From: Russell King - ARM Linux <linux@armlinux.org.uk>
To: Kees Cook <keescook@chromium.org>
Cc: "Mark Rutland" <mark.rutland@arm.com>,
"Stephen Bates" <stephen.bates@pmcs.com>,
"linux-s390@vger.kernel.org" <linux-s390@vger.kernel.org>,
"Arnd Bergmann" <arnd@arndb.de>,
"kernel-hardening@lists.openwall.com"
<kernel-hardening@lists.openwall.com>,
"Linux API" <linux-api@vger.kernel.org>,
"Will Deacon" <will.deacon@arm.com>,
LKML <linux-kernel@vger.kernel.org>,
"Andy Lutomirski" <luto@amacapital.net>,
"Dave Hansen" <dave.hansen@intel.com>,
"Jeff Moyer" <jmoyer@redhat.com>,
"René Nyffenegger" <mail@renenyffenegger.ch>,
"Milosz Tanski" <milosz@adfin.com>,
"Thomas Garnier" <thgarnie@google.com>,
"linux-arm-kernel@lists.infradead.org"
<linux-arm-kernel@lists.infradead.org>
Subject: [kernel-hardening] Re: [RFC] syscalls: Restore address limit after a syscall
Date: Fri, 10 Feb 2017 21:49:54 +0000 [thread overview]
Message-ID: <20170210214954.GO27312@n2100.armlinux.org.uk> (raw)
In-Reply-To: <CAGXu5jJf5z5f0O=T4awfF98OR7+kaQaFFJu3kXXa402vq-Mj2Q@mail.gmail.com>
On Fri, Feb 10, 2017 at 12:49:34PM -0800, Kees Cook wrote:
> On Fri, Feb 10, 2017 at 11:22 AM, Russell King - ARM Linux
> <linux@armlinux.org.uk> wrote:
> > On Thu, Feb 09, 2017 at 06:42:34PM -0800, Andy Lutomirski wrote:
> >> On Thu, Feb 9, 2017 at 3:41 PM, Thomas Garnier <thgarnie@google.com> wrote:
> >> > So by default it is in the wrapper. If selected, an architecture can
> >> > disable the wrapper put it in the best places. Understood correctly?
> >>
> >> Sounds good to me.
> >>
> >> Presumably the result should go through -mm. Want to cc: akpm and
> >> linux-arch@ on the next version?
> >>
> >> I've also cc'd arm and s390 folks -- those are the other arches that
> >> try to be on top of hardening.
> >
> > The best place for this on ARM is in the assembly code, rather than in
> > the hundreds of system calls - having it in one place is surely better
> > for reducing the cache impact.
> >
> > This (untested) patch should be sufficient for ARM - there's two choices
> > which I think make sense to do this:
> > 1. Immediately after returning the syscall
> > 2. Immediately before any returning to userspace
> >
> > (1) has the advantage that the address limit will be forced for the
> > exit-path works that we do, preventing those making accesses to kernel
> > space.
> >
> > (2) has the advantage that we'd guarantee that the address limit will
> > be forced while userspace is running for the next entry into kernel
> > space.
> >
> > There's actually a third option as well:
> >
> > (3) forcing the address limit on entry to the kernel from userspace.
> >
> > This patch implements option 1.
> >
> > arch/arm/kernel/entry-common.S | 6 ++++++
> > 1 files changed, 6 insertions(+)
> >
> > diff --git a/arch/arm/kernel/entry-common.S b/arch/arm/kernel/entry-common.S
> > index eb5cd77bf1d8..6a717a2ccb88 100644
> > --- a/arch/arm/kernel/entry-common.S
> > +++ b/arch/arm/kernel/entry-common.S
> > @@ -39,6 +39,8 @@
> > ret_fast_syscall:
> > UNWIND(.fnstart )
> > UNWIND(.cantunwind )
> > + mov r1, #TASK_SIZE
> > + str r1, [tsk, #TI_ADDR_LIMIT]
> > disable_irq_notrace @ disable interrupts
> > ldr r1, [tsk, #TI_FLAGS] @ re-check for syscall tracing
> > tst r1, #_TIF_SYSCALL_WORK | _TIF_WORK_MASK
> > @@ -64,6 +66,8 @@ ENDPROC(ret_fast_syscall)
> > ret_fast_syscall:
> > UNWIND(.fnstart )
> > UNWIND(.cantunwind )
> > + mov r1, #TASK_SIZE
> > + str r1, [tsk, #TI_ADDR_LIMIT]
> > str r0, [sp, #S_R0 + S_OFF]! @ save returned r0
> > disable_irq_notrace @ disable interrupts
> > ldr r1, [tsk, #TI_FLAGS] @ re-check for syscall tracing
> > @@ -262,6 +266,8 @@ ENDPROC(vector_swi)
> > b ret_slow_syscall
> >
> > __sys_trace_return:
> > + mov r1, #TASK_SIZE
> > + str r1, [tsk, #TI_ADDR_LIMIT]
> > str r0, [sp, #S_R0 + S_OFF]! @ save returned r0
> > mov r0, sp
> > bl syscall_trace_exit
> >
>
> That looks pretty great! If I'm reading the macros correctly, this'll
> only happen on _actual_ syscall exit, right? So all the crazy OABI
> stuff won't suddenly break? e.g.:
Correct.
> Is there a similarly good place to do this for arm64?
I'd imagine similar places exist in arm64:
ret_fast_syscall
ret_to_user
maybe?
--
RMK's Patch system: http://www.armlinux.org.uk/developer/patches/
FTTC broadband for 0.8mile line: currently at 9.6Mbps down 400kbps up
according to speedtest.net.
prev parent reply other threads:[~2017-02-10 21:49 UTC|newest]
Thread overview: 4+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <20170209183358.103094-1-thgarnie@google.com>
[not found] ` <CAGXu5j+hyXxpyU1R+BeL9RwPhT6HSNE0c_b7MP_V0rYSAepYFw@mail.gmail.com>
[not found] ` <CALCETrWrbDnka=aqzQ5+7WN2N6RwFsQb7smcnjQMsjov+y=dTQ@mail.gmail.com>
[not found] ` <CAJcbSZHv7w5jYQ2AZ-g4Kc0mX0jRRbHCKwFKx1EFuOAby1yxXA@mail.gmail.com>
2017-02-10 2:42 ` [kernel-hardening] Re: [RFC] syscalls: Restore address limit after a syscall Andy Lutomirski
2017-02-10 19:22 ` Russell King - ARM Linux
2017-02-10 20:49 ` Kees Cook
2017-02-10 21:49 ` Russell King - ARM Linux [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20170210214954.GO27312@n2100.armlinux.org.uk \
--to=linux@armlinux.org.uk \
--cc=arnd@arndb.de \
--cc=dave.hansen@intel.com \
--cc=jmoyer@redhat.com \
--cc=keescook@chromium.org \
--cc=kernel-hardening@lists.openwall.com \
--cc=linux-api@vger.kernel.org \
--cc=linux-arm-kernel@lists.infradead.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-s390@vger.kernel.org \
--cc=luto@amacapital.net \
--cc=mail@renenyffenegger.ch \
--cc=mark.rutland@arm.com \
--cc=milosz@adfin.com \
--cc=stephen.bates@pmcs.com \
--cc=thgarnie@google.com \
--cc=will.deacon@arm.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox