public inbox for libc-alpha@sourceware.org
 help / color / mirror / Atom feed
From: "H.J. Lu" <hjl.tools@gmail.com>
To: GNU C Library <libc-alpha@sourceware.org>,
	"Carlos O'Donell" <carlos@redhat.com>
Cc: Florian Weimer <fweimer@redhat.com>
Subject: PING: [PATCH 1/3] CET: Rename CET_MAX to CET_CONTROL_MASK [BZ #25887]
Date: Sat, 16 May 2020 09:37:20 -0700	[thread overview]
Message-ID: <CAMe9rOp-5fsaaXGWhUXycP1QX+j7TofS30vh+A66uZ49RhoTYg@mail.gmail.com> (raw)
In-Reply-To: <20200428215243.236312-2-hjl.tools@gmail.com>

On Tue, Apr 28, 2020 at 2:52 PM H.J. Lu <hjl.tools@gmail.com> wrote:
>
> _dl_x86_feature_1[1] is used to control each CET feature, IBT and SHSTK:
>
>  /* Valid control values:
>     0: Enable CET features based on ELF property note.
>     1: Always disable CET features.
>     2: Always enable CET features.
>     3: Enable CET features permissively.
>   */
>  #define CET_ELF_PROPERTY       0
>  #define CET_ALWAYS_OFF         1
>  #define CET_ALWAYS_ON          2
>  #define CET_PERMISSIVE         3
>  #define CET_MAX                CET_PERMISSIVE
>
> CET control value takes 2 bits.  Rename CET_MAX to CET_CONTROL_MASK.  Add
> CET_IBT_SHIFT and CET_SHSTK_SHIFT.
> ---
>  sysdeps/x86/cet-tunables.h | 22 +++++++++++++++++++--
>  sysdeps/x86/cpu-features.c |  7 +++----
>  sysdeps/x86/cpu-tunables.c | 39 +++++++++++++++-----------------------
>  sysdeps/x86/dl-cet.c       |  6 ++----
>  4 files changed, 40 insertions(+), 34 deletions(-)
>
> diff --git a/sysdeps/x86/cet-tunables.h b/sysdeps/x86/cet-tunables.h
> index 5e1e42df10..0088b89d3e 100644
> --- a/sysdeps/x86/cet-tunables.h
> +++ b/sysdeps/x86/cet-tunables.h
> @@ -16,14 +16,32 @@
>     License along with the GNU C Library; if not, see
>     <https://www.gnu.org/licenses/>.  */
>
> -/* Valid control values:
> +#ifndef _CET_TUNABLES_H
> +#define _CET_TUNABLES_H
> +
> +/* For each CET feature, IBT and SHSTK, valid control values:
>     0: Enable CET features based on ELF property note.
>     1: Always disable CET features.
>     2: Always enable CET features.
>     3: Enable CET features permissively.
> +
> +   Bits 0-1: IBT
> +   Bits 2-3: SHSTK
>   */
>  #define CET_ELF_PROPERTY       0
>  #define CET_ALWAYS_OFF         1
>  #define CET_ALWAYS_ON          2
>  #define CET_PERMISSIVE         3
> -#define CET_MAX                        CET_PERMISSIVE
> +#define CET_CONTROL_MASK       3
> +#define CET_IBT_SHIFT          0
> +#define CET_SHSTK_SHIFT                2
> +
> +/* Get CET control value.  */
> +
> +static inline unsigned int
> +get_cet_control_value (unsigned int shift)
> +{
> +  return (GL(dl_x86_feature_1)[1] >> shift) & CET_CONTROL_MASK;
> +}
> +
> +#endif /* cet-tunables.h */
> diff --git a/sysdeps/x86/cpu-features.c b/sysdeps/x86/cpu-features.c
> index 81a170a819..76a6476607 100644
> --- a/sysdeps/x86/cpu-features.c
> +++ b/sysdeps/x86/cpu-features.c
> @@ -594,10 +594,9 @@ no_cpuid:
>             }
>
>           /* Lock CET if IBT or SHSTK is enabled in executable.  Don't
> -            lock CET if SHSTK is enabled permissively.  */
> -         if (((GL(dl_x86_feature_1)[1] >> CET_MAX)
> -              & ((1 << CET_MAX) - 1))
> -              != CET_PERMISSIVE)
> +            lock CET if IBT or SHSTK is enabled permissively.  */
> +         if (get_cet_control_value (CET_IBT_SHIFT) != CET_PERMISSIVE
> +             && get_cet_control_value (CET_SHSTK_SHIFT) != CET_PERMISSIVE)
>             dl_cet_lock_cet ();
>         }
>  # endif
> diff --git a/sysdeps/x86/cpu-tunables.c b/sysdeps/x86/cpu-tunables.c
> index 861bd7bcaa..c8fc5e67d9 100644
> --- a/sysdeps/x86/cpu-tunables.c
> +++ b/sysdeps/x86/cpu-tunables.c
> @@ -338,26 +338,26 @@ TUNABLE_CALLBACK (set_hwcaps) (tunable_val_t *valp)
>  # if CET_ENABLED
>  #  include <cet-tunables.h>
>
> +/* Set CET control value.  */
> +
> +static inline void
> +set_cet_control_value (unsigned int value, unsigned int shift)
> +{
> +   GL(dl_x86_feature_1)[1] &= ~(CET_CONTROL_MASK << shift);
> +   GL(dl_x86_feature_1)[1] |= value << shift;
> +}
> +
>  attribute_hidden
>  void
>  TUNABLE_CALLBACK (set_x86_ibt) (tunable_val_t *valp)
>  {
>    if (DEFAULT_MEMCMP (valp->strval, "on", sizeof ("on")) == 0)
> -    {
> -      GL(dl_x86_feature_1)[1] &= ~((1 << CET_MAX) - 1);
> -      GL(dl_x86_feature_1)[1] |= CET_ALWAYS_ON;
> -    }
> +    set_cet_control_value (CET_ALWAYS_ON, CET_IBT_SHIFT);
>    else if (DEFAULT_MEMCMP (valp->strval, "off", sizeof ("off")) == 0)
> -    {
> -      GL(dl_x86_feature_1)[1] &= ~((1 << CET_MAX) - 1);
> -      GL(dl_x86_feature_1)[1] |= CET_ALWAYS_OFF;
> -    }
> +    set_cet_control_value (CET_ALWAYS_OFF, CET_IBT_SHIFT);
>    else if (DEFAULT_MEMCMP (valp->strval, "permissive",
>                            sizeof ("permissive")) == 0)
> -    {
> -      GL(dl_x86_feature_1)[1] &= ~((1 << CET_MAX) - 1);
> -      GL(dl_x86_feature_1)[1] |= CET_PERMISSIVE;
> -    }
> +    set_cet_control_value (CET_PERMISSIVE, CET_IBT_SHIFT);
>  }
>
>  attribute_hidden
> @@ -365,21 +365,12 @@ void
>  TUNABLE_CALLBACK (set_x86_shstk) (tunable_val_t *valp)
>  {
>    if (DEFAULT_MEMCMP (valp->strval, "on", sizeof ("on")) == 0)
> -    {
> -      GL(dl_x86_feature_1)[1] &= ~(((1 << CET_MAX) - 1) << CET_MAX);
> -      GL(dl_x86_feature_1)[1] |= (CET_ALWAYS_ON << CET_MAX);
> -    }
> +    set_cet_control_value (CET_ALWAYS_ON, CET_SHSTK_SHIFT);
>    else if (DEFAULT_MEMCMP (valp->strval, "off", sizeof ("off")) == 0)
> -    {
> -      GL(dl_x86_feature_1)[1] &= ~(((1 << CET_MAX) - 1) << CET_MAX);
> -      GL(dl_x86_feature_1)[1] |= (CET_ALWAYS_OFF << CET_MAX);
> -    }
> +    set_cet_control_value (CET_ALWAYS_OFF, CET_SHSTK_SHIFT);
>    else if (DEFAULT_MEMCMP (valp->strval, "permissive",
>                            sizeof ("permissive")) == 0)
> -    {
> -      GL(dl_x86_feature_1)[1] &= ~(((1 << CET_MAX) - 1) << CET_MAX);
> -      GL(dl_x86_feature_1)[1] |= (CET_PERMISSIVE << CET_MAX);
> -    }
> +    set_cet_control_value (CET_PERMISSIVE, CET_SHSTK_SHIFT);
>  }
>  # endif
>  #endif
> diff --git a/sysdeps/x86/dl-cet.c b/sysdeps/x86/dl-cet.c
> index c7029f1b51..0f115540aa 100644
> --- a/sysdeps/x86/dl-cet.c
> +++ b/sysdeps/x86/dl-cet.c
> @@ -39,11 +39,9 @@ static void
>  dl_cet_check (struct link_map *m, const char *program)
>  {
>    /* Check how IBT should be enabled.  */
> -  unsigned int enable_ibt_type
> -    = GL(dl_x86_feature_1)[1] & ((1 << CET_MAX) - 1);
> +  unsigned int enable_ibt_type = get_cet_control_value (CET_IBT_SHIFT);
>    /* Check how SHSTK should be enabled.  */
> -  unsigned int enable_shstk_type
> -    = ((GL(dl_x86_feature_1)[1] >> CET_MAX) & ((1 << CET_MAX) - 1));
> +  unsigned int enable_shstk_type = get_cet_control_value (CET_SHSTK_SHIFT);
>
>    /* No legacy object check if both IBT and SHSTK are always on.  */
>    if (enable_ibt_type == CET_ALWAYS_ON
> --
> 2.25.4
>

PING.

-- 
H.J.

  reply	other threads:[~2020-05-16 16:37 UTC|newest]

Thread overview: 21+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-04-28 21:52 [PATCH 0/3] x86: Add --enable-cet=permissive H.J. Lu
2020-04-28 21:52 ` [PATCH 1/3] CET: Rename CET_MAX to CET_CONTROL_MASK [BZ #25887] H.J. Lu
2020-05-16 16:37   ` H.J. Lu [this message]
2020-05-16 17:27   ` Florian Weimer
2020-05-16 23:44     ` [PATCH] x86: Move CET control to _dl_x86_feature_control " H.J. Lu
2020-05-18  7:19       ` Florian Weimer
2020-05-18 12:26         ` V2 " H.J. Lu
2020-05-18 12:36           ` Florian Weimer
2020-04-28 21:52 ` [PATCH 2/3] rtld: Get architecture specific initializer in rtld_global H.J. Lu
2020-05-16 16:38   ` PING: " H.J. Lu
2020-05-16 17:51   ` Florian Weimer
2020-05-16 18:01     ` H.J. Lu
2020-05-16 18:07       ` Florian Weimer
2020-05-16 18:24         ` V2 [PATCH] " H.J. Lu
2020-04-28 21:52 ` [PATCH 3/3] x86: Add --enable-cet=permissive H.J. Lu
2020-04-29 17:19 ` [PATCH 0/3] " Adhemerval Zanella
2020-04-29 20:29   ` H.J. Lu
2020-04-29 20:46   ` Florian Weimer
2020-04-29 21:14     ` Adhemerval Zanella
2020-05-18 13:50       ` V2 [PATCH] " H.J. Lu
2020-05-18 14:43         ` Florian Weimer

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=CAMe9rOp-5fsaaXGWhUXycP1QX+j7TofS30vh+A66uZ49RhoTYg@mail.gmail.com \
    --to=hjl.tools@gmail.com \
    --cc=carlos@redhat.com \
    --cc=fweimer@redhat.com \
    --cc=libc-alpha@sourceware.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).