From patchwork Sun Jul 16 21:50:57 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Mark Brown X-Patchwork-Id: 13314933 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4CCBEC001E0 for ; Sun, 16 Jul 2023 21:53:00 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id BD2676B0074; Sun, 16 Jul 2023 17:52:59 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id B5B666B0075; Sun, 16 Jul 2023 17:52:59 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 9FC258D0001; Sun, 16 Jul 2023 17:52:59 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id 8CA706B0074 for ; Sun, 16 Jul 2023 17:52:59 -0400 (EDT) Received: from smtpin14.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay10.hostedemail.com (Postfix) with ESMTP id 65CBEC01A9 for ; Sun, 16 Jul 2023 21:52:59 +0000 (UTC) X-FDA: 81018825678.14.B04CA86 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by imf22.hostedemail.com (Postfix) with ESMTP id A2251C000A for ; Sun, 16 Jul 2023 21:52:57 +0000 (UTC) Authentication-Results: imf22.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b="D6u3/V1M"; dmarc=pass (policy=none) header.from=kernel.org; spf=pass (imf22.hostedemail.com: domain of broonie@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=broonie@kernel.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1689544377; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=sjpnLXaqItMtpNTEFyIHzeW5xIb7x9XSv/6wNzvGdSU=; b=ftcUfmV20eYLgEU2OnvGTbxcAN5qvG9oLpmLZLa4aT4Rw7Bkb4b4+SNtMWnUyA2XmiwdEN GLIZgijTHLvG1GHcToyIeb0A3R48xiHO2nguB9zyCDvRKPD15L0EFIT7ULbam2KxUUwHPu sIRuJHYuR5krIk6WsbfVYx40Z6oiKDg= ARC-Authentication-Results: i=1; imf22.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b="D6u3/V1M"; dmarc=pass (policy=none) header.from=kernel.org; spf=pass (imf22.hostedemail.com: domain of broonie@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=broonie@kernel.org ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1689544377; a=rsa-sha256; cv=none; b=3ds5U8Jf0LoMvilpynY1u4mGM0VntsVVqshJ+zrN4p4CW6SchZMyXz+p1+RXfI4P1eqeS2 TSZPQIRLSfwGgmHqP8Ne//NZ1oS3E3AJcItkOxgHf7DDGI5WBbOkC3HRHNNa1CyMTG/XGz 3nXsV7Hvbhoi7+PtERfbHGKhyVAvcLU= Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id A611C60D2C; Sun, 16 Jul 2023 21:52:56 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 5F0CAC433D9; Sun, 16 Jul 2023 21:52:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1689544376; bh=pjsLx6b1K0x937g9y/oHkxJKpquxYt6WMLA+SQZbCw0=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=D6u3/V1MrlLBNBjRRjCkDs71lTKKLdxk4UVJjERzJR5KtW04sDJdFN6DY4BPTv7r0 aTfNC0/NB9GX79XAFYhU9VdVRzw7MQZB2TF5LJweHmcGzRshXudBtlTD2haZIuC5LP NaMVrAzn6EMq6cEbwRZ7uCadAgG/757FAaXVcG059B2O2THi3ybHajqxcaPXT14ni/ 6NChUcGdOlfnZpMRnwjiRdGcw3nrq4zpyK9Bx75LgEsUYLdTuKOLC/IWjPFQaqy28Z elrpk8hcyukSHOh6r8e7/i+jKu2gyDkRcAfCoKCGTMq/2lOlXbHU4FnmZICc8ziKLS FgyPVP92q+o+A== From: Mark Brown Date: Sun, 16 Jul 2023 22:50:57 +0100 Subject: [PATCH 01/35] prctl: arch-agnostic prctl for shadow stack MIME-Version: 1.0 Message-Id: <20230716-arm64-gcs-v1-1-bf567f93bba6@kernel.org> References: <20230716-arm64-gcs-v1-0-bf567f93bba6@kernel.org> In-Reply-To: <20230716-arm64-gcs-v1-0-bf567f93bba6@kernel.org> To: Catalin Marinas , Will Deacon , Jonathan Corbet , Andrew Morton , Marc Zyngier , Oliver Upton , James Morse , Suzuki K Poulose , Arnd Bergmann , Oleg Nesterov , Eric Biederman , Kees Cook , Shuah Khan , "Rick P. Edgecombe" , Deepak Gupta , Ard Biesheuvel , Szabolcs Nagy Cc: "H.J. Lu" , Paul Walmsley , Palmer Dabbelt , Albert Ou , linux-arm-kernel@lists.infradead.org, linux-doc@vger.kernel.org, kvmarm@lists.linux.dev, linux-fsdevel@vger.kernel.org, linux-arch@vger.kernel.org, linux-mm@kvack.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, linux-riscv@lists.infradead.org, Mark Brown X-Mailer: b4 0.13-dev-099c9 X-Developer-Signature: v=1; a=openpgp-sha256; l=3582; i=broonie@kernel.org; h=from:subject:message-id; bh=98fSp9zoycOoO4JRBJGcJJdFtBdtqinfhtbljBoqJQI=; b=owEBbQGS/pANAwAKASTWi3JdVIfQAcsmYgBktGaPOeEvYK+HaBvmOtGw+GIVwaAEnOI6agwGJ0VT 4ZZsfRKJATMEAAEKAB0WIQSt5miqZ1cYtZ/in+ok1otyXVSH0AUCZLRmjwAKCRAk1otyXVSH0BEJB/ 9TsUZy5D4ijFFo1Dfdcl7QkdIYj1UVRzxptIb9l671dL338Gc6GZhPmT4VkT3f+hyJjVzVSMK0BwQx 7fE6Izud5qO6BfUkfyU51nyNtrLB7yLggC9+jRTraTvq081sRTpALcQTMwAYjiw8BoH1aDx04+TDp5 m9GAxFLqSAzAvANMpV53ulubFEhZCOy172JSzFniKE4JCODuwQFC/Lc1Ze7H5Y8LHJoEx4NnI3FvY5 hCcDa2LqJ6vTvaleevbA95bGiuxuE3DnaUGiWqcw/ZREbyi7SKv2jlGrWefGv7OMxEAHprq0ZEDBHW aTwFGtJ3i24vZYlTquUCFDGTC9O7Iw X-Developer-Key: i=broonie@kernel.org; a=openpgp; fpr=3F2568AAC26998F9E813A1C5C3F436CA30F5D8EB X-Rspam-User: X-Stat-Signature: 6ffwr584gfnpptj9phyufhjyjayfwqdz X-Rspamd-Server: rspam07 X-Rspamd-Queue-Id: A2251C000A X-HE-Tag: 1689544377-580453 X-HE-Meta: U2FsdGVkX1+0jxkPOe+cdyWt2HXhmKXV8QZifEUAmgw89ne4idbhpIIjj7yLeajGxjbVvUeQXiohjNFF6kYW0OSIcLoY1WdbPMpThVg5+oFOGC/d7uloUzCeANdLrzYSvpw9L9tLxCjPuElgtwNgO7DphkLaAismEdBXKqbb4/hQ0Vx6NI4adEwcSrtZsysRaAacE5U0XR337U9ynysgOyV3CBYbXFyeYWICH5Fs/LYe6ZWrVGI1PdVPZBye9odQVXk7qGSdovIPEury8hgRwiimakvFDCSO+ExbcZeAnfK9B/mnZR0Ki6QmsDl9caW0+Z8XAdH+7cFeEszUv5B8GY99R2gEdvJKL3fTFL8KOXIrrT6vycOUoFI1lVHfjMwxZAOJQflo3TMAbFqgWLR6YSxzoVpcTQL317P/SD2nVEsSLrx6tQ6MxDrDI8B3snJBaV2ly+YE5VhoG1rse9dKZUbTYwyjZSbkmYUyvV7YvOfYXVfRQ40AEXN679eiEUdcorZrYB7i88jon462ZEkjnj+rKoduHh37cCg9ogWBmTVZ9CTcsmyWC6JR6NzngqrttmFVLYXrWcuhURDZ2dyADtFjY8ybUsPH60YZs8vmIjttdWRikKy0wFKsj5iaaAwkLO3L8jY1Eylj3cBH0my9uepW8Y3dhAvUAQtgFk2agn1qyxPax2Uw4WTitb9v+9Z1s7qqgRAH0JX9Q5WcI82aefRPhd5ZcGZoN4OI3kvXP0EvER6RIwvnnzOjcrRd296GeHqI2tpuJxv2ztVV4CsvvlmPvgp7uxxO6wxUWk3Mw+ToLJFgkT9L+c0xsUaiCbVOx2e6cSadQ7GJJQNkOnDnjk9d2RSbIp/b+ECJDE5Z9yjnzx/oKEbjBClucMM7j9qrZKkXcMInes0eEhiV4meC83Smi5sg+vpcLvVd8IuLbKotSH4P0aQ+Q4YWo6vRMH5v0LOQZy+az1AUWRup8p5 CI/SCUbX wQwhutIg/DIEDhpZABvSSSWuJipEPLrG2IMYMsbuCOBkBWm9nqmEo5NTWuPvnIGnkCeuIFfnCQcu7pCxjvT7AVYZpiWqy+vE7ttAh+UCgbIR3LF3Sw2ECHARG2fRjsxGmOFbkCYKkZsQIpFPkiIMd5fZ5r/BTw2d5fkkH8/V66SRWkvJK4cZ3jtEotDJOASG7Wzyk6LN7vUNNlffIkrvdLXRP2pfb7ylbFbkyNFw1QMdCMhaLs3gVmfo/d7ZpP62L//MYguJCWxiWf1zlprmhuS2uz9humYWlFbt2FoRJWTS2Yd0VMT7g0/CX6cSzJhszwe5piwRXgeS4DAtyEuWzE8hma1YvdLGXBY13kPpZtLjomqW+4QbG3c8wIjjmPUE9/6yYpHjix/DoZSMrkpxahYg4IZU1UVsmasH8TZJMONyg24f5TiwRNrD60mSz0E1eZ5jSM2+wvMPYpK4JihsG9C8TNQWzf2LSyhRn X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: From: Deepak Gupta Three architectures (x86, aarch64, riscv) have announced support for shadow stack. This patch adds arch-agnostic prtcl support to enable /disable/get/set status of shadow stack and forward control (landing pad) flow cfi statuses. New prctls are - PR_GET_SHADOW_STACK_STATUS, PR_SET_SHADOW_STACK_STATUS Signed-off-by: Deepak Gupta [Rebased onto current kernels, renumbering to track other allocations already upstream, dropping indirect LP, updating to pass arg to set by value, fix missing prototypes for weak functions and update title. -- broonie] Signed-off-by: Mark Brown --- include/linux/mm.h | 3 +++ include/uapi/linux/prctl.h | 17 +++++++++++++++++ kernel/sys.c | 20 ++++++++++++++++++++ 3 files changed, 40 insertions(+) diff --git a/include/linux/mm.h b/include/linux/mm.h index 97eddc83d19c..bf16edf2fcd9 100644 --- a/include/linux/mm.h +++ b/include/linux/mm.h @@ -3947,4 +3947,7 @@ static inline void accept_memory(phys_addr_t start, phys_addr_t end) #endif +int arch_get_shadow_stack_status(struct task_struct *t, unsigned long __user *status); +int arch_set_shadow_stack_status(struct task_struct *t, unsigned long status); + #endif /* _LINUX_MM_H */ diff --git a/include/uapi/linux/prctl.h b/include/uapi/linux/prctl.h index 3c36aeade991..9fdc77fa2bfe 100644 --- a/include/uapi/linux/prctl.h +++ b/include/uapi/linux/prctl.h @@ -305,4 +305,21 @@ struct prctl_mm_map { # define PR_RISCV_V_VSTATE_CTRL_NEXT_MASK 0xc # define PR_RISCV_V_VSTATE_CTRL_MASK 0x1f +/* + * get shadow stack status for current thread. Assumes shadow stack is min 4 byte aligned. + * Note shadow stack can be 8 byte aligned on 64bit. + * Lower 2 bits can give status of locked and enabled/disabled. + * size and address range can be obtained via /proc/maps. get_shadow_stack_status will + * return base of shadow stack. + */ +#define PR_GET_SHADOW_STACK_STATUS 71 +/* + * set shadow stack status for current thread (including enabling, disabling or locking) + * note that it will only set the status and setup of the shadow stack. Allocating shadow + * stack should be done separately using mmap. + */ +#define PR_SET_SHADOW_STACK_STATUS 72 +# define PR_SHADOW_STACK_LOCK (1UL << 0) +# define PR_SHADOW_STACK_ENABLE (1UL << 1) + #endif /* _LINUX_PRCTL_H */ diff --git a/kernel/sys.c b/kernel/sys.c index 05f838929e72..ebf9ea5f0fae 100644 --- a/kernel/sys.c +++ b/kernel/sys.c @@ -2302,6 +2302,16 @@ int __weak arch_prctl_spec_ctrl_set(struct task_struct *t, unsigned long which, return -EINVAL; } +int __weak arch_get_shadow_stack_status(struct task_struct *t, unsigned long __user *status) +{ + return -EINVAL; +} + +int __weak arch_set_shadow_stack_status(struct task_struct *t, unsigned long status) +{ + return -EINVAL; +} + #define PR_IO_FLUSHER (PF_MEMALLOC_NOIO | PF_LOCAL_THROTTLE) #ifdef CONFIG_ANON_VMA_NAME @@ -2720,6 +2730,16 @@ SYSCALL_DEFINE5(prctl, int, option, unsigned long, arg2, unsigned long, arg3, case PR_RISCV_V_GET_CONTROL: error = RISCV_V_GET_CONTROL(); break; + case PR_GET_SHADOW_STACK_STATUS: + if (arg3 || arg4 || arg5) + return -EINVAL; + error = arch_get_shadow_stack_status(me, (unsigned long __user *) arg2); + break; + case PR_SET_SHADOW_STACK_STATUS: + if (arg3 || arg4 || arg5) + return -EINVAL; + error = arch_set_shadow_stack_status(me, arg2); + break; default: error = -EINVAL; break;