| 1 | /* x86 CET initializers function. |
| 2 | Copyright (C) 2018-2020 Free Software Foundation, Inc. |
| 3 | |
| 4 | The GNU C Library is free software; you can redistribute it and/or |
| 5 | modify it under the terms of the GNU Lesser General Public |
| 6 | License as published by the Free Software Foundation; either |
| 7 | version 2.1 of the License, or (at your option) any later version. |
| 8 | |
| 9 | The GNU C Library is distributed in the hope that it will be useful, |
| 10 | but WITHOUT ANY WARRANTY; without even the implied warranty of |
| 11 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
| 12 | Lesser General Public License for more details. |
| 13 | |
| 14 | You should have received a copy of the GNU Lesser General Public |
| 15 | License along with the GNU C Library; if not, see |
| 16 | <https://www.gnu.org/licenses/>. */ |
| 17 | |
| 18 | #include <unistd.h> |
| 19 | #include <errno.h> |
| 20 | #include <libintl.h> |
| 21 | #include <ldsodefs.h> |
| 22 | #include <dl-cet.h> |
| 23 | |
| 24 | /* GNU_PROPERTY_X86_FEATURE_1_IBT and GNU_PROPERTY_X86_FEATURE_1_SHSTK |
| 25 | are defined in <elf.h>, which are only available for C sources. |
| 26 | X86_FEATURE_1_IBT and X86_FEATURE_1_SHSTK are defined in <sysdep.h> |
| 27 | which are available for both C and asm sources. They must match. */ |
| 28 | #if GNU_PROPERTY_X86_FEATURE_1_IBT != X86_FEATURE_1_IBT |
| 29 | # error GNU_PROPERTY_X86_FEATURE_1_IBT != X86_FEATURE_1_IBT |
| 30 | #endif |
| 31 | #if GNU_PROPERTY_X86_FEATURE_1_SHSTK != X86_FEATURE_1_SHSTK |
| 32 | # error GNU_PROPERTY_X86_FEATURE_1_SHSTK != X86_FEATURE_1_SHSTK |
| 33 | #endif |
| 34 | |
| 35 | /* Check if object M is compatible with CET. */ |
| 36 | |
| 37 | static void |
| 38 | dl_cet_check (struct link_map *m, const char *program) |
| 39 | { |
| 40 | /* Check how IBT should be enabled. */ |
| 41 | enum dl_x86_cet_control enable_ibt_type |
| 42 | = GL(dl_x86_feature_control).ibt; |
| 43 | /* Check how SHSTK should be enabled. */ |
| 44 | enum dl_x86_cet_control enable_shstk_type |
| 45 | = GL(dl_x86_feature_control).shstk; |
| 46 | |
| 47 | /* No legacy object check if both IBT and SHSTK are always on. */ |
| 48 | if (enable_ibt_type == cet_always_on |
| 49 | && enable_shstk_type == cet_always_on) |
| 50 | return; |
| 51 | |
| 52 | /* Check if IBT is enabled by kernel. */ |
| 53 | bool ibt_enabled |
| 54 | = (GL(dl_x86_feature_1) & GNU_PROPERTY_X86_FEATURE_1_IBT) != 0; |
| 55 | /* Check if SHSTK is enabled by kernel. */ |
| 56 | bool shstk_enabled |
| 57 | = (GL(dl_x86_feature_1) & GNU_PROPERTY_X86_FEATURE_1_SHSTK) != 0; |
| 58 | |
| 59 | if (ibt_enabled || shstk_enabled) |
| 60 | { |
| 61 | struct link_map *l = NULL; |
| 62 | unsigned int ibt_legacy = 0, shstk_legacy = 0; |
| 63 | bool found_ibt_legacy = false, found_shstk_legacy = false; |
| 64 | |
| 65 | /* Check if IBT and SHSTK are enabled in object. */ |
| 66 | bool enable_ibt = (ibt_enabled |
| 67 | && enable_ibt_type != cet_always_off); |
| 68 | bool enable_shstk = (shstk_enabled |
| 69 | && enable_shstk_type != cet_always_off); |
| 70 | if (program) |
| 71 | { |
| 72 | /* Enable IBT and SHSTK only if they are enabled in executable. |
| 73 | NB: IBT and SHSTK may be disabled by environment variable: |
| 74 | |
| 75 | GLIBC_TUNABLES=glibc.cpu.hwcaps=-IBT,-SHSTK |
| 76 | */ |
| 77 | enable_ibt &= (CPU_FEATURE_USABLE (IBT) |
| 78 | && (enable_ibt_type == cet_always_on |
| 79 | || (m->l_cet & lc_ibt) != 0)); |
| 80 | enable_shstk &= (CPU_FEATURE_USABLE (SHSTK) |
| 81 | && (enable_shstk_type == cet_always_on |
| 82 | || (m->l_cet & lc_shstk) != 0)); |
| 83 | } |
| 84 | |
| 85 | /* ld.so is CET-enabled by kernel. But shared objects may not |
| 86 | support IBT nor SHSTK. */ |
| 87 | if (enable_ibt || enable_shstk) |
| 88 | { |
| 89 | unsigned int i; |
| 90 | |
| 91 | i = m->l_searchlist.r_nlist; |
| 92 | while (i-- > 0) |
| 93 | { |
| 94 | /* Check each shared object to see if IBT and SHSTK are |
| 95 | enabled. */ |
| 96 | l = m->l_initfini[i]; |
| 97 | |
| 98 | if (l->l_init_called) |
| 99 | continue; |
| 100 | |
| 101 | #ifdef SHARED |
| 102 | /* Skip CET check for ld.so since ld.so is CET-enabled. |
| 103 | CET will be disabled later if CET isn't enabled in |
| 104 | executable. */ |
| 105 | if (l == &GL(dl_rtld_map) |
| 106 | || l->l_real == &GL(dl_rtld_map) |
| 107 | || (program && l == m)) |
| 108 | continue; |
| 109 | #endif |
| 110 | |
| 111 | /* IBT is enabled only if it is enabled in executable as |
| 112 | well as all shared objects. */ |
| 113 | enable_ibt &= (enable_ibt_type == cet_always_on |
| 114 | || (l->l_cet & lc_ibt) != 0); |
| 115 | if (!found_ibt_legacy && enable_ibt != ibt_enabled) |
| 116 | { |
| 117 | found_ibt_legacy = true; |
| 118 | ibt_legacy = i; |
| 119 | } |
| 120 | |
| 121 | /* SHSTK is enabled only if it is enabled in executable as |
| 122 | well as all shared objects. */ |
| 123 | enable_shstk &= (enable_shstk_type == cet_always_on |
| 124 | || (l->l_cet & lc_shstk) != 0); |
| 125 | if (enable_shstk != shstk_enabled) |
| 126 | { |
| 127 | found_shstk_legacy = true; |
| 128 | shstk_legacy = i; |
| 129 | } |
| 130 | } |
| 131 | } |
| 132 | |
| 133 | bool cet_feature_changed = false; |
| 134 | |
| 135 | if (enable_ibt != ibt_enabled || enable_shstk != shstk_enabled) |
| 136 | { |
| 137 | if (!program) |
| 138 | { |
| 139 | if (enable_ibt_type != cet_permissive) |
| 140 | { |
| 141 | /* When IBT is enabled, we cannot dlopen a shared |
| 142 | object without IBT. */ |
| 143 | if (found_ibt_legacy) |
| 144 | _dl_signal_error (0, |
| 145 | m->l_initfini[ibt_legacy]->l_name, |
| 146 | "dlopen" , |
| 147 | N_("rebuild shared object with IBT support enabled" )); |
| 148 | } |
| 149 | |
| 150 | if (enable_shstk_type != cet_permissive) |
| 151 | { |
| 152 | /* When SHSTK is enabled, we cannot dlopen a shared |
| 153 | object without SHSTK. */ |
| 154 | if (found_shstk_legacy) |
| 155 | _dl_signal_error (0, |
| 156 | m->l_initfini[shstk_legacy]->l_name, |
| 157 | "dlopen" , |
| 158 | N_("rebuild shared object with SHSTK support enabled" )); |
| 159 | } |
| 160 | |
| 161 | if (enable_ibt_type != cet_permissive |
| 162 | && enable_shstk_type != cet_permissive) |
| 163 | return; |
| 164 | } |
| 165 | |
| 166 | /* Disable IBT and/or SHSTK if they are enabled by kernel, but |
| 167 | disabled in executable or shared objects. */ |
| 168 | unsigned int cet_feature = 0; |
| 169 | |
| 170 | if (!enable_ibt) |
| 171 | cet_feature |= GNU_PROPERTY_X86_FEATURE_1_IBT; |
| 172 | if (!enable_shstk) |
| 173 | cet_feature |= GNU_PROPERTY_X86_FEATURE_1_SHSTK; |
| 174 | |
| 175 | int res = dl_cet_disable_cet (cet_feature); |
| 176 | if (res != 0) |
| 177 | { |
| 178 | if (program) |
| 179 | _dl_fatal_printf ("%s: can't disable CET\n" , program); |
| 180 | else |
| 181 | { |
| 182 | if (found_ibt_legacy) |
| 183 | l = m->l_initfini[ibt_legacy]; |
| 184 | else |
| 185 | l = m->l_initfini[shstk_legacy]; |
| 186 | _dl_signal_error (-res, l->l_name, "dlopen" , |
| 187 | N_("can't disable CET" )); |
| 188 | } |
| 189 | } |
| 190 | |
| 191 | /* Clear the disabled bits in dl_x86_feature_1. */ |
| 192 | GL(dl_x86_feature_1) &= ~cet_feature; |
| 193 | |
| 194 | cet_feature_changed = true; |
| 195 | } |
| 196 | |
| 197 | #ifdef SHARED |
| 198 | if (program && (ibt_enabled || shstk_enabled)) |
| 199 | { |
| 200 | if ((!ibt_enabled |
| 201 | || enable_ibt_type != cet_permissive) |
| 202 | && (!shstk_enabled |
| 203 | || enable_shstk_type != cet_permissive)) |
| 204 | { |
| 205 | /* Lock CET if IBT or SHSTK is enabled in executable unless |
| 206 | IBT or SHSTK is enabled permissively. */ |
| 207 | int res = dl_cet_lock_cet (); |
| 208 | if (res != 0) |
| 209 | _dl_fatal_printf ("%s: can't lock CET\n" , program); |
| 210 | } |
| 211 | |
| 212 | /* Set feature_1 if IBT or SHSTK is enabled in executable. */ |
| 213 | cet_feature_changed = true; |
| 214 | } |
| 215 | #endif |
| 216 | |
| 217 | if (cet_feature_changed) |
| 218 | { |
| 219 | unsigned int feature_1 = 0; |
| 220 | if (enable_ibt) |
| 221 | feature_1 |= GNU_PROPERTY_X86_FEATURE_1_IBT; |
| 222 | if (enable_shstk) |
| 223 | feature_1 |= GNU_PROPERTY_X86_FEATURE_1_SHSTK; |
| 224 | struct pthread *self = THREAD_SELF; |
| 225 | THREAD_SETMEM (self, header.feature_1, feature_1); |
| 226 | } |
| 227 | } |
| 228 | } |
| 229 | |
| 230 | void |
| 231 | _dl_cet_open_check (struct link_map *l) |
| 232 | { |
| 233 | dl_cet_check (l, NULL); |
| 234 | } |
| 235 | |
| 236 | #ifdef SHARED |
| 237 | |
| 238 | # ifndef LINKAGE |
| 239 | # define LINKAGE |
| 240 | # endif |
| 241 | |
| 242 | LINKAGE |
| 243 | void |
| 244 | _dl_cet_check (struct link_map *main_map, const char *program) |
| 245 | { |
| 246 | dl_cet_check (main_map, program); |
| 247 | } |
| 248 | #endif /* SHARED */ |
| 249 | |