[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <201906101526.66E589DDD@keescook>
Date: Mon, 10 Jun 2019 15:26:37 -0700
From: Kees Cook <keescook@...omium.org>
To: Thomas Garnier <thgarnie@...omium.org>
Cc: kernel-hardening@...ts.openwall.com, kristen@...ux.intel.com,
Thomas Garnier <thgarnie@...gle.com>,
Thomas Gleixner <tglx@...utronix.de>,
Ingo Molnar <mingo@...hat.com>, Borislav Petkov <bp@...en8.de>,
"H. Peter Anvin" <hpa@...or.com>, x86@...nel.org,
Juergen Gross <jgross@...e.com>,
Feng Tang <feng.tang@...el.com>,
Maran Wilson <maran.wilson@...cle.com>,
Jan Beulich <JBeulich@...e.com>,
Andy Lutomirski <luto@...nel.org>, linux-kernel@...r.kernel.org
Subject: Re: [PATCH v7 09/12] x86/boot/64: Adapt assembly for PIE support
On Mon, May 20, 2019 at 04:19:34PM -0700, Thomas Garnier wrote:
> From: Thomas Garnier <thgarnie@...gle.com>
>
> Change the assembly code to use only relative references of symbols for the
> kernel to be PIE compatible.
>
> Early at boot, the kernel is mapped at a temporary address while preparing
> the page table. To know the changes needed for the page table with KASLR,
> the boot code calculate the difference between the expected address of the
> kernel and the one chosen by KASLR. It does not work with PIE because all
> symbols in code are relatives. Instead of getting the future relocated
> virtual address, you will get the current temporary mapping.
> Instructions were changed to have absolute 64-bit references.
>
> Position Independent Executable (PIE) support will allow to extend the
> KASLR randomization range below 0xffffffff80000000.
>
> Signed-off-by: Thomas Garnier <thgarnie@...gle.com>
Reviewed-by: Kees Cook <keescook@...omium.org>
-Kees
> ---
> arch/x86/kernel/head_64.S | 16 ++++++++++------
> 1 file changed, 10 insertions(+), 6 deletions(-)
>
> diff --git a/arch/x86/kernel/head_64.S b/arch/x86/kernel/head_64.S
> index bcd206c8ac90..64a4f0a22b20 100644
> --- a/arch/x86/kernel/head_64.S
> +++ b/arch/x86/kernel/head_64.S
> @@ -90,8 +90,10 @@ startup_64:
> popq %rsi
>
> /* Form the CR3 value being sure to include the CR3 modifier */
> - addq $(early_top_pgt - __START_KERNEL_map), %rax
> + movabs $(early_top_pgt - __START_KERNEL_map), %rcx
> + addq %rcx, %rax
> jmp 1f
> +
> ENTRY(secondary_startup_64)
> UNWIND_HINT_EMPTY
> /*
> @@ -120,7 +122,8 @@ ENTRY(secondary_startup_64)
> popq %rsi
>
> /* Form the CR3 value being sure to include the CR3 modifier */
> - addq $(init_top_pgt - __START_KERNEL_map), %rax
> + movabs $(init_top_pgt - __START_KERNEL_map), %rcx
> + addq %rcx, %rax
> 1:
>
> /* Enable PAE mode, PGE and LA57 */
> @@ -138,7 +141,7 @@ ENTRY(secondary_startup_64)
> movq %rax, %cr3
>
> /* Ensure I am executing from virtual addresses */
> - movq $1f, %rax
> + movabs $1f, %rax
> ANNOTATE_RETPOLINE_SAFE
> jmp *%rax
> 1:
> @@ -235,11 +238,12 @@ ENTRY(secondary_startup_64)
> * REX.W + FF /5 JMP m16:64 Jump far, absolute indirect,
> * address given in m16:64.
> */
> - pushq $.Lafter_lret # put return address on stack for unwinder
> + movabs $.Lafter_lret, %rax
> + pushq %rax # put return address on stack for unwinder
> xorl %ebp, %ebp # clear frame pointer
> - movq initial_code(%rip), %rax
> + leaq initial_code(%rip), %rax
> pushq $__KERNEL_CS # set correct cs
> - pushq %rax # target address in negative space
> + pushq (%rax) # target address in negative space
> lretq
> .Lafter_lret:
> END(secondary_startup_64)
> --
> 2.21.0.1020.gf2820cf01a-goog
>
--
Kees Cook
Powered by blists - more mailing lists