[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20180220213604.GD3728@rh>
Date: Wed, 21 Feb 2018 08:36:04 +1100
From: Dave Chinner <dchinner@...hat.com>
To: Igor Stoppa <igor.stoppa@...wei.com>
Cc: Kees Cook <keescook@...omium.org>,
Matthew Wilcox <willy@...radead.org>,
Randy Dunlap <rdunlap@...radead.org>,
Jonathan Corbet <corbet@....net>,
Michal Hocko <mhocko@...nel.org>,
Laura Abbott <labbott@...hat.com>,
Jerome Glisse <jglisse@...hat.com>,
Christoph Hellwig <hch@...radead.org>,
Christoph Lameter <cl@...ux.com>,
linux-security-module <linux-security-module@...r.kernel.org>,
Linux-MM <linux-mm@...ck.org>,
LKML <linux-kernel@...r.kernel.org>,
Kernel Hardening <kernel-hardening@...ts.openwall.com>
Subject: Re: [RFC PATCH v16 0/6] mm: security: ro protection for dynamic data
On Tue, Feb 20, 2018 at 08:03:49PM +0200, Igor Stoppa wrote:
>
>
> On 20/02/18 03:21, Dave Chinner wrote:
> > On Mon, Feb 12, 2018 at 03:32:36PM -0800, Kees Cook wrote:
> >> On Mon, Feb 12, 2018 at 8:52 AM, Igor Stoppa <igor.stoppa@...wei.com> wrote:
> >>> This patch-set introduces the possibility of protecting memory that has
> >>> been allocated dynamically.
> >>>
> >>> The memory is managed in pools: when a memory pool is turned into R/O,
> >>> all the memory that is part of it, will become R/O.
> >>>
> >>> A R/O pool can be destroyed, to recover its memory, but it cannot be
> >>> turned back into R/W mode.
> >>>
> >>> This is intentional. This feature is meant for data that doesn't need
> >>> further modifications after initialization.
> >>
> >> This series came up in discussions with Dave Chinner (and Matthew
> >> Wilcox, already part of the discussion, and others) at LCA. I wonder
> >> if XFS would make a good initial user of this, as it could allocate
> >> all the function pointers and other const information about a
> >> superblock in pmalloc(), keeping it separate from the R/W portions?
> >> Could other filesystems do similar things?
> >
> > I wasn't cc'd on this patchset, (please use david@...morbit.com for
> > future postings)
>
> Apologies, somehow I didn't realize that I should have put you too in
> CC. It will be fixed at the next iteration.
No worries, If you weren't at LCA, you wouldn't have known :P
> > so I can't really say anything about it right
> > now. My interest for XFS was that we have a fair amount of static
> > data in XFS that we set up at mount time and it never gets modified
> > after that.
>
> This is the typical use case I had in mind, although it requires a
> conversion.
> Ex:
>
> before:
>
> static int a;
>
>
> void set_a(void)
> {
> a = 4;
> }
>
>
>
> after:
>
> static int *a __ro_after_init;
> struct gen_pool *pool;
>
> void init_a(void)
> {
> pool = pmalloc_create_pool("pool", 0);
> a = (int *)pmalloc(pool, sizeof(int), GFP_KERNEL);
> }
>
> void set_a(void)
> {
> *a = 4;
> pmalloc_protect_pool(pool);
> }
Yeah, that's kinda what I figured. I'm guessing that I treat a pool
just like a normal heap allocation, but then when all the objects I
need to allocate are fully initialised, then I write protect the
pool? i.e. the API isn't using an object-based protection scope?
FWIW, I'm not wanting to use it to replace static variables. All the
structures are dynamically allocated right now, and get assigned to
other dynamically allocated pointers. I'd likely split the current
structures into a "ro after init" structure and rw structure, so
how does the "__ro_after_init" attribute work in that case? Is it
something like this?
struct xfs_mount {
struct xfs_mount_ro{
.......
} *ro __ro_after_init;
......
Also, what compile time checks are in place to catch writes to
ro structure members? Is sparse going to be able to check this sort
of thing, like is does with endian-specific variables?
> I'd be interested to have your review of the pmalloc API, if you think
> something is missing, once I send out the next revision.
I'll look at it in more depth when it comes past again. :P
Cheers,
Dave.
--
Dave Chinner
dchinner@...hat.com
Powered by blists - more mailing lists