diff mbox series

[v5,4/6] x86/cet: Check feature_1 in TCB for active IBT and SHSTK

Message ID 20231222165830.2100438-5-hjl.tools@gmail.com
State New
Headers show
Series x86/cet: Update CET kernel interface | expand

Commit Message

H.J. Lu Dec. 22, 2023, 4:58 p.m. UTC
Initially, IBT and SHSTK are marked as active when CPU supports them
and CET are enabled in glibc.  They can be disabled early by tunables
before relocation.  Since after relocation, GLRO(dl_x86_cpu_features)
becomes read-only, we can't update GLRO(dl_x86_cpu_features) to mark
IBT and SHSTK as inactive.  Instead, check the feature_1 field in TCB
to decide if IBT and SHST are active.
---
 sysdeps/x86/bits/platform/x86.h      |  8 ++++++++
 sysdeps/x86/get-cpuid-feature-leaf.c | 11 ++++++++++-
 sysdeps/x86/sys/platform/x86.h       | 17 +++++++++++++++++
 3 files changed, 35 insertions(+), 1 deletion(-)

Comments

Adhemerval Zanella Netto Dec. 29, 2023, 2:59 p.m. UTC | #1
On 22/12/23 13:58, H.J. Lu wrote:
> Initially, IBT and SHSTK are marked as active when CPU supports them
> and CET are enabled in glibc.  They can be disabled early by tunables
> before relocation.  Since after relocation, GLRO(dl_x86_cpu_features)
> becomes read-only, we can't update GLRO(dl_x86_cpu_features) to mark
> IBT and SHSTK as inactive.  Instead, check the feature_1 field in TCB
> to decide if IBT and SHST are active.
> ---
>  sysdeps/x86/bits/platform/x86.h      |  8 ++++++++
>  sysdeps/x86/get-cpuid-feature-leaf.c | 11 ++++++++++-
>  sysdeps/x86/sys/platform/x86.h       | 17 +++++++++++++++++
>  3 files changed, 35 insertions(+), 1 deletion(-)
> 
> diff --git a/sysdeps/x86/bits/platform/x86.h b/sysdeps/x86/bits/platform/x86.h
> index 1e23d53ba2..1575ae53fb 100644
> --- a/sysdeps/x86/bits/platform/x86.h
> +++ b/sysdeps/x86/bits/platform/x86.h
> @@ -337,3 +337,11 @@ enum
>    x86_cpu_AVX10_YMM = x86_cpu_index_24_ecx_0_ebx + 17,
>    x86_cpu_AVX10_ZMM = x86_cpu_index_24_ecx_0_ebx + 18,
>  };
> +
> +/* Bits in the feature_1 field in TCB.  */
> +
> +enum
> +{
> +  x86_feature_1_ibt		= 1U << 0,
> +  x86_feature_1_shstk		= 1U << 1
> +};
> diff --git a/sysdeps/x86/get-cpuid-feature-leaf.c b/sysdeps/x86/get-cpuid-feature-leaf.c
> index 9317a6b494..f69936b31e 100644
> --- a/sysdeps/x86/get-cpuid-feature-leaf.c
> +++ b/sysdeps/x86/get-cpuid-feature-leaf.c
> @@ -15,9 +15,18 @@
>     License along with the GNU C Library; if not, see
>     <https://www.gnu.org/licenses/>.  */
>  
> -
> +#include <assert.h>
> +#include <tcb-offsets.h>
>  #include <ldsodefs.h>
>  
> +#ifdef __x86_64__
> +# ifdef __LP64__
> +_Static_assert (FEATURE_1_OFFSET == 72, "FEATURE_1_OFFSET != 72");
> +# else
> +_Static_assert (FEATURE_1_OFFSET == 40, "FEATURE_1_OFFSET != 40");
> +# endif
> +#endif
> +
>  const struct cpuid_feature *
>  __x86_get_cpuid_feature_leaf (unsigned int leaf)
>  {
> diff --git a/sysdeps/x86/sys/platform/x86.h b/sysdeps/x86/sys/platform/x86.h
> index 1ea2c5fc0b..89b1b16f22 100644
> --- a/sysdeps/x86/sys/platform/x86.h
> +++ b/sysdeps/x86/sys/platform/x86.h
> @@ -45,6 +45,23 @@ x86_cpu_present (unsigned int __index)
>  static __inline__ _Bool
>  x86_cpu_active (unsigned int __index)
>  {
> +  if (__index == x86_cpu_IBT || __index == x86_cpu_SHSTK)
> +    {
> +#ifdef __x86_64__
> +      unsigned int __feature_1;
> +# ifdef __LP64__
> +      __asm__ ("mov %%fs:72, %0" : "=r" (__feature_1));
> +# else
> +      __asm__ ("mov %%fs:40, %0" : "=r" (__feature_1));
> +# endif
> +      if (__index == x86_cpu_IBT)
> +	return __feature_1 & x86_feature_1_ibt;
> +      else
> +	return __feature_1 & x86_feature_1_shstk;

So I take that shadow stack is fully supported on x32, right?

> +#else
> +      return false;
> +#endif
> +    }
>    const struct cpuid_feature *__ptr = __x86_get_cpuid_feature_leaf
>      (__index / (8 * sizeof (unsigned int) * 4));
>    unsigned int __reg
H.J. Lu Dec. 29, 2023, 3:14 p.m. UTC | #2
On Fri, Dec 29, 2023 at 6:59 AM Adhemerval Zanella Netto
<adhemerval.zanella@linaro.org> wrote:
>
>
>
> On 22/12/23 13:58, H.J. Lu wrote:
> > Initially, IBT and SHSTK are marked as active when CPU supports them
> > and CET are enabled in glibc.  They can be disabled early by tunables
> > before relocation.  Since after relocation, GLRO(dl_x86_cpu_features)
> > becomes read-only, we can't update GLRO(dl_x86_cpu_features) to mark
> > IBT and SHSTK as inactive.  Instead, check the feature_1 field in TCB
> > to decide if IBT and SHST are active.
> > ---
> >  sysdeps/x86/bits/platform/x86.h      |  8 ++++++++
> >  sysdeps/x86/get-cpuid-feature-leaf.c | 11 ++++++++++-
> >  sysdeps/x86/sys/platform/x86.h       | 17 +++++++++++++++++
> >  3 files changed, 35 insertions(+), 1 deletion(-)
> >
> > diff --git a/sysdeps/x86/bits/platform/x86.h b/sysdeps/x86/bits/platform/x86.h
> > index 1e23d53ba2..1575ae53fb 100644
> > --- a/sysdeps/x86/bits/platform/x86.h
> > +++ b/sysdeps/x86/bits/platform/x86.h
> > @@ -337,3 +337,11 @@ enum
> >    x86_cpu_AVX10_YMM = x86_cpu_index_24_ecx_0_ebx + 17,
> >    x86_cpu_AVX10_ZMM = x86_cpu_index_24_ecx_0_ebx + 18,
> >  };
> > +
> > +/* Bits in the feature_1 field in TCB.  */
> > +
> > +enum
> > +{
> > +  x86_feature_1_ibt          = 1U << 0,
> > +  x86_feature_1_shstk                = 1U << 1
> > +};
> > diff --git a/sysdeps/x86/get-cpuid-feature-leaf.c b/sysdeps/x86/get-cpuid-feature-leaf.c
> > index 9317a6b494..f69936b31e 100644
> > --- a/sysdeps/x86/get-cpuid-feature-leaf.c
> > +++ b/sysdeps/x86/get-cpuid-feature-leaf.c
> > @@ -15,9 +15,18 @@
> >     License along with the GNU C Library; if not, see
> >     <https://www.gnu.org/licenses/>.  */
> >
> > -
> > +#include <assert.h>
> > +#include <tcb-offsets.h>
> >  #include <ldsodefs.h>
> >
> > +#ifdef __x86_64__
> > +# ifdef __LP64__
> > +_Static_assert (FEATURE_1_OFFSET == 72, "FEATURE_1_OFFSET != 72");
> > +# else
> > +_Static_assert (FEATURE_1_OFFSET == 40, "FEATURE_1_OFFSET != 40");
> > +# endif
> > +#endif
> > +
> >  const struct cpuid_feature *
> >  __x86_get_cpuid_feature_leaf (unsigned int leaf)
> >  {
> > diff --git a/sysdeps/x86/sys/platform/x86.h b/sysdeps/x86/sys/platform/x86.h
> > index 1ea2c5fc0b..89b1b16f22 100644
> > --- a/sysdeps/x86/sys/platform/x86.h
> > +++ b/sysdeps/x86/sys/platform/x86.h
> > @@ -45,6 +45,23 @@ x86_cpu_present (unsigned int __index)
> >  static __inline__ _Bool
> >  x86_cpu_active (unsigned int __index)
> >  {
> > +  if (__index == x86_cpu_IBT || __index == x86_cpu_SHSTK)
> > +    {
> > +#ifdef __x86_64__
> > +      unsigned int __feature_1;
> > +# ifdef __LP64__
> > +      __asm__ ("mov %%fs:72, %0" : "=r" (__feature_1));
> > +# else
> > +      __asm__ ("mov %%fs:40, %0" : "=r" (__feature_1));
> > +# endif
> > +      if (__index == x86_cpu_IBT)
> > +     return __feature_1 & x86_feature_1_ibt;
> > +      else
> > +     return __feature_1 & x86_feature_1_shstk;
>
> So I take that shadow stack is fully supported on x32, right?

Not yet.  I have additional kernel and glibc patches to enable
shadow stack on x32.  I will submit them after shadow stack
is enabled in glibc.

> > +#else
> > +      return false;
> > +#endif
> > +    }
> >    const struct cpuid_feature *__ptr = __x86_get_cpuid_feature_leaf
> >      (__index / (8 * sizeof (unsigned int) * 4));
> >    unsigned int __reg

Thanks.
diff mbox series

Patch

diff --git a/sysdeps/x86/bits/platform/x86.h b/sysdeps/x86/bits/platform/x86.h
index 1e23d53ba2..1575ae53fb 100644
--- a/sysdeps/x86/bits/platform/x86.h
+++ b/sysdeps/x86/bits/platform/x86.h
@@ -337,3 +337,11 @@  enum
   x86_cpu_AVX10_YMM = x86_cpu_index_24_ecx_0_ebx + 17,
   x86_cpu_AVX10_ZMM = x86_cpu_index_24_ecx_0_ebx + 18,
 };
+
+/* Bits in the feature_1 field in TCB.  */
+
+enum
+{
+  x86_feature_1_ibt		= 1U << 0,
+  x86_feature_1_shstk		= 1U << 1
+};
diff --git a/sysdeps/x86/get-cpuid-feature-leaf.c b/sysdeps/x86/get-cpuid-feature-leaf.c
index 9317a6b494..f69936b31e 100644
--- a/sysdeps/x86/get-cpuid-feature-leaf.c
+++ b/sysdeps/x86/get-cpuid-feature-leaf.c
@@ -15,9 +15,18 @@ 
    License along with the GNU C Library; if not, see
    <https://www.gnu.org/licenses/>.  */
 
-
+#include <assert.h>
+#include <tcb-offsets.h>
 #include <ldsodefs.h>
 
+#ifdef __x86_64__
+# ifdef __LP64__
+_Static_assert (FEATURE_1_OFFSET == 72, "FEATURE_1_OFFSET != 72");
+# else
+_Static_assert (FEATURE_1_OFFSET == 40, "FEATURE_1_OFFSET != 40");
+# endif
+#endif
+
 const struct cpuid_feature *
 __x86_get_cpuid_feature_leaf (unsigned int leaf)
 {
diff --git a/sysdeps/x86/sys/platform/x86.h b/sysdeps/x86/sys/platform/x86.h
index 1ea2c5fc0b..89b1b16f22 100644
--- a/sysdeps/x86/sys/platform/x86.h
+++ b/sysdeps/x86/sys/platform/x86.h
@@ -45,6 +45,23 @@  x86_cpu_present (unsigned int __index)
 static __inline__ _Bool
 x86_cpu_active (unsigned int __index)
 {
+  if (__index == x86_cpu_IBT || __index == x86_cpu_SHSTK)
+    {
+#ifdef __x86_64__
+      unsigned int __feature_1;
+# ifdef __LP64__
+      __asm__ ("mov %%fs:72, %0" : "=r" (__feature_1));
+# else
+      __asm__ ("mov %%fs:40, %0" : "=r" (__feature_1));
+# endif
+      if (__index == x86_cpu_IBT)
+	return __feature_1 & x86_feature_1_ibt;
+      else
+	return __feature_1 & x86_feature_1_shstk;
+#else
+      return false;
+#endif
+    }
   const struct cpuid_feature *__ptr = __x86_get_cpuid_feature_leaf
     (__index / (8 * sizeof (unsigned int) * 4));
   unsigned int __reg