[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <303fc4ee5ac04e4fac104df1188952e8@AcuMS.aculab.com>
Date: Wed, 1 May 2019 08:41:57 +0000
From: David Laight <David.Laight@...LAB.COM>
To: "'Reshetova, Elena'" <elena.reshetova@...el.com>,
Andy Lutomirski <luto@...capital.net>
CC: Theodore Ts'o <tytso@....edu>, Eric Biggers <ebiggers3@...il.com>,
"ebiggers@...gle.com" <ebiggers@...gle.com>,
"herbert@...dor.apana.org.au" <herbert@...dor.apana.org.au>,
Ingo Molnar <mingo@...nel.org>,
Peter Zijlstra <peterz@...radead.org>,
"keescook@...omium.org" <keescook@...omium.org>,
Daniel Borkmann <daniel@...earbox.net>,
"luto@...nel.org" <luto@...nel.org>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
"jpoimboe@...hat.com" <jpoimboe@...hat.com>,
"jannh@...gle.com" <jannh@...gle.com>,
"Perla, Enrico" <enrico.perla@...el.com>,
"mingo@...hat.com" <mingo@...hat.com>,
"bp@...en8.de" <bp@...en8.de>,
"tglx@...utronix.de" <tglx@...utronix.de>,
"gregkh@...uxfoundation.org" <gregkh@...uxfoundation.org>,
"Edgecombe, Rick P" <rick.p.edgecombe@...el.com>
Subject: RE: [PATCH] x86/entry/64: randomize kernel stack offset upon syscall
From: Reshetova, Elena
> Sent: 30 April 2019 18:51
...
> +unsigned char random_get_byte(void)
> +{
> + struct rnd_buffer *buffer = &get_cpu_var(stack_rand_offset);
> + unsigned char res;
> +
> + if (buffer->byte_counter >= RANDOM_BUFFER_SIZE) {
> + get_random_bytes(&(buffer->buffer), sizeof(buffer->buffer));
> + buffer->byte_counter = 0;
> + }
> +
> + res = buffer->buffer[buffer->byte_counter];
> + buffer->buffer[buffer->byte_counter] = 0;
If is really worth dirtying a cache line to zero data we've used?
The unused bytes following are much more interesting.
Actually if you got 'byte_counter' into a completely different
area of memory (in data that is changed more often to avoid
dirtying an extra cache line) then not zeroing the used data
would make it harder to determine which byte will be used next.
I'm also guessing that get_cpu_var() disables pre-emption?
This code could probably run 'fast and loose' and just ignore
the fact that pre-emption would have odd effects.
All it would do is perturb the randomness!
David
> + buffer->byte_counter ++;
> + put_cpu_var(stack_rand_offset);
> + return res;
> +}
> +EXPORT_SYMBOL(random_get_byte);
-
Registered Address Lakeside, Bramley Road, Mount Farm, Milton Keynes, MK1 1PT, UK
Registration No: 1397386 (Wales)
Powered by blists - more mailing lists