Received: by 2002:a25:c205:0:0:0:0:0 with SMTP id s5csp57743ybf; Thu, 27 Feb 2020 16:01:34 -0800 (PST) X-Google-Smtp-Source: APXvYqw909LUCUN+vCtcpsA34yx2Z4762AbhwFNpL1HrO+xqKIaT7TMZka1Df3013vCggbiAnHSP X-Received: by 2002:aca:f305:: with SMTP id r5mr1253808oih.174.1582848093940; Thu, 27 Feb 2020 16:01:33 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582848093; cv=none; d=google.com; s=arc-20160816; b=WTGTbSMPWY2hFcckmLYRhxFDsYxCTUASMZYfrrkVss3UNVm16FWlz0IX3N1HZ1SGdE NSga0yOiya1yFoyRjQ6JywUILu/8dnsekaLO+6YRzr3JN3e3xXHjwbwWpbCEtiYvgjBR LjMnD+xCohC/Bk/2INDGGrnVVSjv6csog/ZzsMIZW7Wkbz8+Z4gZRSXjdZai2jlPZXfW HoAJcAon4kunBRd71xabvcsNeNUZqQ4sPOr8RF8sqmLqzODpLAt+SRk2v3Q7QS992sX0 nRamUW4dTGotR5OIkc2ayMhpo7xmzhY2pqwZrTRznRgQNHDGyt27PRYYl08ZOOtyE1LK VMpA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=AjOtp5FR+EutG91iiiNHeLTtXSRa+F8rsDdCFbNQiKA=; b=M86Vt2l3JR/X2JSRSwU8K3H6LLQBBHgyM2Yc3qndOcAtMobk+oibOGX+76Lwk11Cyz GYL/NMaeF1oXCk5ZcIj+u6KQjBZX3w6vQQDTEtdnVJsux7jh2zLxcr7pP6pZk1RevesN 4RHDzaHqzc1yrA6fuP4Qs9N4ERBnQcUzR+eRd6bDlopjv19m+KpSA2SgTFYaRYOhGd0r fGJQepKPZmC0Ppn5qcWqAXCodGUyFtoMk91oTzdC1hhCQ7vlgNFr9PzC9NDVT6DRiepA tb+sajuBs5Y3Ss0D0XNnzAp2l6CD6lh0U8m8bWKZt1HJNF9ANs+jKvy1Vq1p+0aEvoAS tcAg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=og7wbWl6; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x84si850212oia.27.2020.02.27.16.01.21; Thu, 27 Feb 2020 16:01:33 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=og7wbWl6; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730140AbgB1ABL (ORCPT + 99 others); Thu, 27 Feb 2020 19:01:11 -0500 Received: from mail-pj1-f65.google.com ([209.85.216.65]:36824 "EHLO mail-pj1-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730031AbgB1ABL (ORCPT ); Thu, 27 Feb 2020 19:01:11 -0500 Received: by mail-pj1-f65.google.com with SMTP id gv17so488222pjb.1 for ; Thu, 27 Feb 2020 16:01:10 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=AjOtp5FR+EutG91iiiNHeLTtXSRa+F8rsDdCFbNQiKA=; b=og7wbWl6rTie1f9y+17pPNODfxhRLbqyDmNOgU3ni+5ldYJnCUnsKtnloJk0Et5Vjq JIIzeny0AtgNula80xkra5O9DFF//GYNz4kKVUZxQzcux2YO2BZl++Zo6OBw2K2+iUKK w0a3VGbl1Got9ch5YVPfo5JI2si+sbT1lhW6Q= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=AjOtp5FR+EutG91iiiNHeLTtXSRa+F8rsDdCFbNQiKA=; b=KmYKNDO1DQAjaSsLNpgHKJl78gAs5NSfD99SNQJUA7d0Kg3cQf8SYtVeMdHib6tQ/u +LuZfYe6oJSX1fqyDm85yOTyJW4Jh0OeC+qrdVwrhxdqqcTVcLHzSSnCc/cHdie8Im12 U4xQgfbtjce2l/2T7XqeGU349wLwHbzFR01Zj9DWGlpJ3O5nPMjlPdeNZ4lN0sQmUlAB d6y9lVuNZkOL0AODvGkZRMMdX0JesV50jGD+XyYzZ3WyRK0w8aVvbfRigAAJAmtFtq0O aKg5lM/0Jf1z2P43/xrApvQN1i7Zm24k0LxAbGnFHg0GG/qq/3CFHTUgYwZwC1dMAS+N snEg== X-Gm-Message-State: APjAAAUMpUhMy8GnHopnkGIgWLefSkk26aiQO9OJbXFYOt28a8/s3Fh8 5vfw8+OqylKxQ7d+G9bmosQ+Jg== X-Received: by 2002:a17:90a:ef17:: with SMTP id k23mr1496185pjz.139.1582848069749; Thu, 27 Feb 2020 16:01:09 -0800 (PST) Received: from thgarnie.kir.corp.google.com ([2620:0:1008:1100:6e62:16fa:a60c:1d24]) by smtp.gmail.com with ESMTPSA id c18sm7314476pgw.17.2020.02.27.16.01.08 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 27 Feb 2020 16:01:09 -0800 (PST) From: Thomas Garnier To: kernel-hardening@lists.openwall.com Cc: kristen@linux.intel.com, keescook@chromium.org, Herbert Xu , "David S. Miller" , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , x86@kernel.org, Andy Lutomirski , Juergen Gross , Thomas Hellstrom , "VMware, Inc." , "Rafael J. Wysocki" , Len Brown , Pavel Machek , Rasmus Villemoes , Peter Zijlstra , Thomas Garnier , Miguel Ojeda , Will Deacon , Ard Biesheuvel , Masami Hiramatsu , Jiri Slaby , Boris Ostrovsky , Josh Poimboeuf , Cao jin , Allison Randal , linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, virtualization@lists.linux-foundation.org, linux-pm@vger.kernel.org Subject: [PATCH v11 00/11] x86: PIE support to extend KASLR randomization Date: Thu, 27 Feb 2020 16:00:45 -0800 Message-Id: <20200228000105.165012-1-thgarnie@chromium.org> X-Mailer: git-send-email 2.25.1.481.gfbce0eb801-goog MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Minor changes based on feedback and rebase from v10. Splitting the previous serie in two. This part contains assembly code changes required for PIE but without any direct dependencies with the rest of the patchset. Note: Using objtool to detect non-compliant PIE relocations is not yet possible as this patchset only includes the simplest PIE changes. Additional changes are needed in kvm, xen and percpu code. Changes: - patch v11 (assembly); - Fix comments on x86/entry/64. - Remove KASLR PIE explanation on all commits. - Add note on objtool not being possible at this stage of the patchset. - patch v10 (assembly): - Swap rax for rdx on entry/64 changes based on feedback. - Addressed feedback from Borislav Petkov on boot, paravirt, alternatives and globally. - Rebased the patchset and ensure it works with large kaslr (not included). - patch v9 (assembly): - Moved to relative reference for sync_core based on feedback. - x86/crypto had multiple algorithms deleted, removed PIE changes to them. - fix typo on comment end line. - patch v8 (assembly): - Fix issues in crypto changes (thanks to Eric Biggers). - Remove unnecessary jump table change. - Change author and signoff to chromium email address. - patch v7 (assembly): - Split patchset and reorder changes. - patch v6: - Rebase on latest changes in jump tables and crypto. - Fix wording on couple commits. - Revisit checkpatch warnings. - Moving to @chromium.org. - patch v5: - Adapt new crypto modules for PIE. - Improve per-cpu commit message. - Fix xen 32-bit build error with .quad. - Remove extra code for ftrace. - patch v4: - Simplify early boot by removing global variables. - Modify the mcount location script for __mcount_loc intead of the address read in the ftrace implementation. - Edit commit description to explain better where the kernel can be located. - Streamlined the testing done on each patch proposal. Always testing hibernation, suspend, ftrace and kprobe to ensure no regressions. - patch v3: - Update on message to describe longer term PIE goal. - Minor change on ftrace if condition. - Changed code using xchgq. - patch v2: - Adapt patch to work post KPTI and compiler changes - Redo all performance testing with latest configs and compilers - Simplify mov macro on PIE (MOVABS now) - Reduce GOT footprint - patch v1: - Simplify ftrace implementation. - Use gcc mstack-protector-guard-reg=%gs with PIE when possible. - rfc v3: - Use --emit-relocs instead of -pie to reduce dynamic relocation space on mapped memory. It also simplifies the relocation process. - Move the start the module section next to the kernel. Remove the need for -mcmodel=large on modules. Extends module space from 1 to 2G maximum. - Support for XEN PVH as 32-bit relocations can be ignored with --emit-relocs. - Support for GOT relocations previously done automatically with -pie. - Remove need for dynamic PLT in modules. - Support dymamic GOT for modules. - rfc v2: - Add support for global stack cookie while compiler default to fs without mcmodel=kernel - Change patch 7 to correctly jump out of the identity mapping on kexec load preserve. These patches make some of the changes necessary to build the kernel as Position Independent Executable (PIE) on x86_64. Another patchset will add the PIE option and larger architecture changes. PIE allows the kernel to be placed below the 0xffffffff80000000 increasing the range of KASLR. The patches: - 1, 3-11: Change in assembly code to be PIE compliant. - 2: Add a new _ASM_MOVABS macro to fetch a symbol address generically. diffstat: crypto/aegis128-aesni-asm.S | 6 +- crypto/aesni-intel_asm.S | 8 +-- crypto/aesni-intel_avx-x86_64.S | 3 - crypto/camellia-aesni-avx-asm_64.S | 42 +++++++-------- crypto/camellia-aesni-avx2-asm_64.S | 44 ++++++++-------- crypto/camellia-x86_64-asm_64.S | 8 +-- crypto/cast5-avx-x86_64-asm_64.S | 50 ++++++++++-------- crypto/cast6-avx-x86_64-asm_64.S | 44 +++++++++------- crypto/des3_ede-asm_64.S | 96 ++++++++++++++++++++++++------------ crypto/ghash-clmulni-intel_asm.S | 4 - crypto/glue_helper-asm-avx.S | 4 - crypto/glue_helper-asm-avx2.S | 6 +- crypto/sha256-avx2-asm.S | 18 ++++-- entry/entry_64.S | 16 ++++-- include/asm/alternative.h | 6 +- include/asm/asm.h | 1 include/asm/bug.h | 2 include/asm/paravirt_types.h | 32 ++++++++++-- include/asm/pm-trace.h | 2 include/asm/processor.h | 6 +- kernel/acpi/wakeup_64.S | 31 ++++++----- kernel/head_64.S | 15 +++-- kernel/relocate_kernel_64.S | 2 power/hibernate_asm_64.S | 4 - 24 files changed, 268 insertions(+), 182 deletions(-) Patchset is based on next-20200227.