[PATCH v2 0/5] split ET_DYN ASLR from mmap ASLR
Ingo Molnar
mingo at kernel.org
Tue Mar 3 20:20:45 PST 2015
* Kees Cook <keescook at chromium.org> wrote:
> On Mon, Mar 2, 2015 at 11:31 PM, Ingo Molnar <mingo at kernel.org> wrote:
> >
> > * Kees Cook <keescook at chromium.org> wrote:
> >
> >> To address the "offset2lib" ASLR weakness[1], this separates ET_DYN
> >> ASLR from mmap ASLR, as already done on s390. The architectures
> >> that are already randomizing mmap (arm, arm64, mips, powerpc, s390,
> >> and x86), have their various forms of arch_mmap_rnd() made available
> >> via the new CONFIG_ARCH_HAS_ELF_RANDOMIZE. For these architectures,
> >> arch_randomize_brk() is collapsed as well.
> >>
> >> This is an alternative to the solutions in:
> >> https://lkml.org/lkml/2015/2/23/442
> >
> > Looks good so far:
> >
> > Reviewed-by: Ingo Molnar <mingo at kernel.org>
> >
> > While reviewing this series I also noticed that the following code
> > could be factored out from architecture mmap code as well:
> >
> > - arch_pick_mmap_layout() uses very similar patterns across the
> > platforms, with only few variations. Many architectures use
> > the same duplicated mmap_is_legacy() helper as well. There's
> > usually just trivial differences between mmap_legacy_base()
> > approaches as well.
>
> I was nervous to start refactoring this code, but it's true: most of
> it is the same.
Well, it still needs to be done if we want to add new randomization
features: code fractured over multiple architectures is a receipe for
bugs, as this series demonstrates. So it first has to be made more
maintainable.
> > - arch_mmap_rnd(): the PF_RANDOMIZE checks are needlessly
> > exposed to the arch routine - the arch routine should only
> > concentrate on arch details, not generic flags like
> > PF_RANDOMIZE.
>
> Yeah, excellent point. I will send a follow-up patch to move this
> into binfmt_elf instead. I'd like to avoid removing it in any of the
> other patches since each was attempting a single step in the
> refactoring.
Finegrained patches are ideal!
> > In theory the mmap layout could be fully parametrized as well:
> > i.e. no callback functions to architectures by default at all:
> > just declarations of bits of randomization desired (or, available
> > address space bits), and perhaps an arch helper to allow 32-bit
> > vs. 64-bit address space distinctions.
>
> Yeah, I was considering that too, since each architecture has a
> nearly identical arch_mmap_rnd() at this point. Only the size of the
> entropy was changing.
>
> > 'Weird' architectures could provide special routines, but only by
> > overriding the default behavior, which should be generic, safe and
> > robust.
>
> Yeah, quite true. Should entropy size be a #define like
> ELF_ET_DYN_BASE? Something like ASLR_MMAP_ENTROPY and
> ASLR_MMAP_ENTROPY_32? [...]
That would work I suspect.
> [...] Is there a common function for determining a compat task? That
> seemed to be per-arch too. Maybe arch_mmap_entropy()?
Compat flags are a bit of a mess, and since they often tie into arch
low level assembly code, they are hard to untangle. So maybe as an
intermediate step add an is_compat() generic method, and make that
obvious and self-defined function a per arch thing?
But I'm just handwaving here - I suspect it has to be tried to see all
the complications and to determine whether that's the best structure
and whether it's a win ... Only one thing is certain: the current code
is not compact and reviewable enough, and VM bits hiding in
arch/*/mm/mmap.c tends to reduce net attention paid to these details.
Thanks,
Ingo
More information about the linux-arm-kernel
mailing list