From patchwork Fri May 15 14:40:44 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Szabolcs Nagy X-Patchwork-Id: 39262 Return-Path: X-Original-To: patchwork@sourceware.org Delivered-To: patchwork@sourceware.org Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id C79A139858BD; Fri, 15 May 2020 14:41:27 +0000 (GMT) X-Original-To: libc-alpha@sourceware.org Delivered-To: libc-alpha@sourceware.org Received: from EUR02-AM5-obe.outbound.protection.outlook.com (mail-eopbgr00055.outbound.protection.outlook.com [40.107.0.55]) by sourceware.org (Postfix) with ESMTPS id 82F543985453 for ; Fri, 15 May 2020 14:41:13 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.3.2 sourceware.org 82F543985453 Authentication-Results: sourceware.org; dmarc=none (p=none dis=none) header.from=arm.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=Szabolcs.Nagy@arm.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=BHDJG48RPKf8jcXJ1NA9cPbu26OQ2kcg3bkrQ0wjDBw=; b=KKlweZhxl/b/Khl6ysAuZgZViOr0HJdE//dG3MA0St95LdaAX9oPlLu0DK3VhZ0CajAD4YOYeAE4D9GROBHydGvzRPG0s0p+dZ/mfQ/s+ZY1eEhHC7IOFmpTscwb++j/gn7x76knBlN8XxyiQakL/kfZVX5eq4neRELj4cqzHNc= Received: from AM0PR07CA0012.eurprd07.prod.outlook.com (2603:10a6:208:ac::25) by VI1PR0802MB2622.eurprd08.prod.outlook.com (2603:10a6:800:b0::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3000.25; Fri, 15 May 2020 14:41:11 +0000 Received: from AM5EUR03FT017.eop-EUR03.prod.protection.outlook.com (2603:10a6:208:ac:cafe::5a) by AM0PR07CA0012.outlook.office365.com (2603:10a6:208:ac::25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3021.10 via Frontend Transport; Fri, 15 May 2020 14:41:11 +0000 Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; sourceware.org; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com; sourceware.org; dmarc=bestguesspass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AM5EUR03FT017.mail.protection.outlook.com (10.152.16.89) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3000.19 via Frontend Transport; Fri, 15 May 2020 14:41:10 +0000 Received: ("Tessian outbound 4cdf5642225a:v54"); Fri, 15 May 2020 14:41:10 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: bde2acb0c81c475d X-CR-MTA-TID: 64aa7808 Received: from d8c8fe1eabb3.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 022828A7-D7FC-4AAE-8C90-05A9E7B964DA.1; Fri, 15 May 2020 14:41:04 +0000 Received: from EUR03-DB5-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id d8c8fe1eabb3.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Fri, 15 May 2020 14:41:04 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=d0DpOLJyKD0PtqhkkAfkSECoDO/XzPYYaMy4hc1BrX85GX+agtEHEXDgAIoE/gegBQJIO9K5p6a2beMgm/3SjnXl2OqLLvZ1layJZ/UnDYjUZ/W2ltP0veRr2eV1o16xeNaAQnB9hkG1grzT6Akyr4ecbWzjagZewgBXp+4WToVXJXssk9JyfSEIbYqznJv6B2WW08Bl7ECFG4Y/ZEvfpcOhptIgQLVJBZ0CSgAKl5Pxc2NNAW/Su7gBpeuRKAo0RhIFXGYamh/Vs/tvrll4M8RHCbtTPFDrxN2h2eitBiGnI0bTKyawf98UBCA0BsiallMc/Fe6JKnuL+HIbmjbjA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=BHDJG48RPKf8jcXJ1NA9cPbu26OQ2kcg3bkrQ0wjDBw=; b=E6kNzcuPE8+S9mv+RHl30cY7V7R+oTveWNjbGaVVIQH8N/Jt1Smm3YbZ9G36DsmDSWnPOZmfpPkvAPQf0uLm+lK48VCnkW39tesZfSzyvOw1vpz8YJ4KPvPV+fjaHD97euEPQmRZx6okak9ZqDQuC3G+5gsmN2RjXedUr6hDZeuQ9dT1JiYCxYpxsrIQyDWl39bzurQsFaVFRzij4vt7WbPsSTi7oa8iI09M1SJEikwsg0lW4flJO6IHs77uFcMNd6TJexAvp0gLotrMkl0lFA4UArm8NEExfFC9gkFsxX8t/Dmw095NvTIvWJYSGWnPzI8vrCZrzms2h6O9J6W2gg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=BHDJG48RPKf8jcXJ1NA9cPbu26OQ2kcg3bkrQ0wjDBw=; b=KKlweZhxl/b/Khl6ysAuZgZViOr0HJdE//dG3MA0St95LdaAX9oPlLu0DK3VhZ0CajAD4YOYeAE4D9GROBHydGvzRPG0s0p+dZ/mfQ/s+ZY1eEhHC7IOFmpTscwb++j/gn7x76knBlN8XxyiQakL/kfZVX5eq4neRELj4cqzHNc= Authentication-Results-Original: sourceware.org; dkim=none (message not signed) header.d=none;sourceware.org; dmarc=none action=none header.from=arm.com; Received: from AM6PR08MB3047.eurprd08.prod.outlook.com (2603:10a6:209:4c::23) by AM6PR08MB3528.eurprd08.prod.outlook.com (2603:10a6:20b:4b::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2979.34; Fri, 15 May 2020 14:41:03 +0000 Received: from AM6PR08MB3047.eurprd08.prod.outlook.com ([fe80::49fd:6ded:4da7:8862]) by AM6PR08MB3047.eurprd08.prod.outlook.com ([fe80::49fd:6ded:4da7:8862%7]) with mapi id 15.20.2979.033; Fri, 15 May 2020 14:41:03 +0000 From: Szabolcs Nagy To: libc-alpha@sourceware.org Subject: [PATCH v3 00/13] aarch64: branch protection support Date: Fri, 15 May 2020 15:40:44 +0100 Message-Id: X-Mailer: git-send-email 2.17.1 X-ClientProxiedBy: LO2P265CA0309.GBRP265.PROD.OUTLOOK.COM (2603:10a6:600:a5::33) To AM6PR08MB3047.eurprd08.prod.outlook.com (2603:10a6:209:4c::23) MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 Received: from localhost.localdomain (217.140.106.55) by LO2P265CA0309.GBRP265.PROD.OUTLOOK.COM (2603:10a6:600:a5::33) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3000.24 via Frontend Transport; Fri, 15 May 2020 14:41:02 +0000 X-Mailer: git-send-email 2.17.1 X-Originating-IP: [217.140.106.55] X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-HT: Tenant X-MS-Office365-Filtering-Correlation-Id: 559d24f4-345d-4fee-c523-08d7f8de02a5 X-MS-TrafficTypeDiagnostic: AM6PR08MB3528:|VI1PR0802MB2622: X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true NoDisclaimer: true X-MS-Oob-TLC-OOBClassifiers: OLM:9508;OLM:9508; X-Forefront-PRVS: 04041A2886 X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 0esHVndyCRiy7Stm/FE2kcAEsdt+lTQjcaA0/VTVHdY4pmOOK5kQOl45npgBZqw2xC4B6Jx/GyziknLpupeav66Uj2LAHKHcMGZMVQaDiq35/XSeO+APwg3vjendmk6PMkJ5hHWwR8cefjuY2qJgACUkBU3/qVqHHfdRPFQUT52evusE3QB8H2mnvmVKPlvBjnlREM1ygLNvqk+J3XCx7eyE3KkcXgJkUwoEAtGH8xRgI8IOM2K3y0wJ7VijoqHuJhOkY7MkkhV1B4udp3sgoZtozat0l8sOAjAo3UfV2AsmliuZfW0ZNT0Yeq5GufZH5cQkzVOQzwjvubenaFUAPCj/fmC1DUlNaw6qeoMqLm8ayPDllL4ai/a1rsxYW9mXDCIpTJDg5WJ7561EMJ/pJslpHy0xeMgy3GWFV8+zspzyWmRGzMGe7TaXPp+FKYfQHxyf1TfYBKOCJItAd7k100yFiZ86WIYKfQ9V8yCwRvWoOcQ16X1WeyZe/GcaHeWI+KFTpK2MNmbujS6CcsSf9cUvlr5h+tBAgGT617f1DA0= X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM6PR08MB3047.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(136003)(376002)(39860400002)(346002)(366004)(396003)(86362001)(6506007)(69590400007)(52116002)(478600001)(316002)(6666004)(6916009)(6486002)(66556008)(44832011)(6512007)(5660300002)(2906002)(956004)(66476007)(8936002)(66946007)(36756003)(186003)(26005)(2616005)(8676002)(16526019)(136400200001); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData: 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 X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB3528 Original-Authentication-Results: sourceware.org; dkim=none (message not signed) header.d=none; sourceware.org; dmarc=none action=none header.from=arm.com; X-EOPAttributedMessage: 0 X-MS-Exchange-Transport-CrossTenantHeadersStripped: AM5EUR03FT017.eop-EUR03.prod.protection.outlook.com X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFTY:; SFS:(4636009)(396003)(376002)(346002)(39860400002)(136003)(46966005)(36756003)(5660300002)(82310400002)(356005)(70586007)(6666004)(47076004)(6512007)(478600001)(81166007)(70206006)(44832011)(69590400007)(316002)(8676002)(6486002)(36906005)(6506007)(8936002)(2906002)(2616005)(956004)(26005)(16526019)(6916009)(86362001)(336012)(82740400003)(186003)(136400200001); DIR:OUT; SFP:1101; X-MS-Office365-Filtering-Correlation-Id-Prvs: 929a6cc7-fe09-4cac-c3b3-08d7f8ddfe05 X-Forefront-PRVS: 04041A2886 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 May 2020 14:41:10.6491 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 559d24f4-345d-4fee-c523-08d7f8de02a5 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0802MB2622 X-Spam-Status: No, score=-14.6 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, MSGID_FROM_MTA_HEADER, RCVD_IN_DNSWL_LOW, RCVD_IN_MSPIKE_H2, SPF_HELO_PASS, SPF_PASS, TXREP, UNPARSEABLE_RELAY autolearn=ham autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on server2.sourceware.org X-BeenThere: libc-alpha@sourceware.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Libc-alpha mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: libc-alpha-bounces@sourceware.org Sender: "Libc-alpha" Indirect branch target identification (BTI, armv8.5-a) and return address signing using pointer authentication (PAC-RET, armv8.3-a) can be used for security hardening against some control flow hijack attacks. In gcc these are exposed via -mbranch-protection=bti+pac-ret which is the same as -mbranch-protection=standard and gcc can be configured via --enable-standard-branch-protection to use them by default. BTI requires libc support: it is an opt-in feature per ELF module via a GNU property note that the dynamic linker has to check and mprotect the executable pages with PROT_BTI. And libc objects that are statically linked into user binaries must be BTI compatible for the GNU property note to be present. (The property note is handled by linux for static linked executables and for the ld.so.) PAC-RET does not require libc runtime support, (other than for _mcount with current -pg code gen), but, just like BTI, it can be used in libc binaries for security hardening. v3: - instead of END_FILE add note in sysdep.h. - dropped the syscall template patch (END_FILE is not needed). - PATCH 05: remove END_FILE macros. - PATCH 05: clarify the GNU_PROPERTY macro and related defines. - PATCH 09: separate hook for PT_GNU_PROPERTY handling. - PATCH 09: modified rtld.c and dl-load.c accordingly. - PATCH 09: rename linkmap->bti_guarded to linkmap->bti. - PATCH 13: new patch, update _mcount for pac-ret. - fixed TODOs except for the last two patches, which are written for current gcc behaviour. - I'm waiting for a review of PATCH 03 and welcome comments on the rest of the set, which i consider done unless there are changes on the gcc or linux side. v2: - removed --enable-branch-protection-standard configure option, branch protection in glibc is enabled based on the compiler default. - GNU property notes are disabled if compiler/linker has no support. - pac-ret is enabled based on compiler defaults. - PATCH 03: cleaner csu/abi-note.c and fix arm/abi-note.S. - PATCH 04: new (bti config check). - PATCH 09: drop the umount2 change. - PATCH 10: use bool instead of int. - PATCH 10: fix code style and comments. - PATCH 10: add linux version requirement to description. - PATCH 11: new (pac-ret config check). - PATCH 12: only use pac-ret if HAVE_AARCH64_PAC_RET. - PATCH 12: fix pac-ret use in dl-trampoline.S. - PATCH 13: use static inline instead of macro, update description. - addressed some of the reviews from Adhemerval, the remaining ones are marked as TODO in the descriptions and will require another test run or agreement on the design. Ran cross tests in qemu using the linux for-next/bti-user branch of git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git FAIL: elf/tst-audit14 FAIL: elf/tst-audit15 FAIL: elf/tst-audit16 cross test issue. (/dev/stdout is pipe) FAIL: elf/tst-ldconfig-ld_so_conf-update cross test issue. (etc/ld.so.cache is missing) XPASS: elf/tst-protected1a XPASS: elf/tst-protected1b UNSUPPORTED: iconv/tst-gconv-init-failure FAIL: io/ftwtest cross test issue. (symlink to nfs root) FAIL: libio/tst-wfile-sync cross test issue. (stdin is pipe, bug 24668) UNSUPPORTED: math/test-fesetexcept-traps UNSUPPORTED: math/test-fexcept-traps UNSUPPORTED: math/test-nearbyint-except-2 UNSUPPORTED: misc/tst-pkey FAIL: nptl/test-cond-printers FAIL: nptl/test-condattr-printers FAIL: nptl/test-mutex-printers FAIL: nptl/test-mutexattr-printers FAIL: nptl/test-rwlock-printers FAIL: nptl/test-rwlockattr-printers cross test issue. FAIL: nptl/tst-cancel7 FAIL: nptl/tst-cancelx7 cross test issue. (racy test, bug 14232) UNSUPPORTED: posix/tst-spawn4-compat UNSUPPORTED: resolv/tst-resolv-ai_idn UNSUPPORTED: resolv/tst-resolv-ai_idn-latin1 Summary of test results: 14 FAIL 4127 PASS 8 UNSUPPORTED 17 XFAIL 2 XPASS Sudakshina Das (2): aarch64: Add BTI support to assembly files aarch64: enable BTI at runtime Szabolcs Nagy (11): elf.h: Add PT_GNU_PROPERTY elf.h: add aarch64 property definitions Rewrite abi-note.S in C. aarch64: configure test for BTI support aarch64: Rename place holder .S files to .c aarch64: fix swapcontext for BTI aarch64: fix RTLD_START for BTI aarch64: configure check for pac-ret code generation aarch64: Add pac-ret support to assembly files aarch64: redefine RETURN_ADDRESS to strip PAC aarch64: fix _mcount for pac-ret config.h.in | 6 + csu/{abi-note.S => abi-note.c} | 28 ++-- elf/dl-load.c | 13 ++ elf/elf.h | 7 + elf/rtld.c | 6 + sysdeps/aarch64/Makefile | 4 + .../aarch64/{bsd-_setjmp.S => bsd-_setjmp.c} | 0 .../aarch64/{bsd-setjmp.S => bsd-setjmp.c} | 0 sysdeps/aarch64/configure | 81 ++++++++++ sysdeps/aarch64/configure.ac | 40 +++++ sysdeps/aarch64/crti.S | 10 ++ sysdeps/aarch64/crtn.S | 8 + sysdeps/aarch64/dl-bti.c | 54 +++++++ sysdeps/aarch64/dl-machine.h | 5 +- sysdeps/aarch64/dl-prop.h | 145 ++++++++++++++++++ sysdeps/aarch64/dl-tlsdesc.S | 11 ++ sysdeps/aarch64/dl-trampoline.S | 20 +++ sysdeps/aarch64/linkmap.h | 3 + sysdeps/aarch64/machine-gmon.h | 2 +- sysdeps/aarch64/{memmove.S => memmove.c} | 0 sysdeps/aarch64/start.S | 1 + sysdeps/aarch64/sysdep.h | 57 ++++++- sysdeps/arm/abi-note.S | 8 - sysdeps/generic/dl-prop.h | 16 +- sysdeps/unix/sysv/linux/aarch64/bits/hwcap.h | 1 + sysdeps/unix/sysv/linux/aarch64/bits/mman.h | 31 ++++ .../unix/sysv/linux/aarch64/cpu-features.c | 3 + .../unix/sysv/linux/aarch64/cpu-features.h | 2 + sysdeps/unix/sysv/linux/aarch64/swapcontext.S | 14 +- sysdeps/x86/dl-prop.h | 6 + 30 files changed, 554 insertions(+), 28 deletions(-) rename csu/{abi-note.S => abi-note.c} (88%) rename sysdeps/aarch64/{bsd-_setjmp.S => bsd-_setjmp.c} (100%) rename sysdeps/aarch64/{bsd-setjmp.S => bsd-setjmp.c} (100%) create mode 100644 sysdeps/aarch64/dl-bti.c create mode 100644 sysdeps/aarch64/dl-prop.h rename sysdeps/aarch64/{memmove.S => memmove.c} (100%) delete mode 100644 sysdeps/arm/abi-note.S create mode 100644 sysdeps/unix/sysv/linux/aarch64/bits/mman.h