2023Q3
Date of Issue: 6th October 2023
This document describes the PAuth ABI Extensions to ELF for the Arm 64-bit architecture (AArch64). A high-level language may use these extensions to make wider use of pointer authentication than is possible within the base standard.
ELF, AArch64 ELF, Pointer Authentication
Please check Application Binary Interface for the Arm® Architecture for the latest release of this document.
Please report defects in this specification to the issue tracker page on GitHub.
This work is licensed under the Creative Commons Attribution-ShareAlike 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by-sa/4.0/ or send a letter to Creative Commons, PO Box 1866, Mountain View, CA 94042, USA.
Grant of Patent License. Subject to the terms and conditions of this license (both the Public License and this Patent License), each Licensor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated in this section) patent license to make, have made, use, offer to sell, sell, import, and otherwise transfer the Licensed Material, where such license applies only to those patent claims licensable by such Licensor that are necessarily infringed by their contribution(s) alone or by combination of their contribution(s) with the Licensed Material to which such contribution(s) was submitted. If You institute patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that the Licensed Material or a contribution incorporated within the Licensed Material constitutes direct or contributory patent infringement, then any licenses granted to You under this license for that Licensed Material shall terminate as of the date such litigation is filed.
As identified more fully in the Licence section, this project is licensed under CC-BY-SA-4.0 along with an additional patent license. The language in the additional patent license is largely identical to that in Apache-2.0 (specifically, Section 3 of Apache-2.0 as reflected at https://www.apache.org/licenses/LICENSE-2.0) with two exceptions.
First, several changes were made related to the defined terms so as to reflect the fact that such defined terms need to align with the terminology in CC-BY-SA-4.0 rather than Apache-2.0 (e.g., changing “Work” to “Licensed Material”).
Second, the defensive termination clause was changed such that the scope of defensive termination applies to “any licenses granted to You” (rather than “any patent licenses granted to You”). This change is intended to help maintain a healthy ecosystem by providing additional protection to the community against patent litigation claims.
Contributions to this project are licensed under an inbound=outbound model such that any such contributions are licensed by the contributor under the same terms as those in the Licence section.
The text of and illustrations in this document are licensed by Arm under a Creative Commons Attribution–Share Alike 4.0 International license ("CC-BY-SA-4.0”), with an additional clause on patents. The Arm trademarks featured here are registered trademarks or trademarks of Arm Limited (or its subsidiaries) in the US and/or elsewhere. All rights reserved. Please visit https://www.arm.com/company/policies/trademarks for more information about Arm’s trademarks.
Copyright (c) 2020-2023, Arm Limited and its affiliates. All rights reserved.
Contents
- 1 Preamble
- 2 About this document
- 3 Scope
- 4 Platform Standards
- 5 Introduction
- 6 Platform Decisions
- 7 Section Types
- 8 Static Relocations
- 9 AUTH variant Dynamic Relocations
- 10 Dynamic Section
- 11 Relocation Compression
- 12 Static Linking
- 13 Run-time dynamic linking
- 14 ELF Marking
- 15 Appendix extension to recording signing schema for dlsym
- 16 Appendix Signed GOT
- 17 Additional AUTH variant Dynamic Relocations for Signed GOT
- 18 Appendix thoughts on encoding a signing schema
The following support level definitions are used by the Arm ABI specifications:
- Release
- Arm considers this specification to have enough implementations, which have received sufficient testing, to verify that it is correct. The details of these criteria are dependent on the scale and complexity of the change over previous versions: small, simple changes might only require one implementation, but more complex changes require multiple independent implementations, which have been rigorously tested for cross-compatibility. Arm anticipates that future changes to this specification will be limited to typographical corrections, clarifications and compatible extensions.
- Beta
- Arm considers this specification to be complete, but existing implementations do not meet the requirements for confidence in its release quality. Arm may need to make incompatible changes if issues emerge from its implementation.
- Alpha
- The content of this specification is a draft, and Arm considers the likelihood of future incompatible changes to be significant.
This document is at Alpha release quality.
If there is no entry in the change history table for a release, there are no changes to the content of the document for that release.
Issue | Date | Change |
---|---|---|
0.1 | 21st September 2020 | Alpha draft release. |
0.2 | 7th October 2020 | Restructure after initial review comments. Move GOT relocations with custom signing schema to appendix along with commentary. Specify AUTH variant dynamic relocations and tighten up descriptions of existing encoding and relocations. Add description of SHT_AUTH_RELR. |
0.3 | 22nd October 2020 | Delete the appendix giving an encoding for GOT generating relocations using the relocation addend to carry the signing schema. Move the remaining GOT signing text to an optional appendix Describe the default dlsym signing schema and add .symauth and .dynauth as an appendix. Provide details for the ELF marking scheme. description of SHT_AUTH_RELR. |
2021Q3 | 1st November 2021 | Clarify the concepts of a default and alternate PAuth elf signing schemes. |
2023Q3 | 6th October 2023 | Update tags in Dynamic Section to avoid conflict with DT_AARCH64_VARIANT_PCS. |
2024Q1 | 29th January 2024 18th March 2024 19th March 2024 | Update preferred ELF marking scheme to be GNU property based Update relocation codes to move out of private experiments space. Remove alternative ELF marking scheme. No implementation is using it. |
This document refers to, or is referred to by, the following documents.
Ref | URL or other reference | Title |
---|---|---|
ARMARM | DDI 0487 | Arm Architecture Reference Manual Armv8 for Armv8-A architecture profile |
AAELF64 | IHI 0056 | ELF for the Arm 64-bit Architecture |
ARM64E | Pointer Authentication | |
CPPABI64 | IHI 0059 | C++ ABI for the Arm 64-bit Architecture |
LSB | Linux Standards Base | |
SCO-ELF | http://www.sco.com/developers/gabi/ | System V Application Binary Interface – DRAFT |
SYSVABI64 | sysvabi64 | System V Application Binary Interface (ABI) for the Arm 64-bit Architecture |
TLSDESC | http://www.fsfla.org/~lxoliva/writeups/TLS/paper-lk2006.pdf | TLS Descriptors for Arm. Original proposal document |
GABI_SHT_RELR | ELF GABI Google Groups | Proposal for a new section type SHT_RELR |
LINUX_ABI | https://github.com/hjl-tools/linux-abi/wiki | Linux Extensions to gABI |
The ABI for the Arm 64-bit Architecture uses the following terms and abbreviations.
- A32
- The instruction set named Arm in the Armv7 architecture; A32 uses 32-bit fixed-length instructions.
- A64
- The instruction set available when in AArch64 state.
- AAPCS64
- Procedure Call Standard for the Arm 64-bit Architecture (AArch64)
- AArch32
- The 32-bit general-purpose register width state of the Armv8 architecture, broadly compatible with the Armv7-A architecture.
- AArch64
- The 64-bit general-purpose register width state of the Armv8 architecture.
- ABI
Application Binary Interface:
- The specifications to which an executable must conform in order to execute in a specific execution environment. For example, the Linux ABI for the Arm Architecture.
- A particular aspect of the specifications to which independently produced relocatable files must conform in order to be statically linkable and executable. For example, the CPPABI64, AAELF64, ...
- Arm-based
- ... based on the Arm architecture ...
- Floating point
- Depending on context floating point means or qualifies: (a) floating-point arithmetic conforming to IEEE 754 2008; (b) the Armv8 floating point instruction set; (c) the register set shared by (b) and the Armv8 SIMD instruction set.
- Q-o-I
- Quality of Implementation – a quality, behavior, functionality, or mechanism not required by this standard, but which might be provided by systems conforming to it. Q-o-I is often used to describe the toolchain-specific means by which a standard requirement is met.
- SIMD
- Single Instruction Multiple Data – A term denoting or qualifying: (a) processing several data items in parallel under the control of one instruction; (b) the Arm v8 SIMD instruction set: (c) the register set shared by (b) and the Armv8 floating point instruction set.
- SIMD and floating point
- The Arm architecture’s SIMD and Floating Point architecture comprising the floating point instruction set, the SIMD instruction set and the register set shared by them.
- SVE
- The Arm architecture's Scalable Vector Extension.
- T32
- The instruction set named Thumb in the Armv7 architecture; T32 uses 16-bit and 32-bit instructions.
- VG
- The number of 64-bit “vector granules” in an SVE vector; in other words, the number of bits in an SVE vector register divided by 64.
- ILP32
- SysV-like data model where int, long int and pointer are 32-bit
- LP64
- SysV-like data model where int is 32-bit, but long int and pointer are 64-bit.
- LLP64
- Windows-like data model where int and long int are 32-bit, but long long int and pointer are 64-bit.
This document uses the following terms and abbreviations.
- Link-unit
- An executable or shared library
- PAuth ABI
- The pointer authentication ABI that this document forms a part of.
- PAUTHELF64
- An abbreviation for this document.
- RELRO
- Part of an ELF file that can be mapped read-only after relocation. In an executable/shared-library it is described by a program header with type PT_GNU_RELRO.
- Signing Schema
- The set of rules that determine how a pointer is signed. In ARMARM terminology the rules will evaluate to a key and a modifier that can be used in a signing or authorizing operation.
- Default signing schema
- A default signing schema for a pointer is determined by the context. The signing schema will not be encoded in the ELF file.
This document is a set of extensions to ELF for the Arm 64-bit architecture (AAELF64) describing how PAuth ABI information is encoded in the ELF file. As an alpha document all details in this document are subject to change.
As is the case with the AAELF64, we expect that each operating system that adopts components of this ABI specification will specify additional requirements and constraints that must be met by application code in binary form and the code-generation tools that generate such code. This document will present recommendations for a SysVr4 like operating system such as Linux.
The Armv8.3-A architecture introduced a pointer authentication feature that permits a pointer to be cryptographically signed and authenticated. A subset of the new instructions were added in the HINT space to take advantage of a limited form of pointer authentication that maintained backwards compatibility with software written without assuming Armv8.3-A capabilities. If use of all of the PAuth instructions is permitted then more pointers can be protected at the expense of requiring Armv8.3-A and potential incompatibility with objects not using the PAuth ABI.
The goals of the final PAUTHELF64 document are to:
- Provide primitives that can be used to support different language and platform choices for a PAuth ABI, including the minimal bare-metal platform.
- Provide a means to reason about compatibility of ELF files at both the relocatable and executable/shared-library level.
The goals of the initial draft of the PAUTHELF64 document are to:
- Enable experimentation to find out the most useful encodings and options.
- Provide rationale for design choices.
- Signed pointers can only be created at run-time.
- PAUTHELF64 does not support the R_AARCH64_COPY relocation for signed pointers. Non-position independent code that imports signed pointers from shared libraries must use an alternative code-sequence that does not require the static linker to use COPY relocations. A simple way to avoid COPY relocations is to access imported signed pointers via the GOT.
- PAUTHELF64 only supports the descriptor based TLS (TLSDESC).
The Rationale behind the requirement to avoid copy relocations is that the static linker creates the storage that the copy is placed; which adds more complication in the form of communicating a signing schema than avoiding the copy relocation. The descriptor based TLS has been chosen as the most common implementation choice for AArch64.
PAUTHELF64 supports deployment of pointer authentication in a wide variety of environments including a bare-metal environment without a memory management unit. Platforms may not need to implement all of this ABI by placing additional platform specific restrictions. For example if the platform does not support lazy binding and both the GOT and PLT GOT are RELRO then there is no need to implement support for AUTH variant dynamic relocations. Optional parts of the ABI have been broken out into appendices.
The GOT is a linker generated table of pointers, where each entry is created as a result of a GOT-creating relocation from a relocatable object. The GOT is normally split into two subsets, the GOT and the PLT GOT. With the PLT GOT made up of code pointers that are only accessed by linker generated PLT sequences. As the PLT GOT is not accessed directly by code in relocatable objects, this will be covered in a separate section of the document.
The pointers in the GOT may include pointers to code so there is a question of whether these pointers should be signed and if so, how should they be signed?
The value of many of the pointers in the GOT is not known at static link time. These GOT entries will have a dynamic relocation that a dynamic linker will resolve at program load time. Once the GOT has been relocated, it can be re-mapped as read-only (RELRO). If the GOT is RELRO then the GOT does not need to be signed.
As a majority of platforms support RELRO and assuming a RELRO GOT simplifies the ABI, this document will assume an unsigned GOT. An optional appendix Appendix thoughts on encoding a signing schema describes how a GOT can be signed.
The PLT is a table of trampolines used to indirect function calls through a function pointer. The PLT GOT is a subset of the GOT that is used exclusively by the PLT.
When lazy binding is disabled, all relocations are resolved at load time and the PLT GOT can be made RELRO like the GOT. In this case the PLT GOT does not need to be signed.
When lazy binding is enabled the initial contents of each entry in the PLT GOT points to the first entry in the PLT. The first entry in the PLT reserved for the lazy resolver. When a function is called via its PLT entry, control is transferred to the lazy resolver which finds the destination address and writes it back to the PLT GOT. As the lazy resolver needs to write to PLT GOT, it requires the PLT GOT to be writeable throughout the lifetime of the program. Writeable pointers in the PLT GOT can be signed to protect against an attacker modifying the PLT GOT.
If the PLT GOT is signed, the dynamic linker must sign all entries in the table during program loading and the static linker must generate PLT trampolines that authenticate pointers loaded from the PLT GOT.
The choice of whether to sign the PLT GOT is made at static link time. The decision to sign the PLT GOT is independent of the decision to sign the GOT.
The PAuth ABI reuses the signing schema from the existing ABI. This uses the IA key with the address of the PLT GOT entry as the modifier. This can be implemented using instructions that are encoded in the hint space.
Example code for the PLT sequence generated by the static linker.
adrp x16, Page(&(.plt.got[n]))
ldr x17, [x16, Offset(&(.plt.got[n]))]
add x16, x16, Offset(&(.plt.got[n]))
autia1716
br x17
If instructions not encoded in the hint space can be used, it is
possible to combine the autia1716
and br x17
into a single
instruction braa x17, x16
The dynamic tag DT_AARCH64_PAC_PLT
must be set if the PLT GOT is
signed. When this dynamic tag is present, a dynamic loader must sign
the result of a R_AARCH64_JUMP_SLOT
using the signing schema
above. PAUTHELF64 does not define an additional
R_AARCH64_AUTH_JUMP_SLOT
relocation as the static linker will only
generate one type of PLT entry in a link-unit.
The PAuth ABI adds an additional Processor-specific section type
Name | Value | Comment |
---|---|---|
SHT_AARCH64_AUTH_RELR |
0x70000004 |
Section type for compressed signed relative relocations |
The value is in the AArch64 Processor-specific range. The value is subject to change if there is a clash with any section types added by AAELF64.
As the PAuth ABI is Alpha, relocation codes are in the vendor experiment space of 0xE000 to 0xEFFF. These are guaranteed not to clash with any relocation type defined by Arm in AAELF64. New permanent relocation codes will be issued in AAELF64 when the PAuth ABI comes out of Alpha.
This ABI requires the creation of signed pointers at program start-up by the run-time environment. The signing schema to be used by the run-time environment is encoded in the place to be relocated.
In the descriptions below, the place
is the operation P
in
AAELF64 relocation descriptions. It is derived from the r_offset
field of the relocation.
The top 32-bits of the contents of the place is used to encode the signing schema for both static and dynamic relocations. This permits platforms using relocation compression or SHT_REL dynamic relocations to encode relocation addends in the bottom 32-bits. Given that the maximum size of link-units using the small code-model is 4 gigabytes this should be sufficient.
63 | 62 | 61:60 | 59:48 | 47:32 | 31:0 |
---|---|---|---|---|---|
address diversity | reserved | key | reserved | discriminator | reserved for addend |
address diversity
is a single bit that when set, denotes that the pointer has address diversity. The place (relocation target address) will be blended with the discriminator value.key
determines the key to be used. Armv8.3-A specifies 5 keys, 4 of which can be used by PAUTHELF64. The generic keyAPGA
is not repesented at the ELF ABI level.
key name | field |
---|---|
APIA |
0b00 |
APIB |
0b01 |
APDA |
0b10 |
APDB |
0b11 |
discriminator
is a 16-bit unsigned integer that after an optional blending (address diversity) forms themodifier
for the sign and authenticate instructions.reserved for addend
is used inSHT_AUTH_RELR
orSHT_REL
relocation implementations where the relocation addend is written to the contents of the place. It must be set to 0 if not used for an addend.reserved
are bits reserved for future expansion. These bits must be set to 0 by a producer. A consumer must not assume that reserved bits are set to 0.
For a relocation that involves signing a pointer, if the target symbol is an undefined weak reference, the result of the relocation is 0 (nullptr) regardless of the signing schema.
The computation to form the modifier
is the same as
ARM64E. Place
is the relocation target address.
- If
address diversity
is set and thediscriminator
is 0 thenmodifier
=Place
- If
address diversity
is set and thediscriminator
is not 0 thenmodifier[63:48]
=discriminator
andmodifier[47:0]
=Place
- If
address diversity
is not set thenmodifier
=discriminator
zero-extended to 64-bits.
PAUTH(S+A)
is an instruction for the run-time environment to create a signed pointer. The static linker writes the encoded signing schema into the contents of the place being relocated, and emits a dynamic relocation to instruct the run-time to create the signed pointer. When static linking, the dynamic relocation may be replaced by a toolchain-specific mechanism.SCHEMA(\*P)
represents the dynamic linker reading the signing schema from the contents of the placeP
.SIGN(value, schema)
represents the dynamic linker signing value with schema.
ELF 64 Code | Name | Operation | Comment |
---|---|---|---|
0x244 | R_AARCH64_AUTH_ABS64 | PAUTH(S+A) |
Signing schema encoded in the contents of the place |
In the static context, this is the equivalent of the arm64e
ARM64_RELOC_AUTHENTICATED
relocation. R_AARCH64_AUTH_ABS64
can
also be used as a dynamic relocation with the same ELF 64 Code.
The dynamic relocations required for the PAuth ABI are built on the
existing dynamic relocations, for example R_AARCH64_AUTH_RELATIVE
is the PAuth ABI equivalent of R_AARCH64_RELATIVE
. The underlying
calculation performed by the dynamic linker is the same, the only
difference is that the resulting pointer is signed. The dynamic linker
reads the signing schema from the contents of the place of the dynamic
relocation.
Relocation code | Name | Operation |
---|---|---|
0x244 | R_AARCH64_AUTH_ABS64 | SIGN(S + A, SCHEMA(*P)) |
0x411 | R_AARCH64_AUTH_RELATIVE | SIGN(DELTA(S) + A, SCHEMA(*P)) |
The PAuth ABI adds the following processor-specific dynamic array tags.
Name | Value | d_un | Executable | Shared Object |
---|---|---|---|---|
DT_AARCH64_AUTH_RELRSZ | 0x70000011 | d_val | optional | optional |
DT_AARCH64_AUTH_RELR | 0x70000012 | d_ptr | optional | optional |
DT_AARCH64_AUTH_RELRENT | 0x70000013 | d_val | optional | optional |
Description:
DT_AARCH64_AUTH_RELRSZ
This element holds the total size in bytes, of theDT_AARCH64_AUTH_RELR
relocation table.DT_AARCH64_AUTH_RELR
The address of anSHT_AARCH64_AUTH_RELR
relocation table. This element requires theDT_AARCH64_AUTH_RELRSZ
andDT_AARCH64_AUTH_RELRENT
elements also be present. During dynamic linking, aDT_AARCH64_AUTH_RELR
element is processed before anyDT_REL
orDT_RELA
elements in the same object file.DT_AARCH64_AUTH_RELRENT
This element holds the size in bytes of aDT_AARCH64_RELR
relocation entry.
The SHT_RELR section type as defined in GABI_SHT_RELR, when present in
an AArch64 ELF file, encodes R_AARCH64_RELATIVE
relocations in a
more compact form. To encode R_AARCH64_AUTH_RELATIVE
using the
same encoding, a new ELF section type SHT_AARCH64_AUTH_RELR
is
added, alongside the dynamic tags DT_AARCH64_AUTH_RELR
,
DT_AARCH64_AUTH_RELRENT
, and DT_AARCH64_AUTH_RELRSZ
.
The format of the SHT_AARCH64_AUTH_RELR
section is identical to
SHT_RELR
, the only difference is that all relocations are of type
R_AARCH64_AUTH_RELATIVE
. A link-unit may contain both SHT_RELR
and SHT_AARCH64_AUTH_RELR
sections.
The static linker cannot create signed pointers, just as it cannot run
constructors for static variables, but the start-up code that runs
before the program (in C/C++, before main()
) can. The static
linker must communicate the details of how to
create the signed pointers by embedding the information in the ELF
file. The format of the information must be defined by the platform
ABI, as it is a
contract between the static linker and the runtime. One simple
method of encoding the information is to emit a dynamic relocation
section as if dynamic linking, with linker-defined symbols denoting
the base and limit of the section. The runtime can resolve the dynamic
relocations to create the signed pointers. More compact encodings are
possible.
On many platforms, programs can load shared libraries at run-time via
dlopen
and access symbols in that library via dlsym
or
dlvsym
. Some or all of these pointers may be signed. The signing
schema for these functions is a platform decision that the compiled
code and implementation of dlsym
agree on.
The PAuth ABI uses a simple default signing schema. If the
symbol found by dlsym
has type STT_FUNC
, the address to be
returned is signed with the IA
key with a 0 modifier. Otherwise
the address is not signed.
An optional extension that communicates the signing schema for a symbol to the dynamic linker can be found in Appendix extension to recording signing schema for dlsym.
ELF files must be marked to allow toolchains and platforms to reason about compatibility. The high-level language mapping of source language to signing schema is expected to evolve over time. Even if the low-level ELF extensions remain constant, a change to the high-level language mapping may result in incompatible ELF files.
This document defines the core information that any ELF marking scheme must contain and the base compatibility model that uses that information.
The core information used by the base compatibility model is made up of two values, both of which must be present.
platform identifier
is a 64-bit value that specifies the platform vendor. The values of theplatform identifier
in the table below are reserved:
Platform | Hex value |
---|---|
Invalid | 0x0 |
Baremetal | 0x1 |
version number
is a 64-bit value that identifies the signing schema used by the ELF file. The meaning of the value is determined by the platform vendor identified by theplatform identifier
above.
The tuple of (platform identifier
, version number
) equal to
(0,0) is reserved to mean an ELF file incompatible with the PAuth ABI
Extension to ELF for the Arm® 64-bit Architecture (AArch64).
The default ELF marking scheme for executables and shared-libraries
uses the .note.gnu.property
section. The format of this section is
defined in (LINUX_ABI).
The following processor-specific program property types are defined:
Name Value GNU_PROPERTY_AARCH64_FEATURE_PAUTH 0xc0000001
Other processor-specific program property types defined by the 64-bit ABI for the Arm Architecture are defined in (SYSVABI64).
The format of the data in pr_data
is two 64-bit words. With the
first 64-bit word being the platform identifier
, and the second
64-bit word being the version number
. Both of these form the
information required in Core Information above.
.note.gnu.property
sections can be used as ELF marking for
relocatable objects as well as executables and shared libraries. Arm
intends to use standardize build attributes for all relocatable-object
ELF marking. When this change occurs the default ELF marking for
relocatable objects will be updated to use build attributes.
A per-ELF file marking scheme permits a coarse way of reasoning about compatibility.
- All reasoning about compatibility is done using the Core
Information. This permits an ELF relocatable object file using
the
.note.gnu.property
ELF marking to be compared to an ELF file using build attributes that encode the Core Information. - The absence of any ELF marking means no information on how pointers
are signed is available for this ELF file. When used in combination
with ELF files that contain ELF marking, then by default the file is
assigned the (
platform identifer
,version number
) of (0,0). Implementations may use additional information supplementary to the ELF file, such as linker command-line options, to provide an implementation defined Core Information for ELF files with no ELF marking. - The presence of ELF marking means that, if the file contains pointers, they were signed in a compatible way with the schema identified in the (platform identifier, version number). Core Information.
- A combination of Core Information from two ELF files is
successful if the
platform identifier
values match and theversion numbers
values match. All other combinations are unsuccessful. - The result of a successful combination of Core Information is a
single ELF Marking containing the Core Information. The result of
an unsuccesful combination must be either a single ELF marking with
(
platform identifer
,version number
) of (0,0), or no ELF marking is written to the output file. - The static linker may choose to fault the unsuccessful combination of Core Information.
- A dynamic loader may disable pointer authentication, or fault the
program with an error message, in case it encounters an incompatible
ELF file. A dynamic loader may consider the ELF file to be
incompatible with the PAuthABI in any of the following cases:
- If no ELF marking is present.
- If the (platform identifier, version number) from the Core Information is not recognized by the loader.
- If the platform identifier from the Core Information is the reserved Invalid value 0.
Platforms may replace the base compatibility model with a platform-specific model.
With additional per-symbol information encoded in the ELF file, a
dynamic linker can look up the signing schema to use for dlsym
or
dlvsym
instead of using the default signing schema.
The pointer authentication information for global symbols is stored in
a section named .symauth
with type SHT_AARCH64_AUTH_SYM
, it
is associated with a symbol table section in a similar way to
.symtab_shndx. The following table describes the
SHT_AARCH64_AUTH_SYM
symbol type:
.symauth
and .dynauth
ELF Section Type
Name | Value | Comment |
---|---|---|
SHT_AARCH64_AUTH_SYM | 0x70000005 | Section type for symbol signing information |
A section of type SHT_AARCH64_AUTH_SYM
is an array of
Elf32_Word
values. Each value corresponds to a non-local symbol
table entry in the symbol table and appear in the same order as those
entries. All local symbols in the symbol table precede global symbols
so the index in .symauth
of a global symbol with index I
in
the symbol table is I
- Index of first non-local symbol
. Each
table entry is specified as follows:
31 | 30 | 30-19 | 18-17 | 16 | 15-0 |
---|---|---|---|---|---|
sign | set | reserved | key | 0 | discriminator |
key
same as in Encoding the signing schema.discriminator
same as in Encoding the signing schema.reserved
same as in Encoding the signing schema.sign
indicates whether the address of the symbol should be signed when its addres is taken bydlsym
.set
indicates whether an assembly directive was used to set the signing schema. This may be used by the linker to detect cases where a directive was required but was not present.
There is no address diversity
field as this has no meaning for
symbols returned by dlsym
.
For ELF shared libraries and executables that support dynamic linking
the static linker creates a SHT_AARCH64_AUTH_SYM
section with name
.dynauth
. This section is associated with the dynamic symbol
table. If the .dynauth
section is present an additional dynamic
tag DT_AARCH64_AUTH_SYM is added.
Name | Value | d_un | Executable | Shared Object |
---|---|---|---|---|
DT_AARCH64_AUTH_SYM | 0x70000008 | d_ptr | optional | optional |
If the program (-z norelo) or platform does not support RELRO the GOT will be writeable for the lifetime of the program. There is scope for some or all of the pointers in the GOT to protect against an attacker modifying the GOT.
If a pointer in the GOT is to be signed then the dynamic linker must sign the pointer at load time, and the code that loads the pointer from the GOT must authenticate it using the same signing schema.
PAUTHELF64 describes a default signing schema for GOT entries and AUTH variant GOT-generating relocations that can be used to create signed pointers in the GOT.
Signed GOT entries use the IA
key for symbols of type STT_FUNC
and the DA
key for all other symbol types, with the address of the
GOT entry as the modifier. The static linker must encode the signing
schema into the GOT slot. AUTH variant dynamic relocations must be
used for signed GOT entries.
Example Code to access a signed GOT entry with the small code model:
adrp x8, :got_auth: symbol
add x8, x8, :got_auth_lo12: symbol
ldr x0, [x8]
// Authenticate to get unsigned pointer
autia x0, x8
In the example the :got_auth: and :got_auth_lo12: operators result in AUTH variant GOT generating relocations being used.
Example Code to access a signed GOT entry with the tiny code model:
adr x8, :got_auth: symbol
ldr x0, [x8]
// Authenticate to get unsigned pointer
autia x0, x8
Compared to the tiny code model without pointer authentication an additonal adr is required to get the address of the GOT entry.
ENCD(value)
is the encoding of the signing schema into the GOT
slot using the IA
key for symbols of type STT_FUNC and the DA
key for all other symbol types. The address of the GOT slot G
is
used as a modifer.
The GOT entries must be relocated by AUTH variant dynamic relocations.
ELF 64 Code | Name | Operation | Comment |
---|---|---|---|
0x8110 | R_AARCH64_AUTH_MOVW_GOTOFF_G0 | G(ENCD(GDAT(S))) - GOT | Set a MOV[NZ] immediate field to bits [15:0] of X (see notes below) |
0x8111 | R_AARCH64_AUTH_MOVW_GOTOFF_G0_NC | G(ENCD(GDAT(S))) - GOT | Set a MOV[NZ] immediate field to bits [15:0] of X (see notes below) |
0x8112 | R_AARCH64_AUTH_MOVW_GOTOFF_G1 | G(ENCD(GDAT(S))) - GOT | Set a MOV[NZ] immediate field to bits [31:16] of X (see notes below) |
0x8113 | R_AARCH64_AUTH_MOVW_GOTOFF_G1_NC | G(ENCD(GDAT(S))) - GOT | Set a MOV[NZ] immediate field to bits [31:16] of X (see notes below) |
0x8114 | R_AARCH64_AUTH_MOVW_GOTOFF_G2 | G(ENCD(GDAT(S))) - GOT | Set a MOV[NZ] immediate field to bits [47:32] of X (see notes below) |
0x8115 | R_AARCH64_AUTH_MOVW_GOTOFF_G2_NC | G(ENCD(GDAT(S))) - GOT | Set a MOV[NZ] immediate field to bits [47:32] of X (see notes below) |
0x8116 | R_AARCH64_AUTH_MOVW_GOTOFF_G3 | G(ENCD(GDAT(S))) - GOT | Set a MOV[NZ] immediate field to bits [63:48] of X (see notes below) |
0x8117 | R_AARCH64_AUTH_GOT_LD_PREL19 | G(ENCD(GDAT(S))) - P | Set a load-literal im- mediate field to bits [20:2] of X; check –220 <= X < 2 20 |
0x8118 | R_AARCH64_AUTH_LD64_GOTOFF_LO15 | G(ENCD(GDAT(S))) - GOT | Set the immediate value of an ADRP to bits [32:12] of X; check that –232 <= X < 232 |
0x8119 | R_AARCH64_AUTH_ADR_GOT_PAGE | G(ENCD(GDAT(S))) - Page(P) | Set the immediate value of an ADRP to bits [32:12] of X; check that –232 <= X < 232 |
0x811A | R_AARCH64_AUTH_LD64_GOT_LO12_NC | G(ENCD(GDAT(S))) | Set the LD/ST immediate field to bits [11:3] of X. No overflow check; check that X&7 = 0 |
0x811B | R_AARCH64_AUTH_LD64_GOTPAGE_LO15 | G(ENCD(GDAT(S))) - Page(GOT) | Set the LD/ST immediate field to bits [14:3] of X; check that 0 <= X < 215 |
0x811C | RAARCH64_AUTH_GOT_ADD_LO12_NC | G(ENCD(GDAT(S))) | Set an ADD immediate value to bits [11:0] of X. No overflow check. |
0x811D | RAARCH64_AUTH_GOT_ADR_PREL_LO21 | G(ENCD(GDAT(S))) - P | Set the immediate value to bits[20:0] of X; check that -2 20 <= 2 :sup: 20 |
The dynamic relocations required for the PAuth ABI are built on the
existing dynamic relocations, for example R_AARCH64_AUTH_RELATIVE
is the PAuth ABI equivalent of R_AARCH64_RELATIVE
. The underlying
calculation performed by the dynamic linker is the same, the only
difference is that the resulting pointer is signed. The dynamic linker
reads the signing schema from the contents of the place of the dynamic
relocation.
The R_AARCH64_AUTH_GOT_ADD_LO12_NC
relocation is an addition for
the PAuth ABI and has no equivalent in (AAELF64). It is
The R_AARCH64_AUTH_GOT_ADR_PREL_LO21
relocation is used with the
:got_auth:
operator on an adr instruction.
Relocation code | Name | Operation |
---|---|---|
0xE201 | R_AARCH64_AUTH_GLOB_DAT | SIGN((S + A), SCHEMA(*P)) |
0xE202 | R_AARCH64_AUTH_TLSDESC | SIGN(TLSDESC(S + A), SCHEMA(*P)) |
0xE203 | R_AARCH64_AUTH_IRELATIVE | SIGN(Indirect(S + A), SCHEMA(*P)) |
Relocatable objects in the same link-unit must agree on whether a GOT entry is signed. If there are AUTH and non-AUTH variant GOT generating relocations to the same symbol two GOT entries are required, one signed and one unsigned. While not a hard limitation many static linkers only support a single GOT entry per symbol. An implementation may choose to fault an AUTH and a non-AUTH GOT generating relocation to the same symbol, this would require all the GOT-generating relocations to a symbol to be signed or unsigned.
This section describes some of the trade-offs behind choosing a signing schema. It is not part of the ABI.
To create a signed pointer the run-time system needs to know the signing schema to use for the pointer. The object producer and static linker will need to communicate this via metadata; including at least:
- The Key, one of
IA
,IB
,DA
,DB
. TheGA
key for signing of generic data is not exposed in this ABI. - The constant discriminator value.
- Whether to combine address diversity with the discriminator.
In ELF we have the following places where we can encode this information via a combination of.
- The relocation code.
- The relocation code could be used to communicate key and address diversity. There are not enough spare codes to describe a discriminator.
- The relocation addend.
- AArch64 uses the
RELA
format which gives a 64-bit addend field. At a cost of limiting the size of the program, a number of bits of the addend could be reserved for communicating metadata.
- AArch64 uses the
- Writing data into the contents of the place being relocated.
- The place is the operation
P
in relocation descriptions. It is derived from the r_offset field of the relocation. - When using
RELA
relocations, the contents of the place are ignored. The metadata could be written into the contents of the place and combined with the relocation.
- The place is the operation
- Default rules such as altering the behavior of existing
relocations.
- If there is a default signing schema for the GOT, and every GOT entry is signed with that schema we may not need any per-relocation encoding of the schema.
Some observations:
- Using the relocation code to encode key and address diversity would
require 8 relocations to save 3-bits of metadata. If the
GI
key was supported by the ABI, 16 relocations would be needed to save 4-bits of metadata. - Although ABI compliant ELF relocatable objects use
RELA
relocations, the type used in the link-unit is platform ABI. There are at least two documented relocation compression mechanisms (Android andSHT_RELR
) and at least one platform that can support REL dynamic relocations.- In
SHT_RELR
the addend is written to the contents of the place likeSHT_REL
relocations.
- In
- If the GOT is signed and a non default signing schema is used then the contents of the place of the relocation cannot be used to store the metadata as the linker creates the GOT entry.
- When not dynamic linking a static linker may choose to encode the pointer signing information in a custom encoding understood by the start-up code used.
###Page###
Copyright © 2020-2023, Arm Limited and its affiliates. All rights reserved.