lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <250234d1acd54553bf5f55972d9b05cfccb2cfab.camel@sipsolutions.net>
Date: Fri, 12 Sep 2025 09:58:49 +0200
From: Benjamin Berg <benjamin@...solutions.net>
To: Tiwei Bie <tiwei.bie@...ux.dev>
Cc: richard@....at, anton.ivanov@...bridgegreys.com,
 johannes@...solutions.net, 	arnd@...db.de, linux-um@...ts.infradead.org,
 linux-kernel@...r.kernel.org, 	tiwei.btw@...group.com
Subject: Re: [PATCH v2 04/10] um: Turn signals_* into thread-local variables

On Fri, 2025-09-12 at 08:30 +0800, Tiwei Bie wrote:
> On Thu, 11 Sep 2025 10:06:53 +0200, Benjamin Berg wrote:
> 
> > [SNIP]
> > That said, I do believe that the allocations from the libc itself are
> > problematic. A lot of the mappings from UML are there already (i.e. the
> > physical memory is mapped). However, I believe the vmalloc area for
> > example is not guarded.
> > 
> > So when pthread allocates the thread specific memory (stack, TLS, ...),
> > we really do not know where this will be mapped into the address space.
> > If it happens to be in an area that UML wants to use later, then UML
> > could map e.g. vmalloc data over it.
> > 
> > Now, it could be that (currently) the addresses picked by pthread (or
> > the host kernel) do not actually clash with anything. However, I do not
> > think there is any guarantee for that.
> 
> Indeed. The mmap from libc (pthread, shared libs, ...) can potentially
> conflict with UML. The reason it has been working on x86_64 so far might
> be that we did this in linux_main():
> 
> 	task_size = task_size & PGDIR_MASK;
> 
> The current layout is:
> 
> shared libs and pthreads are located at 7ffxxxxxxxxx
> TASK_SIZE                             = 7f8000000000
> VMALLOC_END                           = 7f7fffffe000 (which is TASK_SIZE-2*PAGE_SIZE)

Uh, right, yes. Because of the masking we are capping ourselves to
0x7f8000000000. And then all of the interesting bits (vdso, ...) happen
to be mapped above that address and are effectively protected. And,
there is also plenty of space for other allocations technically.

That is kind of horrible, as it only works because all of this happens
to be mapped into the top of the address space. But, maybe something to
just wilfully ignore and only fix as part of a nolibc port?

> However, on i386, the risk of conflicts looks much higher:
> 
> TASK_SIZE   = ffc00000
> VMALLOC_END = ffbfe000
> 
> ......
> f7c00000-f7c20000 r--p 00000000 08:01 9114                               /usr/lib32/libc.so.6
> f7c20000-f7d9e000 r-xp 00020000 08:01 9114                               /usr/lib32/libc.so.6
> f7d9e000-f7e23000 r--p 0019e000 08:01 9114                               /usr/lib32/libc.so.6
> f7e23000-f7e24000 ---p 00223000 08:01 9114                               /usr/lib32/libc.so.6
> f7e24000-f7e26000 r--p 00223000 08:01 9114                               /usr/lib32/libc.so.6
> f7e26000-f7e27000 rw-p 00225000 08:01 9114                               /usr/lib32/libc.so.6
> f7e27000-f7e31000 rw-p 00000000 00:00 0 
> f7fbe000-f7fc0000 rw-p 00000000 00:00 0 
> f7fc0000-f7fc4000 r--p 00000000 00:00 0                                  [vvar]
> f7fc4000-f7fc6000 r-xp 00000000 00:00 0                                  [vdso]
> f7fc6000-f7fc7000 r--p 00000000 08:01 9107                               /usr/lib32/ld-linux.so.2
> f7fc7000-f7fec000 r-xp 00001000 08:01 9107                               /usr/lib32/ld-linux.so.2
> f7fec000-f7ffb000 r--p 00026000 08:01 9107                               /usr/lib32/ld-linux.so.2
> f7ffb000-f7ffd000 r--p 00034000 08:01 9107                               /usr/lib32/ld-linux.so.2
> f7ffd000-f7ffe000 rw-p 00036000 08:01 9107                               /usr/lib32/ld-linux.so.2
> fffdd000-ffffe000 rw-p 00000000 00:00 0                                  [stack]
> 
> Ideally, we could completely eliminate the dependency on libc. Before that,
> perhaps we could reserve a region of address space for UML with mmap(PROT_NONE).

Yeah, that does seem reasonable. That should at least protect us from
libc using our vmalloc area. And it is easy to do, as it just needs an
initial mmap and changing the kern_unmap implementation in tlb.c

Benjamin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ