Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp5016485ybi; Tue, 30 Jul 2019 12:13:32 -0700 (PDT) X-Google-Smtp-Source: APXvYqyUmUpN2vkF3lOplJMvFUm42WJ898iFHBzAlE6k31rZCHEIMMrNMD34Fc0ZVv3QuFbffsTA X-Received: by 2002:a17:90a:db52:: with SMTP id u18mr119532217pjx.107.1564514012318; Tue, 30 Jul 2019 12:13:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1564514012; cv=none; d=google.com; s=arc-20160816; b=jYUxFVNuozFh7pRKr0q7FCTw6DBmWfP3gk8r8ZjCwwIJexMKElv06bDkmmNciC3VAr vmzqbbDp1zfwzNe1Tb1hXM30hqdywK3m7TwAGwUxSkR7I97cYd/mlmh3ORl5UQID/P+0 aMUC/qeYmW7c+lDvF5NKI7P77+lmZ/iNWnTjpOBfbirU4DgAc135Jfod3rASR13ZCEfq P/7seJQ+mP43PUgRXispCcd8zyfFspeJgSvQHTsh8pbLQhi143tLTVJVDdUYuv1ugolW ZOiYVQztXB877rYw9zBFIJ4+aIhN4Ezb5SjtH5AQSOZuGOJcp6OCXumOAKCY7ybH8wOo rkgA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=PQpQB1xhGd1BWNwCOVPVq65dOaaamVfa0p9XxE9K8UE=; b=xcjBKehYZjqMi5keem53VubdQJIEyR/mafz6fbBG3NxbTjRUBUd3R+LIX6zqTNXo1b o9nOGmfqOtqUCs2HQKgD45JQtlokVYrwdeCJ8dKuffSomsP+bzNwL4KIfTOuY/YjDjoO J7GQCnSQiVSwq69jAL3Qi9yinYMzAzYE191t22RaInzI5PBc4/LghUUkXICoaGfpiZF+ rriYib1Q70/yUJ1cgB7HwVJYYp3bZ1WffL3AZBoa4XL+QA5rOYWAB84badYnqNY2U8wK i+qDl4uE79wsYrJFHQfbw/sTJG3hWqaQ1zJecctC70joZC6Z3TK+c+MUlnhHgYT/2SLP ljrg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=UeEkx54f; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x9si32109814pfi.211.2019.07.30.12.13.14; Tue, 30 Jul 2019 12:13:32 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=UeEkx54f; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387403AbfG3TNK (ORCPT + 99 others); Tue, 30 Jul 2019 15:13:10 -0400 Received: from mail-pf1-f193.google.com ([209.85.210.193]:44550 "EHLO mail-pf1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727797AbfG3TNJ (ORCPT ); Tue, 30 Jul 2019 15:13:09 -0400 Received: by mail-pf1-f193.google.com with SMTP id t16so30303241pfe.11 for ; Tue, 30 Jul 2019 12:13:09 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=PQpQB1xhGd1BWNwCOVPVq65dOaaamVfa0p9XxE9K8UE=; b=UeEkx54frGpuY2a5hI6uujVV6CP+NOOrqZjevpUoKoJ93cmYNk/k3rMiq3AadGoCKK 4u7ZW5L9P5D/w1F6ZopTCab2PdKgv5sovzVTiDlesGwqHNwk1iQ59Z1CIqJUVPimrjCH 2d2E01pLBsNwq9CrfIuERHJQKh4JgFunTybsQ= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=PQpQB1xhGd1BWNwCOVPVq65dOaaamVfa0p9XxE9K8UE=; b=N2ESObj6uNPZWwx9xnKy4HrWw38G6/H/0BwVNFMfWgdjPxt+bHpeJiGeE2qsprvOXj y8ne+X9wZq6R5Lfh+WEoiFFSP9dYBJDNRqqg3643DdXZriPA+CSCNSEamKiDsAQxxbaV 4cmDNWw3O5jruB47Wde0eZH5LiJiJ2js8vLKV1p+5UR/UhHqkjVr1VHdN5twifxGBvW1 5T3PSKxDnvGfIS42K8OOj1FRSR3zKpY6VRPONPusqDBaVJqnyMX0Cro7OyLV6eWowQcM t0zNJltl9JTHI8w+RD1ov5YUXlM6euIqsZR2rZWqKGUl9Sr8CqzXoTV0ggObrpl2hjoO FBdQ== X-Gm-Message-State: APjAAAWOM+5YDfaMUDn7nQJvzn9iMYeEjmNaKJaHzPuy1NqhM84WPHKS 8ZvJ6IqAwZw3vKeDtWWymCeWqw== X-Received: by 2002:a63:8a49:: with SMTP id y70mr15370050pgd.271.1564513988658; Tue, 30 Jul 2019 12:13:08 -0700 (PDT) Received: from skynet.sea.corp.google.com ([2620:0:1008:1100:c4b5:ec23:d87b:d6d3]) by smtp.gmail.com with ESMTPSA id n89sm84649540pjc.0.2019.07.30.12.13.07 (version=TLS1_3 cipher=AEAD-AES256-GCM-SHA384 bits=256/256); Tue, 30 Jul 2019 12:13:08 -0700 (PDT) From: Thomas Garnier To: kernel-hardening@lists.openwall.com Cc: kristen@linux.intel.com, keescook@chromium.org, Herbert Xu , "David S. Miller" , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , x86@kernel.org, Andy Lutomirski , Juergen Gross , Thomas Hellstrom , "VMware, Inc." , "Rafael J. Wysocki" , Len Brown , Pavel Machek , Peter Zijlstra , Nadav Amit , Thomas Garnier , Jann Horn , Feng Tang , Maran Wilson , Enrico Weigelt , Allison Randal , Alexios Zavras , linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, virtualization@lists.linux-foundation.org, linux-pm@vger.kernel.org Subject: [PATCH v9 00/11] x86: PIE support to extend KASLR randomization Date: Tue, 30 Jul 2019 12:12:44 -0700 Message-Id: <20190730191303.206365-1-thgarnie@chromium.org> X-Mailer: git-send-email 2.22.0.770.g0f2c4a37fd-goog MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Minor changes based on feedback and rebase from v8. Splitting the previous serie in two. This part contains assembly code changes required for PIE but without any direct dependencies with the rest of the patchset. Changes: - patch v9 (assembly): - Moved to relative reference for sync_core based on feedback. - x86/crypto had multiple algorithms deleted, removed PIE changes to them. - fix typo on comment end line. - patch v8 (assembly): - Fix issues in crypto changes (thanks to Eric Biggers). - Remove unnecessary jump table change. - Change author and signoff to chromium email address. - patch v7 (assembly): - Split patchset and reorder changes. - patch v6: - Rebase on latest changes in jump tables and crypto. - Fix wording on couple commits. - Revisit checkpatch warnings. - Moving to @chromium.org. - patch v5: - Adapt new crypto modules for PIE. - Improve per-cpu commit message. - Fix xen 32-bit build error with .quad. - Remove extra code for ftrace. - patch v4: - Simplify early boot by removing global variables. - Modify the mcount location script for __mcount_loc intead of the address read in the ftrace implementation. - Edit commit description to explain better where the kernel can be located. - Streamlined the testing done on each patch proposal. Always testing hibernation, suspend, ftrace and kprobe to ensure no regressions. - patch v3: - Update on message to describe longer term PIE goal. - Minor change on ftrace if condition. - Changed code using xchgq. - patch v2: - Adapt patch to work post KPTI and compiler changes - Redo all performance testing with latest configs and compilers - Simplify mov macro on PIE (MOVABS now) - Reduce GOT footprint - patch v1: - Simplify ftrace implementation. - Use gcc mstack-protector-guard-reg=%gs with PIE when possible. - rfc v3: - Use --emit-relocs instead of -pie to reduce dynamic relocation space on mapped memory. It also simplifies the relocation process. - Move the start the module section next to the kernel. Remove the need for -mcmodel=large on modules. Extends module space from 1 to 2G maximum. - Support for XEN PVH as 32-bit relocations can be ignored with --emit-relocs. - Support for GOT relocations previously done automatically with -pie. - Remove need for dynamic PLT in modules. - Support dymamic GOT for modules. - rfc v2: - Add support for global stack cookie while compiler default to fs without mcmodel=kernel - Change patch 7 to correctly jump out of the identity mapping on kexec load preserve. These patches make some of the changes necessary to build the kernel as Position Independent Executable (PIE) on x86_64. Another patchset will add the PIE option and larger architecture changes. The patches: - 1, 3-11: Change in assembly code to be PIE compliant. - 2: Add a new _ASM_MOVABS macro to fetch a symbol address generically. diffstat: crypto/aegis128-aesni-asm.S | 6 +- crypto/aesni-intel_asm.S | 8 +-- crypto/aesni-intel_avx-x86_64.S | 3 - crypto/camellia-aesni-avx-asm_64.S | 42 +++++++-------- crypto/camellia-aesni-avx2-asm_64.S | 44 ++++++++-------- crypto/camellia-x86_64-asm_64.S | 8 +-- crypto/cast5-avx-x86_64-asm_64.S | 50 ++++++++++-------- crypto/cast6-avx-x86_64-asm_64.S | 44 +++++++++------- crypto/des3_ede-asm_64.S | 96 ++++++++++++++++++++++++------------ crypto/ghash-clmulni-intel_asm.S | 4 - crypto/glue_helper-asm-avx.S | 4 - crypto/glue_helper-asm-avx2.S | 6 +- crypto/sha256-avx2-asm.S | 18 ++++-- entry/entry_64.S | 16 ++++-- include/asm/alternative.h | 6 +- include/asm/asm.h | 1 include/asm/paravirt_types.h | 25 +++++++-- include/asm/pm-trace.h | 2 include/asm/processor.h | 6 +- kernel/acpi/wakeup_64.S | 31 ++++++----- kernel/head_64.S | 16 +++--- kernel/relocate_kernel_64.S | 2 power/hibernate_asm_64.S | 4 - 23 files changed, 261 insertions(+), 181 deletions(-) Patchset is based on next-20190729.