Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp887011pxb; Wed, 27 Oct 2021 14:29:37 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyJcaUizUJRPoAEMCqKpdSHqssGuhMBhwybjysxLFbtwbBo9202RzoMXKMVBCnC9jNAskFI X-Received: by 2002:a17:906:2f16:: with SMTP id v22mr113807eji.334.1635370177202; Wed, 27 Oct 2021 14:29:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1635370177; cv=none; d=google.com; s=arc-20160816; b=Ed2TNp4OemeeQv/djZ4aNX0eGI72HvcddgtOEgddLNtRobOiLchpb6OLBeS0tAuYFZ JdixcUkLGO9M5ISDHrbjSHNiXw/lva0qJCycMBtx8EArjeCSJdr2NronYO71cyFLsVfp q5btdxnDe8QfpE70YS2YwGOv2Kd9QT4gG7/cHOYGslQy8MZ+q81jdmzaHmFCQYII8EB4 f/792GSVGMkwrQmh5lJFiKfInNUsmtX2zEGqhCucavJR1cy14uHNDEde9PmrBEGXg0/W aeNYqEQgdSZjqCMd3Yoj94RU//3X1hhG6wMEe2hSbT23ToEOQwMA/Re7WdwplnCeiqEI QBCQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=GOoLAuNdNfRv/eaJgrIl/SVkmT677HOMmmTY9iIuhm8=; b=ME0UDYwZQKTKDHRPhN9elpp0sPEON+cR9U6e7cmSaRllYyJ8foLxyDs8TyFGMUGcDd e7JiE/3AupGyLcKqcJuRAnLBoNmQxn0fKXnA6MaI3Z8GYnuJsRVUBF9iGNxUQ6QN95On FooZxY7D5N9gxG7VrAj2xU33uhKb9zbZsaIcenL5QcLI1bCCBN3ZOVJP7iO2V7PQnf+5 TOiGRzGkWTXuGdsX242YjflyjcuULLR1HIiAHjOFEZT6SzlIJzf0jk76cB307HBEhdnX HKChKrkMPRH+k3QWspL7tat9Wu6iYB9mAhCdQTdx8PIdAe7u40vv2IEqeuPWGle8UutH mqhg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Z3GI4v+m; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f14si1137780edc.609.2021.10.27.14.29.14; Wed, 27 Oct 2021 14:29:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Z3GI4v+m; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S242857AbhJ0P5y (ORCPT + 97 others); Wed, 27 Oct 2021 11:57:54 -0400 Received: from mail.kernel.org ([198.145.29.99]:45258 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231983AbhJ0P5x (ORCPT ); Wed, 27 Oct 2021 11:57:53 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 58CC4610CF; Wed, 27 Oct 2021 15:55:28 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1635350128; bh=YrSJF1WLDzUs07MzocSeTB/P/c338AvA4f+uEBWnzm8=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=Z3GI4v+mpdUhDOdlZ3OzazrcsmocuekxnOyLxea0AAgkWfjzAckM65ybR4PzJ7pt/ 2wl+h4hPjSmb71nhxomgjoC5h8cP8eEBPw8pFsUu/ILjd7yOnlpSfvqmsg8MBm2G3/ nXOl7ZO+QRFssGSmWxknWEMy7SFDI98kVF0kKdxKH5EfaPDj7yfQ5HTh4H2Wn5WIaG 3Lu4rMKuTP5qHXAkQ3qM8JReVjl+2NjqOmm9NUdl0Gng7nAmaEy5uBv/RMtkaoamVV vPAkbOI/PjsG5VOYkC5KXkiR0eH1t5zr3PQKdWrkj3yoWDxXfx3OFWAFC828JLsG9i VfmiaTk+SBVzw== Received: by mail-oi1-f179.google.com with SMTP id y207so3987061oia.11; Wed, 27 Oct 2021 08:55:28 -0700 (PDT) X-Gm-Message-State: AOAM531oiwcdMAmHZ64Fxi1i69JCCE+vpWcELYbYabNGmdpc2C2FAQW4 3WnV5uqMM12uNr5mWsZMQVJ5iUtuK0Q/IIR1ZXA= X-Received: by 2002:a54:448e:: with SMTP id v14mr4352588oiv.174.1635350127547; Wed, 27 Oct 2021 08:55:27 -0700 (PDT) MIME-Version: 1.0 References: <20211013181658.1020262-1-samitolvanen@google.com> <20211026201622.GG174703@worktop.programming.kicks-ass.net> <20211027120515.GC54628@C02TD0UTHF1T.local> <20211027124852.GK174703@worktop.programming.kicks-ass.net> In-Reply-To: From: Ard Biesheuvel Date: Wed, 27 Oct 2021 17:55:15 +0200 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH v5 00/15] x86: Add support for Clang CFI To: Sami Tolvanen Cc: Peter Zijlstra , Mark Rutland , X86 ML , Kees Cook , Josh Poimboeuf , Nathan Chancellor , Nick Desaulniers , Sedat Dilek , Steven Rostedt , linux-hardening@vger.kernel.org, Linux Kernel Mailing List , llvm@lists.linux.dev Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 27 Oct 2021 at 17:50, Sami Tolvanen wrote: > > On Wed, Oct 27, 2021 at 7:18 AM Ard Biesheuvel wrote: > > > > On Wed, 27 Oct 2021 at 16:03, Peter Zijlstra wrote: > > > > > > On Wed, Oct 27, 2021 at 03:30:11PM +0200, Ard Biesheuvel wrote: > > > > > > > As far as I can tell from playing around with Clang, the stubs can > > > > actually be executed directly, > > > > > > I had just finished reading the clang docs which suggest as much and was > > > about to try what the compiler actually generates. > > > > > > > they just jumps to the actual function. > > > > The compiler simply generates a jump table for each prototype that > > > > appears in the code as the target of an indirect jump, and checks > > > > whether the target appears in the list. > > > > > > > > E.g., the code below > > > > > > > > void foo(void) {} > > > > void bar(int) {} > > > > void baz(int) {} > > > > void (* volatile fn1)(void) = foo; > > > > void (* volatile fn2)(int) = bar; > > > > > > > > int main(int argc, char *argv[]) > > > > { > > > > fn1(); > > > > fn2 = baz; > > > > fn2(-1); > > > > } > > > > > > > > produces > > > > > > > > 0000000000400594 : > > > > 400594: d65f03c0 ret > > > > > > > > 0000000000400598 : > > > > 400598: d65f03c0 ret > > > > > > > > 000000000040059c : > > > > 40059c: d65f03c0 ret > > > > > > Right, so these are the actual functions ^. > > > > > > > 00000000004005a0
: > > > > 4005a0: a9bf7bfd stp x29, x30, [sp, #-16]! > > > > > > > > // First indirect call > > > > 4005a4: b0000088 adrp x8, 411000 <__libc_start_main@GLIBC_2.17> > > > > 4005a8: f9401508 ldr x8, [x8, #40] > > > > 4005ac: 90000009 adrp x9, 400000 <__abi_tag-0x278> > > > > 4005b0: 91182129 add x9, x9, #0x608 > > > > 4005b4: 910003fd mov x29, sp > > > > 4005b8: eb09011f cmp x8, x9 > > > > 4005bc: 54000241 b.ne 400604 // b.any > > > > 4005c0: d63f0100 blr x8 > > > > > > That's impenetrable to me, sorry. > > > > > > > This loads the value of fn1 in x8, and takes the address of the jump > > table in x9. Since it is only one entry long, it does a simple compare > > to check whether x8 appears in the jump table, and branches to the BRK > > at the end if they are different. > > > > > > // Assignment of fn2 > > > > 4005c4: 90000009 adrp x9, 400000 <__abi_tag-0x278> > > > > 4005c8: b0000088 adrp x8, 411000 <__libc_start_main@GLIBC_2.17> > > > > 4005cc: 91184129 add x9, x9, #0x610 > > > > 4005d0: f9001909 str x9, [x8, #48] > > > > > > I'm struggling here, x9 points to the branch at 400610, but then what? > > > > > > x8 is in .data somewhere? > > > > > > > This takes the address of the jump table entry of 'baz' in x9, and > > stores it in fn2 whose address is taken in x8. > > > > > > > > // Second indirect call > > > > 4005d4: f9401908 ldr x8, [x8, #48] > > > > 4005d8: 90000009 adrp x9, 400000 <__abi_tag-0x278> > > > > 4005dc: 91183129 add x9, x9, #0x60c > > > > 4005e0: cb090109 sub x9, x8, x9 > > > > 4005e4: 93c90929 ror x9, x9, #2 > > > > 4005e8: f100053f cmp x9, #0x1 > > > > 4005ec: 540000c8 b.hi 400604 // b.pmore > > > > 4005f0: 12800000 mov w0, #0xffffffff // #-1 > > > > 4005f4: d63f0100 blr x8 > > > > > > > > > > > > 4005f8: 2a1f03e0 mov w0, wzr > > > > 4005fc: a8c17bfd ldp x29, x30, [sp], #16 > > > > 400600: d65f03c0 ret > > > > 400604: d4200020 brk #0x1 > > > > > > > > > > 0000000000400608 <__typeid__ZTSFvvE_global_addr>: > > > > 400608: 17ffffe3 b 400594 > > > > > > > > 000000000040060c <__typeid__ZTSFviE_global_addr>: > > > > 40060c: 17ffffe3 b 400598 > > > > 400610: 17ffffe3 b 40059c > > > > > > And these are the stubs per type. > > > > > > > So it looks like taking the address is fine, although not optimal due > > > > to the additional jump. > > > > > > Right. > > > > > > > ... although it does seem that function_nocfi() doesn't actually work > > as expected, given that we want the address of .cfi and not the > > address of the stub. > > This is because the example wasn't compiled with > -fno-sanitize-cfi-canonical-jump-tables, which we use in the kernel. > With non-canonical jump tables, continues to point to the > function and .cfi_jt points to the jump table, and therefore, > function_nocfi() returns the raw function address. > Ah excellent. So that means that we don't need function_nocfi() at all, given that - statically allocated references (i.e., DEFINE_STATIC_CALL()) will refer to the function directly; - runtime assignments can decode the target of the *func pointer and strip off the initial branch. It would still be nice to have an intrinsic for that, or some variable attribute that signifies that assigning the address of a function to it will produce the actual function rather than the jump table entry. > > > > We could fudge around that by checking the > > > > opcode at the target of the call, or token paste ".cfi" after the > > > > symbol name in the static_call_update() macro, but it doesn't like > > > > like anything is terminally broken tbh. > > > > > > Agreed, since the jump table entries are actually executable it 'works'. > > > > > > I really don't like that extra jump though, so I think I really do want > > > that nocfi_ptr() thing. And going by: > > > > > > https://clang.llvm.org/docs/ControlFlowIntegrityDesign.html#forward-edge-cfi-for-indirect-function-calls > > > > > > and the above, that might be possible (on x86) with something like: > > > > > > /* > > > * Turns a Clang CFI jump-table entry into an actual function pointer. > > > * These jump-table entries are simply jmp.d32 instruction with their > > > * relative offset pointing to the actual function, therefore decode the > > > * instruction to find the real function. > > > */ > > > static __always_inline void *nocfi_ptr(void *func) > > > { > > > union text_poke_insn insn = *(union text_poke_insn *)func; > > > > > > return func + sizeof(insn) + insn.disp; > > > } > > > > > > But really, that wants to be a compiler intrinsic. > > > > Agreed. We could easily do something similar on arm64, but I'd prefer > > to avoid that too. > > I'll see what we can do. Note that the compiler built-in we previously > discussed would have semantics similar to function_nocfi(). It would > return the raw function address from a symbol name, but it wouldn't > decode the address from an arbitrary pointer, so this would require > something different. > > Sami