* Sam James <sam@xxxxxxxxxx>: > > Helge Deller <deller@xxxxxx> writes: > > > On 11/3/23 13:53, Sam James wrote: > >> Sam James <sam@xxxxxxxxxx> writes: > >>> I recently hit an issue with systemd-254 which tries to use the new > >>> prctl(PR_SET_MDWE) for systemd's MemoryDenyWriteExecute functionality. > > > > Is this still a problem? > > Yes. When I get time, I will play with Dave's changes to allow using > non-exeuctable stacks, but for now, it is broken until I can test these > (thanks dave for working on that, and helge for the kernel side). > > > > >>> On HPPA, we still need executable stacks, so this option doesn't work > >>> and leads to a segfault on boot. > > > > For kernel we don't need it any longer. > > But there might be dependencies on glibc version and/or combination. > > So, I've currently lost overview if we still need executable stacks... > > > > I don't remember which kernel version either.. I think it was last year > that you finished off all the DSO bits. Kernel 5.18+ should be OK: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=df24e1783e6e0eb3dc0e3ba5a8df3bb0cc537408 > I had to configure binutils with --enable-default-execstack=no for it to > work in addition to Dave's GCC patches. But I did not test systemd yet... > > (sorry, I know this is equally vague.) > > >>> Should this call be succeeeding on HPPA, or should we reject it for > >>> now until we have things wired up? > >>> > >>> Reported to systemd at https://github.com/systemd/systemd/issues/29775. > >> > >> Lennart has made clear (and I don't think I disagree) that he considers > >> this squarely a kernel bug. > > > > I've read the various bug reports and looked at the kernel commits regarding, e.g. > > > > commit b507808ebce23561d4ff8c2aa1fb949fe402bc61 > > Author: Joey Gouly <joey.gouly@xxxxxxx> > > Date: Thu Jan 19 16:03:43 2023 +0000 > > > > mm: implement memory-deny-write-execute as a prctl > > > > but what is prctl(PR_SET_MDWE, PR_MDWE*, 0, 0)... expected to return on parisc? > > EINVAL? ENOTSUP? > > Maybe we can ask Joey or the ARM people what they expect the semantics > to be. Looking at https://fossies.org/linux/systemd/src/core/execute.c 1636 1637 /* use prctl() if kernel supports it (6.3) */ 1638 r = prctl(PR_SET_MDWE, PR_MDWE_REFUSE_EXEC_GAIN, 0, 0, 0); 1639 if (r == 0) { 1640 log_unit_debug(u, "Enabled MemoryDenyWriteExecute= with PR_SET_MDWE"); 1641 return 0; 1642 } 1643 if (r < 0 && errno != EINVAL) 1644 return log_unit_debug_errno(u, errno, "Failed to enable MemoryDenyWriteExecute= with PR_SET_MDWE: %m"); 1645 /* else use seccomp */ 1646 log_unit_debug(u, "Kernel doesn't support PR_SET_MDWE: falling back to seccomp"); 1647 1648 if (skip_seccomp_unavailable(u, "MemoryDenyWriteExecute=")) 1649 return 0; 1650 1651 return seccomp_memory_deny_write_execute(); 1652 } it seems this patch/hack might at least not report success: diff --git a/kernel/sys.c b/kernel/sys.c index 420d9cb9cc8e..fe4f2162457c 100644 --- a/kernel/sys.c +++ b/kernel/sys.c @@ -2384,6 +2384,10 @@ static inline int prctl_set_mdwe(unsigned long bits, unsigned long arg3, { unsigned long current_bits; + /* parisc still needs a writeable stack for older glibc versions */ + if (IS_ENABLED(CONFIG_PARISC)) + return -EINVAL; + if (arg3 || arg4 || arg5) return -EINVAL; A test would be good though, esp. since I don't know what the seccomp() functions are doing then. Helge