From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-pf1-x444.google.com (mail-pf1-x444.google.com [IPv6:2607:f8b0:4864:20::444]) by sourceware.org (Postfix) with ESMTPS id 0DE493851C09 for ; Tue, 28 Apr 2020 21:52:46 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.3.2 sourceware.org 0DE493851C09 Received: by mail-pf1-x444.google.com with SMTP id w65so17656pfc.12 for ; Tue, 28 Apr 2020 14:52:46 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=8lKHACMIecnXt7zl4FAFJF+cJ0l8aKS93cQ03H7ifwA=; b=LX939LOup2euWP5+djEaEuwde8KtXYcVQlmdrx/PmF3ifPsFqwZTcDMozlcseXwRCm C28sv0EC8crNFTvD4/EZLcI0RxlyB57lUdRwQlLsnwknEWWNedqQkhaeUSlCbrzofiJn N3ZxpRVzF8K+Ksza9iI9OrIIOjVakhWPaaEDzwDxdFTTclqnkN49CVLJb0zg4+/kZp0N VxvPYc29qZz6mQKh+lLnbuyAaRGUG3rj+722HfIq5VlfuPNHdpyDYlo1LoZAIxUBolYG 66PKMB9yXmKA6D+ycge3I49WlCWqYzE8X+1WzlrzfcEBYPAqHqgBOgxXyFo0mIn9S6FK j8qA== X-Gm-Message-State: AGi0PuaZbBkq7jKbEEYp392td53jXaQgOKo4jStub3a5CC+6+W/MjdJv Axzx+Z5BersBJaOfKrHywDk= X-Google-Smtp-Source: APiQypICmqN6j0hCGovxSPYGYIARxtktQ8UYANvyXtYdwPc2LnRMAhITHokPAbFuf0zJ3Aua2uqwIA== X-Received: by 2002:aa7:843a:: with SMTP id q26mr30151525pfn.240.1588110765176; Tue, 28 Apr 2020 14:52:45 -0700 (PDT) Received: from gnu-cfl-2.localdomain (c-69-181-90-243.hsd1.ca.comcast.net. [69.181.90.243]) by smtp.gmail.com with ESMTPSA id h14sm15952793pfq.46.2020.04.28.14.52.44 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 28 Apr 2020 14:52:44 -0700 (PDT) Received: from gnu-cfl-2.localdomain (localhost [IPv6:::1]) by gnu-cfl-2.localdomain (Postfix) with ESMTP id 9BB78C013F; Tue, 28 Apr 2020 14:52:43 -0700 (PDT) From: "H.J. Lu" To: libc-alpha@sourceware.org Subject: [PATCH 0/3] x86: Add --enable-cet=permissive Date: Tue, 28 Apr 2020 14:52:40 -0700 Message-Id: <20200428215243.236312-1-hjl.tools@gmail.com> X-Mailer: git-send-email 2.25.4 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-17.5 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, FREEMAIL_FROM, GIT_PATCH_2, GIT_PATCH_3, RCVD_IN_DNSWL_NONE, SPF_HELO_NONE, SPF_PASS, TXREP autolearn=ham autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on server2.sourceware.org X-BeenThere: libc-alpha@sourceware.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Libc-alpha mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 28 Apr 2020 21:52:50 -0000 When CET is enabled, it is an error to dlopen a non CET enabled shared library in CET enabled application. It may be desirable to make CET permissive, that is disable CET when dlopening a non CET enabled shared library. With the new --enable-cet=permissive configure option, CET is disabled when dlopening a non CET enabled shared library. To support --enable-cet=permissive, CET_MAX is renamed to CET_CONTROL_MASK and is included in rtld.c to get architecture specific initializer in rtld_global. H.J. Lu (3): CET: Rename CET_MAX to CET_CONTROL_MASK [BZ #25887] rtld: Get architecture specific initializer in rtld_global x86: Add --enable-cet=permissive INSTALL | 26 +++++++++++-------- config.h.in | 3 +++ elf/rtld.c | 2 ++ manual/install.texi | 12 ++++++--- sysdeps/unix/sysv/linux/x86/Makefile | 2 +- sysdeps/x86/Makefile | 18 +++++++++---- sysdeps/x86/cet-tunables.h | 22 ++++++++++++++-- sysdeps/x86/configure | 21 ++++++++------- sysdeps/x86/configure.ac | 19 +++++++------- sysdeps/x86/cpu-features.c | 7 +++-- sysdeps/x86/cpu-tunables.c | 39 +++++++++++----------------- sysdeps/x86/dl-cet.c | 6 ++--- sysdeps/x86/dl-procruntime.c | 5 ++++ sysdeps/x86/tst-cet-legacy-5.c | 25 ++++++++++++------ sysdeps/x86/tst-cet-legacy-6.c | 25 ++++++++++++------ 15 files changed, 141 insertions(+), 91 deletions(-) -- 2.25.4