From: Adhemerval Zanella Netto <adhemerval.zanella@linaro.org>
To: "H.J. Lu" <hjl.tools@gmail.com>, libc-alpha@sourceware.org
Cc: goldstein.w.n@gmail.com
Subject: Re: [PATCH v3 2/4] x86-64/cet: Move dl-cet.[ch] to x86_64 directories
Date: Wed, 10 Jan 2024 09:51:31 -0300 [thread overview]
Message-ID: <c546af78-1679-4a0d-896b-d9c146dc63a0@linaro.org> (raw)
In-Reply-To: <20240109202327.1565961-3-hjl.tools@gmail.com>
On 09/01/24 17:23, H.J. Lu wrote:
> Since CET is only enabled for x86-64, move dl-cet.[ch] to x86_64
> directories.
LGTM, thanks.
Reviewed-by: Adhemerval Zanella <adhemerval.zanella@linaro.org>
> ---
> sysdeps/unix/sysv/linux/x86/dl-cet.h | 63 -------------------------
> sysdeps/unix/sysv/linux/x86_64/dl-cet.h | 47 +++++++++++++++++-
> sysdeps/{x86 => x86_64}/dl-cet.c | 2 +-
> 3 files changed, 47 insertions(+), 65 deletions(-)
> delete mode 100644 sysdeps/unix/sysv/linux/x86/dl-cet.h
> rename sysdeps/{x86 => x86_64}/dl-cet.c (99%)
>
> diff --git a/sysdeps/unix/sysv/linux/x86/dl-cet.h b/sysdeps/unix/sysv/linux/x86/dl-cet.h
> deleted file mode 100644
> index c10773ab0e..0000000000
> --- a/sysdeps/unix/sysv/linux/x86/dl-cet.h
> +++ /dev/null
> @@ -1,63 +0,0 @@
> -/* Linux/x86 CET initializers function.
> - Copyright (C) 2018-2024 Free Software Foundation, Inc.
> -
> - The GNU C Library is free software; you can redistribute it and/or
> - modify it under the terms of the GNU Lesser General Public
> - License as published by the Free Software Foundation; either
> - version 2.1 of the License, or (at your option) any later version.
> -
> - The GNU C Library is distributed in the hope that it will be useful,
> - but WITHOUT ANY WARRANTY; without even the implied warranty of
> - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> - Lesser General Public License for more details.
> -
> - You should have received a copy of the GNU Lesser General Public
> - License along with the GNU C Library; if not, see
> - <https://www.gnu.org/licenses/>. */
> -
> -#include <sys/prctl.h>
> -#include <asm/prctl.h>
> -
> -static __always_inline int
> -dl_cet_disable_cet (unsigned int cet_feature)
> -{
> - if (cet_feature != GNU_PROPERTY_X86_FEATURE_1_SHSTK)
> - return -1;
> - long long int kernel_feature = ARCH_SHSTK_SHSTK;
> - return (int) INTERNAL_SYSCALL_CALL (arch_prctl, ARCH_SHSTK_DISABLE,
> - kernel_feature);
> -}
> -
> -static __always_inline int
> -dl_cet_lock_cet (unsigned int cet_feature)
> -{
> - if (cet_feature != GNU_PROPERTY_X86_FEATURE_1_SHSTK)
> - return -1;
> - /* Lock all SHSTK features. */
> - long long int kernel_feature = -1;
> - return (int) INTERNAL_SYSCALL_CALL (arch_prctl, ARCH_SHSTK_LOCK,
> - kernel_feature);
> -}
> -
> -static __always_inline unsigned int
> -dl_cet_get_cet_status (void)
> -{
> - unsigned long long kernel_feature;
> - unsigned int status = 0;
> - if (INTERNAL_SYSCALL_CALL (arch_prctl, ARCH_SHSTK_STATUS,
> - &kernel_feature) == 0)
> - {
> - if ((kernel_feature & ARCH_SHSTK_SHSTK) != 0)
> - status = GNU_PROPERTY_X86_FEATURE_1_SHSTK;
> - }
> - return status;
> -}
> -
> -/* Enable shadow stack with a macro to avoid shadow stack underflow. */
> -#define ENABLE_X86_CET(cet_feature) \
> - if ((cet_feature & GNU_PROPERTY_X86_FEATURE_1_SHSTK)) \
> - { \
> - long long int kernel_feature = ARCH_SHSTK_SHSTK; \
> - INTERNAL_SYSCALL_CALL (arch_prctl, ARCH_SHSTK_ENABLE, \
> - kernel_feature); \
> - }
> diff --git a/sysdeps/unix/sysv/linux/x86_64/dl-cet.h b/sysdeps/unix/sysv/linux/x86_64/dl-cet.h
> index c89dd6bd42..94e9b9aa86 100644
> --- a/sysdeps/unix/sysv/linux/x86_64/dl-cet.h
> +++ b/sysdeps/unix/sysv/linux/x86_64/dl-cet.h
> @@ -15,8 +15,53 @@
> License along with the GNU C Library; if not, see
> <https://www.gnu.org/licenses/>. */
>
> +#include <sys/prctl.h>
> +#include <asm/prctl.h>
> #include <cpu-features-offsets.h>
> -#include_next <dl-cet.h>
> +
> +static __always_inline int
> +dl_cet_disable_cet (unsigned int cet_feature)
> +{
> + if (cet_feature != GNU_PROPERTY_X86_FEATURE_1_SHSTK)
> + return -1;
> + long long int kernel_feature = ARCH_SHSTK_SHSTK;
> + return (int) INTERNAL_SYSCALL_CALL (arch_prctl, ARCH_SHSTK_DISABLE,
> + kernel_feature);
> +}
> +
> +static __always_inline int
> +dl_cet_lock_cet (unsigned int cet_feature)
> +{
> + if (cet_feature != GNU_PROPERTY_X86_FEATURE_1_SHSTK)
> + return -1;
> + /* Lock all SHSTK features. */
> + long long int kernel_feature = -1;
> + return (int) INTERNAL_SYSCALL_CALL (arch_prctl, ARCH_SHSTK_LOCK,
> + kernel_feature);
> +}
> +
> +static __always_inline unsigned int
> +dl_cet_get_cet_status (void)
> +{
> + unsigned long long kernel_feature;
> + unsigned int status = 0;
> + if (INTERNAL_SYSCALL_CALL (arch_prctl, ARCH_SHSTK_STATUS,
> + &kernel_feature) == 0)
> + {
> + if ((kernel_feature & ARCH_SHSTK_SHSTK) != 0)
> + status = GNU_PROPERTY_X86_FEATURE_1_SHSTK;
> + }
> + return status;
> +}
> +
> +/* Enable shadow stack with a macro to avoid shadow stack underflow. */
> +#define ENABLE_X86_CET(cet_feature) \
> + if ((cet_feature & GNU_PROPERTY_X86_FEATURE_1_SHSTK)) \
> + { \
> + long long int kernel_feature = ARCH_SHSTK_SHSTK; \
> + INTERNAL_SYSCALL_CALL (arch_prctl, ARCH_SHSTK_ENABLE, \
> + kernel_feature); \
> + }
>
> #define X86_STRINGIFY_1(x) #x
> #define X86_STRINGIFY(x) X86_STRINGIFY_1 (x)
> diff --git a/sysdeps/x86/dl-cet.c b/sysdeps/x86_64/dl-cet.c
> similarity index 99%
> rename from sysdeps/x86/dl-cet.c
> rename to sysdeps/x86_64/dl-cet.c
> index d1d42ab002..1297c09f84 100644
> --- a/sysdeps/x86/dl-cet.c
> +++ b/sysdeps/x86_64/dl-cet.c
> @@ -1,4 +1,4 @@
> -/* x86 CET initializers function.
> +/* x86-64 CET initializers function.
> Copyright (C) 2018-2024 Free Software Foundation, Inc.
>
> The GNU C Library is free software; you can redistribute it and/or
next prev parent reply other threads:[~2024-01-10 12:51 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-01-09 20:23 [PATCH v3 0/4] i386: Remove remaining CET bits H.J. Lu
2024-01-09 20:23 ` [PATCH v3 1/4] x86: Move x86-64 shadow stack startup codes H.J. Lu
2024-01-10 12:51 ` Adhemerval Zanella Netto
2024-01-09 20:23 ` [PATCH v3 2/4] x86-64/cet: Move dl-cet.[ch] to x86_64 directories H.J. Lu
2024-01-10 12:51 ` Adhemerval Zanella Netto [this message]
2024-01-09 20:23 ` [PATCH v3 3/4] x86-64/cet: Move check-cet.awk to x86_64 H.J. Lu
2024-01-10 12:51 ` Adhemerval Zanella Netto
2024-01-09 20:23 ` [PATCH v3 4/4] i386: Remove CET support bits H.J. Lu
2024-01-10 12:51 ` Adhemerval Zanella Netto
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=c546af78-1679-4a0d-896b-d9c146dc63a0@linaro.org \
--to=adhemerval.zanella@linaro.org \
--cc=goldstein.w.n@gmail.com \
--cc=hjl.tools@gmail.com \
--cc=libc-alpha@sourceware.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).