Received: by 2002:a17:90a:1609:0:0:0:0 with SMTP id n9csp2091112pja; Thu, 26 Mar 2020 09:33:19 -0700 (PDT) X-Google-Smtp-Source: ADFU+vtlgeYmurwGCBiDX0/gWup6pSYo4QomF6AxYOXRmVCKn7WBfqJQnn/I/HhEtC+kn15spV86 X-Received: by 2002:a9d:7617:: with SMTP id k23mr6531984otl.329.1585240398911; Thu, 26 Mar 2020 09:33:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585240398; cv=none; d=google.com; s=arc-20160816; b=08spVLQQskXW14/CA10ygBe6RXVm8L4mTDzo7RVi1F9mdfcdxTJVdG7FWEq11BR70R ArcThVBerHl8IR7Ofpw8BqEzipYguvdHpra4rMhOaBJP9M3DmAhZ4WChCrDgIqb/9bdJ BjX3SVVx2yixbLMbt7ThmEATXNIRI7QdQG7VPfFnCBveOpzxcdDrOWtfqSxEYCdh6jqH +V9RtDdHrm0pTpnsgDavbcfV7Q0C9Ow9nfIgcVuWXMSOhfZ93ACYMYmf0J7Fh6SjCMnC 7IoyxVe5kmafqqtp0XJS7rctfiRX/dW2JKmPWRMIEG5d3mMMFkv3UnFWKnpM6pBbqJvu Y3CQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=ZDF6On+HDyMfQFFmOzj2HQxDo1MqPfrIkTej+3BhvlQ=; b=CAXKIZSVahUJJy5JvYdqHDcVX04rFTP40WHcspRRbU9kMnnIEGzfIv1YBD1wct+BOC AylSNzOWhjZKPGGXa89TeoRYyJBbsq06LGpHtm0gvX4nmWFDvyXA7ubVxR28He3c66y4 c9Sk6cMwJ1sw2OQWW+fvSmPX97p2SWUSQ8V6JaUxmTNNExu3/rfrWklBcTh3LoDvSsud UQtbAHc2YxH9o71rcWFxK9J9qTSKGOXzBlM9mxjOfROyLp2nTbuvOnZ0QUYLj51hR92k YwEIv3hlpFpYW0CsDmpo0EW6NawS2fDnYQCbqivxDZjX8QveyEoG577ka0ew65HhtRZS t0pg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=fMaF0p1e; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f136si1306318oig.9.2020.03.26.09.32.52; Thu, 26 Mar 2020 09:33:18 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=fMaF0p1e; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728177AbgCZQbf (ORCPT + 99 others); Thu, 26 Mar 2020 12:31:35 -0400 Received: from mail-pj1-f67.google.com ([209.85.216.67]:40812 "EHLO mail-pj1-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727912AbgCZQbf (ORCPT ); Thu, 26 Mar 2020 12:31:35 -0400 Received: by mail-pj1-f67.google.com with SMTP id kx8so2616124pjb.5 for ; Thu, 26 Mar 2020 09:31:35 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=ZDF6On+HDyMfQFFmOzj2HQxDo1MqPfrIkTej+3BhvlQ=; b=fMaF0p1e3sw4WUqlnz+78vbRi0z7dyl2McMHXTD+sd1/6njnlDhaPruhcC8Rm/PONY h/KIZx8kfstf2SInDgM8Ia8ACWComL6cz15SRdgw2ZqSeVFDj6jKGl1qdbKgSajR39p6 OWi/cobumFsmvp3qDjKwP7CpsIHjb95Q2VwBQ= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=ZDF6On+HDyMfQFFmOzj2HQxDo1MqPfrIkTej+3BhvlQ=; b=M2SAPDb84aVDLTL9BizdPUN7eoYOGDsZlKMl1Q0qDCzq6kkxxUfveRoRqQwivxl0c3 N4tbrq4BMhnHhnLUnNFYzTbHUKMye3AQWOLieqmzK7ghD/qSy3BvXo28QUgGaEd4GBpB yTE2FBlMSU2SAnFwSPoZxNtttm5OPQ1d2ZNVHRjqz/rJ8K3bGtAtZFWiW7rSxc0aAFKZ jlRZQSDLqsTaTz0VAI+sWaYADrR+I8fEDQ/x7/agQnOC7By4TZURH62/keb8hrOFM+2c DgYzB/sB19HmZi9Us/ShWAFSioOKF33Ev2VCVd7U1LO2p5vGia8dLVnHdKHeqJ3f/7Av HQjA== X-Gm-Message-State: ANhLgQ27gh2dlAtra+UDvqpY1oauYId/lavth9VnYRWtpbaCg86pRsuL 7+vtNTc3WY2D375vqaBc8N1kfw== X-Received: by 2002:a17:90a:2541:: with SMTP id j59mr883153pje.128.1585240294536; Thu, 26 Mar 2020 09:31:34 -0700 (PDT) Received: from www.outflux.net (smtp.outflux.net. [198.145.64.163]) by smtp.gmail.com with ESMTPSA id t60sm2044703pjb.9.2020.03.26.09.31.33 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 26 Mar 2020 09:31:33 -0700 (PDT) Date: Thu, 26 Mar 2020 09:31:32 -0700 From: Kees Cook To: Mark Rutland Cc: Thomas Gleixner , Elena Reshetova , x86@kernel.org, Andy Lutomirski , Peter Zijlstra , Catalin Marinas , Will Deacon , Alexander Potapenko , Ard Biesheuvel , Jann Horn , "Perla, Enrico" , kernel-hardening@lists.openwall.com, linux-arm-kernel@lists.infradead.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v2 5/5] arm64: entry: Enable random_kstack_offset support Message-ID: <202003260926.83BC44B@keescook> References: <20200324203231.64324-1-keescook@chromium.org> <20200324203231.64324-6-keescook@chromium.org> <20200325132127.GB12236@lakrids.cambridge.arm.com> <202003251319.AECA788D63@keescook> <20200326111521.GA72909@C02TD0UTHF1T.local> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200326111521.GA72909@C02TD0UTHF1T.local> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Mar 26, 2020 at 11:15:21AM +0000, Mark Rutland wrote: > On Wed, Mar 25, 2020 at 01:22:07PM -0700, Kees Cook wrote: > > On Wed, Mar 25, 2020 at 01:21:27PM +0000, Mark Rutland wrote: > > > On Tue, Mar 24, 2020 at 01:32:31PM -0700, Kees Cook wrote: > > > > Allow for a randomized stack offset on a per-syscall basis, with roughly > > > > 5 bits of entropy. > > > > > > > > Signed-off-by: Kees Cook > > > > > > Just to check, do you have an idea of the impact on arm64? Patch 3 had > > > figures for x86 where it reads the TSC, and it's unclear to me how > > > get_random_int() compares to that. > > > > I didn't do a measurement on arm64 since I don't have a good bare-metal > > test environment. I know Andy Lutomirki has plans for making > > get_random_get() as fast as possible, so that's why I used it here. > > Ok. I suspect I also won't get the chance to test that in the next few > days, but if I do I'll try to share the results. Okay, thanks! I can try a rough estimate under emulation, but I assume that'll be mostly useless. :) > My concern here was that, get_random_int() has to grab a spinlock and > mess with IRQ masking, so has the potential to block for much longer, > but that might not be an issue in practice, and I don't think that > should block these patches. Gotcha. I was already surprised by how "heavy" the per-cpu access was when I looked at the resulting assembly (there looked to be preempt stuff, etc). But my hope was that this is configurable so people can measure for themselves if they want it, and most people who want this feature have a high tolerance for performance trade-offs. ;) > > I couldn't figure out if there was a comparable instruction like rdtsc > > in aarch64 (it seems there's a cycle counter, but I found nothing in > > the kernel that seemed to actually use it)? > > AArch64 doesn't have a direct equivalent. The generic counter > (CNTxCT_EL0) is the closest thing, but its nominal frequency is > typically much lower than the nominal CPU clock frequency (unlike TSC > where they're the same). The cycle counter (PMCCNTR_EL0) is part of the > PMU, and can't be relied on in the same way (e.g. as perf reprograms it > to generate overflow events, and it can stop for things like WFI/WFE). Okay, cool; thanks for the details! It's always nice to confirm I didn't miss some glaringly obvious solution. ;) For a potential v2, should I add your reviewed-by or wait for your timing analysis, etc? -- Kees Cook