lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <4C152166.4070106@msgid.tls.msk.ru>
Date:	Sun, 13 Jun 2010 22:20:22 +0400
From:	Michael Tokarev <mjt@....msk.ru>
To:	Andi Kleen <andi@...stfloor.org>
CC:	Kernel Mailing List <linux-kernel@...r.kernel.org>,
	Ollie Wild <aaw@...gle.com>
Subject: Re: personality(ADDR_LIMIT_3GB) results in EFAULT

[replying to somewhat old email...]

27.05.2010 22:38, Andi Kleen wrote:
> Michael Tokarev<mjt@....msk.ru>  writes:
>
>> I noticed an.. interesting issue here.
>>
>> Running a 32bit executable on a 64bit kernel,
>> and doing
>>
>>    personality(ADDR_LIMIT_3GB);
>>
>> That call succedes, but any further execve()
>> and friends results in EFAULT, unless whole
>> argv[] and envp[] are copied to a malloc'ed
>> space.  alloca sometimes helps and sometimes
>> not.
>
> It worked when I wrote it originally.
>
> Sounds like a regression, perhaps related to
> b6a2fea39318e43fee84fa7b0b90d68bed92d2ba

This is this commit:

commit b6a2fea39318e43fee84fa7b0b90d68bed92d2ba
Author: Ollie Wild <aaw@...gle.com>
Date:   Thu Jul 19 01:48:16 2007 -0700

     mm: variable length argument support

     Remove the arg+env limit of MAX_ARG_PAGES by copying the strings directly from
     the old mm into the new mm.

     We create the new mm before the binfmt code runs, and place the new stack at
     the very top of the address space.  Once the binfmt code runs and figures out
     where the stack should be, we move it downwards.

     It is a bit peculiar in that we have one task with two mm's, one of which is
     inactive.

     [a.p.zijlstra@...llo.nl: limit stack size]
     Signed-off-by: Ollie Wild <aaw@...gle.com>
     Signed-off-by: Peter Zijlstra <a.p.zijlstra@...llo.nl>
     Cc: <linux-arch@...r.kernel.org>
     Cc: Hugh Dickins <hugh@...itas.com>
     [bunk@...sta.de: unexport bprm_mm_init]
     Signed-off-by: Adrian Bunk <bunk@...sta.de>
     Signed-off-by: Andrew Morton <akpm@...ux-foundation.org>
     Signed-off-by: Linus Torvalds <torvalds@...ux-foundation.org>

(Author of this commit CC'ed).


Folks, I really need some advise here.

Right now I've a 64 wrapper executable to run the legacy
database (which we didn't finish migrating from yet, it's
always long process).  It sets the necessary personality
and executes the real binary.  But the problem is that after
a recompile (I added something else to it), the whole thing
stopped working on a machine with 4Gb memory: the execve()
call, now when made from 64bit binary, immediately fails
with EFAULT.  Before, this were happening only when the
wrapper is 32bit code (try `setarch i686 -3 any_32bit_exe' --
it will fail if setarch itself is 32bit executable).  Now
it fails from 64bits too, even just recompiling the old
.c code (with single personality() call in it) now results
in non-working thing - apparently due to some gcc diff.

Can we restore this personality thing, please?.. :)
I'm not good at all this code, so I need someone who is
able to understand what's going on.... ;)

Thanks!

/mjt
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ