From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: by sourceware.org (Postfix, from userid 1944) id 49938388302A; Wed, 26 Oct 2022 15:16:13 +0000 (GMT) DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org 49938388302A DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sourceware.org; s=default; t=1666797373; bh=YRGG/VYoQ6tlGbvGGJrvuDCK3yqlY3gApJql0TkK0vo=; h=From:To:Subject:Date:From; b=iIAE+mAAo7OEyu1lIaoIkR/y3UtkDYq8KlyHhNDomTB9RpsUpH3dpTXNIrAN+frpY jPhRR9/QqmfaYguXQjI46oe0NO6g+tbUQaIJUTrGzGFHOVMTOsah5WLye8aYSPECYk DzcSK/kw8PuboiA/WZLwKKnD+AWpVxA8Vepnt3IE= Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Szabolcs Nagy To: glibc-cvs@sourceware.org Subject: [glibc/arm/morello/main] cheri: don't use dl_random for pointer mangling X-Act-Checkin: glibc X-Git-Author: Szabolcs Nagy X-Git-Refname: refs/heads/arm/morello/main X-Git-Oldrev: 4053c23efe7836e4099c50f86ca741b0035ac242 X-Git-Newrev: 72aca7d8eb54c2a44b2d1b13e5b84dc874241c1e Message-Id: <20221026151613.49938388302A@sourceware.org> Date: Wed, 26 Oct 2022 15:16:13 +0000 (GMT) List-Id: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=72aca7d8eb54c2a44b2d1b13e5b84dc874241c1e commit 72aca7d8eb54c2a44b2d1b13e5b84dc874241c1e Author: Szabolcs Nagy Date: Tue Mar 1 17:36:12 2022 +0000 cheri: don't use dl_random for pointer mangling Pointer mangling cannot be supported on capability architectures. And there is not enough bytes in dl_random for 128 bit pointers. Stack guard is still loaded from dl_random: stack protection is unlikely to be useful on a capability architecture, but it works. Diff: --- sysdeps/unix/sysv/linux/dl-osinfo.h | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/sysdeps/unix/sysv/linux/dl-osinfo.h b/sysdeps/unix/sysv/linux/dl-osinfo.h index 49d8f973c8..c5d864f5ba 100644 --- a/sysdeps/unix/sysv/linux/dl-osinfo.h +++ b/sysdeps/unix/sysv/linux/dl-osinfo.h @@ -52,7 +52,12 @@ _dl_setup_stack_chk_guard (void *dl_random) static inline uintptr_t __attribute__ ((always_inline)) _dl_setup_pointer_guard (void *dl_random, uintptr_t stack_chk_guard) { +#ifdef __CHERI_PURE_CAPABILITY__ + /* Pointer mangling is not supported on capability architectures. */ + return 0; +#else uintptr_t ret; memcpy (&ret, (char *) dl_random + sizeof (ret), sizeof (ret)); return ret; +#endif }