Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp749931ybz; Wed, 15 Apr 2020 18:08:00 -0700 (PDT) X-Google-Smtp-Source: APiQypJGNDUzf/rYUp1gbV53DhZKUyDpoG/ipTKm9xV1kcMTcp+lbvF3AGhQKUlHCCT87ga72oLU X-Received: by 2002:aa7:d718:: with SMTP id t24mr5381070edq.29.1586999280730; Wed, 15 Apr 2020 18:08:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1586999280; cv=none; d=google.com; s=arc-20160816; b=pgrTOYyRSxfM9+KN2PVmG/TIi38ynH6ECVnAANSjX0XhTW6LQx5E6m3OEh5IsPtdeT 9U6GccrhLUJFNFNUXRMve+rhpkY3LkjzR7OxjIQo3kNiKxOUlT3HxyboM/s0qwIcjWHR 5RSjhfL82UVE2Butu/8WD0KnAuoJIVOLWZP4T8quLzC2ho/3dJbIrLua7Y6y0+1ByxSZ qQNiVWlJTS5CXc24HwdbhR7IwZo4dYqH0TAwnxOUqz3DQ+RpKA/wRc/278yh17y6uiCu W3d+xMK+y/+q3zlapXa1CYWH/rXZqHXeEsQ2iu0I5gf1dvHwniIqJZgSFi3J172aISGC rLnw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:ironport-sdr:ironport-sdr; bh=QK1101yQecyYIwHPzo5TwQgJlYeZMWMW6Ypt4zv8Vzc=; b=lsEtE5xcQUsBz12kqipIZaDFMaJMXxxUPs0U9ShPR0pdZSluGveR73YKlGpKxGhPpd TSjONLqMlVee5bwqqeYsvsMvd/XdG6tNdw+7AKE9ipsmLtfXICF3I7768XUGDL3fsgKU beoFUWmvLdoZCsEWzE8XZWgc95GTTLbBzeo3hCPNfnPZ3NzWWIK8+8FqGOHwMmS9oX5a KGoCAIDdOQLKmmG0fIG492S9aFLeZ9CGAuHJQJ53ixEwlx0jZ7uNAvnKe5u6tytSJXCW HhdcXXgIrxY/WkAW+5LbnACJytD4c+GoCEZ7oiiuc7SNAkR3M59bbq42VNIkF58UybLM 4Glw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b1si11854397edh.318.2020.04.15.18.07.36; Wed, 15 Apr 2020 18:08:00 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2438815AbgDOVFK (ORCPT + 99 others); Wed, 15 Apr 2020 17:05:10 -0400 Received: from mga09.intel.com ([134.134.136.24]:27158 "EHLO mga09.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2438334AbgDOVFG (ORCPT ); Wed, 15 Apr 2020 17:05:06 -0400 IronPort-SDR: deevrgteYAPjfH63bfZnHwVCXdNHWMZstAM4qOVEtbB5FJ5JrJ/bfbstiPWIGnC1qHjxKxqV8p BMbL8KdpZVwg== X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga006.fm.intel.com ([10.253.24.20]) by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 15 Apr 2020 14:05:04 -0700 IronPort-SDR: R2bCasboqisfPPyuMLstwXFjoi0ukgJ86YMGSjrgOBFfwRqhItm+VLhEWOM3HRwgUH6pEDi4Ao 9rSyaSjvgr9Q== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.72,388,1580803200"; d="scan'208";a="455035445" Received: from kcaccard-mobl.amr.corp.intel.com (HELO kcaccard-mobl1.jf.intel.com) ([10.209.116.191]) by fmsmga006.fm.intel.com with ESMTP; 15 Apr 2020 14:05:01 -0700 From: Kristen Carlson Accardi To: keescook@chromium.org, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, hpa@zytor.com Cc: arjan@linux.intel.com, x86@kernel.org, linux-kernel@vger.kernel.org, kernel-hardening@lists.openwall.com, rick.p.edgecomb@intel.com Subject: [PATCH 0/9] Function Granular Kernel Address Space Layout Randomization Date: Wed, 15 Apr 2020 14:04:42 -0700 Message-Id: <20200415210452.27436-1-kristen@linux.intel.com> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This patch set is an implementation of finer grained kernel address space randomization. It rearranges your kernel code at load time on a per-function level granularity, with only around a second added to boot time. Background ---------- KASLR was merged into the kernel with the objective of increasing the difficulty of code reuse attacks. Code reuse attacks reused existing code snippets to get around existing memory protections. They exploit software bugs which expose addresses of useful code snippets to control the flow of execution for their own nefarious purposes. KASLR moves the entire kernel code text as a unit at boot time in order to make addresses less predictable. The order of the code within the segment is unchanged - only the base address is shifted. There are a few shortcomings to this algorithm. 1. Low Entropy - there are only so many locations the kernel can fit in. This means an attacker could guess without too much trouble. 2. Knowledge of a single address can reveal the offset of the base address, exposing all other locations for a published/known kernel image. 3. Info leaks abound. Finer grained ASLR has been proposed as a way to make ASLR more resistant to info leaks. It is not a new concept at all, and there are many variations possible. Function reordering is an implementation of finer grained ASLR which randomizes the layout of an address space on a function level granularity. We use the term "fgkaslr" in this document to refer to the technique of function reordering when used with KASLR, as well as finer grained KASLR in general. Proposed Improvement -------------------- This patch set proposes adding function reordering on top of the existing KASLR base address randomization. The over-arching objective is incremental improvement over what we already have, as well as something that can be merged and deployed with as little disruption to our existing kernel/ecosystem as possible. It is designed to work with the existing solution, although it can be used independently (not sure why you would do that though...). The implementation is really pretty simple, and there are 2 main area where changes occur: * Build time GCC has an option to place functions into individual .text sections. We can use this option to implement function reordering at load time. The final compiled vmlinux retains all the section headers, which can be used to help us find the address ranges of each function. Using this information and an expanded table of relocation addresses, we can shuffle the individual text sections immediately after decompression. You are probably asking yourself how this could possibly work given the number of tables of addresses that exist inside the kernel today for features such as exception handling and kprobes. Most of these tables generate relocations and require a simple update, and some tables that have assumptions about order require sorting after the update. In order to modify these tables, we preserve a few key symbols from the objcopy symbol stripping process for use after shuffling the text segments. Some highlights from the build time changes to look for: The top level kernel Makefile was modified to add the gcc flag if it is supported. Currently, I am applying this flag to everything it is possible to randomize. Future work could turn off this flags for selected files or even entire subsystems, although obviously at the cost of security. The relocs tool is updated to add relative relocations. This information previously wasn't included because it wasn't necessary when moving the entire .text segment as a unit. A new file was created to contain a list of symbols that objcopy should keep. We use those symbols at load time as described below. * Load time The boot kernel was modified to parse the vmlinux elf file after decompression to check for our interesting symbols that we kept, and to look for any .text.* sections to randomize. We then shuffle the sections and update any tables that need to be updated or resorted. The existing code which updated relocation addresses was modified to account for not just a fixed delta from the load address, but the offset that the function section was moved to. This requires inspection of each address to see if it was impacted by a randomization. We use a bsearch to make this less horrible on performance. In order to hide our new layout, symbols reported through /proc/kallsyms will be sorted by name alphabetically rather than by address. Security Considerations ----------------------- The objective of this patch set is to improve a technology that is already merged into the kernel (KASLR). Obviously, this code is not a one stop shopping place for blocking code reuse attacks, but should instead be considered as one of several tools that can be used. In particular, this code is meant to make KASLR more effective in the presence of info leaks. A key point to note is that we are basically accepting that there are many and various ways to leak address today and in the future, and rather than assume that we can stop them all, we should find a method which makes individual info leaks less important. How much entropy we are adding to the existing entropy of standard KASLR will depend on a few variables. Firstly and most obviously, the number of functions you randomize matters. This implementation keeps the existing .text section for code that cannot be randomized - for example, because it was assembly code, or we opted out of randomization for performance reasons. The less sections to randomize, the less entropy. In addition, due to alignment (16 bytes for x86_64), the number of bits in a address that the attacker needs to guess is reduced, as the lower bits are identical. Performance Impact ------------------ There are two areas where function reordering can impact performance: boot time latency, and run time performance. * Boot time latency This implementation of finer grained KASLR impacts the boot time of the kernel in several places. It requires additional parsing of the kernel ELF file to obtain the section headers of the sections to be randomized. It calls the random number generator for each section to be randomized to determine that section's new memory location. It copies the decompressed kernel into a new area of memory to avoid corruption when laying out the newly randomized sections. It increases the number of relocations the kernel has to perform at boot time vs. standard KASLR, and it also requires a lookup on each address that needs to be relocated to see if it was in a randomized section and needs to be adjusted by a new offset. Finally, it re-sorts a few data tables that are required to be sorted by address. Booting a test VM on a modern, well appointed system showed an increase in latency of approximately 1 second. * Run time The performance impact at run-time of function reordering varies by workload. Using kcbench, a kernel compilation benchmark, the performance of a kernel build with finer grained KASLR was about 1% slower than a kernel with standard KASLR. Analysis with perf showed a slightly higher percentage of L1-icache-load-misses. Other workloads were examined as well, with varied results. Some workloads performed significantly worse under FGKASLR, while others stayed the same or were mysteriously better. In general, it will depend on the code flow whether or not finer grained KASLR will impact your workload, and how the underlying code was designed. Future work could identify hot areas that may not be randomized and either leave them in the .text section or group them together into a single section that may be randomized. If grouping things together helps, one other thing to consider is that if we could identify text blobs that should be grouped together to benefit a particular code flow, it could be interesting to explore whether this security feature could be also be used as a performance feature if you are interested in optimizing your kernel layout for a particular workload at boot time. Optimizing function layout for a particular workload has been researched and proven effective - for more information read the Facebook paper "Optimizing Function Placement for Large-Scale Data-Center Applications" (see references section below). Image Size ---------- Adding additional section headers as a result of compiling with -ffunction-sections will increase the size of the vmlinux ELF file. With a standard distro config, the resulting vmlinux was increased by about 3%. The compressed image is also increased due to the header files, as well as the extra relocations that must be added. You can expect fgkaslr to increase the size of the compressed image by about 15%. Building -------- To enable fine grained KASLR, you need to have the following config options set (including all the ones you would use to build normal KASLR) CONFIG_FG_KASLR=y In addition, fgkaslr is only supported for the X86_64 architecture. Modules ------- Modules are randomized similarly to the rest of the kernel by shuffling the sections at load time prior to moving them into memory. The module must also have been build with the -ffunction-sections compiler option. References ---------- There are a lot of academic papers which explore finer grained ASLR. This paper in particular contributed the most to my implementation design as well as my overall understanding of the problem space: Selfrando: Securing the Tor Browser against De-anonymization Exploits, M. Conti, S. Crane, T. Frassetto, et al. For more information on how function layout impacts performance, see: Optimizing Function Placement for Large-Scale Data-Center Applications, G. Ottoni, B. Maher Kees Cook (1): x86/boot: Allow a "silent" kaslr random byte fetch Kristen Carlson Accardi (8): objtool: do not assume order of parent/child functions x86: tools/relocs: Support >64K section headers x86: Makefile: Add build and config option for CONFIG_FG_KASLR x86: make sure _etext includes function sections x86/tools: Adding relative relocs for randomized functions x86: Add support for function granular KASLR kallsyms: hide layout module: Reorder functions Documentation/security/fgkaslr.rst | 151 +++++ Documentation/security/index.rst | 1 + Makefile | 4 + arch/x86/Kconfig | 13 + arch/x86/boot/compressed/Makefile | 10 +- arch/x86/boot/compressed/fgkaslr.c | 809 +++++++++++++++++++++++ arch/x86/boot/compressed/kaslr.c | 7 +- arch/x86/boot/compressed/misc.c | 107 ++- arch/x86/boot/compressed/misc.h | 31 + arch/x86/boot/compressed/utils.c | 12 + arch/x86/boot/compressed/vmlinux.symbols | 18 + arch/x86/include/asm/boot.h | 15 +- arch/x86/kernel/vmlinux.lds.S | 18 +- arch/x86/lib/kaslr.c | 18 +- arch/x86/tools/relocs.c | 143 +++- arch/x86/tools/relocs.h | 4 +- arch/x86/tools/relocs_common.c | 14 +- include/asm-generic/vmlinux.lds.h | 2 +- include/uapi/linux/elf.h | 1 + kernel/kallsyms.c | 138 +++- kernel/module.c | 82 +++ tools/objtool/elf.c | 8 +- 22 files changed, 1543 insertions(+), 63 deletions(-) create mode 100644 Documentation/security/fgkaslr.rst create mode 100644 arch/x86/boot/compressed/fgkaslr.c create mode 100644 arch/x86/boot/compressed/utils.c create mode 100644 arch/x86/boot/compressed/vmlinux.symbols -- 2.20.1