blob: 3c76f0065ee51ef30bcfef60edc1cc43940ff5c5 [file] [log] [blame]
Peter Collingbournea4ccff32015-02-20 20:30:56 +00001======================
2Control Flow Integrity
3======================
4
5.. toctree::
6 :hidden:
7
8 ControlFlowIntegrityDesign
9
10.. contents::
11 :local:
12
13Introduction
14============
15
16Clang includes an implementation of a number of control flow integrity (CFI)
17schemes, which are designed to abort the program upon detecting certain forms
18of undefined behavior that can potentially allow attackers to subvert the
19program's control flow. These schemes have been optimized for performance,
20allowing developers to enable them in release builds.
21
22To enable Clang's available CFI schemes, use the flag ``-fsanitize=cfi``.
Alexey Samsonov9eda6402015-12-04 21:30:58 +000023You can also enable a subset of available :ref:`schemes <cfi-schemes>`.
24As currently implemented, all schemes rely on link-time optimization (LTO);
25so it is required to specify ``-flto``, and the linker used must support LTO,
26for example via the `gold plugin`_.
27To allow the checks to be implemented efficiently, the program must
Peter Collingbourne2c7f7e32015-09-10 02:17:40 +000028be structured such that certain object files are compiled with CFI enabled,
29and are statically linked into the program. This may preclude the use of
30shared libraries in some cases.
Peter Collingbournea4ccff32015-02-20 20:30:56 +000031
Peter Collingbournea4ccff32015-02-20 20:30:56 +000032.. _gold plugin: http://llvm.org/docs/GoldPlugin.html
33
Alexey Samsonov9eda6402015-12-04 21:30:58 +000034.. _cfi-schemes:
35
36Available schemes
37=================
38
39Available schemes are:
40
41 - ``-fsanitize=cfi-cast-strict``: Enables :ref:`strict cast checks
42 <cfi-strictness>`.
43 - ``-fsanitize=cfi-derived-cast``: Base-to-derived cast to the wrong
44 dynamic type.
45 - ``-fsanitize=cfi-unrelated-cast``: Cast from ``void*`` or another
46 unrelated type to the wrong dynamic type.
47 - ``-fsanitize=cfi-nvcall``: Non-virtual call via an object whose vptr is of
48 the wrong dynamic type.
49 - ``-fsanitize=cfi-vcall``: Virtual call via an object whose vptr is of the
50 wrong dynamic type.
51 - ``-fsanitize=cfi-icall``: Indirect call of a function with wrong dynamic
52 type.
53
54You can use ``-fsanitize=cfi`` to enable all the schemes and use
55``-fno-sanitize`` flag to narrow down the set of schemes as desired.
56For example, you can build your program with
57``-fsanitize=cfi -fno-sanitize=cfi-nvcall,cfi-icall``
58to use all schemes except for non-virtual member function call and indirect call
59checking.
60
61Remember that you have to provide ``-flto`` if at least one CFI scheme is
62enabled.
63
Peter Collingbourne93bb8622015-12-11 23:54:18 +000064Trapping and Diagnostics
65========================
66
67By default, CFI will abort the program immediately upon detecting a control
68flow integrity violation. You can use the :ref:`-fno-sanitize-trap=
69<controlling-code-generation>` flag to cause CFI to print a diagnostic
70similar to the one below before the program aborts.
71
72.. code-block:: console
73
74 bad-cast.cpp:109:7: runtime error: control flow integrity check for type 'B' failed during base-to-derived cast (vtable address 0x000000425a50)
75 0x000000425a50: note: vtable is of type 'A'
76 00 00 00 00 f0 f1 41 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 5a 42 00
77 ^
78
79If diagnostics are enabled, you can also configure CFI to continue program
80execution instead of aborting by using the :ref:`-fsanitize-recover=
81<controlling-code-generation>` flag.
Alexey Samsonov9eda6402015-12-04 21:30:58 +000082
Peter Collingbournea4ccff32015-02-20 20:30:56 +000083Forward-Edge CFI for Virtual Calls
Alexey Samsonov9eda6402015-12-04 21:30:58 +000084==================================
Peter Collingbournea4ccff32015-02-20 20:30:56 +000085
86This scheme checks that virtual calls take place using a vptr of the correct
87dynamic type; that is, the dynamic type of the called object must be a
88derived class of the static type of the object used to make the call.
Peter Collingbourne1a7488a2015-04-02 00:23:30 +000089This CFI scheme can be enabled on its own using ``-fsanitize=cfi-vcall``.
Peter Collingbournea4ccff32015-02-20 20:30:56 +000090
91For this scheme to work, all translation units containing the definition
Peter Collingbourne6fccf952015-07-15 12:15:56 +000092of a virtual member function (whether inline or not), other than members
93of :ref:`blacklisted <cfi-blacklist>` types, must be compiled with
94``-fsanitize=cfi-vcall`` enabled and be statically linked into the program.
Peter Collingbournea4ccff32015-02-20 20:30:56 +000095
96Performance
Alexey Samsonov9eda6402015-12-04 21:30:58 +000097-----------
Peter Collingbournea4ccff32015-02-20 20:30:56 +000098
99A performance overhead of less than 1% has been measured by running the
100Dromaeo benchmark suite against an instrumented version of the Chromium
101web browser. Another good performance benchmark for this mechanism is the
102virtual-call-heavy SPEC 2006 xalancbmk.
103
104Note that this scheme has not yet been optimized for binary size; an increase
105of up to 15% has been observed for Chromium.
106
Peter Collingbourned2926c92015-03-14 02:42:25 +0000107Bad Cast Checking
Alexey Samsonov9eda6402015-12-04 21:30:58 +0000108=================
Peter Collingbourned2926c92015-03-14 02:42:25 +0000109
110This scheme checks that pointer casts are made to an object of the correct
111dynamic type; that is, the dynamic type of the object must be a derived class
112of the pointee type of the cast. The checks are currently only introduced
113where the class being casted to is a polymorphic class.
114
115Bad casts are not in themselves control flow integrity violations, but they
116can also create security vulnerabilities, and the implementation uses many
117of the same mechanisms.
118
119There are two types of bad cast that may be forbidden: bad casts
120from a base class to a derived class (which can be checked with
121``-fsanitize=cfi-derived-cast``), and bad casts from a pointer of
122type ``void*`` or another unrelated type (which can be checked with
123``-fsanitize=cfi-unrelated-cast``).
124
125The difference between these two types of casts is that the first is defined
126by the C++ standard to produce an undefined value, while the second is not
127in itself undefined behavior (it is well defined to cast the pointer back
128to its original type).
129
130If a program as a matter of policy forbids the second type of cast, that
131restriction can normally be enforced. However it may in some cases be necessary
132for a function to perform a forbidden cast to conform with an external API
133(e.g. the ``allocate`` member function of a standard library allocator). Such
Peter Collingbourne6fccf952015-07-15 12:15:56 +0000134functions may be :ref:`blacklisted <cfi-blacklist>`.
Peter Collingbourned2926c92015-03-14 02:42:25 +0000135
136For this scheme to work, all translation units containing the definition
Peter Collingbourne6fccf952015-07-15 12:15:56 +0000137of a virtual member function (whether inline or not), other than members
138of :ref:`blacklisted <cfi-blacklist>` types, must be compiled with
Peter Collingbourned2926c92015-03-14 02:42:25 +0000139``-fsanitize=cfi-derived-cast`` or ``-fsanitize=cfi-unrelated-cast`` enabled
Peter Collingbourne6fccf952015-07-15 12:15:56 +0000140and be statically linked into the program.
Peter Collingbourned2926c92015-03-14 02:42:25 +0000141
Peter Collingbourne1a7488a2015-04-02 00:23:30 +0000142Non-Virtual Member Function Call Checking
Alexey Samsonov9eda6402015-12-04 21:30:58 +0000143=========================================
Peter Collingbourne1a7488a2015-04-02 00:23:30 +0000144
145This scheme checks that non-virtual calls take place using an object of
146the correct dynamic type; that is, the dynamic type of the called object
147must be a derived class of the static type of the object used to make the
148call. The checks are currently only introduced where the object is of a
149polymorphic class type. This CFI scheme can be enabled on its own using
150``-fsanitize=cfi-nvcall``.
151
152For this scheme to work, all translation units containing the definition
Peter Collingbourne6fccf952015-07-15 12:15:56 +0000153of a virtual member function (whether inline or not), other than members
154of :ref:`blacklisted <cfi-blacklist>` types, must be compiled with
155``-fsanitize=cfi-nvcall`` enabled and be statically linked into the program.
Peter Collingbourne1a7488a2015-04-02 00:23:30 +0000156
Peter Collingbourned2926c92015-03-14 02:42:25 +0000157.. _cfi-strictness:
158
159Strictness
Alexey Samsonov9eda6402015-12-04 21:30:58 +0000160----------
Peter Collingbourned2926c92015-03-14 02:42:25 +0000161
162If a class has a single non-virtual base and does not introduce or override
163virtual member functions or fields other than an implicitly defined virtual
164destructor, it will have the same layout and virtual function semantics as
165its base. By default, casts to such classes are checked as if they were made
166to the least derived such class.
167
168Casting an instance of a base class to such a derived class is technically
169undefined behavior, but it is a relatively common hack for introducing
170member functions on class instances with specific properties that works under
171most compilers and should not have security implications, so we allow it by
172default. It can be disabled with ``-fsanitize=cfi-cast-strict``.
173
Peter Collingbourne2c7f7e32015-09-10 02:17:40 +0000174Indirect Function Call Checking
Alexey Samsonov9eda6402015-12-04 21:30:58 +0000175===============================
Peter Collingbourne2c7f7e32015-09-10 02:17:40 +0000176
177This scheme checks that function calls take place using a function of the
178correct dynamic type; that is, the dynamic type of the function must match
179the static type used at the call. This CFI scheme can be enabled on its own
180using ``-fsanitize=cfi-icall``.
181
182For this scheme to work, each indirect function call in the program, other
183than calls in :ref:`blacklisted <cfi-blacklist>` functions, must call a
184function which was either compiled with ``-fsanitize=cfi-icall`` enabled,
185or whose address was taken by a function in a translation unit compiled with
186``-fsanitize=cfi-icall``.
187
188If a function in a translation unit compiled with ``-fsanitize=cfi-icall``
189takes the address of a function not compiled with ``-fsanitize=cfi-icall``,
190that address may differ from the address taken by a function in a translation
191unit not compiled with ``-fsanitize=cfi-icall``. This is technically a
192violation of the C and C++ standards, but it should not affect most programs.
193
194Each translation unit compiled with ``-fsanitize=cfi-icall`` must be
195statically linked into the program or shared library, and calls across
196shared library boundaries are handled as if the callee was not compiled with
197``-fsanitize=cfi-icall``.
198
199This scheme is currently only supported on the x86 and x86_64 architectures.
200
201``-fsanitize=cfi-icall`` and ``-fsanitize=function``
Alexey Samsonov9eda6402015-12-04 21:30:58 +0000202----------------------------------------------------
Peter Collingbourne2c7f7e32015-09-10 02:17:40 +0000203
204This tool is similar to ``-fsanitize=function`` in that both tools check
205the types of function calls. However, the two tools occupy different points
206on the design space; ``-fsanitize=function`` is a developer tool designed
207to find bugs in local development builds, whereas ``-fsanitize=cfi-icall``
208is a security hardening mechanism designed to be deployed in release builds.
209
210``-fsanitize=function`` has a higher space and time overhead due to a more
211complex type check at indirect call sites, as well as a need for run-time
212type information (RTTI), which may make it unsuitable for deployment. Because
213of the need for RTTI, ``-fsanitize=function`` can only be used with C++
214programs, whereas ``-fsanitize=cfi-icall`` can protect both C and C++ programs.
215
216On the other hand, ``-fsanitize=function`` conforms more closely with the C++
217standard and user expectations around interaction with shared libraries;
218the identity of function pointers is maintained, and calls across shared
219library boundaries are no different from calls within a single program or
220shared library.
221
Peter Collingbourne6fccf952015-07-15 12:15:56 +0000222.. _cfi-blacklist:
223
224Blacklist
Alexey Samsonov9eda6402015-12-04 21:30:58 +0000225=========
Peter Collingbourne6fccf952015-07-15 12:15:56 +0000226
227A :doc:`SanitizerSpecialCaseList` can be used to relax CFI checks for certain
228source files, functions and types using the ``src``, ``fun`` and ``type``
229entity types.
230
231In addition, if a type has a ``uuid`` attribute and the blacklist contains
232the type entry ``attr:uuid``, CFI checks are suppressed for that type. This
233allows all COM types to be easily blacklisted, which is useful as COM types
234are typically defined outside of the linked program.
235
236.. code-block:: bash
237
238 # Suppress checking for code in a file.
239 src:bad_file.cpp
240 src:bad_header.h
241 # Ignore all functions with names containing MyFooBar.
242 fun:*MyFooBar*
243 # Ignore all types in the standard library.
244 type:std::*
245 # Ignore all types with a uuid attribute.
246 type:attr:uuid
247
Peter Collingbournea4ccff32015-02-20 20:30:56 +0000248Design
Alexey Samsonov9eda6402015-12-04 21:30:58 +0000249======
Peter Collingbournea4ccff32015-02-20 20:30:56 +0000250
251Please refer to the :doc:`design document<ControlFlowIntegrityDesign>`.
252
253Publications
Alexey Samsonov9eda6402015-12-04 21:30:58 +0000254============
Peter Collingbournea4ccff32015-02-20 20:30:56 +0000255
256`Control-Flow Integrity: Principles, Implementations, and Applications <http://research.microsoft.com/pubs/64250/ccs05.pdf>`_.
257Martin Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti.
258
259`Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM <http://www.pcc.me.uk/~peter/acad/usenix14.pdf>`_.
260Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway,
261Úlfar Erlingsson, Luis Lozano, Geoff Pike.