diff options
author | Szabolcs Nagy <szabolcs.nagy@arm.com> | 2022-10-19 16:08:54 +0100 |
---|---|---|
committer | Szabolcs Nagy <szabolcs.nagy@arm.com> | 2022-11-22 14:35:46 +0000 |
commit | ae90dd111bc393178a39cc6166170aa7c3656296 (patch) | |
tree | 0821babfaa896d74ea7aeb203b5ceedf2b112f5f | |
parent | c38427f52d5386a25650ed982fa9a4af596a3f34 (diff) | |
download | glibc-ae90dd111bc393178a39cc6166170aa7c3656296.zip glibc-ae90dd111bc393178a39cc6166170aa7c3656296.tar.gz glibc-ae90dd111bc393178a39cc6166170aa7c3656296.tar.bz2 |
morello: Provide documentation about the morello port.
-rw-r--r-- | manual/README.morello | 37 |
1 files changed, 37 insertions, 0 deletions
diff --git a/manual/README.morello b/manual/README.morello new file mode 100644 index 0000000..cf30eea --- /dev/null +++ b/manual/README.morello @@ -0,0 +1,37 @@ +Morello glibc port +================== + +Morello is a prototype security architecture, led by Arm, based on CHERI. +https://www.morello-project.org/ +https://www.cl.cam.ac.uk/research/security/ctsrd/cheri/ + +Toolchain components of the morello port are maintained in upstream branches. +The morello port is implemented as an ABI variant of the aarch64 port that is +also called the purecap ABI. Morello specific ABI documents are at: +https://github.com/ARM-software/abi-aa +https://git.morello-project.org/morello/kernel/linux/-/wikis/home + +Areas with significant morello or CHERI specific changes outside the usual +target specific changes: + +- Early start code including ELF entry and auxv, +- Dynamic linker and relocation processing, +- malloc with narrow capability support, +- printf %#p to pretty print capabilities. + +Limitations of the morello port: + +- Building requires --disable-werror. +- Profiling and --enable-profile are not supported (gprof, sprof, LD_PROFILE). +- LD_AUDIT is not supported (la_symbind, PLT hooks, require new API redesign). +- VDSO is not supported (depends on Linux work). +- static-pie is not supported (requires start code redesign). +- POSIX message queue async notify does not work (pointers passed via an fd). +- Process shared robust mutex does not work (pointers in shared memory). +- Purecap pldd only supports purecap ABI processes (not lp64). +- malloc bounds narrowing has large overhead (locks and hash table lookup). +- malloc bounds narrowing can break code expecting page granularity protection. + Use GLIBC_TUNABLES=glibc.mem.cap_narrowing=0 env var as a workaround. +- string functions are not optimized. +- Executable stack is not supported. +- Internal pointer protection and pointer mangling are disabled. |