Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp37094862rwd; Tue, 11 Jul 2023 09:20:21 -0700 (PDT) X-Google-Smtp-Source: APBJJlHfiBVP044p3btQTBhRzXVKnCfOCdjsenmmx8ko0OzurIV2PE1Tn/rQag1pi0zexD8RRyXS X-Received: by 2002:a05:6358:2794:b0:133:7c4:e752 with SMTP id l20-20020a056358279400b0013307c4e752mr18916570rwb.26.1689092421400; Tue, 11 Jul 2023 09:20:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1689092421; cv=none; d=google.com; s=arc-20160816; b=IiwEp2GOGuL9sZMHqukwFBJreqjeVE+5ccvLHxSeSc4Jj8v5imBL2tbzn8m8jD5XuJ lJ/wTpBBcurwIyL+o0n4nXmhmDgmA106YD0pA52ekR47oArG0Gr8wjdrcNBkY7sJZgre ZFT4U10325TTlc7XCG1Gy1FUegp35y3nCZBSbnKXddfBnYi5AN5IDOaa/K8QfvWwDeRk HOqPTGsfU4ZgVvZpxJrXiy6OspAIlgbpnSc+JE5I25nVM3lOfUNaAXY1o0UeASPv69RV JLHQmi7wcCozYL8qGKs/gR2PrgsvaKMrz+NEo+ZFwl1kRZjhtWpU4MpJYv/+2Nw0T9pJ L5Sw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=14BF34CA+deUxHLUvuKK0NdUXrmzEpT2HQriQO+aNSc=; fh=6q3vl7dUCBDfvjMR3Kvmk2MXVy8bi4UYx8JmiM3j60M=; b=W8V+u8Ffbz9Dnwd3YAzZCMa5oU/ylGFvtASKwWgRYD6/ZOdbfLBntBVhYCzaiZuCHd vW+/trgyLU5uoLpChM107moUBm9kKKucKcFDy2PSnLLCL3pxqdjwqZ4JA5RmC+jx2cp4 wZ348FJOXKZn8fo79yUCm4iDakFRyOImfBzvXHSrgYwBGqnv+lA9urDZ1h69vJbhJi9B QiWzMxloEjtnh3AU93qvJaK2Ljuarx8HoS6NWOdtlMPwGsTa5kl0mJ2ikI+3pzcMcuzm 1aSsFFxstCSfFI2NW8/XXo+xN2VgY87DiIhnvjZTv36J3tlJ28fymEJaziERPb56pnly sEqg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=lAX+nmUn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 194-20020a6301cb000000b0055c4c9cc016si1579105pgb.598.2023.07.11.09.20.09; Tue, 11 Jul 2023 09:20:21 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=lAX+nmUn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232388AbjGKQLs (ORCPT + 99 others); Tue, 11 Jul 2023 12:11:48 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45900 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233184AbjGKQLe (ORCPT ); Tue, 11 Jul 2023 12:11:34 -0400 Received: from mail-pl1-x632.google.com (mail-pl1-x632.google.com [IPv6:2607:f8b0:4864:20::632]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 81525171E for ; Tue, 11 Jul 2023 09:11:10 -0700 (PDT) Received: by mail-pl1-x632.google.com with SMTP id d9443c01a7336-1b89d47ffb6so29828495ad.2 for ; Tue, 11 Jul 2023 09:11:10 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; t=1689091870; x=1691683870; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:from:to:cc:subject:date:message-id:reply-to; bh=14BF34CA+deUxHLUvuKK0NdUXrmzEpT2HQriQO+aNSc=; b=lAX+nmUnvQh8Wr4sSat33joYcFucraRvBlLjDezD4gl2CuEiTvYwK1rISc2zz7VGl3 4Z9xm4yMTWpiCWj83z0n3GITD7+A8laRk8aL0Ab2ADl3io+anea7vTXZTAG1PvdDyofW w0Vyjl/9h85bclpewVFAtdHzjAJ7OSyEq+mpc= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1689091870; x=1691683870; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=14BF34CA+deUxHLUvuKK0NdUXrmzEpT2HQriQO+aNSc=; b=JjyKatxB9z0+/Murwj7KstfiMym2s2ntaLUXLiSl4G7VHzr01UaLoggM5Ug5yNNIE1 0jw2mDPyBItvxy+ft5v7TCwTf8qA9xhNwYWOKJ1m2SbU+OFT/CRIMu59yk82XtmfzUon 4cUEVkXS2FwM7cmAWj5A8Pdktygs7XlhaH26zAkmhcfyg7dfz5UD7hXCgTxON16jOCdq /w6gR7WzL30GuRPtRwGDwUrPIYlrUGhX+MBadYhkaP92UPwjGEpssF7dPaFdVGgJS7BO D+HMyCAk7Hbgel0gU6Uhb6R1wPoxgT3rtyverePzerQOVtmqaBaYxE6b6pbc7MyjW4mq P9XQ== X-Gm-Message-State: ABy/qLboqGOuGZJRwtqyj0J9mYJ8oGFJ7BzxA7j/9kqheKw5AM2y+nJ2 gLu+r2Ka5rsACXzBbX5AOvn2Pw== X-Received: by 2002:a17:902:e548:b0:1b9:e1d5:c826 with SMTP id n8-20020a170902e54800b001b9e1d5c826mr4519362plf.16.1689091869978; Tue, 11 Jul 2023 09:11:09 -0700 (PDT) Received: from www.outflux.net (198-0-35-241-static.hfc.comcastbusiness.net. [198.0.35.241]) by smtp.gmail.com with ESMTPSA id c18-20020a170902c1d200b001b872695c1csm2098419plc.256.2023.07.11.09.11.08 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 11 Jul 2023 09:11:08 -0700 (PDT) Date: Tue, 11 Jul 2023 09:11:08 -0700 From: Kees Cook To: Greg Ungerer Cc: linux-arm@lists.infradead.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, viro@zeniv.linux.org.uk, ebiederm@xmission.com, brauner@kernel.org Subject: Re: [PATCH] fs: binfmt_elf_efpic: fix personality for fdpic ELF Message-ID: <202307110901.7E9A0D0AE5@keescook> References: <20230711133955.483393-1-gerg@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230711133955.483393-1-gerg@kernel.org> X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE, URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jul 11, 2023 at 11:39:55PM +1000, Greg Ungerer wrote: > The elf-fdpic loader hard sets the process personality to either > PER_LINUX_FDPIC for true elf-fdpic binaries or to PER_LINUX for > normal ELF binaries (in this case they would be constant displacement > compiled with -pie for example). The problem with that is that it > will lose any other bits that may be in the ELF header personality > (such as the "bug emulation" bits). > > On the ARM architecture the ADDR_LIMIT_32BIT flag is used to signify > a normal 32bit binary - as opposed to a legacy 26bit address binary. > This matters since start_thread() will set the ARM CPSR register as > required based on this flag. If the elf-fdpic loader loses this bit > the process will be mis-configured and crash out pretty quickly. > > Modify elf-fdpic loaders personality setting for ELF binaries so that > it preserves the upper three bytes by using the SET_PERSONALITY macro > to set it. This macro in the generic case sets PER_LINUX but and > preserves the upper bytes. Architectures can override this for their > specific use case, and ARM does exactly this. Thanks for tracking this down! There are some twisty macros in use across all the architectures here! I notice the bare set_personality() call remains, though. Is that right? For example, ARM (and sh and xtensa) also sets: #define elf_check_fdpic(x) ((x)->e_ident[EI_OSABI] == ELFOSABI_ARM_FDPIC) so it's possible the first half of the "if" below could get executed, and ARM (and possibly other architectures) would again lose the other flags, if I'm reading correctly. (And the fact that PER_LINUX is actually 0x0 is oddly handled, leaving it implicit in most architectures.) What seems perhaps more correct is to remove the "if" entirely and make sure that SET_PERSONALITY() checks the header flags on all architectures? But I'm less familiar with this area, so please let me know what I'm missing. :) > > Signed-off-by: Greg Ungerer > --- > > Is anyone out there using elf-fdpic on ARM? It would seem you're the first? :) (_Should_ it be usable on ARM?) -Kees > This seems to break it rather badly due to the loss of that ADDR_LIMIT_32BIT > bit from the process personality. > > fs/binfmt_elf_fdpic.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/fs/binfmt_elf_fdpic.c b/fs/binfmt_elf_fdpic.c > index a05eafcacfb2..f29ae1d96fd7 100644 > --- a/fs/binfmt_elf_fdpic.c > +++ b/fs/binfmt_elf_fdpic.c > @@ -348,7 +348,7 @@ static int load_elf_fdpic_binary(struct linux_binprm *bprm) > if (elf_check_fdpic(&exec_params.hdr)) > set_personality(PER_LINUX_FDPIC); > else > - set_personality(PER_LINUX); > + SET_PERSONALITY(exec_params.hdr); > if (elf_read_implies_exec(&exec_params.hdr, executable_stack)) > current->personality |= READ_IMPLIES_EXEC; > > -- > 2.25.1 > -- Kees Cook