All the mail mirrored from lore.kernel.org
 help / color / mirror / Atom feed
From: "H. Peter Anvin" <hpa@zytor.com>
To: Thomas Garnier <thgarnie@google.com>, Brian Gerst <brgerst@gmail.com>
Cc: "Michal Hocko" <mhocko@suse.com>,
	"kvm list" <kvm@vger.kernel.org>,
	"Radim Krčmář" <rkrcmar@redhat.com>,
	"Peter Zijlstra" <peterz@infradead.org>,
	"Catalin Marinas" <catalin.marinas@arm.com>,
	"Christopher Li" <sparse@chrisli.org>,
	"the arch/x86 maintainers" <x86@kernel.org>,
	"Paul Gortmaker" <paul.gortmaker@windriver.com>,
	"Pavel Machek" <pavel@ucw.cz>,
	"Kernel Hardening" <kernel-hardening@lists.openwall.com>,
	"Christoph Lameter" <cl@linux.com>,
	"Thomas Gleixner" <tglx@linutronix.de>,
	"Chris Metcalf" <cmetcalf@mellanox.com>,
	linux-arch <linux-arch@vger.kernel.org>,
	"Herbert Xu" <herbert@gondor.apana.org.au>,
	"Daniel Borkmann" <daniel@iogearbox.net>,
	"Matthew Wilcox" <mawilcox@microsoft.com>,
	"Joerg Roedel" <joro@8bytes.org>,
	"Peter Foley" <pefoley2@pefoley.com>,
	"Christian Borntraeger" <borntraeger@de.ibm.com>,
	linux-sparse@vger.kernel.org,
	"Matthias Kaehlcke" <mka@chromium.org>
Subject: Re: [RFC 16/22] x86/percpu: Adapt percpu for PIE support
Date: Wed, 19 Jul 2017 16:33:17 -0700	[thread overview]
Message-ID: <25a2974a-fbb4-ea4b-d090-582d6d0de7fd__46410.0898978815$1500508686$gmane$org@zytor.com> (raw)
In-Reply-To: <CAJcbSZFXrDZikh9P5M81ztkiMv7EhO4x0bzBdYE8RYC=HMZgqg@mail.gmail.com>

On 07/19/17 11:26, Thomas Garnier wrote:
> On Tue, Jul 18, 2017 at 8:08 PM, Brian Gerst <brgerst@gmail.com> wrote:
>> On Tue, Jul 18, 2017 at 6:33 PM, Thomas Garnier <thgarnie@google.com> wrote:
>>> Perpcu uses a clever design where the .percu ELF section has a virtual
>>> address of zero and the relocation code avoid relocating specific
>>> symbols. It makes the code simple and easily adaptable with or without
>>> SMP support.
>>>
>>> This design is incompatible with PIE because generated code always try to
>>> access the zero virtual address relative to the default mapping address.
>>> It becomes impossible when KASLR is configured to go below -2G. This
>>> patch solves this problem by removing the zero mapping and adapting the GS
>>> base to be relative to the expected address. These changes are done only
>>> when PIE is enabled. The original implementation is kept as-is
>>> by default.
>>
>> The reason the per-cpu section is zero-based on x86-64 is to
>> workaround GCC hardcoding the stack protector canary at %gs:40.  So
>> this patch is incompatible with CONFIG_STACK_PROTECTOR.
> 
> Ok, that make sense. I don't want this feature to not work with
> CONFIG_CC_STACKPROTECTOR*. One way to fix that would be adding a GDT
> entry for gs so gs:40 points to the correct memory address and
> gs:[rip+XX] works correctly through the MSR.

What are you talking about?  A GDT entry and the MSR do the same thing,
except that a GDT entry is limited to an offset of 0-0xffffffff (which
doesn't work for us, obviously.)

> Given the separate
> discussion on mcmodel, I am going first to check if we can move from
> PIE to PIC with a mcmodel=small or medium that would remove the percpu
> change requirement. I tried before without success but I understand
> better percpu and other components so maybe I can make it work.

>> This is silly.  The right thing is for PIE is to be explicitly absolute,
>> without (%rip).  The use of (%rip) memory references for percpu is just
>> an optimization.
> 
> I agree that it is odd but that's how the compiler generates code. I
> will re-explore PIC options with mcmodel=small or medium, as mentioned
> on other threads.

Why should the way compiler generates code affect the way we do things
in assembly?

That being said, the compiler now has support for generating this kind
of code explicitly via the __seg_gs pointer modifier.  That should let
us drop the __percpu_prefix and just use variables directly.  I suspect
we want to declare percpu variables as "volatile __seg_gs" to account
for the possibility of CPU switches.

Older compilers won't be able to work with this, of course, but I think
that it is acceptable for those older compilers to not be able to
support PIE.

	-hpa


_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel

  parent reply	other threads:[~2017-07-19 23:56 UTC|newest]

Thread overview: 151+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-07-18 22:33 x86: PIE support and option to extend KASLR randomization Thomas Garnier
2017-07-18 22:33 ` [kernel-hardening] " Thomas Garnier
2017-07-18 22:33 ` [RFC 01/22] x86/crypto: Adapt assembly for PIE support Thomas Garnier
2017-07-18 22:33 ` Thomas Garnier
2017-07-18 22:33   ` [kernel-hardening] " Thomas Garnier
2017-07-18 22:33 ` [RFC 02/22] x86: Use symbol name on bug table " Thomas Garnier
2017-07-18 22:33   ` [kernel-hardening] " Thomas Garnier
2017-07-18 22:33 ` [RFC 03/22] x86: Use symbol name in jump " Thomas Garnier
2017-07-18 22:33   ` [kernel-hardening] " Thomas Garnier
2017-07-18 22:33 ` [RFC 04/22] x86: Add macro to get symbol address " Thomas Garnier
2017-07-18 22:33   ` [kernel-hardening] " Thomas Garnier
2017-07-18 22:33 ` [RFC 05/22] xen: Adapt assembly " Thomas Garnier
2017-07-18 22:33   ` [kernel-hardening] " Thomas Garnier
2017-07-18 22:33 ` [RFC 06/22] kvm: " Thomas Garnier
2017-07-18 22:33   ` [kernel-hardening] " Thomas Garnier
2017-07-19  2:49   ` Brian Gerst
2017-07-19  2:49   ` Brian Gerst
2017-07-19  2:49     ` [kernel-hardening] " Brian Gerst
2017-07-19 15:40     ` Thomas Garnier
2017-07-19 15:40       ` [kernel-hardening] " Thomas Garnier
2017-07-19 22:27       ` H. Peter Anvin
2017-07-19 22:27       ` H. Peter Anvin
2017-07-19 22:27         ` [kernel-hardening] " H. Peter Anvin
2017-07-19 22:44         ` Thomas Garnier
2017-07-19 22:44           ` [kernel-hardening] " Thomas Garnier
2017-07-19 22:44         ` Thomas Garnier
2017-07-19 22:58         ` Ard Biesheuvel
2017-07-19 22:58         ` Ard Biesheuvel
2017-07-19 22:58           ` [kernel-hardening] " Ard Biesheuvel
2017-07-19 23:47           ` H. Peter Anvin
2017-07-19 23:47           ` H. Peter Anvin
2017-07-19 23:47           ` H. Peter Anvin
2017-07-19 23:47           ` H. Peter Anvin
2017-07-19 23:47           ` H. Peter Anvin
2017-07-19 23:47           ` H. Peter Anvin
2017-07-19 23:47           ` H. Peter Anvin
2017-07-19 15:40     ` Thomas Garnier
2017-07-18 22:33 ` [RFC 07/22] x86: relocate_kernel - " Thomas Garnier
2017-07-18 22:33   ` [kernel-hardening] " Thomas Garnier
2017-07-19 22:58   ` H. Peter Anvin
2017-07-19 22:58     ` [kernel-hardening] " H. Peter Anvin
2017-07-19 23:23     ` Thomas Garnier
2017-07-19 23:23       ` [kernel-hardening] " Thomas Garnier
2017-07-19 23:23     ` Thomas Garnier
2017-07-19 22:58   ` H. Peter Anvin
2017-07-18 22:33 ` [RFC 08/22] x86/entry/64: " Thomas Garnier
2017-07-18 22:33   ` [kernel-hardening] " Thomas Garnier
2017-07-18 22:33 ` [RFC 09/22] x86: pm-trace - " Thomas Garnier
2017-07-18 22:33   ` [kernel-hardening] " Thomas Garnier
2017-07-18 22:33 ` [RFC 10/22] x86/CPU: " Thomas Garnier
2017-07-18 22:33   ` [kernel-hardening] " Thomas Garnier
2017-07-18 22:33 ` [RFC 11/22] x86/acpi: " Thomas Garnier
2017-07-18 22:33   ` [kernel-hardening] " Thomas Garnier
2017-07-18 22:33 ` [RFC 12/22] x86/boot/64: " Thomas Garnier
2017-07-18 22:33   ` [kernel-hardening] " Thomas Garnier
2017-07-18 22:33 ` [RFC 13/22] x86/power/64: " Thomas Garnier
2017-07-18 22:33   ` [kernel-hardening] " Thomas Garnier
2017-07-19 18:41   ` Pavel Machek
2017-07-19 18:41   ` Pavel Machek
2017-07-19 18:41     ` [kernel-hardening] " Pavel Machek
2017-07-18 22:33 ` [RFC 14/22] x86/paravirt: " Thomas Garnier
2017-07-18 22:33   ` [kernel-hardening] " Thomas Garnier
2017-07-18 22:33 ` [RFC 15/22] x86/boot/64: Use _text in a global " Thomas Garnier
2017-07-18 22:33   ` [kernel-hardening] " Thomas Garnier
2017-07-18 22:33 ` [RFC 16/22] x86/percpu: Adapt percpu " Thomas Garnier
2017-07-18 22:33   ` [kernel-hardening] " Thomas Garnier
2017-07-19  3:08   ` Brian Gerst
2017-07-19  3:08     ` [kernel-hardening] " Brian Gerst
2017-07-19 18:26     ` Thomas Garnier
2017-07-19 18:26     ` Thomas Garnier
2017-07-19 18:26       ` [kernel-hardening] " Thomas Garnier
2017-07-19 23:33       ` H. Peter Anvin
2017-07-19 23:33         ` [kernel-hardening] " H. Peter Anvin
2017-07-20  2:21         ` H. Peter Anvin
2017-07-20  2:21           ` [kernel-hardening] " H. Peter Anvin
2017-07-20  3:03           ` H. Peter Anvin
2017-07-20  3:03             ` [kernel-hardening] " H. Peter Anvin
2017-07-20  3:03           ` H. Peter Anvin
2017-07-20  2:21         ` H. Peter Anvin
2017-07-20 14:26         ` Thomas Garnier
2017-07-20 14:26           ` [kernel-hardening] " Thomas Garnier
2017-08-02 16:42           ` Thomas Garnier
2017-08-02 16:42           ` Thomas Garnier
2017-08-02 16:42             ` [kernel-hardening] " Thomas Garnier
2017-08-02 16:56             ` Kees Cook
2017-08-02 16:56               ` [kernel-hardening] " Kees Cook
2017-08-02 18:05               ` Thomas Garnier
2017-08-02 18:05                 ` [kernel-hardening] " Thomas Garnier
2017-08-02 18:05               ` Thomas Garnier
2017-08-02 16:56             ` Kees Cook
2017-07-20 14:26         ` Thomas Garnier
2017-07-19 23:33       ` H. Peter Anvin [this message]
2017-07-19  3:08   ` Brian Gerst
2017-07-18 22:33 ` [RFC 17/22] compiler: Option to default to hidden symbols Thomas Garnier
2017-07-18 22:33   ` [kernel-hardening] " Thomas Garnier
2017-07-18 22:33 ` [RFC 18/22] x86/relocs: Handle DYN relocations for PIE support Thomas Garnier
2017-07-18 22:33   ` [kernel-hardening] " Thomas Garnier
2017-07-18 22:33 ` [RFC 19/22] x86/pie: Add option to build the kernel as PIE for x86_64 Thomas Garnier
2017-07-18 22:33   ` [kernel-hardening] " Thomas Garnier
2017-07-18 22:33 ` [RFC 20/22] x86/relocs: Add option to generate 64-bit relocations Thomas Garnier
2017-07-18 22:33   ` [kernel-hardening] " Thomas Garnier
2017-07-19 22:33   ` H. Peter Anvin
2017-07-19 22:33   ` H. Peter Anvin
2017-07-19 22:33     ` [kernel-hardening] " H. Peter Anvin
2017-07-19 22:47     ` Thomas Garnier
2017-07-19 22:47     ` Thomas Garnier
2017-07-19 22:47       ` [kernel-hardening] " Thomas Garnier
2017-07-19 23:08       ` H. Peter Anvin
2017-07-19 23:08         ` [kernel-hardening] " H. Peter Anvin
2017-07-19 23:25         ` Thomas Garnier
2017-07-19 23:25           ` [kernel-hardening] " Thomas Garnier
2017-07-19 23:45           ` H. Peter Anvin
2017-07-19 23:45           ` H. Peter Anvin
2017-07-19 23:45           ` H. Peter Anvin
2017-07-19 23:45           ` H. Peter Anvin
2017-07-19 23:45           ` H. Peter Anvin
2017-07-19 23:45           ` H. Peter Anvin
2017-07-19 23:45           ` H. Peter Anvin
2017-07-19 23:25         ` Thomas Garnier
2017-07-19 23:08       ` H. Peter Anvin
2017-07-18 22:33 ` [RFC 21/22] x86/module: Add support for mcmodel large and PLTs Thomas Garnier
2017-07-18 22:33   ` [kernel-hardening] " Thomas Garnier
2017-07-19  1:35   ` H. Peter Anvin
2017-07-19  1:35   ` H. Peter Anvin
2017-07-19  1:35     ` [kernel-hardening] " H. Peter Anvin
2017-07-19  3:59     ` Brian Gerst
2017-07-19  3:59     ` Brian Gerst
2017-07-19  3:59       ` [kernel-hardening] " Brian Gerst
2017-07-19 15:58       ` Thomas Garnier
2017-07-19 15:58         ` [kernel-hardening] " Thomas Garnier
2017-07-19 17:34         ` Brian Gerst
2017-07-19 17:34         ` Brian Gerst
2017-07-19 17:34           ` [kernel-hardening] " Brian Gerst
2017-07-24 16:32           ` Thomas Garnier
2017-07-24 16:32             ` [kernel-hardening] " Thomas Garnier
2017-07-24 16:32           ` Thomas Garnier
2017-07-19 15:58       ` Thomas Garnier
2017-07-18 22:33 ` [RFC 22/22] x86/kaslr: Add option to extend KASLR range from 1GB to 3GB Thomas Garnier
2017-07-18 22:33   ` [kernel-hardening] " Thomas Garnier
2017-07-19 12:10   ` Baoquan He
2017-07-19 12:10     ` [kernel-hardening] " Baoquan He
2017-07-19 13:49     ` Baoquan He
2017-07-19 13:49       ` [kernel-hardening] " Baoquan He
2017-07-19 13:49     ` Baoquan He
2017-07-19 12:10   ` Baoquan He
2017-07-19 14:08 ` x86: PIE support and option to extend KASLR randomization Christopher Lameter
2017-07-19 14:08 ` Christopher Lameter
2017-07-19 14:08   ` [kernel-hardening] " Christopher Lameter
2017-07-19 19:21   ` Kees Cook
2017-07-19 19:21     ` [kernel-hardening] " Kees Cook
2017-07-19 19:21   ` Kees Cook

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to='25a2974a-fbb4-ea4b-d090-582d6d0de7fd__46410.0898978815$1500508686$gmane$org@zytor.com' \
    --to=hpa@zytor.com \
    --cc=borntraeger@de.ibm.com \
    --cc=brgerst@gmail.com \
    --cc=catalin.marinas@arm.com \
    --cc=cl@linux.com \
    --cc=cmetcalf@mellanox.com \
    --cc=daniel@iogearbox.net \
    --cc=herbert@gondor.apana.org.au \
    --cc=joro@8bytes.org \
    --cc=kernel-hardening@lists.openwall.com \
    --cc=kvm@vger.kernel.org \
    --cc=linux-arch@vger.kernel.org \
    --cc=linux-sparse@vger.kernel.org \
    --cc=mawilcox@microsoft.com \
    --cc=mhocko@suse.com \
    --cc=mka@chromium.org \
    --cc=paul.gortmaker@windriver.com \
    --cc=pavel@ucw.cz \
    --cc=pefoley2@pefoley.com \
    --cc=peterz@infradead.org \
    --cc=rkrcmar@redhat.com \
    --cc=sparse@chrisli.org \
    --cc=tglx@linutronix.de \
    --cc=thgarnie@google.com \
    --cc=x86@kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.