there are several things we do to avoid anomalies:
> > 
> > - we don't patch asm functions
> 
> the problem with asm functions isn't that we might want to 
> patch them (although sometimes we might want to: especially 
> the more interesting security fixes tend to be in assembly 
> code), it's that asm functions can (easily) mess up debug 
> info, without that being apparent in any functional way.

Again, that's why I proposed the stack unwinding validation
improvements.

> > - we only walk the stack of sleeping tasks
> 
> sleeping tasks are affected by debug info bugs too.
> 
> > Second, currently the stack unwinding code is rather crude and
> > doesn't do much in the way of error handling.
> 
> That's a big red flag in my book ...

I wasn't talking about my patch set.  I was talking about the existing
stack dumping code in the kernel.

-- 
Josh
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ