From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755631Ab1ISR7e (ORCPT ); Mon, 19 Sep 2011 13:59:34 -0400 Received: from mail-bw0-f46.google.com ([209.85.214.46]:54502 "EHLO mail-bw0-f46.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754840Ab1ISR7d (ORCPT ); Mon, 19 Sep 2011 13:59:33 -0400 Date: Mon, 19 Sep 2011 21:58:56 +0400 From: Vasiliy Kulikov To: Pekka Enberg Cc: Andrew Morton , kernel-hardening@lists.openwall.com, Kees Cook , Cyrill Gorcunov , Al Viro , Christoph Lameter , Matt Mackall , linux-kernel@vger.kernel.org, linux-mm@kvack.org, Dan Rosenberg , Theodore Tso , Alan Cox , Jesper Juhl , Linus Torvalds Subject: Re: [kernel-hardening] Re: [RFC PATCH 2/2] mm: restrict access to /proc/slabinfo Message-ID: <20110919175856.GA4282@albatros> References: <20110918170512.GA2351@albatros> <20110919144657.GA5928@albatros> <20110919155718.GB16272@albatros> <20110919161837.GA2232@albatros> <20110919173539.GA3751@albatros> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: User-Agent: Mutt/1.5.20 (2009-06-14) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Sep 19, 2011 at 20:51 +0300, Pekka Enberg wrote: > On Mon, Sep 19, 2011 at 8:35 PM, Vasiliy Kulikov wrote: > >> Yes, but there's no way for users to know where the allocations came from > >> if you mix them up with other kmalloc-128 call-sites. That way the number > >> of private files will stay private to the user, no? Doesn't that give you even > >> better protection against the infoleak? > > > > No, what it gives us is an obscurity, not a protection.  I'm sure it > > highly depends on the specific situation whether an attacker is able to > > identify whether the call is from e.g. ecryptfs or from VFS.  Also the > > correlation between the number in slabinfo and the real private actions > > still exists. > > How is the attacker able to identify that we kmalloc()'d from ecryptfs or > VFS based on non-root /proc/slabinfo when the slab allocator itself does > not have that sort of information if you mix up the allocations? How can you _guarantee_ that they mix? > Isn't this > much stronger protection especially if you combine that with /proc/slabinfo > restriction? I don't see any reason to change allocators if we close slabinfo. Thanks, -- Vasiliy Kulikov http://www.openwall.com - bringing security into open computing environments