Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp604428pxa; Fri, 21 Aug 2020 16:03:53 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwzSEewwaZW2zPNb48z3gYxH54whAg5bX/TbKvLjZFOdD2GFJwp24Gr2tHrUgQht0ZB2mKN X-Received: by 2002:aa7:da48:: with SMTP id w8mr4877177eds.329.1598051033174; Fri, 21 Aug 2020 16:03:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1598051033; cv=none; d=google.com; s=arc-20160816; b=pDZSnsBfe6fbMOu1cERrsH5XiRfKrqTo4Rec34W4ih1n4E4pYiqVO+yW5jd7ey3Ap6 X/xTiPSGtWyqrWAIPDREbfrFymSO7xiSs5Ke6hE71jWzZMJI+dnMZEr9RG99WFkhL8og M4jT4NpD7F6/FZHGJGa2WjtaC5RJKySs25fIm6/NPiZ/ugiVMdN/u/t2HtpuvMiBPGRR MnMhmQuWQvI+nDAafDRYeJx8/JfNmCZRHAzD7wKvG+m3vB0ELM+7Us1IBX4zm/OOg4fd 6BYsHaeIKKwFj2kkoKm7AfN9QAGCUjHuEPM4ZZNzdwRS39uz+3E9QlyBrDzLtOTTdHy7 y6yQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id:ironport-sdr:ironport-sdr; bh=3KwUg8/1TNu9RTtn/ByLn9zqoJ9XV6RloHl1RY3cRac=; b=H+GeYopPBIzIirVRlCqHlq2g7p281QqHqgtsVj6lmKRf2UJE7o3r75CarcJLy19i7t IfLK86MBiS6d0LWaljbu3BArJQLiMp4GjhZhQQpIm9Tn+Jc3CiZ/6bu0fldqqcHRSNJ6 tbkGHNZvTT1kERFFMDRPyebFdyvOcXTQjXTI54IpMFuxubPHLwhEPFHih6vUvtWxLYL7 thuRBAv8GMornZerN/+yt2bwTkxLNCg6eNZAVg+PETaIflPYtxIe+JNhB1ac+F/8xJ02 dxMOMoZ0gdL2zYb5U0Ey2ICPIdINOj8AkoeN+sb592VuU9LYxuY7l+WMWDgY5+6DKF96 InLg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q8si2237551edn.409.2020.08.21.16.03.28; Fri, 21 Aug 2020 16:03:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726727AbgHUXCn (ORCPT + 99 others); Fri, 21 Aug 2020 19:02:43 -0400 Received: from mga11.intel.com ([192.55.52.93]:30336 "EHLO mga11.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726688AbgHUXCl (ORCPT ); Fri, 21 Aug 2020 19:02:41 -0400 IronPort-SDR: StPZFGGBcdKmY04Xv+y/pNhI75rPIq2ARYNw52mEqZk9915od8EypXsExsxQWjk3XdpUVmZn4V fymAAMZGxOEA== X-IronPort-AV: E=McAfee;i="6000,8403,9720"; a="153248926" X-IronPort-AV: E=Sophos;i="5.76,338,1592895600"; d="scan'208";a="153248926" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga005.jf.intel.com ([10.7.209.41]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 21 Aug 2020 16:02:40 -0700 IronPort-SDR: ToGmx6dS8MqJfWdeMn8gS85sydet1IIwHZhopRPEpLlrhZIQI12Cn7bDwDzvyQqiuYnCbfRP41 Vaio4ho7wJqA== X-IronPort-AV: E=Sophos;i="5.76,338,1592895600"; d="scan'208";a="473214632" Received: from jlpaulk-mobl.amr.corp.intel.com (HELO kcaccard-mobl1.jf.intel.com) ([10.252.133.148]) by orsmga005-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 21 Aug 2020 16:02:37 -0700 Message-ID: <46c49dec078cb8625a9c3a3cd1310a4de7ec760b.camel@linux.intel.com> Subject: Re: [PATCH v4 00/10] Function Granular KASLR From: Kristen Carlson Accardi To: Josh Poimboeuf Cc: Kees Cook , Miroslav Benes , tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, arjan@linux.intel.com, x86@kernel.org, linux-kernel@vger.kernel.org, kernel-hardening@lists.openwall.com, rick.p.edgecombe@intel.com, live-patching@vger.kernel.org, Hongjiu Lu , joe.lawrence@redhat.com Date: Fri, 21 Aug 2020 16:02:24 -0700 In-Reply-To: <20200722213313.aetl3h5rkub6ktmw@treble> References: <20200717170008.5949-1-kristen@linux.intel.com> <202007220738.72F26D2480@keescook> <20200722160730.cfhcj4eisglnzolr@treble> <202007221241.EBC2215A@keescook> <301c7fb7d22ad6ef97856b421873e32c2239d412.camel@linux.intel.com> <20200722213313.aetl3h5rkub6ktmw@treble> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.30.5 (3.30.5-1.fc29) MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 2020-07-22 at 16:33 -0500, Josh Poimboeuf wrote: > On Wed, Jul 22, 2020 at 12:56:10PM -0700, Kristen Carlson Accardi > wrote: > > On Wed, 2020-07-22 at 12:42 -0700, Kees Cook wrote: > > > On Wed, Jul 22, 2020 at 11:07:30AM -0500, Josh Poimboeuf wrote: > > > > On Wed, Jul 22, 2020 at 07:39:55AM -0700, Kees Cook wrote: > > > > > On Wed, Jul 22, 2020 at 11:27:30AM +0200, Miroslav Benes > > > > > wrote: > > > > > > Let me CC live-patching ML, because from a quick glance > > > > > > this is > > > > > > something > > > > > > which could impact live patching code. At least it > > > > > > invalidates > > > > > > assumptions > > > > > > which "sympos" is based on. > > > > > > > > > > In a quick skim, it looks like the symbol resolution is using > > > > > kallsyms_on_each_symbol(), so I think this is safe? What's a > > > > > good > > > > > selftest for live-patching? > > > > > > > > The problem is duplicate symbols. If there are two static > > > > functions > > > > named 'foo' then livepatch needs a way to distinguish them. > > > > > > > > Our current approach to that problem is "sympos". We rely on > > > > the > > > > fact > > > > that the second foo() always comes after the first one in the > > > > symbol > > > > list and kallsyms. So they're referred to as foo,1 and foo,2. > > > > > > Ah. Fun. In that case, perhaps the LTO series has some solutions. > > > I > > > think builds with LTO end up renaming duplicate symbols like > > > that, so > > > it'll be back to being unique. > > > > > > > Well, glad to hear there might be some precendence for how to solve > > this, as I wasn't able to think of something reasonable off the top > > of > > my head. Are you speaking of the Clang LTO series? > > https://lore.kernel.org/lkml/20200624203200.78870-1-samitolvanen@google.com/ > > I'm not sure how LTO does it, but a few more (half-brained) ideas > that > could work: > > 1) Add a field in kallsyms to keep track of a symbol's original > offset > before randomization/re-sorting. Livepatch could use that field > to > determine the original sympos. > > 2) In fgkaslr code, go through all the sections and mark the ones > which > have duplicates (i.e. same name). Then when shuffling the > sections, > skip a shuffle if it involves a duplicate section. That way all > the > duplicates would retain their original sympos. > > 3) Livepatch could uniquely identify symbols by some feature other > than > sympos. For example: > > Symbol/function size - obviously this would only work if > duplicately > named symbols have different sizes. > > Checksum - as part of a separate feature we're also looking at > giving > each function its own checksum, calculated based on its > instruction > opcodes. Though calculating checksums at runtime could be > complicated by IP-relative addressing. > > I'm thinking #1 or #2 wouldn't be too bad. #3 might be harder. > Hi there! I was trying to find a super easy way to address this, so I thought the best thing would be if there were a compiler or linker switch to just eliminate any duplicate symbols at compile time for vmlinux. I filed this question on the binutils bugzilla looking to see if there were existing flags that might do this, but H.J. Lu went ahead and created a new one "-z unique", that seems to do what we would need it to do. https://sourceware.org/bugzilla/show_bug.cgi?id=26391 When I use this option, it renames any duplicate symbols with an extension - for example duplicatefunc.1 or duplicatefunc.2. You could either match on the full unique name of the specific binary you are trying to patch, or you match the base name and use the extension to determine original position. Do you think this solution would work? If so, I can modify livepatch to refuse to patch on duplicated symbols if CONFIG_FG_KASLR and when this option is merged into the tool chain I can add it to KBUILD_LDFLAGS when CONFIG_FG_KASLR and livepatching should work in all cases.