[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20180327235852.GL1436@brightrain.aerifal.cx>
Date: Tue, 27 Mar 2018 19:58:52 -0400
From: Rich Felker <dalias@...c.org>
To: "Theodore Y. Ts'o" <tytso@....edu>,
Ilya Smith <blackzert@...il.com>,
Michal Hocko <mhocko@...nel.org>,
Matthew Wilcox <willy@...radead.org>, rth@...ddle.net,
ink@...assic.park.msu.ru, mattst88@...il.com, vgupta@...opsys.com,
linux@...linux.org.uk, tony.luck@...el.com, fenghua.yu@...el.com,
ralf@...ux-mips.org, jejb@...isc-linux.org,
Helge Deller <deller@....de>, benh@...nel.crashing.org,
paulus@...ba.org, mpe@...erman.id.au, schwidefsky@...ibm.com,
heiko.carstens@...ibm.com, ysato@...rs.sourceforge.jp,
davem@...emloft.net, tglx@...utronix.de, mingo@...hat.com,
hpa@...or.com, x86@...nel.org, nyc@...omorphy.com,
viro@...iv.linux.org.uk, arnd@...db.de, gregkh@...uxfoundation.org,
deepa.kernel@...il.com, Hugh Dickins <hughd@...gle.com>,
kstewart@...uxfoundation.org, pombredanne@...b.com,
Andrew Morton <akpm@...ux-foundation.org>,
steve.capper@....com, punit.agrawal@....com,
aneesh.kumar@...ux.vnet.ibm.com, npiggin@...il.com,
Kees Cook <keescook@...omium.org>, bhsharma@...hat.com,
riel@...hat.com, nitin.m.gupta@...cle.com,
"Kirill A. Shutemov" <kirill.shutemov@...ux.intel.com>,
Dan Williams <dan.j.williams@...el.com>,
Jan Kara <jack@...e.cz>, ross.zwisler@...ux.intel.com,
Jerome Glisse <jglisse@...hat.com>,
Andrea Arcangeli <aarcange@...hat.com>,
Oleg Nesterov <oleg@...hat.com>, linux-alpha@...r.kernel.org,
LKML <linux-kernel@...r.kernel.org>,
linux-snps-arc@...ts.infradead.org, linux-ia64@...r.kernel.org,
linux-metag@...r.kernel.org, linux-mips@...ux-mips.org,
linux-parisc@...r.kernel.org, linuxppc-dev@...ts.ozlabs.org,
linux-s390@...r.kernel.org, linux-sh@...r.kernel.org,
sparclinux@...r.kernel.org, Linux-MM <linux-mm@...ck.org>
Subject: Re: [RFC PATCH v2 0/2] Randomization of address chosen by mmap.
On Tue, Mar 27, 2018 at 06:16:35PM -0400, Theodore Y. Ts'o wrote:
> On Tue, Mar 27, 2018 at 04:51:08PM +0300, Ilya Smith wrote:
> > > /dev/[u]random is not sufficient?
> >
> > Using /dev/[u]random makes 3 syscalls - open, read, close. This is a performance
> > issue.
>
> You may want to take a look at the getrandom(2) system call, which is
> the recommended way getting secure random numbers from the kernel.
Yes, while opening /dev/urandom is not acceptable due to needing an
fd, getrandom and existing fallbacks for it have this covered if
needed.
> > > Well, I am pretty sure userspace can implement proper free ranges
> > > tracking…
> >
> > I think we need to know what libc developers will say on implementing ASLR in
> > user-mode. I am pretty sure they will say ‘nether’ or ‘some-day’. And problem
> > of ASLR will stay forever.
>
> Why can't you send patches to the libc developers?
I can tell you right now that any patch submitted for musl that
depended on trying to duplicate knowledge of the entire virtual
address space layout in userspace as part of mmap would be rejected,
and I would recommend glibc do the same.
Not only does it vastly increase complexity; it also has all sorts of
failure modes (fd exhastion, etc.) which would either introduce new
and unwanted ways for mmap to fail, or would force fallback to the
normal (no extra randomization) strategy under conditions an attacker
could potentially control, defeating the whole purpose. It would also
potentially make it easier for an attacker to examine the vm layout
for attacks, since it would be recorded in userspace.
There's also the issue of preserving AS-safety of mmap. POSIX does not
actually require mmap to be AS-safe, and on musl munmap is not fully
AS-safe anyway because of some obscure issues it compensates for, but
we may be able to make it AS-safe (this is a low-priority open issue).
If mmap were manipulating data structures representing the vm space in
userspace, though, the only way to make it anywhere near AS-safe would
be to block all signals and take a lock every time mmap or munmap is
called. This would significantly increase the cost of each call,
especially now that meltdown/spectre mitigations have greatly
increased the overhead of each syscall.
Overall, asking userspace to take a lead role in management of process
vm space is a radical change in the split of what user and kernel are
responsible for, and it really does not make sense as part of a
dubious hardening measure. Something this big would need to be really
well-motivated.
Rich
Powered by blists - more mailing lists