Received: by 2002:a05:7412:2a8c:b0:e2:908c:2ebd with SMTP id u12csp1402298rdh; Mon, 25 Sep 2023 11:35:37 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHzCyqf6jRNUhGoy2YD6smbQ6vy9WoM/5alVtmG7+zTOCdd3maET7nDXAnuYYaNMxwTP2gl X-Received: by 2002:a05:6a00:230b:b0:68f:f0bb:7de1 with SMTP id h11-20020a056a00230b00b0068ff0bb7de1mr6211318pfh.11.1695666936729; Mon, 25 Sep 2023 11:35:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1695666936; cv=none; d=google.com; s=arc-20160816; b=I0knpbrWrCaTv7/NPOZ1vHPkaSPTAhJWbzsuzmb1Z8dtZ9kqnx9fwHQ8s8YfSjVPpG vwZryj5Rq33IYb7eylHZ/Ezs30RqUMCp0eKQoF873k8DXSgvMEP6Dv+jopEUektGj4lr iy9EZtMRGfp8c6nkmebpH53j49xjQJDAflKp2y25CzaYfDzAfYoC4Api8O376+DruDSj JZjcU8XdlcbBtCq8FQGGcEupnRhd5U92rLNvjB9cCLX8SIQJZUc2FK31WujftHBhP7gz NCf1NBN+AW6bZwMvGYP3f6yq3mMMTo0fHlre5RX0PdyuNRPLy6PK8wG2DpFyRyLlqgvE 8c7A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:references:message-id:in-reply-to :subject:cc:to:from:date:dkim-signature; bh=Vs+s8MbEdlPjqhnrrm1uH19re0iD33TvngqTvSoravg=; fh=ad8OKuXOVV9G1wbC+pirucXLnkm1FtYBZrkHHIdBiOQ=; b=XlEanWfHx6fBHXegE/dlJ9VWVzZ/B9PcC9RIMQOKz9Bukb+WWfMT47x42Z81OGC121 QNUuV579pajEWCJT0qsvZfzGaqy2eB3XWm6eTgVDmBrc0HmuJaz3AkW88VnLz73PvZlU MNrdl+y0k69CDW6Zhc+fcKqdXMyjCkcFOhPv4dVo99NNUNwwAveTVUD7LFpxVxEMjbZh IdWr3kLBLfmWk/TJp9pRUvRsc2cRELnzm5xcuSOZTxNPfgku9LdIa19BbLDj7pzItcoi 4TvqmydMfif+4a+bRldyfFmMWIeJNXkx7HebQcWsFBJ4C1v/XSaoeqdZXilv2QaUuQ75 blaA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=UojhxFLO; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from groat.vger.email (groat.vger.email. [23.128.96.35]) by mx.google.com with ESMTPS id eh14-20020a056a00808e00b0068730bad69bsi9958659pfb.305.2023.09.25.11.35.35 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 25 Sep 2023 11:35:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) client-ip=23.128.96.35; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=UojhxFLO; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by groat.vger.email (Postfix) with ESMTP id 3F7178096594; Mon, 25 Sep 2023 02:21:59 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at groat.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230429AbjIYJVy (ORCPT + 99 others); Mon, 25 Sep 2023 05:21:54 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55332 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232943AbjIYJVu (ORCPT ); Mon, 25 Sep 2023 05:21:50 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 79005AB for ; Mon, 25 Sep 2023 02:20:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1695633657; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=Vs+s8MbEdlPjqhnrrm1uH19re0iD33TvngqTvSoravg=; b=UojhxFLONyYjlF4jwio1KQzu0UA7ZmtccNUAyJU3I7zz/IQxgptziClEblxW+B+fXMZ8Vn vpPqtMhPX8H2v6Zx8QuxqjM9cuvWPM9H92ay9+SpgAcStacdv0/mV5CY6wFJAv7mJaVH2P IBSFJqVTm4gYg/zOxVrPM5TuqwhU4PI= Received: from mail-qk1-f198.google.com (mail-qk1-f198.google.com [209.85.222.198]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-609-N-KoZM1WPZePfs9TdLSlIw-1; Mon, 25 Sep 2023 05:20:55 -0400 X-MC-Unique: N-KoZM1WPZePfs9TdLSlIw-1 Received: by mail-qk1-f198.google.com with SMTP id af79cd13be357-773ed3bb708so1125456885a.2 for ; Mon, 25 Sep 2023 02:20:55 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1695633655; x=1696238455; h=mime-version:references:message-id:in-reply-to:subject:cc:to:from :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=Vs+s8MbEdlPjqhnrrm1uH19re0iD33TvngqTvSoravg=; b=nZWblJvdceif4lRWZObVUib9/foP1PxMBDG3OXE+H+Qc5Ve44OEbNSymnDf2bfkOzQ dFJx3ob369qgF5Zcl073/wx+Z9ZqQxZw5nCQwKImaEowEfbzOJigcuXdavDrWN9tgvvf 2tkDc2ddl8NtYo3GQuK+Nw20PlOKw5LjnnKDaMvMMtgR6E9apyhZ17tkKIiwOeB66vdf 8FlBEWTrrOAhmLFFEjCc48NKkrPt6tHiBheOAc2F+qrF320IfoR8yDEKzmeZeXaxvs+/ 6L0UG5pmRaACsG8aspdefPSKNvc0vJraqX5tUvuB8OJVnasT8uJ8d6/MgNlsyqpcDh+8 ZH4w== X-Gm-Message-State: AOJu0YyZVGCrPAjGBq9G8T0OHleWPr2VA9QKQ1S/7uVA9JQDiOfuk9mV uQWlrCk3qsldHvTcRsCA09u2KlcR9HlEq8IsDX3GqBi9FRmemUuEvSxItaWdg3A9o8LETMWG0+B 2lvwqnmjhxaaqLn6v6yDIQLYh X-Received: by 2002:a05:620a:2988:b0:774:2e8a:ccc6 with SMTP id r8-20020a05620a298800b007742e8accc6mr3902476qkp.32.1695633655383; Mon, 25 Sep 2023 02:20:55 -0700 (PDT) X-Received: by 2002:a05:620a:2988:b0:774:2e8a:ccc6 with SMTP id r8-20020a05620a298800b007742e8accc6mr3902467qkp.32.1695633655100; Mon, 25 Sep 2023 02:20:55 -0700 (PDT) Received: from rh (p200300c93f1ec600a890fb4d684902d4.dip0.t-ipconnect.de. [2003:c9:3f1e:c600:a890:fb4d:6849:2d4]) by smtp.gmail.com with ESMTPSA id vr10-20020a05620a55aa00b0076ef7810f27sm3633710qkn.58.2023.09.25.02.20.53 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 25 Sep 2023 02:20:54 -0700 (PDT) Date: Mon, 25 Sep 2023 11:20:51 +0200 (CEST) From: Sebastian Ott To: "Eric W. Biederman" cc: =?ISO-8859-15?Q?Thomas_Wei=DFschuh?= , Alexander Viro , Christian Brauner , Kees Cook , Mark Brown , Willy Tarreau , linux-fsdevel@vger.kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, stable@vger.kernel.org Subject: Re: [PATCH RFC] binfmt_elf: fully allocate bss pages In-Reply-To: <87zg1bm5xo.fsf@email.froward.int.ebiederm.org> Message-ID: <37d3392c-cf33-20a6-b5c9-8b3fb8142658@redhat.com> References: <20230914-bss-alloc-v1-1-78de67d2c6dd@weissschuh.net> <36e93c8e-4384-b269-be78-479ccc7817b1@redhat.com> <87zg1bm5xo.fsf@email.froward.int.ebiederm.org> MIME-Version: 1.0 Content-Type: text/plain; format=flowed; charset=US-ASCII X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on groat.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (groat.vger.email [0.0.0.0]); Mon, 25 Sep 2023 02:21:59 -0700 (PDT) On Sun, 24 Sep 2023, Eric W. Biederman wrote: > Sebastian Ott writes: > >> Hej, >> >> since we figured that the proposed patch is not going to work I've spent a >> couple more hours looking at this (some static binaries on arm64 segfault >> during load [0]). The segfault happens because of a failed clear_user() >> call in load_elf_binary(). The address we try to write zeros to is mapped with >> correct permissions. >> >> After some experiments I've noticed that writing to anonymous mappings work >> fine and all the error cases happend on file backed VMAs. Debugging showed that >> in elf_map() we call vm_mmap() with a file offset of 15 pages - for a binary >> that's less than 1KiB in size. >> >> Looking at the ELF headers again that 15 pages offset originates from the offset >> of the 2nd segment - so, I guess the loader did as instructed and that binary is >> just too nasty? >> >> Program Headers: >> Type Offset VirtAddr PhysAddr >> FileSiz MemSiz Flags Align >> LOAD 0x0000000000000000 0x0000000000400000 0x0000000000400000 >> 0x0000000000000178 0x0000000000000178 R E 0x10000 >> LOAD 0x000000000000ffe8 0x000000000041ffe8 0x000000000041ffe8 >> 0x0000000000000000 0x0000000000000008 RW 0x10000 >> NOTE 0x0000000000000120 0x0000000000400120 0x0000000000400120 >> 0x0000000000000024 0x0000000000000024 R 0x4 >> GNU_STACK 0x0000000000000000 0x0000000000000000 0x0000000000000000 >> 0x0000000000000000 0x0000000000000000 RW 0x10 >> >> As an additional test I've added a bunch of zeros at the end of that binary >> so that the offset is within that file and it did load just fine. >> >> On the other hand there is this section header: >> [ 4] .bss NOBITS 000000000041ffe8 0000ffe8 >> 0000000000000008 0000000000000000 WA 0 0 1 >> >> "sh_offset >> This member's value gives the byte offset from the beginning of the file to >> the first byte in the section. One section type, SHT_NOBITS described >> below, occupies no space in the file, and its sh_offset member locates >> the conceptual placement in the file. >> " >> >> So, still not sure what to do here.. >> >> Sebastian >> >> [0] https://lore.kernel.org/lkml/5d49767a-fbdc-fbe7-5fb2-d99ece3168cb@redhat.com/ > > I think that .bss section that is being generated is atrocious. > > At the same time I looked at what the linux elf loader is trying to do, > and the elf loader's handling of program segments with memsz > filesz > has serious remnants a.out of programs allocating memory with the brk > syscall. > > Lots of the structure looks like it started with the assumption that > there would only be a single program header with memsz > filesz the way > and that was the .bss. The way things were in the a.out days and > handling of other cases has been debugged in later. > > So I have modified elf_map to always return successfully when there is > a zero filesz in the program header for an elf segment. > > Then I have factored out a function clear_tail that ensures the zero > padding for an entire elf segment is present. > > Please test this and see if it causes your test case to work. Sadly, that causes issues for other programs: [ 44.164596] Run /init as init process [ 44.168763] Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b [ 44.176409] CPU: 32 PID: 1 Comm: init Not tainted 6.6.0-rc2+ #89 [ 44.182404] Hardware name: GIGABYTE R181-T92-00/MT91-FS4-00, BIOS F34 08/13/2020 [ 44.189786] Call trace: [ 44.192220] dump_backtrace+0xa4/0x130 [ 44.195961] show_stack+0x20/0x38 [ 44.199264] dump_stack_lvl+0x48/0x60 [ 44.202917] dump_stack+0x18/0x28 [ 44.206219] panic+0x2e0/0x350 [ 44.209264] do_exit+0x370/0x390 [ 44.212481] do_group_exit+0x3c/0xa0 [ 44.216044] get_signal+0x800/0x808 [ 44.219521] do_signal+0xfc/0x200 [ 44.222824] do_notify_resume+0xc8/0x418 [ 44.226734] el0_da+0x114/0x120 [ 44.229866] el0t_64_sync_handler+0xb8/0x130 [ 44.234124] el0t_64_sync+0x194/0x198 [ 44.237776] SMP: stopping secondary CPUs [ 44.241740] Kernel Offset: disabled [ 44.245215] CPU features: 0x03000000,14028142,10004203 [ 44.250342] Memory Limit: none [ 44.253383] ---[ end Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b ]---