1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
|
This is PIEworld
================
Toolchain modified to build everything that isn't -fPIC, as -fPIE.
gcc:
----
1) Built with PIE-default, SSP-default, RELRO and BIND_NOW
2) Non-PIC crtstuff built -fno-PIE (crtbegin.o, crtend.o)
3) Specs permit -static && -fPIE (but not -pie)
4) New startfile crtbeginTS.o combining crtbeginS.o and crtbeginT.o, for "static PIE"s
glibc:
------
1) Built with PIE-default, SSP off, RELRO and BIND_NOW
SSP-default messes up the dependencies, in different ways on different arches; changes
to glibc would be too invasive for easy maintenance.
2) Non-PIC crtstuff built -fno-PIE (crt1.o - note; crtn.o, crti.o, Scrt1.o all built -fPIC)
3) Make pic-default configure check ignore -fPIE.
4) Link all apps PIE, adjust TLS initialisation to avoid using the TLS before it's ready.
The results are:
crt*S*.o, crtn.o, crti.o & Scrt1.o are -fPIC, all other crtfiles are -fno-PIE.
Code archives lib*.a are -fPIE
Note that since lib*.a are not available -fno-PIE, building static binaries actually creates
binaries containing PIE code, although the executable has a fixed location.
Upgrade path
------------
From hardened gcc-3/glibc-2.3:
1) Switch to vanilla compiler (gcc-config)
2) emerge --oneshot =sys-devel/binutils-2.17
3) USE="-hardened" emerge --oneshot =sys-libs/glibc-2.5
4) USE="-hardened" emerge --oneshot =sys-devel/gcc-4.1.1-r3
5) switch to hardened compiler
6) emerge --oneshot =sys-libs/glibc-2.5
7) emerge --oneshot =sys-devel/gcc-4.1.1-r3
8) emerge -e world :)
Things that can trip up in pieworld
-----------------------------------
* non-PIC assembler. Common in x86 media applications; occurs also in x86 media libraries
although the latter should really be PIC.
* local-exec thread-local storage (TLS). On x86, causes textrels - most arches don't allow
textrels so don't permit local-exec at all in PIC (including PIE).
Investigations
--------------
1) Check all archive lib*.a that don't have a .so - should they be -fPIC rather than -fPIE?
Done:
All those that don't have a .so are best off -fPIC, which is ok for being linked into
shared libraries, and is also ok-enough for use in executables (whereas -fPIE isn't
good for shared libraries).
lib*.a from gcc-4.1.1 are:
libgcc.a built -fPIC
libgcc_eh.a built -fPIC
libffi.a .so equivalent exists
libgcj.a .so equivalent exists
libgcjwt.a .so equivalent exists
libgcov.a built -fPIC
libgfortran.a .so equivalent exists
libgfortranbegin.a Contains fmain.o - looks like only used for executables, so should be ok -fPIE
libgij.a .so equivalent exists
libstdc++.a .so equivalent exists
lib*.a from glibc-2.5 are:
libieee.a shared library (just named '.a')
libmcheck.a shared library (just named '.a')
libc_stubs.a shared library (just named '.a')
libBrokenLocale.a .so equivalent exists
libutil.a .so equivalent exists
librpcsvc.a Built -fPIC (http://sourceware.org/ml/glibc-bugs/2005-07/msg00157.html)
libdl.a .so equivalent exists
librt.a .so equivalent exists
libbsd-compat.a contains only an empty object 'dummy.o' - doesn't matter how it's built
libpthread.a .so equivalent exists
libc.a .so equivalent exists
libg.a contains only an empty object 'dummy.o' - doesn't matter how it's built
libm.a .so equivalent exists
libcrypt.a .so equivalent exists
libanl.a .so equivalent exists
libresolv.a .so equivalent exists
libnsl.a .so equivalent exists
So looks like it's all ok, both in gcc and glibc.
2) glibc-2.5 failures:
For reference, on vanilla x86 the following fail (both in and out of a chroot):
linuxthreads/posix/annexc
Expected (ignored) http://sourceware.org/ml/libc-hacker/1998-11/msg00207.html
linuxthreads/linuxthreads/tst-clock1
Time between threads is too short - expected 1 sec, got a fraction.
linuxthreads/rt/tst-aio9
Limitation of linuxthreads? (ok on nptl) Hints to that effect http://sourceware.org/ml/libc-ports/2006-08/msg00016.html
linuxthreads/rt/tst-aio10
Limitation of linuxthreads? (ok on nptl) http://sourceware.org/ml/libc-ports/2006-08/msg00016.html
linuxthreads/elf/check-localplt
bunch of stuff appears, mostly from libpthread.so, that isn't expected
linuxthreads/c++-types-check
pthread_attr_t and pthread_rwlock_t are different from expected.
ok nptl/posix/annexc
Expected (ignored) http://sourceware.org/ml/libc-hacker/1998-11/msg00207.html
ok nptl/nptl/tst-cancel1
Requires >=gcc-4.2 http://sourceware.org/ml/libc-alpha/2006-09/msg00039.html
and on vanilla amd64 (nptlonly) the following fail:
nptl/iconvdata/iconv-test
nptl/malloc/tst-mtrace
nptl/grp/tst_fgetgrent
nptl/posix/tst-nice
nptl/posix/globtest
ok nptl/posix/annexc
nptl/io/ftwtest
ok nptl/nptl/tst-cancel1
nptl/rt/tst-cpuclock2
so are ignored for the purposes of analysing failures on hardened.
Note also - ppc64 and sparc64 can't have linuxthreads as it doesn't
compile (some changes that are in for nptl have not been back-ported).
H: hardened on hardened kernel, h: hardened on vanilla kernel, V: vanilla,
Arch (HhV)-> x86 ppc amd64 sparc ppc64
NPTL Test v
iconvdata/iconv-test ... -.. ..X .-. ... (? segfault)
libio/tst-wmemstream1 ... -.. .X- .-. ... (? segfault)
libio/tst-wmemstream2 ... -.. .X- .-. ... (? segfault)
libio/bug-wmemstream1 ... -.. .X- .-. ... (? segfault)
malloc/tst-mtrace ... -.. .-X .-. ...
grp/tst_fgetgrent ... -.. .-X .-. ...
math/test-fenv ... -.. .-- .X. ... (?)
dlfcn/default ... X.. .X- .X. .X. (?)
posix/globtest ... -.. .-X .-. ...
posix/annexc ... X.. .XX .X. .X. (expected)
io/ftwtest ... -.. .-X .-. ...
misc/tst-pselect ... -.. .-- .-. ... (?)
nptl/tst-execstack ... X.. .-- .-. ... (PaX)
nptl/tst-cancel1 ... -.. .XX .-. ... (expected)
nptl/rt/tst-cpuclock2 ... -.. .X- .-. ... (?)
nptl/tst-eintr1 ... -.. .-- .X. ... (?)
nptl/tst-cancel20 ... -.. .-- .X. ... (?)
nptl/tst-cancelx20 ... -.. .-- .X. ... (?)
elf/tst-tls1 ... X.. .X- .X. .X. (local-exec TLS)
elf/tst-tls2 ... X.. .X- .X. .X. (local-exec TLS)
elf/tst-tls1-static ... X.. .X- .X. .X. (local-exec TLS)
elf/tst-tls2-static ... X.. .X- .X. .X. (local-exec TLS)
elf/resolvfail ... X.. .X- .X. .X. (BIND_NOW)
elf/constload1 ... X.. .X- .X. .X. (BIND_NOW)
elf/order ... X.. .X- .X. .X. (BIND_NOW)
elf/lateglobal ... X.. .X- .X. .X. (BIND_NOW)
elf/dblload ... X.. .X- .X. .X. (BIND_NOW)
elf/dblunload ... X.. .X- .X. .X. (BIND_NOW)
elf/reldep6 ... X.. .X- .X. .X. (BIND_NOW)
elf/circleload1 ... X.. .X- .X. .X. (BIND_NOW)
elf/tst-tls3 ... X.. .-- .X. ... (?)
elf/tst-tls10 ... X.. .X- .-. .X. (local-exec TLS)
elf/tst-tls14 ... -.. .X- .-. ... (local-exec TLS)
elf/tst-execstack ... X.. .-- .-. ... (PaX)
elf/tst-execstack-needed ... X.. .-- .-. ... (PaX)
elf/tst-execstack-prog ... X.. .-- .-. ... (PaX)
elf/tst-global1 ... X.. .X- .X. .X. (BIND_NOW)
elf/tst-audit2 ... X.. .X- .-. .X. (local-exec TLS)
X => test failure
PaX: PaX kernel causes execstack behaviour to fail (a good thing, where PaX is concerned).
BIND_NOW: These tests require that some of their links be -Wl,-z,lazy (perhaps we could add this explicitly)
local-exec TLS: The local-exec TLS model is not compatible with PIC (and therefore PIE)
posix/annexc is ignored upstream (http://sourceware.org/ml/libc-hacker/1998-11/msg00207.html)
tst-cancel1 fails on x86/amd64 because support is not in gcc-4.1.1 - gcc-4.2 will fix this (http://sourceware.org/ml/libc-alpha/2006-09/msg00039.html)
|