From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from EUR03-VE1-obe.outbound.protection.outlook.com (mail-eopbgr50085.outbound.protection.outlook.com [40.107.5.85]) by sourceware.org (Postfix) with ESMTPS id 36EFB3858D39 for ; Tue, 18 Jan 2022 11:22:37 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.1 sourceware.org 36EFB3858D39 Received: from DU2PR04CA0165.eurprd04.prod.outlook.com (2603:10a6:10:2b0::20) by DBAPR08MB5607.eurprd08.prod.outlook.com (2603:10a6:10:1ae::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4888.11; Tue, 18 Jan 2022 11:22:33 +0000 Received: from DB5EUR03FT023.eop-EUR03.prod.protection.outlook.com (2603:10a6:10:2b0:cafe::69) by DU2PR04CA0165.outlook.office365.com (2603:10a6:10:2b0::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4888.9 via Frontend Transport; Tue, 18 Jan 2022 11:22:33 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DB5EUR03FT023.mail.protection.outlook.com (10.152.20.68) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4888.9 via Frontend Transport; Tue, 18 Jan 2022 11:22:33 +0000 Received: ("Tessian outbound 157533e214a9:v110"); Tue, 18 Jan 2022 11:22:33 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 116755341e9f4bf4 X-CR-MTA-TID: 64aa7808 Received: from 5ece61481cf6.2 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 6611B249-EB5A-4C55-81B0-706B08F66483.1; Tue, 18 Jan 2022 11:22:23 +0000 Received: from EUR05-DB8-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 5ece61481cf6.2 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Tue, 18 Jan 2022 11:22:23 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Utv0fzj47XccJISZNCjiVVoNEQe1Kg9CYZSxirtc7VmclCtEmjjfa7B7SDmRBZKNVr5gxIY180LqsRl0PtGmY9BbRHNwqzS5ml34iYgDxM1Ydv2UGaLqVQs7cwjdcWMGJajnk6pVbuDO20AOxCWYSqRcjplPmuoUfS1zONY4InbK45mx51Y2SBu19KXmq9TWpUkw/uSfFjq2ca1rpinT+8UsBUvda2eQIgt9c8XaN0OO1cIXsOQ8trfaIAcSqTj7MWw8eCrzarTrGeDEztQiV0XF4HI877W4r/l8lgitLrjCw1nBiv5DYeU6g+fxBJrRtJ+8M4tK1bq9sYBnvpFIhQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=vsAFBbyBmHrA9wOmNH9ETk9jPTKgu3F0jZNjmvTyvY4=; b=XrioNI/EP+yYM5UUxnMpJBrSR+ldgGJgYY+kaKGY1VbxT1Y3uzspqlA/KHthIBi9fLE4Rm91eXSguB++B7+KUPdPBT3O9kwECnkhumz6lrq9iL5h4WbsKH//eR8xMz42ZV7qpfnZdvYjKP3ntXA1aqRvsAoaXLMYg31gcCZJB2K83MsubRSMuMAxbBNIEqCAWZqysd1YV8GWPO8mxNkJvUFCmACwOb4BB3sVuTxnytTuVCGo11ijtofq53HAqKNa9J0NFVWXIONmKmGr3bpTwcNxOGRJpVAfBi1iOFXi0/14GY8rIALFrLX3ZRtNlrXuLSLYvclOX3W8LXpGa9mWqg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none Authentication-Results-Original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com; Received: from DB9PR08MB7179.eurprd08.prod.outlook.com (2603:10a6:10:2cc::19) by VI1PR08MB4527.eurprd08.prod.outlook.com (2603:10a6:803:f8::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4888.11; Tue, 18 Jan 2022 11:22:21 +0000 Received: from DB9PR08MB7179.eurprd08.prod.outlook.com ([fe80::25f9:a7e6:422a:da43]) by DB9PR08MB7179.eurprd08.prod.outlook.com ([fe80::25f9:a7e6:422a:da43%7]) with mapi id 15.20.4888.014; Tue, 18 Jan 2022 11:22:21 +0000 Date: Tue, 18 Jan 2022 11:22:11 +0000 From: Szabolcs Nagy To: "H.J. Lu" Cc: Adhemerval Zanella , linux-arch , Mark Rutland , Yu-cheng Yu , GNU C Library , Catalin Marinas , Jeremy Linton , Mark Brown , Will Deacon , linux-arm-kernel@lists.infradead.org Subject: Re: [PATCH v7 0/4] arm64: Enable BTI for the executable as well as the interpreter Message-ID: <20220118112211.GD3294453@arm.com> References: <101d8e84-7429-bbf1-0271-5436eca0eea2@arm.com> <8550afd2-268d-a25f-88fd-0dd0b184ca23@arm.com> <20ae043b-a013-068d-2d83-16e63f5b4989@linaro.org> Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: X-ClientProxiedBy: SN7P222CA0023.NAMP222.PROD.OUTLOOK.COM (2603:10b6:806:124::31) To DB9PR08MB7179.eurprd08.prod.outlook.com (2603:10a6:10:2cc::19) MIME-Version: 1.0 X-MS-Office365-Filtering-Correlation-Id: cfa6c2d6-a598-42b8-f754-08d9da74d2a5 X-MS-TrafficTypeDiagnostic: VI1PR08MB4527:EE_|DB5EUR03FT023:EE_|DBAPR08MB5607:EE_ X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true NoDisclaimer: true X-MS-Oob-TLC-OOBClassifiers: OLM:8273;OLM:8273; X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DB9PR08MB7179.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(366004)(316002)(36756003)(6506007)(6916009)(86362001)(966005)(52116002)(6666004)(2906002)(186003)(4326008)(508600001)(54906003)(33656002)(26005)(8676002)(38350700002)(1076003)(6486002)(5660300002)(66946007)(83380400001)(66556008)(44832011)(8936002)(66476007)(38100700002)(4744005)(6512007)(2616005); DIR:OUT; SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB4527 Original-Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com; X-EOPAttributedMessage: 0 X-MS-Exchange-Transport-CrossTenantHeadersStripped: DB5EUR03FT023.eop-EUR03.prod.protection.outlook.com X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id-Prvs: 1d7dd4a0-ad9c-4a86-c284-08d9da74caf9 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(4636009)(36840700001)(46966006)(26005)(6512007)(966005)(316002)(107886003)(2906002)(186003)(6506007)(6666004)(47076005)(54906003)(5660300002)(83380400001)(4326008)(36756003)(1076003)(8676002)(2616005)(44832011)(70586007)(8936002)(81166007)(6486002)(36860700001)(508600001)(33656002)(82310400004)(4744005)(356005)(6862004)(336012)(86362001)(70206006); DIR:OUT; SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 18 Jan 2022 11:22:33.4714 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: cfa6c2d6-a598-42b8-f754-08d9da74d2a5 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: DB5EUR03FT023.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBAPR08MB5607 X-Spam-Status: No, score=-7.0 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2, SPF_HELO_PASS, SPF_PASS, TXREP, UNPARSEABLE_RELAY autolearn=ham autolearn_force=no version=3.4.4 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on server2.sourceware.org X-BeenThere: libc-alpha@sourceware.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Libc-alpha mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 18 Jan 2022 11:22:39 -0000 The 01/17/2022 11:01, H.J. Lu via Libc-alpha wrote: > We are taking a different approach for CET enabling. CET will be > changed to be enabled from user space: > > https://gitlab.com/x86-glibc/glibc/-/tree/users/hjl/cet/enable > > and the CET kernel no longer enables CET automatically: > > https://github.com/hjl-tools/linux/tree/hjl/cet%2F5.16.0-v4 we considered userspace handling of BTI in static exe and ld.so too. at the time we wanted the protection to be on whenever BTI marked code is executed, so it has to be enabled at program entry. i no longer think that the entry code protection is very important, but delaying mprotect for static exe does not fix our mprotect(*|PROT_EXEC) problem with systemd. i also don't immediately see where you deal with shadow stack allocation for the main stack if it is userspace enabled, i expected that to require kernel assistance if you want the main stack protected all the way up.