From patchwork Mon Jun 22 13:59:01 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Szabolcs Nagy X-Patchwork-Id: 39716 Return-Path: X-Original-To: patchwork@sourceware.org Delivered-To: patchwork@sourceware.org Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id 2AE0B388700C; Mon, 22 Jun 2020 13:59:28 +0000 (GMT) X-Original-To: libc-alpha@sourceware.org Delivered-To: libc-alpha@sourceware.org Received: from EUR03-AM5-obe.outbound.protection.outlook.com (mail-eopbgr30056.outbound.protection.outlook.com [40.107.3.56]) by sourceware.org (Postfix) with ESMTPS id 9A228388700C for ; Mon, 22 Jun 2020 13:59:21 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.3.2 sourceware.org 9A228388700C Authentication-Results: sourceware.org; dmarc=none (p=none dis=none) header.from=arm.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=Szabolcs.Nagy@arm.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=DB/p4GfwNRm2nRo6EU92LjZNMX3pp1/kcnBd+I9OnWE=; b=Y3dtDt+H/isrIigSp8IZZaXTUzxXCaDCg7i2+AB6DvvbA/F9PreLNpABkUIc55pAXzZdOXNQqQgQ3Q4P26mS719hF2krnnnX8h/n5juE+X4LoKrjSkEG3DAhryProQOVCfZamgezK3nU3WZbz3nDSt32Nm+5U0kSSI1wS4g4Xqc= Received: from AM6P194CA0043.EURP194.PROD.OUTLOOK.COM (2603:10a6:209:84::20) by AM6PR08MB4616.eurprd08.prod.outlook.com (2603:10a6:20b:6f::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3109.22; Mon, 22 Jun 2020 13:59:19 +0000 Received: from AM5EUR03FT049.eop-EUR03.prod.protection.outlook.com (2603:10a6:209:84:cafe::e2) by AM6P194CA0043.outlook.office365.com (2603:10a6:209:84::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3109.22 via Frontend Transport; Mon, 22 Jun 2020 13:59:19 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; sourceware.org; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com; sourceware.org; dmarc=bestguesspass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AM5EUR03FT049.mail.protection.outlook.com (10.152.17.130) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3109.22 via Frontend Transport; Mon, 22 Jun 2020 13:59:19 +0000 Received: ("Tessian outbound 8fb20e43acb7:v59"); Mon, 22 Jun 2020 13:59:18 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: cb37d3cf0ed1e18b X-CR-MTA-TID: 64aa7808 Received: from 337006d083c2.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 3DB05622-9EA2-4A28-9DF9-EFBD3F1ABDF5.1; Mon, 22 Jun 2020 13:59:12 +0000 Received: from EUR01-DB5-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 337006d083c2.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Mon, 22 Jun 2020 13:59:12 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=b1zWovHzEI9OxxM3IFKUTIjv74k2blPL8BaUX9GkjwTSjYWeJXble/DIkYAvi/4+N4QELyjkNbWbwYWATs6dVYDWwaBeDbih8WaVFDiNncnC+0PxZwa3RAEK/aB8bjoFMCmu3MGpklXaWOL+q+MZY9Js/LlN0hk+IhPwhsjBdnum1tZ46t8F6Fz7IowkoM+YtYKH4fz2Iy3H8vsr1M/q7ctH17lNsVQeUNg/K2XP3HQrfLXpy4dgytOfj08bF47TBt5c+m0zRKe0CnD/uHlpUUdZ2z+sU+gHhlVSuwbEXrfjbZBFafgzjMltM8qcahTu1ujbEDgo5RD+iXwPodyoaA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=DB/p4GfwNRm2nRo6EU92LjZNMX3pp1/kcnBd+I9OnWE=; b=Ine+XUUCWdODkjGdUETm5NoQO6aNrcI1DdgdGbrfbrd4dbqHH95j5GhjIBoFOjAnqcbqqIllLZFsoGqfoUXHhlwqwlH13l6reMHFZwBA3GTMfhSsO+NdIBAEaoRNwbJlcetA2FdehQaKKGBtOnIykQZSZoq+cb1AQiUoDWP3nqExMF/A9t9z1I1I8OTWMo5JfpbPtkqNQirZKclRObmqlq98Hzh6SozO0mhkt/R5QsyJF+6CIzew/xNfpk+Q8jxPuvQBOGEq92LtUO8p69WxgDyAtwoXK/lgK9UE83WUPc8phQOavwEMMbiYtNr2Ig3E1FZKQldlGgLJnRoe2keflg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=DB/p4GfwNRm2nRo6EU92LjZNMX3pp1/kcnBd+I9OnWE=; b=Y3dtDt+H/isrIigSp8IZZaXTUzxXCaDCg7i2+AB6DvvbA/F9PreLNpABkUIc55pAXzZdOXNQqQgQ3Q4P26mS719hF2krnnnX8h/n5juE+X4LoKrjSkEG3DAhryProQOVCfZamgezK3nU3WZbz3nDSt32Nm+5U0kSSI1wS4g4Xqc= Authentication-Results-Original: sourceware.org; dkim=none (message not signed) header.d=none;sourceware.org; dmarc=none action=none header.from=arm.com; Received: from AM6PR08MB3047.eurprd08.prod.outlook.com (2603:10a6:209:4c::23) by AM6PR08MB4344.eurprd08.prod.outlook.com (2603:10a6:20b:74::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3109.22; Mon, 22 Jun 2020 13:59:12 +0000 Received: from AM6PR08MB3047.eurprd08.prod.outlook.com ([fe80::2404:de9f:78c0:313c]) by AM6PR08MB3047.eurprd08.prod.outlook.com ([fe80::2404:de9f:78c0:313c%6]) with mapi id 15.20.3109.027; Mon, 22 Jun 2020 13:59:11 +0000 From: Szabolcs Nagy To: libc-alpha@sourceware.org Subject: [PATCH v5 00/14] aarch64: branch protection support Date: Mon, 22 Jun 2020 14:59:01 +0100 Message-Id: X-Mailer: git-send-email 2.17.1 X-ClientProxiedBy: DM5PR07CA0030.namprd07.prod.outlook.com (2603:10b6:3:16::16) To AM6PR08MB3047.eurprd08.prod.outlook.com (2603:10a6:209:4c::23) MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 Received: from localhost.localdomain (217.140.106.53) by DM5PR07CA0030.namprd07.prod.outlook.com (2603:10b6:3:16::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3109.22 via Frontend Transport; Mon, 22 Jun 2020 13:59:10 +0000 X-Mailer: git-send-email 2.17.1 X-Originating-IP: [217.140.106.53] X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-HT: Tenant X-MS-Office365-Filtering-Correlation-Id: 2663a523-489a-4a3a-5ccd-08d816b47556 X-MS-TrafficTypeDiagnostic: AM6PR08MB4344:|AM6PR08MB4616: X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true NoDisclaimer: true X-MS-Oob-TLC-OOBClassifiers: OLM:9508;OLM:9508; X-Forefront-PRVS: 0442E569BC X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM6PR08MB3047.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(39860400002)(136003)(396003)(346002)(366004)(376002)(52116002)(2616005)(69590400007)(66946007)(66556008)(26005)(66476007)(6916009)(956004)(6666004)(6506007)(2906002)(186003)(16526019)(86362001)(6486002)(44832011)(966005)(478600001)(8936002)(36756003)(316002)(5660300002)(83380400001)(6512007)(8676002)(136400200001); DIR:OUT; SFP:1101; X-MS-Exchange-AntiSpam-MessageData: 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 X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB4344 Original-Authentication-Results: sourceware.org; dkim=none (message not signed) header.d=none; sourceware.org; dmarc=none action=none header.from=arm.com; X-EOPAttributedMessage: 0 X-MS-Exchange-Transport-CrossTenantHeadersStripped: AM5EUR03FT049.eop-EUR03.prod.protection.outlook.com X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFTY:; SFS:(4636009)(376002)(346002)(136003)(39860400002)(396003)(46966005)(478600001)(6506007)(2906002)(6666004)(316002)(336012)(6512007)(44832011)(36906005)(81166007)(6916009)(956004)(2616005)(26005)(6486002)(83380400001)(82310400002)(356005)(186003)(47076004)(69590400007)(16526019)(8936002)(86362001)(8676002)(966005)(82740400003)(70206006)(36756003)(5660300002)(70586007)(136400200001); DIR:OUT; SFP:1101; X-MS-Office365-Filtering-Correlation-Id-Prvs: 1a422231-164e-4483-e225-08d816b470b1 X-Forefront-PRVS: 0442E569BC X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: tOEu/r3PKW37rTgH/VIoTaGoophmbSEsPczC54SoYU/atyENt/uXBu0VM/voPhGW4ZdZ2QeAaqSx1aOexsRA7NgLk+GYnshDJj5LchBM2caBpBAi9Ys35CbXo6E386Pw2p8hFRmT8nRxDJYQu7NTOpgRt3udJzkaqv2frjBU2FlVRDs1AaWt5b7CNUXemNdxRgvT3aMi0YUd3hzv5u0dRbx00PcKEa8bnwWvhXg6CWpWVhWiIJcDZsllGpaNht4r15g04YpqCWdgb4QJGetZDFyzY1AtMoZ71yrm3+KpoTJkppCEyPmD2nSZwJ6agoLFTKzIqCmc6jocm2KbbMEhu8UR+sqG7gJr7S7nciRcYGM72JwwdblKjDuvrbjfjCQiGSFZIal2P6YXwUpeesGSZEz6ibCOJzzh8CFicZIK7FX2NgQ5yyDUIRFvlGIp9FMzdrSbXAmschgLBYRfMqyIR8S7qGvxjy2/A7sClL180J6zUsUzW7003ptRN0uEe3iKr4xWWx4KJqGTi1uOdGEzDaCJtl5MUPQ1cf9LhYio4Ws= X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 22 Jun 2020 13:59:19.0813 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 2663a523-489a-4a3a-5ccd-08d816b47556 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB4616 X-Spam-Status: No, score=-11.8 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, KAM_SHORT, MSGID_FROM_MTA_HEADER, RCVD_IN_DNSWL_LOW, RCVD_IN_MSPIKE_H2, SPF_HELO_PASS, SPF_PASS, TXREP, UNPARSEABLE_RELAY autolearn=ham autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on server2.sourceware.org X-BeenThere: libc-alpha@sourceware.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Libc-alpha mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: libc-alpha-bounces@sourceware.org Sender: "Libc-alpha" Indirect branch target identification (BTI, armv8.5-a) and return address signing using pointer authentication (PAC-RET, armv8.3-a) can be used for security hardening against some control flow hijack attacks. In gcc these are exposed via -mbranch-protection=bti+pac-ret which is the same as -mbranch-protection=standard and gcc can be configured via --enable-standard-branch-protection to use them by default. BTI requires libc support: it is an opt-in feature per ELF module via a GNU property note that the dynamic linker has to check and mprotect the executable pages with PROT_BTI. And libc objects that are statically linked into user binaries must be BTI compatible for the GNU property note to be present. (The property note is handled by linux for static linked executables and for the ld.so.) PAC-RET does not require libc runtime support, but, just like BTI, it can be used in libc binaries for security hardening. There are some unresolved GCC PAC-RET issues, but it is possible to support GCC 10 even without those fixed so this patch set includes two PAC-RET patches that I consider GCC bug workarounds. User code will likely need a fixed GCC for widely deploying PAC-RET. The related GCC discussion is at https://gcc.gnu.org/pipermail/gcc-patches/2020-June/547402.html The HWCAP_BTI and PROT_BTI values depend on linux changes that are scheduled for the Linux 5.8 release. v5: - split the BTI runtime enablement patch (07) and added the PT_NOTE handling cleanup patch from H.J.Lu. - PATCH 07: rtld changes for PT_GNU_PROPERTY handling. - PATCH 08: rtld changes to cleanup PT_NOTE handling: i changed the PHDR processing to scan backward. - PATCH 09: updated the property handling code. v4: - changed plan not to wait for final resolution on gcc issues. gcc-10 can be made to work. - the elf.h changes are now committed. - added Reviewed-by annotations. - PATCH 01: use ElfW(Nhdr). (this has been sent already on its own). - PATCH 02: use #define HAVE_AARCH64_BTI 0 (and not #undef). - PATCH 03: use #if HAVE_AARCH64_BTI (and not #ifdef). - PATCH 07: use errno in _dl_signal_error and not EINVAL. - PATCH 07: more comment about the second pass over program headers. - PATCH 08: use #define HAVE_AARCH64_PAC_RET 0. - PATCH 09: use #if HAVE_AARCH64_PAC_RET. - PATCH 10: _mcount patch is written so it's backportable. no Reviewed-by because this changed significantly. - PATCH 11: strip_pac is moved to PATCH 10 no Reviewed-by because this changed significantly. - PATCH 12: new patch: news entry. v3: - instead of END_FILE add note in sysdep.h. - dropped the syscall template patch (END_FILE is not needed). - PATCH 05: remove END_FILE macros. - PATCH 05: clarify the GNU_PROPERTY macro and related defines. - PATCH 09: separate hook for PT_GNU_PROPERTY handling. - PATCH 09: modified rtld.c and dl-load.c accordingly. - PATCH 09: rename linkmap->bti_guarded to linkmap->bti. - PATCH 13: new patch, update _mcount for pac-ret. - fixed TODOs except for the last two patches, which are written for current gcc behaviour. - I'm waiting for a review of PATCH 03 and welcome comments on the rest of the set, which i consider done unless there are changes on the gcc or linux side. v2: - removed --enable-branch-protection-standard configure option, branch protection in glibc is enabled based on the compiler default. - GNU property notes are disabled if compiler/linker has no support. - pac-ret is enabled based on compiler defaults. - PATCH 03: cleaner csu/abi-note.c and fix arm/abi-note.S. - PATCH 04: new (bti config check). - PATCH 09: drop the umount2 change. - PATCH 10: use bool instead of int. - PATCH 10: fix code style and comments. - PATCH 10: add linux version requirement to description. - PATCH 11: new (pac-ret config check). - PATCH 12: only use pac-ret if HAVE_AARCH64_PAC_RET. - PATCH 12: fix pac-ret use in dl-trampoline.S. - PATCH 13: use static inline instead of macro, update description. - addressed some of the reviews from Adhemerval, the remaining ones are marked as TODO in the descriptions and will require another test run or agreement on the design. H.J. Lu (1): rtld: Rename _rtld_process_pt_note to _dl_process_pt_note Sudakshina Das (2): aarch64: Add BTI support to assembly files aarch64: enable BTI at runtime Szabolcs Nagy (11): Rewrite abi-note.S in C. aarch64: configure test for BTI support aarch64: Rename place holder .S files to .c aarch64: fix swapcontext for BTI aarch64: fix RTLD_START for BTI rtld: Handle PT_GNU_PROPERTY aarch64: configure check for pac-ret code generation aarch64: Add pac-ret support to assembly files aarch64: fix pac-ret support in _mcount aarch64: redefine RETURN_ADDRESS to strip PAC aarch64: add NEWS entry about branch protection support NEWS | 12 +++ config.h.in | 6 ++ csu/{abi-note.S => abi-note.c} | 23 +++-- elf/dl-load.c | 94 +++++++++++++++++-- elf/rtld.c | 14 ++- sysdeps/aarch64/Makefile | 4 + .../aarch64/{bsd-_setjmp.S => bsd-_setjmp.c} | 0 .../aarch64/{bsd-setjmp.S => bsd-setjmp.c} | 0 sysdeps/aarch64/configure | 81 ++++++++++++++++ sysdeps/aarch64/configure.ac | 40 ++++++++ sysdeps/aarch64/crti.S | 10 ++ sysdeps/aarch64/crtn.S | 8 ++ sysdeps/aarch64/dl-bti.c | 54 +++++++++++ sysdeps/aarch64/dl-machine.h | 5 +- sysdeps/aarch64/dl-prop.h | 63 +++++++++++++ sysdeps/aarch64/dl-tlsdesc.S | 11 +++ sysdeps/aarch64/dl-trampoline.S | 20 ++++ sysdeps/aarch64/linkmap.h | 3 + sysdeps/aarch64/machine-gmon.h | 3 +- sysdeps/aarch64/{memmove.S => memmove.c} | 0 sysdeps/aarch64/start.S | 1 + sysdeps/aarch64/sysdep.h | 58 +++++++++++- sysdeps/arm/abi-note.S | 8 -- sysdeps/generic/dl-prop.h | 23 +++-- sysdeps/generic/ldsodefs.h | 4 + sysdeps/unix/sysv/linux/aarch64/bits/hwcap.h | 1 + sysdeps/unix/sysv/linux/aarch64/bits/mman.h | 31 ++++++ .../unix/sysv/linux/aarch64/cpu-features.c | 3 + .../unix/sysv/linux/aarch64/cpu-features.h | 2 + sysdeps/unix/sysv/linux/aarch64/swapcontext.S | 14 ++- sysdeps/x86/dl-prop.h | 47 ++-------- 31 files changed, 556 insertions(+), 87 deletions(-) rename csu/{abi-note.S => abi-note.c} (90%) rename sysdeps/aarch64/{bsd-_setjmp.S => bsd-_setjmp.c} (100%) rename sysdeps/aarch64/{bsd-setjmp.S => bsd-setjmp.c} (100%) create mode 100644 sysdeps/aarch64/dl-bti.c create mode 100644 sysdeps/aarch64/dl-prop.h rename sysdeps/aarch64/{memmove.S => memmove.c} (100%) delete mode 100644 sysdeps/arm/abi-note.S create mode 100644 sysdeps/unix/sysv/linux/aarch64/bits/mman.h