From patchwork Fri Jun 12 13:29:18 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Szabolcs Nagy X-Patchwork-Id: 39573 Return-Path: X-Original-To: patchwork@sourceware.org Delivered-To: patchwork@sourceware.org Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id 109F1395B02B; Fri, 12 Jun 2020 13:29:55 +0000 (GMT) X-Original-To: libc-alpha@sourceware.org Delivered-To: libc-alpha@sourceware.org Received: from EUR04-DB3-obe.outbound.protection.outlook.com (mail-eopbgr60065.outbound.protection.outlook.com [40.107.6.65]) by sourceware.org (Postfix) with ESMTPS id 250DA386F012 for ; Fri, 12 Jun 2020 13:29:51 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.3.2 sourceware.org 250DA386F012 Authentication-Results: sourceware.org; dmarc=none (p=none dis=none) header.from=arm.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=Szabolcs.Nagy@arm.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=zzz/OjV2Tf3RGyW5rF6RMJI9EXUbV0yinYvHEMOSZ1g=; b=jPLVRHD4j12LEh3mmwJvsJiFl4pBWN8Sv05Toq28961UZqk4OZV/By4gWSHNTu8J83aSmqxRWMV28ITJhxh3H4CTRhIXZQU5aUY+wJ9lOH1u4rcIcvGCRNmqCFZbg4RHU4Cs1mQMsAXbplGL3bWfECPbrnpPx2JTFJj3zkdOqpM= Received: from AM7PR04CA0024.eurprd04.prod.outlook.com (2603:10a6:20b:110::34) by VI1PR08MB2655.eurprd08.prod.outlook.com (2603:10a6:802:19::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3066.18; Fri, 12 Jun 2020 13:29:48 +0000 Received: from AM5EUR03FT013.eop-EUR03.prod.protection.outlook.com (2603:10a6:20b:110:cafe::9c) by AM7PR04CA0024.outlook.office365.com (2603:10a6:20b:110::34) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3088.20 via Frontend Transport; Fri, 12 Jun 2020 13:29:48 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; sourceware.org; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com; sourceware.org; dmarc=bestguesspass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AM5EUR03FT013.mail.protection.outlook.com (10.152.16.140) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3088.18 via Frontend Transport; Fri, 12 Jun 2020 13:29:48 +0000 Received: ("Tessian outbound 8bb15bb571b3:v59"); Fri, 12 Jun 2020 13:29:48 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 69d6b0a67eef7542 X-CR-MTA-TID: 64aa7808 Received: from 296018ff88c0.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 38080238-470F-4633-84A7-77D8BAFC778B.1; Fri, 12 Jun 2020 13:29:42 +0000 Received: from EUR01-DB5-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 296018ff88c0.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Fri, 12 Jun 2020 13:29:42 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=laAr1ogVY3ugwNklqu03xohJKZoL7miLwlg9HQ8uauvgT6gdTEX+MkK7C7lqE2wsZOYSVOGqkwVO4ckwjaAZf230hzF5WLF7OdZ1DON3JrmYi4arke/Y19bzvhSOu2w7FeVTXTTtYAOLD6WcKembpdBP6mlBtWGSk1+q1rcs1Ctkb4kR3HFCtR69d4YqYXtNxzACUijtvpjqgMZQqFPppDe+6n7+/dAREfmL20WOMwtPhj4NLzcNix/DvrSe5DRzTEUFCfgjcMLeGwR71lEZatlKkDUxqiKRMvHDAlP2uNMPd3db7jqEPmNMmaw0oUjJk2KcogB+SLFkjfVGCtNULA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=zzz/OjV2Tf3RGyW5rF6RMJI9EXUbV0yinYvHEMOSZ1g=; b=exI91CqRJkdxJJaGSk7EPuIQR2YNQXUhTFY4Q1WaXA6h0rf2FXGve7UCiIgi0CWfY4CJqE8DeZkE3jNUjVnRxc/x853B5G+XFwYjxDtJ22UQAiFSXtDLU/lch87xzCF+U8z8yA45qRZ8VZA6eHA9wIRo8L1Q38DSYC0W0qdNt7BijN3GojDMLOTBt0qtF4FUltnj6N7j9FcV8z5N4W+GnCYgppHcercCGU+i6bMKJwwlzj2C2sIY5B9L7DaOSnZPJx7hVUNnEJ9reWfuuzuKOYUalMvGMeiDGV8PmULPmh7ysjgbKSLGGYHWhGvd+dlykwpevR5ASX3Rb7zdVmq6rA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=zzz/OjV2Tf3RGyW5rF6RMJI9EXUbV0yinYvHEMOSZ1g=; b=jPLVRHD4j12LEh3mmwJvsJiFl4pBWN8Sv05Toq28961UZqk4OZV/By4gWSHNTu8J83aSmqxRWMV28ITJhxh3H4CTRhIXZQU5aUY+wJ9lOH1u4rcIcvGCRNmqCFZbg4RHU4Cs1mQMsAXbplGL3bWfECPbrnpPx2JTFJj3zkdOqpM= Authentication-Results-Original: sourceware.org; dkim=none (message not signed) header.d=none;sourceware.org; dmarc=none action=none header.from=arm.com; Received: from AM6PR08MB3047.eurprd08.prod.outlook.com (2603:10a6:209:4c::23) by AM6PR08MB4183.eurprd08.prod.outlook.com (2603:10a6:20b:a1::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3066.23; Fri, 12 Jun 2020 13:29:41 +0000 Received: from AM6PR08MB3047.eurprd08.prod.outlook.com ([fe80::2404:de9f:78c0:313c]) by AM6PR08MB3047.eurprd08.prod.outlook.com ([fe80::2404:de9f:78c0:313c%6]) with mapi id 15.20.3088.022; Fri, 12 Jun 2020 13:29:41 +0000 From: Szabolcs Nagy To: libc-alpha@sourceware.org Subject: [PATCH v4 00/12] aarch64: branch protection support Date: Fri, 12 Jun 2020 14:29:18 +0100 Message-Id: X-Mailer: git-send-email 2.17.1 X-ClientProxiedBy: SA9PR03CA0017.namprd03.prod.outlook.com (2603:10b6:806:20::22) To AM6PR08MB3047.eurprd08.prod.outlook.com (2603:10a6:209:4c::23) MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 Received: from localhost.localdomain (217.140.106.53) by SA9PR03CA0017.namprd03.prod.outlook.com (2603:10b6:806:20::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3066.20 via Frontend Transport; Fri, 12 Jun 2020 13:29:40 +0000 X-Mailer: git-send-email 2.17.1 X-Originating-IP: [217.140.106.53] X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-HT: Tenant X-MS-Office365-Filtering-Correlation-Id: 1cd6daa3-28c9-4767-f052-08d80ed4adf9 X-MS-TrafficTypeDiagnostic: AM6PR08MB4183:|VI1PR08MB2655: X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true NoDisclaimer: true X-MS-Oob-TLC-OOBClassifiers: OLM:9508;OLM:9508; X-Forefront-PRVS: 0432A04947 X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM6PR08MB3047.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(346002)(39860400002)(376002)(136003)(396003)(366004)(36756003)(8936002)(956004)(8676002)(26005)(44832011)(5660300002)(2906002)(66476007)(316002)(66556008)(186003)(2616005)(16526019)(66946007)(69590400007)(6666004)(83380400001)(6506007)(966005)(52116002)(6512007)(478600001)(6486002)(6916009)(86362001)(136400200001); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData: 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 X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB4183 Original-Authentication-Results: sourceware.org; dkim=none (message not signed) header.d=none; sourceware.org; dmarc=none action=none header.from=arm.com; X-EOPAttributedMessage: 0 X-MS-Exchange-Transport-CrossTenantHeadersStripped: AM5EUR03FT013.eop-EUR03.prod.protection.outlook.com X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFTY:; SFS:(4636009)(396003)(346002)(136003)(39860400002)(376002)(46966005)(16526019)(26005)(82740400003)(6512007)(356005)(186003)(6486002)(6916009)(6506007)(82310400002)(69590400007)(81166007)(5660300002)(47076004)(36756003)(478600001)(83380400001)(2906002)(86362001)(44832011)(8676002)(70586007)(316002)(966005)(6666004)(36906005)(8936002)(336012)(956004)(70206006)(2616005)(136400200001); DIR:OUT; SFP:1101; X-MS-Office365-Filtering-Correlation-Id-Prvs: c792cbda-dc7b-42fb-949e-08d80ed4a9aa X-Forefront-PRVS: 0432A04947 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Jun 2020 13:29:48.7019 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 1cd6daa3-28c9-4767-f052-08d80ed4adf9 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB2655 X-Spam-Status: No, score=-12.4 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, KAM_SHORT, MSGID_FROM_MTA_HEADER, RCVD_IN_DNSWL_LOW, RCVD_IN_MSPIKE_H2, SPF_HELO_PASS, SPF_PASS, TXREP, UNPARSEABLE_RELAY autolearn=ham autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on server2.sourceware.org X-BeenThere: libc-alpha@sourceware.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Libc-alpha mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: libc-alpha-bounces@sourceware.org Sender: "Libc-alpha" Indirect branch target identification (BTI, armv8.5-a) and return address signing using pointer authentication (PAC-RET, armv8.3-a) can be used for security hardening against some control flow hijack attacks. In gcc these are exposed via -mbranch-protection=bti+pac-ret which is the same as -mbranch-protection=standard and gcc can be configured via --enable-standard-branch-protection to use them by default. BTI requires libc support: it is an opt-in feature per ELF module via a GNU property note that the dynamic linker has to check and mprotect the executable pages with PROT_BTI. And libc objects that are statically linked into user binaries must be BTI compatible for the GNU property note to be present. (The property note is handled by linux for static linked executables and for the ld.so.) PAC-RET does not require libc runtime support, but, just like BTI, it can be used in libc binaries for security hardening. There are some unresolved GCC PAC-RET issues, but it is possible to support GCC 10 even without those fixed so this patch set includes two PAC-RET patches that I consider GCC bug workarounds. User code will likely need a fixed GCC for widely deploying PAC-RET. The related GCC discussion is at https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547402.html The HWCAP_BTI and PROT_BTI values depend on linux changes that are scheduled for the Linux 5.8 release. v4: - changed plan not to wait for final resolution on gcc issues. gcc-10 can be made to work. - the elf.h changes are now committed. - added Reviewed-by annotations. - PATCH 01: use ElfW(Nhdr). (this has been sent already on its own). - PATCH 02: use #define HAVE_AARCH64_BTI 0 (and not #undef). - PATCH 03: use #if HAVE_AARCH64_BTI (and not #ifdef). - PATCH 07: use errno in _dl_signal_error and not EINVAL. - PATCH 07: more comment about the second pass over program headers. - PATCH 08: use #define HAVE_AARCH64_PAC_RET 0. - PATCH 09: use #if HAVE_AARCH64_PAC_RET. - PATCH 10: _mcount patch is written so it's backportable. no Reviewed-by because this changed significantly. - PATCH 11: strip_pac is moved to PATCH 10 no Reviewed-by because this changed significantly. - PATCH 12: new patch: news entry. v3: - instead of END_FILE add note in sysdep.h. - dropped the syscall template patch (END_FILE is not needed). - PATCH 05: remove END_FILE macros. - PATCH 05: clarify the GNU_PROPERTY macro and related defines. - PATCH 09: separate hook for PT_GNU_PROPERTY handling. - PATCH 09: modified rtld.c and dl-load.c accordingly. - PATCH 09: rename linkmap->bti_guarded to linkmap->bti. - PATCH 13: new patch, update _mcount for pac-ret. - fixed TODOs except for the last two patches, which are written for current gcc behaviour. - I'm waiting for a review of PATCH 03 and welcome comments on the rest of the set, which i consider done unless there are changes on the gcc or linux side. v2: - removed --enable-branch-protection-standard configure option, branch protection in glibc is enabled based on the compiler default. - GNU property notes are disabled if compiler/linker has no support. - pac-ret is enabled based on compiler defaults. - PATCH 03: cleaner csu/abi-note.c and fix arm/abi-note.S. - PATCH 04: new (bti config check). - PATCH 09: drop the umount2 change. - PATCH 10: use bool instead of int. - PATCH 10: fix code style and comments. - PATCH 10: add linux version requirement to description. - PATCH 11: new (pac-ret config check). - PATCH 12: only use pac-ret if HAVE_AARCH64_PAC_RET. - PATCH 12: fix pac-ret use in dl-trampoline.S. - PATCH 13: use static inline instead of macro, update description. - addressed some of the reviews from Adhemerval, the remaining ones are marked as TODO in the descriptions and will require another test run or agreement on the design. Ran cross tests in qemu using the linux for-next/bti-user branch of git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git Sudakshina Das (2): aarch64: Add BTI support to assembly files aarch64: enable BTI at runtime Szabolcs Nagy (10): Rewrite abi-note.S in C. aarch64: configure test for BTI support aarch64: Rename place holder .S files to .c aarch64: fix swapcontext for BTI aarch64: fix RTLD_START for BTI aarch64: configure check for pac-ret code generation aarch64: Add pac-ret support to assembly files aarch64: fix pac-ret support in _mcount aarch64: redefine RETURN_ADDRESS to strip PAC aarch64: add NEWS entry about branch protection support NEWS | 12 ++ config.h.in | 6 + csu/{abi-note.S => abi-note.c} | 23 +-- elf/dl-load.c | 14 ++ elf/rtld.c | 6 + sysdeps/aarch64/Makefile | 4 + .../aarch64/{bsd-_setjmp.S => bsd-_setjmp.c} | 0 .../aarch64/{bsd-setjmp.S => bsd-setjmp.c} | 0 sysdeps/aarch64/configure | 81 ++++++++++ sysdeps/aarch64/configure.ac | 40 +++++ sysdeps/aarch64/crti.S | 10 ++ sysdeps/aarch64/crtn.S | 8 + sysdeps/aarch64/dl-bti.c | 54 +++++++ sysdeps/aarch64/dl-machine.h | 5 +- sysdeps/aarch64/dl-prop.h | 145 ++++++++++++++++++ sysdeps/aarch64/dl-tlsdesc.S | 11 ++ sysdeps/aarch64/dl-trampoline.S | 20 +++ sysdeps/aarch64/linkmap.h | 3 + sysdeps/aarch64/machine-gmon.h | 3 +- sysdeps/aarch64/{memmove.S => memmove.c} | 0 sysdeps/aarch64/start.S | 1 + sysdeps/aarch64/sysdep.h | 58 ++++++- sysdeps/arm/abi-note.S | 8 - sysdeps/generic/dl-prop.h | 16 +- sysdeps/unix/sysv/linux/aarch64/bits/hwcap.h | 1 + sysdeps/unix/sysv/linux/aarch64/bits/mman.h | 31 ++++ .../unix/sysv/linux/aarch64/cpu-features.c | 3 + .../unix/sysv/linux/aarch64/cpu-features.h | 2 + sysdeps/unix/sysv/linux/aarch64/swapcontext.S | 14 +- sysdeps/x86/dl-prop.h | 6 + 30 files changed, 557 insertions(+), 28 deletions(-) rename csu/{abi-note.S => abi-note.c} (90%) rename sysdeps/aarch64/{bsd-_setjmp.S => bsd-_setjmp.c} (100%) rename sysdeps/aarch64/{bsd-setjmp.S => bsd-setjmp.c} (100%) create mode 100644 sysdeps/aarch64/dl-bti.c create mode 100644 sysdeps/aarch64/dl-prop.h rename sysdeps/aarch64/{memmove.S => memmove.c} (100%) delete mode 100644 sysdeps/arm/abi-note.S create mode 100644 sysdeps/unix/sysv/linux/aarch64/bits/mman.h