From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: by sourceware.org (Postfix, from userid 1039) id 0A2513851C11; Tue, 28 Apr 2020 17:59:45 +0000 (GMT) DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org 0A2513851C11 Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: H.J. Lu To: glibc-cvs@sourceware.org Subject: [glibc] Deleted branch hjl/cet/master X-Act-Checkin: glibc X-Git-Author: H.J. Lu X-Git-Refname: refs/heads/hjl/cet/master X-Git-Oldrev: e772a01f9cdbf8e9d824f793301437ff0bd725a6 X-Git-Newrev: 0000000000000000000000000000000000000000 Message-Id: <20200428175945.0A2513851C11@sourceware.org> Date: Tue, 28 Apr 2020 17:59:45 +0000 (GMT) X-BeenThere: glibc-cvs@sourceware.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Glibc-cvs mailing list List-Unsubscribe: , List-Archive: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 28 Apr 2020 17:59:45 -0000 The branch 'hjl/cet/master' was deleted. It previously pointed to: e772a01f9c... Fix test Diff: !!! WARNING: THE FOLLOWING COMMITS ARE NO LONGER ACCESSIBLE (LOST): ------------------------------------------------------------------- e772a01... Fix test d0ce483... x86: Add --enable-cet=permissive f9a69d5... rtld: Get architecture specific initializer in rtld_global 97547c7... CET: Rename CET_MAX to CET_CONTROL_MASK [BZ #25887] commit e772a01f9cdbf8e9d824f793301437ff0bd725a6 Author: H.J. Lu Date: Tue Apr 28 10:57:24 2020 -0700 Fix test commit d0ce483f4c16edf07d6e2a3a028c7f15388f4735 Author: H.J. Lu Date: Mon Apr 27 15:44:07 2020 -0700 x86: Add --enable-cet=permissive When CET is enabled, it is an error to dlopen a non CET enabled shared library in CET enabled application. It may be desirable to make CET permissive, that is disable CET when dlopening a non CET enabled shared library. With the new --enable-cet=permissive configure option, CET is disabled when dlopening a non CET enabled shared library. Add DEFAULT_DL_X86_FEATURE_1_1 to config.h.in: /* The default value of _dl_x86_feature_1[1]. */ #define DEFAULT_DL_X86_FEATURE_1_1 0 --enable-cet changes it to /* The default value of _dl_x86_feature_1[1]. */ #define DEFAULT_DL_X86_FEATURE_1_1 ((CET_ELF_PROPERTY << CET_IBT_SHIFT) | (CET_ELF_PROPERTY << CET_SHSTK_SHIFT)) enables CET features based on ELF property note. --enable-cet=permissive it to /* The default value of _dl_x86_feature_1[1]. */ #define DEFAULT_DL_X86_FEATURE_1_1 ((CET_PERMISSIVE << CET_IBT_SHIFT) | (CET_PERMISSIVE << CET_SHSTK_SHIFT)) which enable CET features permissively. commit f9a69d5fd4c9a3fd4435b6e58a818e3ebe198b00 Author: H.J. Lu Date: Tue Apr 28 10:05:25 2020 -0700 rtld: Get architecture specific initializer in rtld_global Include to get architecture specific initializer in rtld_global. commit 97547c772180b927531ce073dd55f2bf646a133d Author: H.J. Lu Date: Tue Apr 28 07:46:17 2020 -0700 CET: Rename CET_MAX to CET_CONTROL_MASK [BZ #25887] _dl_x86_feature_1[1] is used to control each CET feature, IBT and SHSTK: /* Valid control values: 0: Enable CET features based on ELF property note. 1: Always disable CET features. 2: Always enable CET features. 3: Enable CET features permissively. */ #define CET_ELF_PROPERTY 0 #define CET_ALWAYS_OFF 1 #define CET_ALWAYS_ON 2 #define CET_PERMISSIVE 3 #define CET_MAX CET_PERMISSIVE CET control value takes 2 bits. Rename CET_MAX to CET_CONTROL_MASK. Add CET_IBT_SHIFT and CET_SHSTK_SHIFT.