Re: [PATCH v3 1/3] ptrace: Provide ___ptrace_may_access() that can be applied on arbitrary tasks
From: Andrea Arcangeli
Date: Tue Sep 04 2018 - 22:38:40 EST
On Wed, Sep 05, 2018 at 01:00:37AM +0000, Schaufler, Casey wrote:
> Sorry, I've been working in security too long for my
> optimistic streak to be very wide.
Eheh. So I was simply trying to follow in context, but it wasn't
entirely clear, so I tried to take it out of context and then it was
even less clear, never mind I was only looking for some more
explanation.
> Not especially, no. I have gotten considerable feedback that
> it should be configurable, and while I may not see the value myself,
> I do respect the people who've requested the configurability.
Correct me if I'm wrong, but LSM as last word "module" implies to make
this logic modular.
My wondering is because:
1) why not just a single version of this logic in the scheduler?
(i.e. can only be on or off or perhaps a only-ibpb-dumpable tweak
to retain current slightly higher perf but less secure behavior)
2) even if you want a myriad of versions of this IBPB logic, how do
the different versions can possibly fit in a whole "module" whose
semantics have pretty much nothing to do with the other methods in
the module like LSM_HOOK_INIT(capable, cap_capable),
LSM_HOOK_INIT(vm_enough_memory, cap_vm_enough_memory), and
LSM_HOOK_INIT(mmap_addr, cap_mmap_addr), or even
LSM_HOOK_INIT(inode_follow_link, selinux_inode_follow_link),
LSM_HOOK_INIT(inode_permission, selinux_inode_permission). I mean
it looks an apple to oranges monolithic link in the same module. Or
are you going to load this method in a separate module with only a
single method implemented and then load multiple LSM modules at the
same time?
3) if you need so much tweaking that not even a single off/on switch
independent of any module loaded through LSM is not enough, how is
it ok that all the rest shouldn't be configurable? All the rest has
more performance impact than this one so it'd start from there if
something.
I understand how configurablity is valuable (this is why we kept
everything dynamic tunable at runtime, including the PTI stop machine
to allow even PTI TLB flushes to be turned off).
I'm just trying to understand how IBPB fits in a LSM module
implementation.
Even if you build with CONFIG_SECURITY=n PTI won't go away, retpoline
won't go away, the l1flush in vmenter won't go away, the
pte/transhugepmd inversion won't go away, why only the runtime
tunability or tweaking of IBPB fits in a LSM module?
> If they provide different answers there should be different
> functions. It's a question of viewpoint. If you don't care about
> the SELinux viewpoint you shouldn't have to include it in your
> checks, any more than you care about x86 issues when you're
> running on a MIPS processor.
I don't see how selinux fits into this. Selinux doesn't affect virtual
memory protection. Not having selinux even built in doesn't mean you
are ok with virtual memory protection not being provided by the CPU.
Or in other words selinux fits into this as much as seccomp or
apparmor fits into this.
This is just like a memory barrier mb() to be executed in the context
switch code. Security issues can emerge with the lack of it regardless
if selinux is built in and enabled or CONFIG_SECURITY=n.
selinux matters after an exploit already happened, this as opposed is
needed to prevent the exploit in the first place.
Also the correct fully secure version provides a single answer
(i.e. in theory assuming a perfect implementation that didn't forget
anything so having a single implementation will also increase the
chances that we get as close as possible to the theoretical correct
implementation).
If it provides different answers in this case it is because somebody
wants not perfect security to provide higher performance, i.e. the
"configurablity" which is valuable and fine feature to provide. Just a
LSM module doesn't seem the most flexibile way to provide
configurability by far.
> Yes, even security people have to worry about locking.
Yes it was some lock that if contended would lockup if used from
inside the scheduler.
> What *is* the most robust way?
The below pretty much explains it.
> Yes, there are locking issues. The code in the LSM infrastructure and in
> the security modules needs to be aware of that and deal with it. The SELinux
> code I proposed is more complex than it could be because the audit code
> requires locking that doesn't work in the switching context.
Or in other words having multiple versions of this called from within
the scheduler is a bit like making the kernel modular and then because
the locking is subtle you may then have scheduler deadlocks only
happening with some kernel module loaded instead of others, but the
real question is what is the payoff compared to just allowing the
scheduler code to be tuned with x86 debugfs or sysctl the normal
way.
Also how would a new common code method in LSM fit for CPUs that are
so slow that they can't possibly need anything like IBPB and
flush_RSB()?
Thanks!
Andrea