[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20150924094956.GA30349@gmail.com>
Date: Thu, 24 Sep 2015 11:49:56 +0200
From: Ingo Molnar <mingo@...nel.org>
To: Dave Hansen <dave@...1.net>
Cc: x86@...nel.org, linux-kernel@...r.kernel.org, linux-mm@...ck.org,
Linus Torvalds <torvalds@...ux-foundation.org>,
Andrew Morton <akpm@...ux-foundation.org>,
Peter Zijlstra <a.p.zijlstra@...llo.nl>,
Andy Lutomirski <luto@...nel.org>,
Borislav Petkov <bp@...en8.de>, Kees Cook <keescook@...gle.com>
Subject: Re: [PATCH 26/26] x86, pkeys: Documentation
* Dave Hansen <dave@...1.net> wrote:
> > Another question, related to enumeration as well: I'm wondering whether
> > there's any way for the kernel to allocate a bit or two for its own purposes -
> > such as protecting crypto keys? Or is the facility fundamentally intended for
> > user-space use only?
>
> No, that's not possible with the current setup.
Ok, then another question, have you considered the following usecase:
AFAICS pkeys only affect data loads and stores. Instruction fetches are notably
absent from the documentation. Can you clarify that instructions can be fetched
and executed from PTE_READ but pkeys-all-access-disabled pags?
If yes then this could be a significant security feature / usecase for pkeys:
executable sections of shared libraries and binaries could be mapped with pkey
access disabled. If I read the Intel documentation correctly then that should be
possible.
The advantage of doing that is that an existing attack method to circumvent ASLR
(or to scout out an unknown binary) is to use an existing (user-space) information
leak to read the address space of a server process - and to use that to figure out
the actual code present at that address.
The code signature can then be be used to identify the precise layout of the
binary, and/or to create ROP gadgets - to escallate permissions using an otherwise
not exploitable buffer overflow.
I.e. AFAICS pkeys could be used to create true '--x' permissions for executable
(user-space) pages.
But I might be reading it wrong ...
Thanks,
Ingo
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists