Re: [PATCH] x86, kaslr: mix entropy sources together as needed

From: Kees Cook
Date: Mon Nov 11 2013 - 16:31:20 EST


On Mon, Nov 11, 2013 at 12:57 PM, Ingo Molnar <mingo@xxxxxxxxxx> wrote:
>
> * Kees Cook <keescook@xxxxxxxxxxxx> wrote:
>
>> Depending on availability, mix the RDRAND and RDTSC entropy together with
>> XOR. Only when neither is available should the i8254 be used. Update
>> the Kconfig documentation to reflect this. Additionally, since bits
>> used for entropy is masked elsewhere, drop the needless masking in the
>> get_random_long().
>>
>> Finally, to improve the starting entropy, do a simple hashing of the
>> boot_params structure for some additional level of unpredictability.
>>
>> Signed-off-by: Kees Cook <keescook@xxxxxxxxxxxx>
>> ---
>> arch/x86/Kconfig | 14 +++++++----
>> arch/x86/boot/compressed/aslr.c | 52 ++++++++++++++++++++++++++++-----------
>> 2 files changed, 46 insertions(+), 20 deletions(-)
>>
>> diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig
>> index ee3b38363063..119455802d57 100644
>> --- a/arch/x86/Kconfig
>> +++ b/arch/x86/Kconfig
>> @@ -1736,13 +1736,17 @@ config RANDOMIZE_BASE
>> deters exploit attempts relying on knowledge of the location
>> of kernel internals.
>>
>> + Entropy is generated using the RDRAND instruction if it is
>> + supported. If RDTSC is supported, it is used as well. If
>> + neither RDRAND nor RDTSC are supported, then randomness is
>> + read from the i8254 timer.
>>
>> The kernel will be offset by up to RANDOMIZE_BASE_MAX_OFFSET,
>> + and aligned according to PHYSICAL_ALIGN. Since the kernel is
>> + built using 2GiB addressing, and PHYSICAL_ALGIN must be at a
>> + minimum of 2MiB, only 10 bits of entropy is theoretically
>> + possible. At best, due to page table layouts, 64-bit can use
>> + 9 bits of entropy and 32-bit uses 8 bits.
>
> Perfect!
>
>> +/* Simple way to create an alternate starting entropy. */
>> +static unsigned long get_boot_hash(void)
>
> s/get_random_boot, signifying that we want to get some initial randomness?
>
> Btw., could we also add some build build time source of randomness as
> well? That won't help distro kernels which all share the same build but it
> would be a nice touch for self-built kernels and Gentoo systems.

Sure thing. Now sent.

>
>> +{
>> + int i;
>> + unsigned long hash = 0;
>> + unsigned long *ptr = (unsigned long *)real_mode;
>> +
>> + for (i = 0; i < sizeof(*real_mode) / sizeof(hash); i++) {
>> + /* Rotate and XOR */
>> + hash = (hash << ((sizeof(hash) - 1) * 8)) | (hash >> 8);
>> + hash ^= ptr[i];
>> + }
>> +
>> + return hash;
>
> Looks mostly good, but I'm too tired to ack this bit now, maybe hpa will
> have a look :-)
>
>> +}
>> +
>> static unsigned long get_random_long(void)
>> {
>> + unsigned long random = get_boot_hash();
>> + bool use_i8254 = true;
>> +
>> + debug_putstr("KASLR using");
>>
>> if (has_cpuflag(X86_FEATURE_RDRAND)) {
>> + unsigned long raw;
>> +
>> + debug_putstr(" RDRAND");
>> + if (rdrand_long(&raw)) {
>> + random ^= raw;
>> + use_i8254 = false;
>> + }
>> }
>>
>> if (has_cpuflag(X86_FEATURE_TSC)) {
>> uint32_t raw;
>>
>> + debug_putstr(" RDTSC");
>> rdtscl(raw);
>>
>> + random ^= raw;
>> + use_i8254 = false;
>
> The TSC is 64-bits. The high bits will most likely be 0, but just in case
> there's some dirt up there or BIOS bootup takes more than 4G cycles we
> might as well use the high portion as well!

Oops, I missed this suggestion entirely when I first read this email. :)

v3 on it's way!

>
>> }
>>
>> + if (use_i8254) {
>> + debug_putstr(" i8254");
>> + random ^= i8254();
>> + }
>> +
>> + debug_putstr("...\n");
>> +
>> return random;
>> }
>
> Looks good otherwise.

Thanks!

-Kees

>
> Thanks,
>
> Ingo



--
Kees Cook
Chrome OS Security
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/