From nobody Fri May 17 09:38:24 2024 Delivered-To: importer2@patchew.org Received-SPF: pass (zohomail.com: domain of vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; envelope-from=linux-kernel-owner@vger.kernel.org; helo=vger.kernel.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass(p=reject dis=none) header.from=google.com ARC-Seal: i=1; a=rsa-sha256; t=1614047818; cv=none; d=zohomail.com; s=zohoarc; b=cui4n8FCIt9ZPMNwpz+GEpkfFnTiKm+8xQuCYX5gOVvEh/YGAzHYUq+qaeHyXuoA+GXw9OfOeQiH/i5TLmTdYSgzH+qjtDdB1FgNU0B0WB7bDbCw0bUPhxurlPGaeJG/qveE/miYSFUsgOaJPp2nRhj3fdCsRluX4ZMeVQEx34A= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1614047818; h=Content-Type:Cc:Date:From:In-Reply-To:List-Id:MIME-Version:Message-ID:References:Sender:Subject:To; bh=PGrLnEq5sje+DbyVyjyk9DtPrIKTxkj/GFVaSNwb+20=; b=Q/oM5pbaFX/8FPRBIT+KSiwS4kgx97f8zAFmDXUSrKxHA9YOpR5qf72HuQftghUg2MyMZNhBxbhtmK+5Aq5HcR7Q4bV5Gl5Y1groq1N6d8N8FG3t6hkZ4S98bJs7LIEbnrBWrboZXrOSsODLqi5g74iD+Z0AEFW/eNS1tMT8LY8= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass header.from= (p=reject dis=none) header.from= Return-Path: Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mx.zohomail.com with SMTP id 1614047817747219.26894946589118; Mon, 22 Feb 2021 18:36:57 -0800 (PST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230516AbhBWCgy (ORCPT ); Mon, 22 Feb 2021 21:36:54 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46040 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230386AbhBWCg1 (ORCPT ); Mon, 22 Feb 2021 21:36:27 -0500 Received: from mail-pl1-x649.google.com (mail-pl1-x649.google.com [IPv6:2607:f8b0:4864:20::649]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D9953C061786 for ; Mon, 22 Feb 2021 18:35:46 -0800 (PST) Received: by mail-pl1-x649.google.com with SMTP id 42so9334202plb.10 for ; Mon, 22 Feb 2021 18:35:46 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=sender:date:in-reply-to:message-id:mime-version:references:subject :from:cc; bh=PGrLnEq5sje+DbyVyjyk9DtPrIKTxkj/GFVaSNwb+20=; b=lQPJcLW5Zj/rVq/5KMZi6Bk5Gxp9bi/jqYNJj/hkmFM6gzte6FNZy8pUhQPuF48DW5 rgdLyFQsyQ6U4RJUQqukWwxkSjocc0fLx+yt1DM01Qk39F7C/1AXZh+zjBdJxQ/3G0By 9Q1STBNlBg5Q7c+WlQM3qRq5jdlJ/xEHfGwh+b+RySqJGyYgto60gGTcmqgVTnskcTia voGzzLmvFVyrWpAvMnajOE6rcF29MHLzcWao+b+LIqDC6xm2dNFZctXjqUO3V/BvFPkl xIDw2+GeuCSLwm+cSUCmzXDs9pW4C7jufUXw/nbxuMFcESLv2rHy/6q1Bho4udqCsDPz 0t3w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:in-reply-to:message-id:mime-version :references:subject:from:cc; bh=PGrLnEq5sje+DbyVyjyk9DtPrIKTxkj/GFVaSNwb+20=; b=V6DKvZmTB/4hZiJJTVGPKSl8Zh/Wdj4RzAQinxL0kGvD2UDErHvMeaI/TPhSGNttkw ZLy4pTjkh/PS38W/neSdCcJgkidOgjfrZCzZabuaRGjYgfsoUz0W7Wh4jTvBs1DMmC5V z1ZEKkGHNky2VsxTVX07fZ97+vYifGsfA101+gdL1qqOGVVlF5o9tDNCsqrs8hwgAKXE PJJJFS70dA1CV/DoXA+yMT/O8lQcz7nseiuh6HHLcRl4oymYuYNNPzIns6QsY3i+RGWq sYXn4t9f1yRg+N+aaSjC3BN8PAAih2b9jkbckl8WQpHBp4qum9rxuPIYuFxegtOk5kaa q7zw== X-Gm-Message-State: AOAM5331CJBJwizmzkq77HFE3MTqOp8O9kuQMwCFCujfmh1gJPwHThr6 Ar6BoaUGVLbtrskqddZqeLzxufYPxD7Q X-Google-Smtp-Source: ABdhPJwpIgoHP79+CAP1cZb8niAgyx2loeUCwl0+OoIAPkr358YzHC0nbYkhT6jM2oeR9Nm6NApKoYyBPvq+ Sender: "jiancai via sendgmr" X-Received: from jiancai.svl.corp.google.com ([2620:15c:2ce:0:7985:60cc:661a:9692]) (user=jiancai job=sendgmr) by 2002:a17:90a:8e83:: with SMTP id f3mr27877234pjo.70.1614047746241; Mon, 22 Feb 2021 18:35:46 -0800 (PST) Date: Mon, 22 Feb 2021 18:35:28 -0800 In-Reply-To: <20210223023125.2265845-1-jiancai@google.com> Message-Id: <20210223023542.2287529-1-jiancai@google.com> Mime-Version: 1.0 References: <20210223023125.2265845-1-jiancai@google.com> X-Mailer: git-send-email 2.30.0.617.g56c4b15f3c-goog Subject: [PATCH v5] ARM: Implement SLS mitigation From: Jian Cai Cc: ndesaulniers@google.com, manojgupta@google.com, llozano@google.com, clang-built-linux@googlegroups.com, Jian Cai , Nathan Chancellor , David Laight , Will Deacon , Russell King , Russell King , Catalin Marinas , James Morris , "Serge E. Hallyn" , Arnd Bergmann , Masahiro Yamada , Krzysztof Kozlowski , Marc Zyngier , Kees Cook , "=?UTF-8?q?Andreas=20F=C3=A4rber?=" , Ard Biesheuvel , Ingo Molnar , Andrew Morton , Mike Rapoport , Mark Rutland , David Brazdil , James Morse , linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org To: unlisted-recipients:; (no To-header on input) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-ZohoMail-DKIM: pass (identity @google.com) Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" This patch adds CONFIG_HARDEN_SLS_ALL that can be used to turn on -mharden-sls=3Dall, which mitigates the straight-line speculation vulnerability, speculative execution of the instruction following some unconditional jumps. Notice -mharden-sls=3D has other options as below, and this config turns on the strongest option. all: enable all mitigations against Straight Line Speculation that are impl= emented. none: disable all mitigations against Straight Line Speculation. retbr: enable the mitigation against Straight Line Speculation for RET and = BR instructions. blr: enable the mitigation against Straight Line Speculation for BLR instru= ctions. Links: https://reviews.llvm.org/D93221 https://reviews.llvm.org/D81404 https://developer.arm.com/support/arm-security-updates/speculative-processo= r-vulnerability/downloads/straight-line-speculation https://developer.arm.com/support/arm-security-updates/speculative-processo= r-vulnerability/frequently-asked-questions#SLS2 Suggested-by: Manoj Gupta Suggested-by: Nick Desaulniers Suggested-by: Nathan Chancellor Suggested-by: David Laight Suggested-by: Will Deacon Suggested-by: Russell King Reviewed-by: Nathan Chancellor Signed-off-by: Jian Cai --- Changes v4->v5: Removed "default n" and made the description target indepdent in Kconfig.hardening. Please ignore my last email, it did not include the changes. arch/arm/Makefile | 4 ++++ arch/arm/include/asm/vmlinux.lds.h | 4 ++++ arch/arm/kernel/vmlinux.lds.S | 1 + arch/arm64/Makefile | 4 ++++ arch/arm64/kernel/vmlinux.lds.S | 5 +++++ security/Kconfig.hardening | 8 ++++++++ 6 files changed, 26 insertions(+) diff --git a/arch/arm/Makefile b/arch/arm/Makefile index 4aaec9599e8a..11d89ef32da9 100644 --- a/arch/arm/Makefile +++ b/arch/arm/Makefile @@ -48,6 +48,10 @@ CHECKFLAGS +=3D -D__ARMEL__ KBUILD_LDFLAGS +=3D -EL endif =20 +ifeq ($(CONFIG_HARDEN_SLS_ALL), y) +KBUILD_CFLAGS +=3D -mharden-sls=3Dall +endif + # # The Scalar Replacement of Aggregates (SRA) optimization pass in GCC 4.9 = and # later may result in code being generated that handles signed short and s= igned diff --git a/arch/arm/include/asm/vmlinux.lds.h b/arch/arm/include/asm/vmli= nux.lds.h index 4a91428c324d..c7f9717511ca 100644 --- a/arch/arm/include/asm/vmlinux.lds.h +++ b/arch/arm/include/asm/vmlinux.lds.h @@ -145,3 +145,7 @@ __edtcm_data =3D .; \ } \ . =3D __dtcm_start + SIZEOF(.data_dtcm); + +#define SLS_TEXT \ + ALIGN_FUNCTION(); \ + *(.text.__llvm_slsblr_thunk_*) diff --git a/arch/arm/kernel/vmlinux.lds.S b/arch/arm/kernel/vmlinux.lds.S index f7f4620d59c3..e71f2bc97bae 100644 --- a/arch/arm/kernel/vmlinux.lds.S +++ b/arch/arm/kernel/vmlinux.lds.S @@ -63,6 +63,7 @@ SECTIONS .text : { /* Real text segment */ _stext =3D .; /* Text and read-only data */ ARM_TEXT + SLS_TEXT } =20 #ifdef CONFIG_DEBUG_ALIGN_RODATA diff --git a/arch/arm64/Makefile b/arch/arm64/Makefile index 90309208bb28..ca7299b356a9 100644 --- a/arch/arm64/Makefile +++ b/arch/arm64/Makefile @@ -34,6 +34,10 @@ $(warning LSE atomics not supported by binutils) endif endif =20 +ifeq ($(CONFIG_HARDEN_SLS_ALL), y) +KBUILD_CFLAGS +=3D -mharden-sls=3Dall +endif + cc_has_k_constraint :=3D $(call try-run,echo \ 'int main(void) { \ asm volatile("and w0, w0, %w0" :: "K" (4294967295)); \ diff --git a/arch/arm64/kernel/vmlinux.lds.S b/arch/arm64/kernel/vmlinux.ld= s.S index 4c0b0c89ad59..f8912e42ffcd 100644 --- a/arch/arm64/kernel/vmlinux.lds.S +++ b/arch/arm64/kernel/vmlinux.lds.S @@ -93,6 +93,10 @@ jiffies =3D jiffies_64; #define TRAMP_TEXT #endif =20 +#define SLS_TEXT \ + ALIGN_FUNCTION(); \ + *(.text.__llvm_slsblr_thunk_*) + /* * The size of the PE/COFF section that covers the kernel image, which * runs from _stext to _edata, must be a round multiple of the PE/COFF @@ -144,6 +148,7 @@ SECTIONS HIBERNATE_TEXT TRAMP_TEXT *(.fixup) + SLS_TEXT *(.gnu.warning) . =3D ALIGN(16); *(.got) /* Global offset table */ diff --git a/security/Kconfig.hardening b/security/Kconfig.hardening index 269967c4fc1b..db76ad732c14 100644 --- a/security/Kconfig.hardening +++ b/security/Kconfig.hardening @@ -121,6 +121,14 @@ choice =20 endchoice =20 +config HARDEN_SLS_ALL + bool "enable SLS vulnerability hardening" + depends on $(cc-option,-mharden-sls=3Dall) + help + Enables straight-line speculation vulnerability hardening. This inserts + speculation barrier instruction sequences after certain unconditional j= umps + to prevent speculative execution past those barriers. + config GCC_PLUGIN_STRUCTLEAK_VERBOSE bool "Report forcefully initialized variables" depends on GCC_PLUGIN_STRUCTLEAK --=20 2.30.0.617.g56c4b15f3c-goog