From mboxrd@z Thu Jan 1 00:00:00 1970 From: Michael Tremer To: development@lists.ipfire.org Subject: Re: [PATCH 18/21] linux: Poison kernel stack before returning from syscalls Date: Tue, 27 Dec 2022 12:35:43 +0100 Message-ID: In-Reply-To: <0d75d16c-8e27-f49d-f1b4-548a52a7a763@ipfire.org> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============2568575072356972605==" List-Id: --===============2568575072356972605== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable > On 26 Dec 2022, at 20:30, Peter M=C3=BCller wr= ote: >=20 > From the kernel documentation: >=20 >> This option makes the kernel erase the kernel stack before >> returning from system calls. This has the effect of leaving >> the stack initialized to the poison value, which both reduces >> the lifetime of any sensitive stack contents and reduces >> potential for uninitialized stack variable exploits or information >> exposures (it does not cover functions reaching the same stack >> depth as prior functions during the same syscall). This blocks >> most uninitialized stack variable attacks, with the performance >> impact being driven by the depth of the stack usage, rather than >> the function calling complexity. >>=20 >> The performance impact on a single CPU system kernel compilation >> sees a 1% slowdown, other systems and workloads may vary and you >> are advised to test this feature on your expected workload before >> deploying it. >>=20 >> This plugin was ported from grsecurity/PaX. >=20 > Let's give it a try. A 1% increase in compile time does not bother us > too much, and given that this is enabled in IPFire 3.x as well, we may > as well take the opportunity to gain experience with this in the field. This is enabled, but not tested. And it does not say, that this will increase the compile time. Compiling the = kernel is the benchmark here. Since IPFire (as a firewall) is very syscall-heavy, we might indeed have a mi= ght higher impact. > Signed-off-by: Peter M=C3=BCller > --- > config/kernel/kernel.config.x86_64-ipfire | 5 ++++- > 1 file changed, 4 insertions(+), 1 deletion(-) >=20 > diff --git a/config/kernel/kernel.config.x86_64-ipfire b/config/kernel/kern= el.config.x86_64-ipfire > index f1d6c2ede..3d9e01e38 100644 > --- a/config/kernel/kernel.config.x86_64-ipfire > +++ b/config/kernel/kernel.config.x86_64-ipfire > @@ -6915,7 +6915,10 @@ CONFIG_GCC_PLUGIN_STRUCTLEAK=3Dy > # CONFIG_GCC_PLUGIN_STRUCTLEAK_BYREF is not set > CONFIG_GCC_PLUGIN_STRUCTLEAK_BYREF_ALL=3Dy > # CONFIG_GCC_PLUGIN_STRUCTLEAK_VERBOSE is not set > -# CONFIG_GCC_PLUGIN_STACKLEAK is not set > +CONFIG_GCC_PLUGIN_STACKLEAK=3Dy > +CONFIG_STACKLEAK_TRACK_MIN_SIZE=3D100 > +# CONFIG_STACKLEAK_METRICS is not set > +# CONFIG_STACKLEAK_RUNTIME_DISABLE is not set > CONFIG_INIT_ON_ALLOC_DEFAULT_ON=3Dy > # CONFIG_INIT_ON_FREE_DEFAULT_ON is not set > CONFIG_CC_HAS_ZERO_CALL_USED_REGS=3Dy > --=20 > 2.35.3 --===============2568575072356972605==--