|
Message-ID: <CALCETrX-rKLa7Skr5NOannx4no1Vma2j-ahAquQNmwLYaVgwQA@mail.gmail.com> Date: Tue, 21 Jun 2016 11:05:41 -0700 From: Andy Lutomirski <luto@...capital.net> To: Rik van Riel <riel@...hat.com> Cc: "kernel-hardening@...ts.openwall.com" <kernel-hardening@...ts.openwall.com>, Arnd Bergmann <arnd@...db.de>, Andy Lutomirski <luto@...nel.org>, "x86@...nel.org" <x86@...nel.org>, LKML <linux-kernel@...r.kernel.org>, linux-arch <linux-arch@...r.kernel.org>, Borislav Petkov <bp@...en8.de>, Nadav Amit <nadav.amit@...il.com>, Brian Gerst <brgerst@...il.com>, Linus Torvalds <torvalds@...ux-foundation.org>, Josh Poimboeuf <jpoimboe@...hat.com>, Jann Horn <jann@...jh.net>, Heiko Carstens <heiko.carstens@...ibm.com> Subject: Re: Re: [PATCH v3 00/13] Virtually mapped stacks with guard pages (x86, core) On Tue, Jun 21, 2016 at 11:02 AM, Rik van Riel <riel@...hat.com> wrote: > On Tue, 2016-06-21 at 10:16 -0700, Kees Cook wrote: >> On Tue, Jun 21, 2016 at 2:24 AM, Arnd Bergmann <arnd@...db.de> wrote: >> > >> > On Monday, June 20, 2016 4:43:30 PM CEST Andy Lutomirski wrote: >> > > >> > > >> > > On my laptop, this adds about 1.5µs of overhead to task creation, >> > > which seems to be mainly caused by vmalloc inefficiently >> > > allocating >> > > individual pages even when a higher-order page is available on >> > > the >> > > freelist. >> > Would it help to have a fixed virtual address for the stack instead >> > and map the current stack to that during a task switch, similar to >> > how we handle fixmap pages? >> > >> > That would of course trade the allocation overhead for a task >> > switch >> > overhead, which may be better or worse. It would also give >> > "current" >> > a constant address, which may give a small performance advantage >> > but may also introduce a new attack vector unless we randomize it >> > again. >> Right: we don't want a fixed address. That makes attacks WAY easier. > > Does that imply we might want the per-cpu cache of > these stacks to be larger than one, in order to > introduce some more randomness after an attacker > crashed an ASLRed program looking for ROP gadgets, > and the next one is spawned? :) This is the kernel stack, so this only really matters if there's some attack in which you OOPS but learn the kernel stack address in the process and then reuse that stack. So... maybe? --Andy
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.