Received: by 2002:a05:6a10:6006:0:0:0:0 with SMTP id w6csp1087940pxa; Fri, 28 Aug 2020 03:24:00 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxtNgmH6XpPnEKX1uRFohaK3GLBlNsrT//Rn9ywgji8OHMocOXHVa5yDe2lwR0gy+tQBNEY X-Received: by 2002:a50:8e58:: with SMTP id 24mr1119864edx.199.1598610240654; Fri, 28 Aug 2020 03:24:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1598610240; cv=none; d=google.com; s=arc-20160816; b=aPteac7y4YTK/j10CzN6jQWwVVk5ZUNjhUIJT7ZoAeO18B16GrsTwrUv/YRZuHTbsZ 352LlHiUqlJg1eL80JuK5JPSc+b1ggSN7djK9lIdsjz8xf537w6ALnVq9Pa6graihwBn 3PBpRYfez9O47DzdRilaZNuyiygAFqjeojzNXovWBP2bxOqpQ9gkYgfAkd2jej8q0xkl QxhVVAeLvyykF4rldtGyKiAZB03Y5R4F/C0oJ8p6lG0MWXUzO9KV0sa1rQ2dcn0fCvXS iLPqje5ukwLiuOgQYJIjrflZVdG1cRMAzf8NkVLR9/2zhoUOrtKSYWb+X46qdNGePj5Q he4Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date; bh=ASEBKJD031n/VO7wdnOu1VNXXTWMKQNIpSX3PwcMJ0g=; b=wXNBzpUebhRq415tijAno42Gc3o4buOQXwzUOpYdoJIv31ro94eLH9oG3HoqHroNnh z/ghVujzj07tbgF6B1ZVXk2rRZ+86ORGoZPJ+G8XCLPWSQeFtuYGvgLmnmM4Hmz0fli9 GBIKA6L+WT98wkpKk/3O9PMQ7JtQXcAmS5fESJYvz2AZ83+2KcN058bUs1/vzkeQUtUa R6I6dEb8p0Aqx+OiiZMEbAVNQizHF4fihPX6eqHrwttkozjqM5/+wE1TNb1FDSHAHEvV qfm5x3mLvqkFm2oQSF1fsQlCRfZQp6sMA1p8E13myNInye35KeExRuQQqXLdaJnPmD/G 1ywA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t22si338758ejy.433.2020.08.28.03.23.37; Fri, 28 Aug 2020 03:24:00 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728991AbgH1KWl (ORCPT + 99 others); Fri, 28 Aug 2020 06:22:41 -0400 Received: from mx2.suse.de ([195.135.220.15]:55376 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728362AbgH1KVQ (ORCPT ); Fri, 28 Aug 2020 06:21:16 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id C40A7B071; Fri, 28 Aug 2020 10:21:46 +0000 (UTC) Date: Fri, 28 Aug 2020 12:21:13 +0200 (CEST) From: Miroslav Benes To: Kristen Carlson Accardi cc: Josh Poimboeuf , Kees Cook , tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, arjan@linux.intel.com, x86@kernel.org, linux-kernel@vger.kernel.org, kernel-hardening@lists.openwall.com, rick.p.edgecombe@intel.com, live-patching@vger.kernel.org, Hongjiu Lu , joe.lawrence@redhat.com Subject: Re: [PATCH v4 00/10] Function Granular KASLR In-Reply-To: <46c49dec078cb8625a9c3a3cd1310a4de7ec760b.camel@linux.intel.com> Message-ID: References: <20200717170008.5949-1-kristen@linux.intel.com> <202007220738.72F26D2480@keescook> <20200722160730.cfhcj4eisglnzolr@treble> <202007221241.EBC2215A@keescook> <301c7fb7d22ad6ef97856b421873e32c2239d412.camel@linux.intel.com> <20200722213313.aetl3h5rkub6ktmw@treble> <46c49dec078cb8625a9c3a3cd1310a4de7ec760b.camel@linux.intel.com> User-Agent: Alpine 2.21 (LSU 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Leaving Josh's proposals here for reference... > > I'm not sure how LTO does it, but a few more (half-brained) ideas > > that > > could work: > > > > 1) Add a field in kallsyms to keep track of a symbol's original > > offset > > before randomization/re-sorting. Livepatch could use that field > > to > > determine the original sympos. > > > > 2) In fgkaslr code, go through all the sections and mark the ones > > which > > have duplicates (i.e. same name). Then when shuffling the > > sections, > > skip a shuffle if it involves a duplicate section. That way all > > the > > duplicates would retain their original sympos. > > > > 3) Livepatch could uniquely identify symbols by some feature other > > than > > sympos. For example: > > > > Symbol/function size - obviously this would only work if > > duplicately > > named symbols have different sizes. > > > > Checksum - as part of a separate feature we're also looking at > > giving > > each function its own checksum, calculated based on its > > instruction > > opcodes. Though calculating checksums at runtime could be > > complicated by IP-relative addressing. > > > > I'm thinking #1 or #2 wouldn't be too bad. #3 might be harder. > > > > Hi there! I was trying to find a super easy way to address this, so I > thought the best thing would be if there were a compiler or linker > switch to just eliminate any duplicate symbols at compile time for > vmlinux. I filed this question on the binutils bugzilla looking to see > if there were existing flags that might do this, but H.J. Lu went ahead > and created a new one "-z unique", that seems to do what we would need > it to do. > > https://sourceware.org/bugzilla/show_bug.cgi?id=26391 > > When I use this option, it renames any duplicate symbols with an > extension - for example duplicatefunc.1 or duplicatefunc.2. You could > either match on the full unique name of the specific binary you are > trying to patch, or you match the base name and use the extension to > determine original position. Do you think this solution would work? Yes, I think so (thanks, Joe, for testing!). It looks cleaner to me than the options above, but it may just be a matter of taste. Anyway, I'd go with full name matching, because -z unique-symbol would allow us to remove sympos altogether, which is appealing. > If > so, I can modify livepatch to refuse to patch on duplicated symbols if > CONFIG_FG_KASLR and when this option is merged into the tool chain I > can add it to KBUILD_LDFLAGS when CONFIG_FG_KASLR and livepatching > should work in all cases. Ok. Josh, Petr, would this work for you too? Thanks Miroslav