lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <87ed1cufj1.fsf@email.froward.int.ebiederm.org>
Date: Thu, 09 Jan 2025 10:18:42 -0600
From: "Eric W. Biederman" <ebiederm@...ssion.com>
To: John Paul Adrian Glaubitz <glaubitz@...sik.fu-berlin.de>
Cc: Arnd Bergmann <arnd@...db.de>,  Richard Henderson
 <richard.henderson@...aro.org>,  Matt Turner <mattst88@...il.com>,  Kees
 Cook <kees@...nel.org>,  "Paul E. McKenney" <paulmck@...nel.org>,
  linux-alpha@...r.kernel.org,  linux-mm@...ck.org,
  linux-kernel@...r.kernel.org,  Michael Cree <mcree@...on.net.nz>,  Sam
 James <sam@...too.org>,  "Maciej W. Rozycki" <macro@...am.me.uk>,  Geert
 Uytterhoeven <geert@...ux-m68k.org>,  Michael Karcher
 <kernel@...rcher.dialup.fu-berlin.de>,  Chris Hofstaedtler
 <zeha@...ian.org>,  util-linux@...r.kernel.org,
  linux-mips@...r.kernel.org,  loongarch@...ts.linux.dev
Subject: Re: [PATCH] alpha: Fix personality flag propagation across an exec

John Paul Adrian Glaubitz <glaubitz@...sik.fu-berlin.de> writes:

> Hi Arnd,
>
> On Thu, 2025-01-09 at 09:56 +0100, Arnd Bergmann wrote:
>> On Thu, Jan 9, 2025, at 09:46, John Paul Adrian Glaubitz wrote:
>> > On Thu, 2025-01-09 at 09:43 +0100, Arnd Bergmann wrote:
>> > > On Thu, Jan 9, 2025, at 09:01, Arnd Bergmann wrote:
>> > > > On Fri, Jan 3, 2025, at 15:01, John Paul Adrian Glaubitz wrote:
>> > > > 
>> > > > > 
>> > > > >  #define SET_PERSONALITY(EX)					\
>> > > > > -	set_personality(((EX).e_flags & EF_ALPHA_32BIT)		\
>> > > > > -	   ? PER_LINUX_32BIT : PER_LINUX)
>> > > > > +	set_personality((((EX).e_flags & EF_ALPHA_32BIT)	\
>> > > > > +	   ? PER_LINUX_32BIT : PER_LINUX) | (current->personality & (~PER_MASK)))

*Grumble*

It would be good to move those EF_${ARCH} flags from
arch/${ARCH}/include/asm/elf.h to arch/${ARCH}/include/uapi/asm/elf.h

Simply because those flags are architecture specific ABI.

>> > > > This looks wrong to me: since ADDR_LIMIT_32BIT is not part of
>> > > > PER_MASK, executing a regular binary from a taso binary no longer
>> > > > reverts back to the entire 64-bit address space.
>> > > > 
>> > > > It seems that the behavior on most other architectures changed in 2012
>> > > > commit 16f3e95b3209 ("cross-arch: don't corrupt personality flags upon
>> > > > exec()").
>> > > > 
>> > 
>> > So, if I understand this correctly, we should just use PER_MASK on alpha
>> > for 64-bit executables and allow the bits to be cleared for 32-bit binaries?
>> 
>> I think ideally the EF_ALPHA_32BIT handling should use TIF_32BIT
>> as we do on other architectures, at that point the custom SET_PERSONALITY()
>> can be removed in favor of the asm-generic version.
>
> I have thought about that as well but I wasn't sure whether the extra
> mangling on alpha was necessary.
>
>> Alternatively this could do something like the arm32 version (note
>> that on arm, PER_LINUX_32BIT/ADDR_LIMIT_32BIT means "allow using
>> the entire 32-bit address space rather than limiting to 26 bits for
>> compatibility", while on alpha it means "use only 31 instead of
>> 42 bits for addressing", but the logic can be the same):
>> 
>>         unsigned int personality = current->personality & ~PER_MASK;
>>         /*
>>          * APCS-26 is only valid for OABI executables
>>          */
>>         if ((eflags & EF_ARM_EABI_MASK) == EF_ARM_EABI_UNKNOWN &&
>>             (eflags & EF_ARM_APCS_26))
>>                 personality &= ~ADDR_LIMIT_32BIT;
>>         else
>>                 personality |= ADDR_LIMIT_32BIT;
>>         set_personality(personality);
>
> So, this would be the 100% correct for alpha then which would not loose
> any functionality even for 32-bit binaries?

I don't think it is correct to think about 32-bit binaries on alpha.

Alpha never had a 32bit instruction set.  But at some point it looks
like binaries that could not handle more than 31 bits of address
space got ported and someone implemented a work-around.  I guess this
is the --taso option that Arnd mentioned.

I think the alpha version would look like:

#define SET_PERSONALITY(ex) 							\
	do {									\
		unsigned long personality = current->personality & ~PER_MASK;	\
                if ((EX).e_flags & EF_ALPHA_32BIT)				\
                	personality |= ADDR_LIMIT_32BIT;			\
		else								\
                	personality &= ~ADDR_LIMIT_32BIT			\
		set_personality(personality);					\
	while (0)

I do see code under arch/alpha/ testing ADDR_LIMIT_32BIT when
setting STACK_TOP, TASK_UNMAPPED_BASE, and arch_get_unmapped_area.
So I think the code still works.

>> In any case, I think we should fix alpha, mips and loongarch at
>> the same time, to make sure it doesn't take another decade to
>> fix the rest.
>
> If you're willing to fix all three at once, I would be happy to help
> with the testing on all three architectures as I have machines for all
> of these.

Yes getting those fixed would be nice.



I don't expect it is worth the hassle to remove support for
EF_ALPHA_32BIT, but I looked into it quickly.

I looked at the history to see if I could find any information about
what was using the EF_ALPHA_32BIT flag and unfortunately I could not
find anything.  Support for the flag first appeared the 2.1.86 release,
and the change description has been lost to time.

Does anyone know if there are any remaining alpha binaries that set
EF_ALPHA_32BIT?

If no interesting binaries have EF_ALPHA_32BIT set anymore
it might be worth using the generic SET_PERSONALITY and implementing
an arch_check_elf to just fail if one of those binaries show up.

Perhaps:
static inline int arch_check_elf(struct elfhdr *ehdr, bool has_interp,
				 struct elfhdr *interp_ehdr,
				 struct arch_elf_state *state)
{
        if (WARN_ON_ONCE(ehdr->e_flags & EF_ALPHA_32BIT)) {
        	return -ENOEXEC;
        }
	return 0;
}

Though frankly it might make more sense and go the other way.  I think
only mips has a non-trivial implementation of arch_check_elf.

Eric


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ