|
Message-ID: <CAG48ez1b_wMkQGj+z=dWSVctikzzw72V3SPexEPm3Aw8LrXGWQ@mail.gmail.com> Date: Mon, 22 Jun 2020 23:42:29 +0200 From: Jann Horn <jannh@...gle.com> To: Kees Cook <keescook@...omium.org> Cc: Thomas Gleixner <tglx@...utronix.de>, Elena Reshetova <elena.reshetova@...el.com>, "the arch/x86 maintainers" <x86@...nel.org>, Andy Lutomirski <luto@...nel.org>, Peter Zijlstra <peterz@...radead.org>, Catalin Marinas <catalin.marinas@....com>, Will Deacon <will@...nel.org>, Mark Rutland <mark.rutland@....com>, Alexander Potapenko <glider@...gle.com>, Alexander Popov <alex.popov@...ux.com>, Ard Biesheuvel <ard.biesheuvel@...aro.org>, Kernel Hardening <kernel-hardening@...ts.openwall.com>, Linux ARM <linux-arm-kernel@...ts.infradead.org>, Linux-MM <linux-mm@...ck.org>, kernel list <linux-kernel@...r.kernel.org> Subject: Re: [PATCH v4 3/5] stack: Optionally randomize kernel stack offset each syscall On Mon, Jun 22, 2020 at 11:30 PM Kees Cook <keescook@...omium.org> wrote: > On Mon, Jun 22, 2020 at 10:07:37PM +0200, Jann Horn wrote: > > On Mon, Jun 22, 2020 at 9:31 PM Kees Cook <keescook@...omium.org> wrote: > > > This provides the ability for architectures to enable kernel stack base > > > address offset randomization. This feature is controlled by the boot > > > param "randomize_kstack_offset=on/off", with its default value set by > > > CONFIG_RANDOMIZE_KSTACK_OFFSET_DEFAULT. > > [...] > > > +#define add_random_kstack_offset() do { \ > > > + if (static_branch_maybe(CONFIG_RANDOMIZE_KSTACK_OFFSET_DEFAULT, \ > > > + &randomize_kstack_offset)) { \ > > > + u32 offset = this_cpu_read(kstack_offset); \ > > > + u8 *ptr = __builtin_alloca(offset & 0x3FF); \ > > > + asm volatile("" : "=m"(*ptr)); \ > > > + } \ > > > +} while (0) > > > > clang generates better code here if the mask is stack-aligned - > > otherwise it needs to round the stack pointer / the offset: [...] > > Maybe this should be something along the lines of > > __builtin_alloca(offset & (0x3ff & ARCH_STACK_ALIGN_MASK)) (with > > appropriate definitions of the stack alignment mask depending on the > > architecture's choice of stack alignment for kernel code). > > Is that explicitly selected anywhere in the kernel? I thought the > alignment was left up to the compiler (as in I've seen bugs fixed where > the kernel had to deal with the alignment choices the compiler was > making...) No, at least on x86-64 and x86 Linux overrides the normal ABI. From arch/x86/Makefile: # For gcc stack alignment is specified with -mpreferred-stack-boundary, # clang has the option -mstack-alignment for that purpose. ifneq ($(call cc-option, -mpreferred-stack-boundary=4),) cc_stack_align4 := -mpreferred-stack-boundary=2 cc_stack_align8 := -mpreferred-stack-boundary=3 else ifneq ($(call cc-option, -mstack-alignment=16),) cc_stack_align4 := -mstack-alignment=4 cc_stack_align8 := -mstack-alignment=8 endif [...] ifeq ($(CONFIG_X86_32),y) [...] # Align the stack to the register width instead of using the default # alignment of 16 bytes. This reduces stack usage and the number of # alignment instructions. KBUILD_CFLAGS += $(call cc-option,$(cc_stack_align4)) [...] else [...] # By default gcc and clang use a stack alignment of 16 bytes for x86. # However the standard kernel entry on x86-64 leaves the stack on an # 8-byte boundary. If the compiler isn't informed about the actual # alignment it will generate extra alignment instructions for the # default alignment which keep the stack *mis*aligned. # Furthermore an alignment to the register width reduces stack usage # and the number of alignment instructions. KBUILD_CFLAGS += $(call cc-option,$(cc_stack_align8)) [...] endif Normal x86-64 ABI has 16-byte stack alignment; Linux kernel x86-64 ABI has 8-byte stack alignment. Similarly, the normal Linux 32-bit x86 ABI is 16-byte aligned; meanwhile Linux kernel x86 ABI has 4-byte stack alignment. This is because userspace code wants the stack to be sufficiently aligned for fancy SSE instructions and such; the kernel, on the other hand, never uses those in normal code, and cares about stack usage and such very much.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.