linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Andy Lutomirski <luto@amacapital.net>
To: Thomas Garnier <thgarnie@google.com>,
	Paolo Bonzini <pbonzini@redhat.com>
Cc: Thomas Gleixner <tglx@linutronix.de>,
	Ingo Molnar <mingo@redhat.com>, "H . Peter Anvin" <hpa@zytor.com>,
	Kees Cook <keescook@chromium.org>, Borislav Petkov <bp@alien8.de>,
	Andy Lutomirski <luto@kernel.org>, Dave Hansen <dave@sr71.net>,
	Chen Yucong <slaoub@gmail.com>,
	Arjan van de Ven <arjan@linux.intel.com>,
	Paul Gortmaker <paul.gortmaker@windriver.com>,
	Andrew Morton <akpm@linux-foundation.org>,
	Masahiro Yamada <yamada.masahiro@socionext.com>,
	Sebastian Andrzej Siewior <bigeasy@linutronix.de>,
	Anna-Maria Gleixner <anna-maria@linutronix.de>,
	Boris Ostrovsky <boris.ostrovsky@oracle.com>,
	Rasmus Villemoes <linux@rasmusvillemoes.dk>,
	Michael Ellerman <mpe@ellerman.id.au>,
	Juergen Gross <jgross@suse.com>,
	Richard Weinberger <richard@nod.at>, X86 ML <x86@kernel.org>,
	"linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>,
	"kernel-hardening@lists.openwall.com" 
	<kernel-hardening@lists.openwall.com>
Subject: Re: [RFC] x86/mm/KASLR: Remap GDTs at fixed location
Date: Thu, 5 Jan 2017 10:01:21 -0800	[thread overview]
Message-ID: <CALCETrWsJxqVuX0S5f=5PFFT-gb=ZE=e6PcYz8D1ivuaHE4qAw@mail.gmail.com> (raw)
In-Reply-To: <CAJcbSZEQkq13K8WA6GoFBUHnbRK+ba9QU0B-pXJ7Zt3fnWMAtw@mail.gmail.com>

On Thu, Jan 5, 2017 at 9:54 AM, Thomas Garnier <thgarnie@google.com> wrote:
> On Thu, Jan 5, 2017 at 9:51 AM, Andy Lutomirski <luto@amacapital.net> wrote:
>> On Wed, Jan 4, 2017 at 2:16 PM, Thomas Garnier <thgarnie@google.com> wrote:
>>> Each processor holds a GDT in its per-cpu structure. The sgdt
>>> instruction gives the base address of the current GDT. This address can
>>> be used to bypass KASLR memory randomization. With another bug, an
>>> attacker could target other per-cpu structures or deduce the base of the
>>> main memory section (PAGE_OFFSET).
>>>
>>> In this change, a space is reserved at the end of the memory range
>>> available for KASLR memory randomization. The space is big enough to hold
>>> the maximum number of CPUs (as defined by setup_max_cpus). Each GDT is
>>> mapped at specific offset based on the target CPU. Note that if there is
>>> not enough space available, the GDTs are not remapped.
>>
>> Can we remap it read-only?  I.e. use PAGE_KERNEL_RO instead of
>> PAGE_KERNEL.  After all, the ability to modify the GDT is instant
>> root.
>
> That's my goal too. I started by doing a RO remap and got couple
> problems with hibernation. I can try again for the next iteration or
> delay it for another patch. I also need to look at KVM GDT usage, I am
> not familiar with it yet.

If you want a small adventure, I think a significant KVM-related
performance improvement is available.  Specifically, on VMX exits, the
GDT limit is hardwired to 0xffff (IIRC -- I could be remembering the
actual vaue wrong).  KVM does LGDT to fix it.

If we actually made the GDT have limit 0xffff (presumably by mapping
the zero page a few times to pad it out without wasting memory), then
we would avoid the LGDT.  LGDT is incredibly slow, so this would be a
big win. Want to see if you can make this work with your patch set?

  reply	other threads:[~2017-01-05 18:31 UTC|newest]

Thread overview: 39+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-01-04 22:16 [RFC] x86/mm/KASLR: Remap GDTs at fixed location Thomas Garnier
2017-01-05  8:11 ` Ingo Molnar
2017-01-05 15:08   ` Arjan van de Ven
2017-01-05 16:40     ` Thomas Garnier
2017-01-05 18:56       ` Arjan van de Ven
2017-01-05 19:00         ` Thomas Garnier
2017-01-06 17:44       ` Borislav Petkov
2017-01-06 18:04         ` Thomas Garnier
2017-01-05 16:39   ` Thomas Garnier
2017-01-06  6:34     ` Ingo Molnar
2017-01-05 17:51 ` Andy Lutomirski
2017-01-05 17:54   ` Thomas Garnier
2017-01-05 18:01     ` Andy Lutomirski [this message]
2017-01-05 18:35       ` Thomas Garnier
2017-01-05 18:58     ` Arjan van de Ven
2017-01-05 19:03       ` Thomas Garnier
2017-01-05 20:18         ` Andy Lutomirski
2017-01-05 21:08           ` Thomas Garnier
2017-01-05 21:19             ` Andy Lutomirski
2017-01-05 21:58               ` Thomas Garnier
2017-01-06  6:49                 ` Ingo Molnar
2017-01-06 18:03                   ` Thomas Garnier
2017-01-06 21:59                     ` Andy Lutomirski
2017-01-06 22:54                       ` Thomas Garnier
2017-01-06 23:39                         ` Andy Lutomirski
2017-01-07  7:45                           ` Ingo Molnar
2017-01-07 15:58                             ` Andy Lutomirski
2017-01-07  7:35                         ` Ingo Molnar
2017-01-07 16:02                           ` Andy Lutomirski
2017-01-09 22:32                           ` Thomas Garnier
2017-01-10 10:27                             ` Ingo Molnar
2017-01-10 17:13                               ` Thomas Garnier
2017-01-05 23:05           ` Linus Torvalds
2017-01-05 23:16             ` Thomas Garnier
2017-01-06  2:34             ` Andy Lutomirski
2017-01-06 18:02               ` Thomas Garnier
2017-01-06 21:53                 ` Andy Lutomirski
2017-01-07  7:46                   ` Ingo Molnar
2017-01-06  6:45       ` Ingo Molnar

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to='CALCETrWsJxqVuX0S5f=5PFFT-gb=ZE=e6PcYz8D1ivuaHE4qAw@mail.gmail.com' \
    --to=luto@amacapital.net \
    --cc=akpm@linux-foundation.org \
    --cc=anna-maria@linutronix.de \
    --cc=arjan@linux.intel.com \
    --cc=bigeasy@linutronix.de \
    --cc=boris.ostrovsky@oracle.com \
    --cc=bp@alien8.de \
    --cc=dave@sr71.net \
    --cc=hpa@zytor.com \
    --cc=jgross@suse.com \
    --cc=keescook@chromium.org \
    --cc=kernel-hardening@lists.openwall.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux@rasmusvillemoes.dk \
    --cc=luto@kernel.org \
    --cc=mingo@redhat.com \
    --cc=mpe@ellerman.id.au \
    --cc=paul.gortmaker@windriver.com \
    --cc=pbonzini@redhat.com \
    --cc=richard@nod.at \
    --cc=slaoub@gmail.com \
    --cc=tglx@linutronix.de \
    --cc=thgarnie@google.com \
    --cc=x86@kernel.org \
    --cc=yamada.masahiro@socionext.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).