[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: prctl call wrongly succeeds on HPPA?
|
From: |
Helge Deller |
|
Subject: |
Re: prctl call wrongly succeeds on HPPA? |
|
Date: |
Fri, 10 Nov 2023 21:25:48 +0100 |
* Sam James <sam@gentoo.org>:
>
> Helge Deller <deller@gmx.de> writes:
>
> > On 11/3/23 13:53, Sam James wrote:
> >> Sam James <sam@gentoo.org> writes:
> >>> I recently hit an issue with systemd-254 which tries to use the new
> >>> prctl(PR_SET_MDWE) for systemd's MemoryDenyWriteExecute functionality.
> >
> > Is this still a problem?
>
> Yes. When I get time, I will play with Dave's changes to allow using
> non-exeuctable stacks, but for now, it is broken until I can test these
> (thanks dave for working on that, and helge for the kernel side).
>
> >
> >>> On HPPA, we still need executable stacks, so this option doesn't work
> >>> and leads to a segfault on boot.
> >
> > For kernel we don't need it any longer.
> > But there might be dependencies on glibc version and/or combination.
> > So, I've currently lost overview if we still need executable stacks...
> >
>
> I don't remember which kernel version either.. I think it was last year
> that you finished off all the DSO bits.
Kernel 5.18+ should be OK:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=df24e1783e6e0eb3dc0e3ba5a8df3bb0cc537408
> I had to configure binutils with --enable-default-execstack=no for it to
> work in addition to Dave's GCC patches. But I did not test systemd yet...
>
> (sorry, I know this is equally vague.)
>
> >>> Should this call be succeeeding on HPPA, or should we reject it for
> >>> now until we have things wired up?
> >>>
> >>> Reported to systemd at https://github.com/systemd/systemd/issues/29775.
> >>
> >> Lennart has made clear (and I don't think I disagree) that he considers
> >> this squarely a kernel bug.
> >
> > I've read the various bug reports and looked at the kernel commits
> > regarding, e.g.
> >
> > commit b507808ebce23561d4ff8c2aa1fb949fe402bc61
> > Author: Joey Gouly <joey.gouly@arm.com>
> > Date: Thu Jan 19 16:03:43 2023 +0000
> >
> > mm: implement memory-deny-write-execute as a prctl
> >
> > but what is prctl(PR_SET_MDWE, PR_MDWE*, 0, 0)... expected to return on
> > parisc?
> > EINVAL? ENOTSUP?
>
> Maybe we can ask Joey or the ARM people what they expect the semantics
> to be.
Looking at https://fossies.org/linux/systemd/src/core/execute.c
1636
1637 /* use prctl() if kernel supports it (6.3) */
1638 r = prctl(PR_SET_MDWE, PR_MDWE_REFUSE_EXEC_GAIN, 0, 0, 0);
1639 if (r == 0) {
1640 log_unit_debug(u, "Enabled MemoryDenyWriteExecute= with
PR_SET_MDWE");
1641 return 0;
1642 }
1643 if (r < 0 && errno != EINVAL)
1644 return log_unit_debug_errno(u, errno, "Failed to enable
MemoryDenyWriteExecute= with PR_SET_MDWE: %m");
1645 /* else use seccomp */
1646 log_unit_debug(u, "Kernel doesn't support PR_SET_MDWE: falling
back to seccomp");
1647
1648 if (skip_seccomp_unavailable(u, "MemoryDenyWriteExecute="))
1649 return 0;
1650
1651 return seccomp_memory_deny_write_execute();
1652 }
it seems this patch/hack might at least not report success:
diff --git a/kernel/sys.c b/kernel/sys.c
index 420d9cb9cc8e..fe4f2162457c 100644
--- a/kernel/sys.c
+++ b/kernel/sys.c
@@ -2384,6 +2384,10 @@ static inline int prctl_set_mdwe(unsigned long bits,
unsigned long arg3,
{
unsigned long current_bits;
+ /* parisc still needs a writeable stack for older glibc versions */
+ if (IS_ENABLED(CONFIG_PARISC))
+ return -EINVAL;
+
if (arg3 || arg4 || arg5)
return -EINVAL;
A test would be good though, esp. since I don't know what the seccomp()
functions are doing then.
Helge
- Re: prctl call wrongly succeeds on HPPA?,
Helge Deller <=