Re: prctl call wrongly succeeds on HPPA?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 11/10/23 21:25, Helge Deller wrote:
* Sam James <sam@xxxxxxxxxx>:

Helge Deller <deller@xxxxxx> writes:

On 11/3/23 13:53, Sam James wrote:
Sam James <sam@xxxxxxxxxx> writes:
I recently hit an issue with systemd-254 which tries to use the new
prctl(PR_SET_MDWE) for systemd's MemoryDenyWriteExecute functionality.

Is this still a problem?

Yes. When I get time, I will play with Dave's changes to allow using
non-exeuctable stacks, but for now, it is broken until I can test these
(thanks dave for working on that, and helge for the kernel side).


On HPPA, we still need executable stacks, so this option doesn't work
and leads to a segfault on boot.

For kernel we don't need it any longer.
But there might be dependencies on glibc version and/or combination.
So, I've currently lost overview if we still need executable stacks...


I don't remember which kernel version either.. I think it was last year
that you finished off all the DSO bits.

Kernel 5.18+ should be OK:
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=df24e1783e6e0eb3dc0e3ba5a8df3bb0cc537408

I had to configure binutils with --enable-default-execstack=no for it to
work in addition to Dave's GCC patches. But I did not test systemd yet...

(sorry, I know this is equally vague.)

Should this call be succeeeding on HPPA, or should we reject it for
now until we have things wired up?

Reported to systemd at https://github.com/systemd/systemd/issues/29775.

Lennart has made clear (and I don't think I disagree) that he considers
this squarely a kernel bug.

I've read the various bug reports and looked at the kernel commits regarding, e.g.

commit b507808ebce23561d4ff8c2aa1fb949fe402bc61
Author: Joey Gouly <joey.gouly@xxxxxxx>
Date:   Thu Jan 19 16:03:43 2023 +0000

     mm: implement memory-deny-write-execute as a prctl

but what is prctl(PR_SET_MDWE, PR_MDWE*, 0, 0)... expected to return on parisc?
EINVAL? ENOTSUP?

Maybe we can ask Joey or the ARM people what they expect the semantics
to be.

Looking at https://fossies.org/linux/systemd/src/core/execute.c
  1636
  1637         /* use prctl() if kernel supports it (6.3) */
  1638         r = prctl(PR_SET_MDWE, PR_MDWE_REFUSE_EXEC_GAIN, 0, 0, 0);
  1639         if (r == 0) {
  1640                 log_unit_debug(u, "Enabled MemoryDenyWriteExecute= with PR_SET_MDWE");
  1641                 return 0;
  1642         }
  1643         if (r < 0 && errno != EINVAL)
  1644                 return log_unit_debug_errno(u, errno, "Failed to enable MemoryDenyWriteExecute= with PR_SET_MDWE: %m");
  1645         /* else use seccomp */
  1646         log_unit_debug(u, "Kernel doesn't support PR_SET_MDWE: falling back to seccomp");
  1647
  1648         if (skip_seccomp_unavailable(u, "MemoryDenyWriteExecute="))
  1649                 return 0;
  1650
  1651         return seccomp_memory_deny_write_execute();
  1652 }

it seems this patch/hack might at least not report success:

diff --git a/kernel/sys.c b/kernel/sys.c
index 420d9cb9cc8e..fe4f2162457c 100644
--- a/kernel/sys.c
+++ b/kernel/sys.c
@@ -2384,6 +2384,10 @@ static inline int prctl_set_mdwe(unsigned long bits, unsigned long arg3,
  {
  	unsigned long current_bits;

+	/* parisc still needs a writeable stack for older glibc versions */
+	if (IS_ENABLED(CONFIG_PARISC))
+		return -EINVAL;
+
  	if (arg3 || arg4 || arg5)
  		return -EINVAL;


A test would be good though, esp. since I don't know what the seccomp()
functions are doing then.

actually, I think we should return any error code other than EINVAL.
See line 1643 above, if we return e.g. -EACCES, systemd should give up.

Helge




[Index of Archives]     [Linux SoC]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux