|
Message-ID: <20181214020942.GC10056@cisco> Date: Thu, 13 Dec 2018 19:09:42 -0700 From: Tycho Andersen <tycho@...ho.ws> To: Julian Stecklina <jsteckli@...zon.de> Cc: kernel-hardening@...ts.openwall.com, Liran Alon <liran.alon@...cle.com>, Jonathan Adams <jwadams@...gle.com>, David Woodhouse <dwmw2@...radead.org>, Igor Stoppa <igor.stoppa@...il.com> Subject: Re: [RFC PATCH 0/6] Process-local memory allocations On Thu, Dec 13, 2018 at 03:28:15PM +0100, Julian Stecklina wrote: > Tycho, > > sorry for the late response, I just returned from vacation. > > Tycho Andersen <tycho@...ho.ws> writes: > > > On Tue, Nov 20, 2018 at 03:07:59PM +0100, Julian Stecklina wrote: > >> In a world with processor information leak vulnerabilities, having a treasure > >> trove of information available for leaking in the global kernel address space > >> is > >> starting to be a liability. The biggest offender is the linear mapping of all > >> physical memory and there are already efforts (XPFO) to start addressing this. > >> In this patch series, I'd like to propose breaking up the kernel address space > >> further and introduce process-local mappings in the kernel. > >> > >> The rationale is that there are allocations in the kernel containing data that > >> should only be accessible when the kernel is executing in the context of a > >> specific process. A prime example is KVM vCPU state. This patch series > >> introduces process-local memory in the kernel address space by claiming a PGD > >> entry for this specific purpose. Then it converts KVM on x86 to use these new > >> primitives to store GPR and FPU registers of vCPUs. KVM is a good testing > >> ground, because it makes sure userspace can only interact with a VM from a > >> single process. > [...] > > This seems similar in spirit to prmem: > > https://lore.kernel.org/lkml/20181023213504.28905-2-igor.stoppa@huawei.com/T/#u > > It's similar in the sense that it adds a new way to allocate memory with > interesting properties. In that sense, it would be useful to have a > common allocation function. > > As far as usage is concerned, prmem and the process local memory is very > different. From a quick glance at the prmem patchset, I see that it > works for statically allocated memory. Process-local memory is by > definition bound to the lifetime of a process (or address space to be > more precise) and thus cannot be statically allocated. It's breaking up > the global address space of the kernel and starts binding some > allocations in the kernel to specific processes. > > My goal is specifically L1TF mitigation and preventing random parts of > the kernel from prefetching user data, but this approach is equally > effective for ordinary info leak vulnerabilities. > > > Basically, we have some special memory that we want to leave unmapped > > (read only) most of the time, but map it (writable) sometimes. I > > Unmapped should really be unmapped, i.e. not present in the page table. > Having it read-only defeats the purpose. Yeah, sorry about the crappy notation, the parens were supposed to indicate the prmem bits, and the non-parens were this patch's bits. > > wonder if we should merge the APIs in to one > > > > spmemalloc(size, flags, PRLOCAL) > > > > type thing? Could we share some infrastructure then? (I also didn't > > follow what happened to the patches Nadav was going to send that might > > replace prmem somehow.) > > When writing the patch series, I had the feeling that the whole > bookkeeping of what is allocated where is something that could be > abstracted and re-used. Maybe there is already such an abstraction layer > in the kernel and I just didn't find it. Yeah, page_ext isn't a good fit, since you don't want to keep track of this metadata for most pages, just ones that have this special property. Hence the comparison to prmem, that series also wants to track special properties of some subset of pages. Tycho
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.