Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp732108pxf; Thu, 8 Apr 2021 11:30:01 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzF87BxVYn+fgs73/1H/xy4JvpGLKN3FB/hCP7NTevk5oCkva7rVAL7h0YCmEcnB6cYc+gq X-Received: by 2002:a17:906:1706:: with SMTP id c6mr12483773eje.223.1617906601556; Thu, 08 Apr 2021 11:30:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617906601; cv=none; d=google.com; s=arc-20160816; b=iHhguPVkG2AicbDPneCiKbLpBWQO4tlNMsrcKhzdAQA4yqtdqyJseFSqee3P0WzgBr 5O2u72LB2E3KwOsbU2/sIKBKyaZYQTbaNysq3nXdqtXYthQFUEC+h01q7JmOHjXp2izd pjyPER9bhczIoPhLgy7tAnZJpcdZ1TKnwSux2KGH/jpojLJky7mWkJFDPsv18n4vZL8h 5cyExxLxZrTYKULMHz2A84Q7Egm3TI0U8poXQSzlmfzqYrlJqVo4Fdo8DEcqwU94VDst Cag8RF4MaPI6Ky4o6A4P+joWqe0N3ZzndI2IP+6S6zk5ggmw9dKJFkO6V1OXzbaHqgxl 9ObQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:mime-version:message-id:date :dkim-signature; bh=hFbfrV6NLQcaUFBI7qoKubPMd6hwVRmqL95jk4+jyxc=; b=nBoEdQ50BfSKqPm8MJMTMJK7Bd6p84MzcRsZHuyYXcSOowMSbGCdhO/+daVaPmHo/n Soh+HFS6o7qcN/lNJpIXfOJRXGQsvOOJ3104zDb6dhEIrHQE2e8RxkOdr/YaJ5KHtLrx OFMVHqZfHAnDoCRLMfOliTU6bhX3KIJef+4/gwFJlxRWz1FpLwypgy0d1RXsO/gKDHCn HdmRWJ9d+oWEJEcQzcPDmuQDaT/ewx7dwlCxyqNCYkAFPlNos9qlP9fXZjzJf9b6bJG6 ZRLzYSXEj+jD/ePl8ZLmHLYPeGCGJCJpUdGRDuzSC8rw1gS4FXQ6HiQ1mQ7Ktmm/2Idx Xqsg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=JBj3h6xq; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b11si197252edd.82.2021.04.08.11.29.37; Thu, 08 Apr 2021 11:30:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=JBj3h6xq; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232670AbhDHS26 (ORCPT + 99 others); Thu, 8 Apr 2021 14:28:58 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48614 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232383AbhDHS25 (ORCPT ); Thu, 8 Apr 2021 14:28:57 -0400 Received: from mail-yb1-xb4a.google.com (mail-yb1-xb4a.google.com [IPv6:2607:f8b0:4864:20::b4a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 37F55C061762 for ; Thu, 8 Apr 2021 11:28:46 -0700 (PDT) Received: by mail-yb1-xb4a.google.com with SMTP id k15so2898483ybh.6 for ; Thu, 08 Apr 2021 11:28:46 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:message-id:mime-version:subject:from:to:cc; bh=hFbfrV6NLQcaUFBI7qoKubPMd6hwVRmqL95jk4+jyxc=; b=JBj3h6xqwlztdZoD9Dqpfp7Alwo8u054FoOK8zma9pkGeWTeuATHhjoaZNawNS9+V6 Tb0dfg5qd67tmw3R8nLEKrnIYOWChn0hf/JHJSKf1HDGlH5u4FFW0wRgpWmyLSvt4ajs 5NMl9F0QfJzNd/l72+LsejYvM3DXrFq4dHIUFzx2BzuMfxcENkc+lXht5+iKIHiJQ9jO 5Hv8ezegeHjGE0ZRU2sZBv0I3I9xLvPzXRtinDBJ/SSxL2hsoHBwdVVGqnvIdCCslKLV FjLUh4sBAuzykaGDJG7ZoK2ZyXcz8dON+CCNISz/BBMbMLgM2CAMTit3atSJCz7eDK7b N/3Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:message-id:mime-version:subject:from:to:cc; bh=hFbfrV6NLQcaUFBI7qoKubPMd6hwVRmqL95jk4+jyxc=; b=k0Af2wf3wBfUZEDF8ScWBsaGNelUdmsJrkP8fodd/EBqv4t0AZ49Nrxmqw4xfQ2u3V 0+OK8ABUhI8cmqfs4HsQ275jTSt+AO98WDnalKP3ki5xx4uwy/yP73S/Ehr+JzkWxdEe lucEYGomTMB8K9eAyCDmfcgGFfa5d/ojXvVirRfHqt78cAmedyIvPs0S/A5PnSnxrzV3 NDFMQLZB9wGxcyT3acTc1iwdM4hNOXobcWdtSJEnmCy/kwQDMWcz7YKqDmlyy6I5AEaL /zWmAm+Zvo2kswFuS45G42/jUKAshc436QM084AL6xtBPXWhQINJIvJXBj6Eg+C8tG2Q 04pQ== X-Gm-Message-State: AOAM533jcu+vnd6sZ0xD2ZSHAQUMly+QS+Bi+akMVbDUSozgiX8T2iYA W/cTncBcV7uc3545lPdcLnFTpvX6L7R8+V5WyLU= X-Received: from samitolvanen1.mtv.corp.google.com ([2620:15c:201:2:3560:8505:40a2:e021]) (user=samitolvanen job=sendgmr) by 2002:a25:31d5:: with SMTP id x204mr13666827ybx.3.1617906525373; Thu, 08 Apr 2021 11:28:45 -0700 (PDT) Date: Thu, 8 Apr 2021 11:28:25 -0700 Message-Id: <20210408182843.1754385-1-samitolvanen@google.com> Mime-Version: 1.0 X-Mailer: git-send-email 2.31.1.295.g9ea45b61b8-goog Subject: [PATCH v6 00/18] Add support for Clang CFI From: Sami Tolvanen To: Kees Cook Cc: Nathan Chancellor , Nick Desaulniers , Masahiro Yamada , Will Deacon , Jessica Yu , Arnd Bergmann , Tejun Heo , "Paul E. McKenney" , Christoph Hellwig , Peter Zijlstra , Sedat Dilek , Mark Rutland , Catalin Marinas , bpf@vger.kernel.org, linux-hardening@vger.kernel.org, linux-arch@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-kbuild@vger.kernel.org, linux-pci@vger.kernel.org, linux-kernel@vger.kernel.org, clang-built-linux@googlegroups.com, Sami Tolvanen Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This series adds support for Clang's Control-Flow Integrity (CFI) checking. With CFI, the compiler injects a runtime check before each indirect function call to ensure the target is a valid function with the correct static type. This restricts possible call targets and makes it more difficult for an attacker to exploit bugs that allow the modification of stored function pointers. For more details, see: https://clang.llvm.org/docs/ControlFlowIntegrity.html The first patch contains build system changes and error handling, and implements support for cross-module indirect call checking. The remaining patches address issues caused by the compiler instrumentation. These include fixing known type mismatches, as well as issues with address space confusion and cross-module function address equality. These patches add support only for arm64, but I'll post patches also for x86_64 after we address the remaining issues there, including objtool support. You can also pull this series from https://github.com/samitolvanen/linux.git cfi-v6 --- Changes in v6: - Added temporary variables and moved assembly constraints to a separate line based on Mark's suggestions. Changes in v5: - Changed module.lds.S to only include when CFI is enabled to fix the MIPS build. - Added a patch that fixes dynamic ftrace with CFI on arm64. Changes in v4: - Per Mark's suggestion, dropped __pa_function() and renamed __va_function() to function_nocfi(). - Added a comment to function_nocfi() to explain what it does. - Updated the psci patch to use an intermediate variable for the physical address for clarity. Changes in v3: - Added a patch to change list_sort() callers treewide to use const pointers instead of simply removing the internal casts. - Changed cleanup_symbol_name() to return bool. - Changed module.lds.S to drop the .eh_frame section only with CONFIG_CFI_CLANG. - Switched to synchronize_rcu() in update_shadow(). Changes in v2: - Fixed .text merging in module.lds.S. - Added WARN_ON_FUNCTION_MISMATCH() and changed kernel/thread.c and kernel/workqueue.c to use the macro instead. Sami Tolvanen (18): add support for Clang CFI cfi: add __cficanonical mm: add generic function_nocfi macro module: ensure __cfi_check alignment workqueue: use WARN_ON_FUNCTION_MISMATCH kthread: use WARN_ON_FUNCTION_MISMATCH kallsyms: strip ThinLTO hashes from static functions bpf: disable CFI in dispatcher functions treewide: Change list_sort to use const pointers lkdtm: use function_nocfi psci: use function_nocfi for cpu_resume arm64: implement function_nocfi arm64: use function_nocfi with __pa_symbol arm64: add __nocfi to functions that jump to a physical address arm64: add __nocfi to __apply_alternatives arm64: ftrace: use function_nocfi for ftrace_call KVM: arm64: Disable CFI for nVHE arm64: allow CONFIG_CFI_CLANG to be selected Makefile | 17 + arch/Kconfig | 45 +++ arch/arm64/Kconfig | 1 + arch/arm64/include/asm/memory.h | 16 + arch/arm64/include/asm/mmu_context.h | 4 +- arch/arm64/kernel/acpi_parking_protocol.c | 3 +- arch/arm64/kernel/alternative.c | 4 +- arch/arm64/kernel/cpu-reset.h | 10 +- arch/arm64/kernel/cpufeature.c | 4 +- arch/arm64/kernel/ftrace.c | 2 +- arch/arm64/kernel/psci.c | 3 +- arch/arm64/kernel/smp_spin_table.c | 3 +- arch/arm64/kvm/hyp/nvhe/Makefile | 6 +- arch/arm64/kvm/vgic/vgic-its.c | 8 +- arch/arm64/kvm/vgic/vgic.c | 3 +- block/blk-mq-sched.c | 3 +- block/blk-mq.c | 3 +- drivers/acpi/nfit/core.c | 3 +- drivers/acpi/numa/hmat.c | 3 +- drivers/clk/keystone/sci-clk.c | 4 +- drivers/firmware/psci/psci.c | 7 +- drivers/gpu/drm/drm_modes.c | 3 +- drivers/gpu/drm/i915/gt/intel_engine_user.c | 3 +- drivers/gpu/drm/i915/gvt/debugfs.c | 2 +- drivers/gpu/drm/i915/selftests/i915_gem_gtt.c | 3 +- drivers/gpu/drm/radeon/radeon_cs.c | 4 +- .../hw/usnic/usnic_uiom_interval_tree.c | 3 +- drivers/interconnect/qcom/bcm-voter.c | 2 +- drivers/md/raid5.c | 3 +- drivers/misc/lkdtm/usercopy.c | 2 +- drivers/misc/sram.c | 4 +- drivers/nvme/host/core.c | 3 +- .../controller/cadence/pcie-cadence-host.c | 3 +- drivers/spi/spi-loopback-test.c | 3 +- fs/btrfs/raid56.c | 3 +- fs/btrfs/tree-log.c | 3 +- fs/btrfs/volumes.c | 3 +- fs/ext4/fsmap.c | 4 +- fs/gfs2/glock.c | 3 +- fs/gfs2/log.c | 2 +- fs/gfs2/lops.c | 3 +- fs/iomap/buffered-io.c | 3 +- fs/ubifs/gc.c | 7 +- fs/ubifs/replay.c | 4 +- fs/xfs/scrub/bitmap.c | 4 +- fs/xfs/xfs_bmap_item.c | 4 +- fs/xfs/xfs_buf.c | 6 +- fs/xfs/xfs_extent_busy.c | 4 +- fs/xfs/xfs_extent_busy.h | 3 +- fs/xfs/xfs_extfree_item.c | 4 +- fs/xfs/xfs_refcount_item.c | 4 +- fs/xfs/xfs_rmap_item.c | 4 +- include/asm-generic/bug.h | 16 + include/asm-generic/vmlinux.lds.h | 20 +- include/linux/bpf.h | 4 +- include/linux/cfi.h | 41 +++ include/linux/compiler-clang.h | 3 + include/linux/compiler_types.h | 8 + include/linux/init.h | 6 +- include/linux/list_sort.h | 7 +- include/linux/mm.h | 10 + include/linux/module.h | 13 +- include/linux/pci.h | 4 +- init/Kconfig | 2 +- kernel/Makefile | 4 + kernel/cfi.c | 329 ++++++++++++++++++ kernel/kallsyms.c | 55 ++- kernel/kthread.c | 3 +- kernel/module.c | 43 +++ kernel/workqueue.c | 2 +- lib/list_sort.c | 17 +- lib/test_list_sort.c | 3 +- net/tipc/name_table.c | 4 +- scripts/Makefile.modfinal | 2 +- scripts/module.lds.S | 19 +- 75 files changed, 760 insertions(+), 113 deletions(-) create mode 100644 include/linux/cfi.h create mode 100644 kernel/cfi.c base-commit: e0a472fffe435af52ea4e21e1e0001c5c8ffc6c7 -- 2.31.1.295.g9ea45b61b8-goog