x86: Add straight-line-speculation mitigation
commit e463a09af2f0677b9485a7e8e4e70b396b2ffb6f upstream. Make use of an upcoming GCC feature to mitigate straight-line-speculation for x86: https://gcc.gnu.org/g:53a643f8568067d7700a9f2facc8ba39974973d3 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=102952 https://bugs.llvm.org/show_bug.cgi?id=52323 It's built tested on x86_64-allyesconfig using GCC-12 and GCC-11. Maintenance overhead of this should be fairly low due to objtool validation. Size overhead of all these additional int3 instructions comes to: text data bss dec hex filename 22267751 6933356 2011368 31212475 1dc43bb defconfig-build/vmlinux 22804126 6933356 1470696 31208178 1dc32f2 defconfig-build/vmlinux.sls Or roughly 2.4% additional text. Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org> Signed-off-by: Borislav Petkov <bp@suse.de> Link: https://lore.kernel.org/r/20211204134908.140103474@infradead.org Signed-off-by: Sasha Levin <sashal@kernel.org> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org> [bwh: Backported to 5.10: - In scripts/Makefile.build, add the objtool option with an ifdef block, same as for other options - Adjust context] Signed-off-by: Ben Hutchings <ben@decadent.org.uk> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
This commit is contained in:

committed by
Greg Kroah-Hartman

parent
0f8532c283
commit
e9925a4584
@@ -462,6 +462,18 @@ config RETPOLINE
|
|||||||
branches. Requires a compiler with -mindirect-branch=thunk-extern
|
branches. Requires a compiler with -mindirect-branch=thunk-extern
|
||||||
support for full protection. The kernel may run slower.
|
support for full protection. The kernel may run slower.
|
||||||
|
|
||||||
|
config CC_HAS_SLS
|
||||||
|
def_bool $(cc-option,-mharden-sls=all)
|
||||||
|
|
||||||
|
config SLS
|
||||||
|
bool "Mitigate Straight-Line-Speculation"
|
||||||
|
depends on CC_HAS_SLS && X86_64
|
||||||
|
default n
|
||||||
|
help
|
||||||
|
Compile the kernel with straight-line-speculation options to guard
|
||||||
|
against straight line speculation. The kernel image might be slightly
|
||||||
|
larger.
|
||||||
|
|
||||||
config X86_CPU_RESCTRL
|
config X86_CPU_RESCTRL
|
||||||
bool "x86 CPU resource control support"
|
bool "x86 CPU resource control support"
|
||||||
depends on X86 && (CPU_SUP_INTEL || CPU_SUP_AMD)
|
depends on X86 && (CPU_SUP_INTEL || CPU_SUP_AMD)
|
||||||
|
@@ -196,7 +196,11 @@ ifdef CONFIG_RETPOLINE
|
|||||||
endif
|
endif
|
||||||
endif
|
endif
|
||||||
|
|
||||||
KBUILD_LDFLAGS := -m elf_$(UTS_MACHINE)
|
ifdef CONFIG_SLS
|
||||||
|
KBUILD_CFLAGS += -mharden-sls=all
|
||||||
|
endif
|
||||||
|
|
||||||
|
KBUILD_LDFLAGS += -m elf_$(UTS_MACHINE)
|
||||||
|
|
||||||
ifdef CONFIG_X86_NEED_RELOCS
|
ifdef CONFIG_X86_NEED_RELOCS
|
||||||
LDFLAGS_vmlinux := --emit-relocs --discard-none
|
LDFLAGS_vmlinux := --emit-relocs --discard-none
|
||||||
|
@@ -18,9 +18,19 @@
|
|||||||
#define __ALIGN_STR __stringify(__ALIGN)
|
#define __ALIGN_STR __stringify(__ALIGN)
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
#ifdef CONFIG_SLS
|
||||||
|
#define RET ret; int3
|
||||||
|
#else
|
||||||
|
#define RET ret
|
||||||
|
#endif
|
||||||
|
|
||||||
#else /* __ASSEMBLY__ */
|
#else /* __ASSEMBLY__ */
|
||||||
|
|
||||||
|
#ifdef CONFIG_SLS
|
||||||
|
#define ASM_RET "ret; int3\n\t"
|
||||||
|
#else
|
||||||
#define ASM_RET "ret\n\t"
|
#define ASM_RET "ret\n\t"
|
||||||
|
#endif
|
||||||
|
|
||||||
#endif /* __ASSEMBLY__ */
|
#endif /* __ASSEMBLY__ */
|
||||||
|
|
||||||
|
@@ -35,7 +35,7 @@
|
|||||||
__ARCH_DEFINE_STATIC_CALL_TRAMP(name, ".byte 0xe9; .long " #func " - (. + 4)")
|
__ARCH_DEFINE_STATIC_CALL_TRAMP(name, ".byte 0xe9; .long " #func " - (. + 4)")
|
||||||
|
|
||||||
#define ARCH_DEFINE_STATIC_CALL_NULL_TRAMP(name) \
|
#define ARCH_DEFINE_STATIC_CALL_NULL_TRAMP(name) \
|
||||||
__ARCH_DEFINE_STATIC_CALL_TRAMP(name, "ret; nop; nop; nop; nop")
|
__ARCH_DEFINE_STATIC_CALL_TRAMP(name, "ret; int3; nop; nop; nop")
|
||||||
|
|
||||||
|
|
||||||
#define ARCH_ADD_TRAMP_KEY(name) \
|
#define ARCH_ADD_TRAMP_KEY(name) \
|
||||||
|
@@ -308,7 +308,7 @@ union ftrace_op_code_union {
|
|||||||
} __attribute__((packed));
|
} __attribute__((packed));
|
||||||
};
|
};
|
||||||
|
|
||||||
#define RET_SIZE 1
|
#define RET_SIZE 1 + IS_ENABLED(CONFIG_SLS)
|
||||||
|
|
||||||
static unsigned long
|
static unsigned long
|
||||||
create_trampoline(struct ftrace_ops *ops, unsigned int *tramp_size)
|
create_trampoline(struct ftrace_ops *ops, unsigned int *tramp_size)
|
||||||
|
@@ -11,6 +11,8 @@ enum insn_type {
|
|||||||
RET = 3, /* tramp / site cond-tail-call */
|
RET = 3, /* tramp / site cond-tail-call */
|
||||||
};
|
};
|
||||||
|
|
||||||
|
static const u8 retinsn[] = { RET_INSN_OPCODE, 0xcc, 0xcc, 0xcc, 0xcc };
|
||||||
|
|
||||||
static void __ref __static_call_transform(void *insn, enum insn_type type, void *func)
|
static void __ref __static_call_transform(void *insn, enum insn_type type, void *func)
|
||||||
{
|
{
|
||||||
int size = CALL_INSN_SIZE;
|
int size = CALL_INSN_SIZE;
|
||||||
@@ -30,8 +32,7 @@ static void __ref __static_call_transform(void *insn, enum insn_type type, void
|
|||||||
break;
|
break;
|
||||||
|
|
||||||
case RET:
|
case RET:
|
||||||
code = text_gen_insn(RET_INSN_OPCODE, insn, func);
|
code = &retinsn;
|
||||||
size = RET_INSN_SIZE;
|
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -40,7 +40,7 @@ SYM_FUNC_START(__memmove)
|
|||||||
/* FSRM implies ERMS => no length checks, do the copy directly */
|
/* FSRM implies ERMS => no length checks, do the copy directly */
|
||||||
.Lmemmove_begin_forward:
|
.Lmemmove_begin_forward:
|
||||||
ALTERNATIVE "cmp $0x20, %rdx; jb 1f", "", X86_FEATURE_FSRM
|
ALTERNATIVE "cmp $0x20, %rdx; jb 1f", "", X86_FEATURE_FSRM
|
||||||
ALTERNATIVE "", "movq %rdx, %rcx; rep movsb; RET", X86_FEATURE_ERMS
|
ALTERNATIVE "", __stringify(movq %rdx, %rcx; rep movsb; RET), X86_FEATURE_ERMS
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* movsq instruction have many startup latency
|
* movsq instruction have many startup latency
|
||||||
|
@@ -34,7 +34,7 @@ SYM_INNER_LABEL(__x86_indirect_thunk_\reg, SYM_L_GLOBAL)
|
|||||||
|
|
||||||
ALTERNATIVE_2 __stringify(ANNOTATE_RETPOLINE_SAFE; jmp *%\reg), \
|
ALTERNATIVE_2 __stringify(ANNOTATE_RETPOLINE_SAFE; jmp *%\reg), \
|
||||||
__stringify(RETPOLINE \reg), X86_FEATURE_RETPOLINE, \
|
__stringify(RETPOLINE \reg), X86_FEATURE_RETPOLINE, \
|
||||||
__stringify(lfence; ANNOTATE_RETPOLINE_SAFE; jmp *%\reg), X86_FEATURE_RETPOLINE_LFENCE
|
__stringify(lfence; ANNOTATE_RETPOLINE_SAFE; jmp *%\reg; int3), X86_FEATURE_RETPOLINE_LFENCE
|
||||||
|
|
||||||
.endm
|
.endm
|
||||||
|
|
||||||
|
@@ -230,6 +230,9 @@ endif
|
|||||||
ifdef CONFIG_X86_SMAP
|
ifdef CONFIG_X86_SMAP
|
||||||
objtool_args += --uaccess
|
objtool_args += --uaccess
|
||||||
endif
|
endif
|
||||||
|
ifdef CONFIG_SLS
|
||||||
|
objtool_args += --sls
|
||||||
|
endif
|
||||||
|
|
||||||
# 'OBJECT_FILES_NON_STANDARD := y': skip objtool checking for a directory
|
# 'OBJECT_FILES_NON_STANDARD := y': skip objtool checking for a directory
|
||||||
# 'OBJECT_FILES_NON_STANDARD_foo.o := 'y': skip objtool checking for a file
|
# 'OBJECT_FILES_NON_STANDARD_foo.o := 'y': skip objtool checking for a file
|
||||||
|
@@ -77,6 +77,9 @@ objtool_link()
|
|||||||
if [ -n "${CONFIG_X86_SMAP}" ]; then
|
if [ -n "${CONFIG_X86_SMAP}" ]; then
|
||||||
objtoolopt="${objtoolopt} --uaccess"
|
objtoolopt="${objtoolopt} --uaccess"
|
||||||
fi
|
fi
|
||||||
|
if [ -n "${CONFIG_SLS}" ]; then
|
||||||
|
objtoolopt="${objtoolopt} --sls"
|
||||||
|
fi
|
||||||
info OBJTOOL ${1}
|
info OBJTOOL ${1}
|
||||||
tools/objtool/objtool ${objtoolopt} ${1}
|
tools/objtool/objtool ${objtoolopt} ${1}
|
||||||
fi
|
fi
|
||||||
|
Reference in New Issue
Block a user