* [RFC, PATCH] Fixup COMPAT_VDSO to work with CONFIG_PARAVIRT
@ 2007-03-16 2:47 Zachary Amsden
2007-03-16 3:20 ` Jeremy Fitzhardinge
2007-03-16 11:56 ` Eric W. Biederman
0 siblings, 2 replies; 17+ messages in thread
From: Zachary Amsden @ 2007-03-16 2:47 UTC (permalink / raw)
To: Linux Kernel Mailing List, Ingo Molnar, Jan Beulich,
Rusty Russell, Jeremy Fitzhardinge, Andi Kleen, Eric W. Biederman,
Chris Wright, Andrew Morton, Linus Torvalds,
Virtualization Mailing List
[-- Attachment #1: Type: text/plain, Size: 1731 bytes --]
Paravirt-ops guests which move the fixmap also end up moving the syscall
VDSO. This fails if it is prelinked at a fixed address, which is why
COMPAT_VDSO is broken under CONFIG_VMI (and also under CONFIG_XEN).
Several options are available to try to address this. Jan had cooked up
a patch for Xen that used build magic to find the parts of the VDSO that
need relocation. I don't like the idea of having auto-generated
relocations, as someday something could change between two linked
objects (timestamp, elf notes perhaps) that is not a relocation. So I
prefer human supervision over the relocation and explicitly fixing
everything by hand. I'm not necessarily advocating one solution over
the other; my way is more code to maintain if the VDSO linkage changes.
I'm looking for feedback about which way is best.
Also, it appears that COMPAT_VDSO could disappear entirely. Since this
approach should work with older broken ld.so (2.3.2 is the version, I
believe), we should be able to switch over completely to using the gate
vma style of linking the vdso. One can even get the address
randomization benefits by simply running fixup on the vdso if you are
prepared to take the cost of allocating an extra page per process. Or
you could randomize just once at boot, which makes the randomization
per-machine, still sufficient to slow network based worm attacks which
might rely on a fixed VDSO address.
Clearly this patch needs more testing and feedback, which I'm sure it
will get...
<zach ducks>
Zach
P.S. - Eric, I've copied you as you appear to be an ELF expert, or at
least have a greater grasp of Elven Magic than me, and I'm hoping I got
all the dynamic tags which need relocation right.
[-- Attachment #2: vdso-relocation-for-paravirt.patch --]
[-- Type: text/plain, Size: 9294 bytes --]
Invoke black magic to relocate the VDSO even when COMPAT_VDSO is enabled
by fixing up the ELF object.
Signed-off-by: Zachary Amsden <zach@vmware.com>
Index: linux-2.6.21/arch/i386/kernel/entry.S
===================================================================
--- linux-2.6.21.orig/arch/i386/kernel/entry.S 2007-03-06 18:51:33.000000000 -0800
+++ linux-2.6.21/arch/i386/kernel/entry.S 2007-03-15 18:14:11.000000000 -0800
@@ -305,16 +305,12 @@ sysenter_past_esp:
pushl $(__USER_CS)
CFI_ADJUST_CFA_OFFSET 4
/*CFI_REL_OFFSET cs, 0*/
-#ifndef CONFIG_COMPAT_VDSO
/*
* Push current_thread_info()->sysenter_return to the stack.
* A tiny bit of offset fixup is necessary - 4*4 means the 4 words
* pushed above; +8 corresponds to copy_thread's esp0 setting.
*/
pushl (TI_sysenter_return-THREAD_SIZE+8+4*4)(%esp)
-#else
- pushl $SYSENTER_RETURN
-#endif
CFI_ADJUST_CFA_OFFSET 4
CFI_REL_OFFSET eip, 0
Index: linux-2.6.21/arch/i386/kernel/sysenter.c
===================================================================
--- linux-2.6.21.orig/arch/i386/kernel/sysenter.c 2007-03-06 18:51:34.000000000 -0800
+++ linux-2.6.21/arch/i386/kernel/sysenter.c 2007-03-15 18:27:43.000000000 -0800
@@ -72,6 +72,99 @@ extern const char vsyscall_int80_start,
extern const char vsyscall_sysenter_start, vsyscall_sysenter_end;
static struct page *syscall_pages[1];
+#ifdef CONFIG_COMPAT_VDSO
+static void fixup_vsyscall_elf(char *page)
+{
+ Elf32_Ehdr *hdr;
+ Elf32_Shdr *sechdrs;
+ Elf32_Phdr *phdr;
+ char *secstrings;
+ int i, j, n;
+
+ hdr = (Elf32_Ehdr *)page;
+
+ printk("Remapping vsyscall page to %08x\n", (unsigned int)VDSO_HIGH_BASE);
+
+ /* Sanity checks against insmoding binaries or wrong arch,
+ weird elf version */
+ if (memcmp(hdr->e_ident, ELFMAG, 4) != 0 ||
+ !elf_check_arch(hdr) ||
+ hdr->e_type != ET_DYN)
+ panic("Bogus ELF in vsyscall DSO\n");
+
+ hdr->e_entry += VDSO_HIGH_BASE;
+ sechdrs = (void *)hdr + hdr->e_shoff;
+ secstrings = (void *)hdr + sechdrs[hdr->e_shstrndx].sh_offset;
+
+ for (i = 1; i < hdr->e_shnum; i++) {
+ if (!(sechdrs[i].sh_flags & SHF_ALLOC))
+ continue;
+
+ sechdrs[i].sh_addr += VDSO_HIGH_BASE;
+ if (strcmp(secstrings+sechdrs[i].sh_name, ".dynsym") == 0) {
+ Elf32_Sym *sym = (void *)hdr + sechdrs[i].sh_offset;
+ n = sechdrs[i].sh_size / sizeof(*sym);
+ for (j = 1; j < n; j++) {
+ int ndx = sym[j].st_shndx;
+ if (ndx == SHN_UNDEF || ndx == SHN_ABS)
+ continue;
+ sym[j].st_value += VDSO_HIGH_BASE;
+ }
+ } else if (strcmp(secstrings+sechdrs[i].sh_name, ".dynamic") == 0) {
+ Elf32_Dyn *dyn = (void *)hdr + sechdrs[i].sh_offset;
+ int tag;
+ while ((tag = (++dyn)->d_tag) != DT_NULL)
+ switch(tag) {
+ case DT_PLTGOT:
+ case DT_HASH:
+ case DT_STRTAB:
+ case DT_SYMTAB:
+ case DT_RELA:
+ case DT_INIT:
+ case DT_FINI:
+ case DT_REL:
+ case DT_JMPREL:
+ case DT_VERSYM:
+ case DT_VERDEF:
+ case DT_VERNEED:
+ dyn->d_un.d_val += VDSO_HIGH_BASE;
+ }
+ } else if (strcmp(secstrings+sechdrs[i].sh_name, ".useless") == 0) {
+ /* This is demonic; see vsyscall.lds.S; it puts the
+ * .got in a section named .useless */
+ uint32_t *got = (void *)hdr + sechdrs[i].sh_offset;
+ *got += VDSO_HIGH_BASE;
+ }
+ }
+ phdr = (void *)hdr + hdr->e_phoff;
+ for (i = 0; i < hdr->e_phnum; i++) {
+ phdr[i].p_vaddr += VDSO_HIGH_BASE;
+ phdr[i].p_paddr += VDSO_HIGH_BASE;
+ }
+
+#if 0
+/*
+ * To verify the binary image in memory is identical, linked in the VDSO page
+ * from a COMPAT_VDSO compile without this patch; then diff the two. For a
+ * non-relocated fixmap, the VDSO image is identical.
+ */
+{
+ extern const char vsyscall_orig_start, vsyscall_orig_end;
+ int *l1 = (int *)page, *l2 = (int *)&vsyscall_orig_start;
+ int foo = vsyscall_orig_end - vsyscall_orig_start / 4;
+ for (i = 0; i < foo; i++) {
+ if (l1[i] != l2[i]) {
+ printk("vsyscall - delta [%03x] orig %08x new %08x\n",
+ i, l2[i], l1[i]);
+ }
+ }
+}
+#endif
+}
+#else /* !CONFIG_COMPAT_VDSO */
+static inline void fixup_vsyscall_elf(char *page) {}
+#endif /* CONFIG_COMPAT_VDSO */
+
int __init sysenter_setup(void)
{
void *syscall_page = (void *)get_zeroed_page(GFP_ATOMIC);
@@ -86,20 +179,22 @@ int __init sysenter_setup(void)
memcpy(syscall_page,
&vsyscall_int80_start,
&vsyscall_int80_end - &vsyscall_int80_start);
+ fixup_vsyscall_elf((char *)syscall_page);
return 0;
}
memcpy(syscall_page,
&vsyscall_sysenter_start,
&vsyscall_sysenter_end - &vsyscall_sysenter_start);
+ fixup_vsyscall_elf((char *)syscall_page);
return 0;
}
-#ifndef CONFIG_COMPAT_VDSO
/* Defined in vsyscall-sysenter.S */
extern void SYSENTER_RETURN;
+#ifdef __HAVE_ARCH_GATE_AREA
/* Setup a VMA at program startup for the vsyscall page */
int arch_setup_additional_pages(struct linux_binprm *bprm, int exstack)
{
@@ -159,4 +254,17 @@ int in_gate_area_no_task(unsigned long a
{
return 0;
}
-#endif
+#else /* !__HAVE_ARCH_GATE_AREA */
+
+int arch_setup_additional_pages(struct linux_binprm *bprm, int exstack)
+ /*
+ * If not creating userspace VMA, simply set vdso to point to
+ * fixmap page.
+ */
+ current->mm->context.vdso = (void *)VDSO_HIGH_BASE;
+ current_thread_info()->sysenter_return =
+ (void *)VDSO_SYM(&SYSENTER_RETURN);
+
+ return 0;
+}
+#endif /* __HAVE_ARCH_GATE_AREA */
Index: linux-2.6.21/arch/i386/mm/pgtable.c
===================================================================
--- linux-2.6.21.orig/arch/i386/mm/pgtable.c 2007-03-06 18:51:34.000000000 -0800
+++ linux-2.6.21/arch/i386/mm/pgtable.c 2007-03-15 18:14:11.000000000 -0800
@@ -144,10 +144,8 @@ void set_pmd_pfn(unsigned long vaddr, un
}
static int fixmaps;
-#ifndef CONFIG_COMPAT_VDSO
unsigned long __FIXADDR_TOP = 0xfffff000;
EXPORT_SYMBOL(__FIXADDR_TOP);
-#endif
void __set_fixmap (enum fixed_addresses idx, unsigned long phys, pgprot_t flags)
{
@@ -173,12 +171,8 @@ void reserve_top_address(unsigned long r
BUG_ON(fixmaps > 0);
printk(KERN_INFO "Reserving virtual address space above 0x%08x\n",
(int)-reserve);
-#ifdef CONFIG_COMPAT_VDSO
- BUG_ON(reserve != 0);
-#else
__FIXADDR_TOP = -reserve - PAGE_SIZE;
__VMALLOC_RESERVE += reserve;
-#endif
}
pte_t *pte_alloc_one_kernel(struct mm_struct *mm, unsigned long address)
Index: linux-2.6.21/include/asm-i386/elf.h
===================================================================
--- linux-2.6.21.orig/include/asm-i386/elf.h 2007-03-06 18:52:03.000000000 -0800
+++ linux-2.6.21/include/asm-i386/elf.h 2007-03-15 18:14:11.000000000 -0800
@@ -133,39 +133,31 @@ extern int dump_task_extended_fpu (struc
#define ELF_CORE_COPY_XFPREGS(tsk, elf_xfpregs) dump_task_extended_fpu(tsk, elf_xfpregs)
#define VDSO_HIGH_BASE (__fix_to_virt(FIX_VDSO))
-#define VDSO_BASE ((unsigned long)current->mm->context.vdso)
-
-#ifdef CONFIG_COMPAT_VDSO
-# define VDSO_COMPAT_BASE VDSO_HIGH_BASE
-# define VDSO_PRELINK VDSO_HIGH_BASE
-#else
-# define VDSO_COMPAT_BASE VDSO_BASE
-# define VDSO_PRELINK 0
-#endif
+#define VDSO_CURRENT_BASE ((unsigned long)current->mm->context.vdso)
+#define VDSO_PRELINK 0
#define VDSO_SYM(x) \
- (VDSO_COMPAT_BASE + (unsigned long)(x) - VDSO_PRELINK)
+ (VDSO_CURRENT_BASE + (unsigned long)(x) - VDSO_PRELINK)
#define VDSO_HIGH_EHDR ((const struct elfhdr *) VDSO_HIGH_BASE)
-#define VDSO_EHDR ((const struct elfhdr *) VDSO_COMPAT_BASE)
+#define VDSO_EHDR ((const struct elfhdr *) VDSO_CURRENT_BASE)
extern void __kernel_vsyscall;
#define VDSO_ENTRY VDSO_SYM(&__kernel_vsyscall)
-#ifndef CONFIG_COMPAT_VDSO
-#define ARCH_HAS_SETUP_ADDITIONAL_PAGES
struct linux_binprm;
+
+#define ARCH_HAS_SETUP_ADDITIONAL_PAGES
extern int arch_setup_additional_pages(struct linux_binprm *bprm,
int executable_stack);
-#endif
extern unsigned int vdso_enabled;
#define ARCH_DLINFO \
do if (vdso_enabled) { \
NEW_AUX_ENT(AT_SYSINFO, VDSO_ENTRY); \
- NEW_AUX_ENT(AT_SYSINFO_EHDR, VDSO_COMPAT_BASE); \
+ NEW_AUX_ENT(AT_SYSINFO_EHDR, VDSO_CURRENT_BASE);\
} while (0)
#endif
Index: linux-2.6.21/include/asm-i386/fixmap.h
===================================================================
--- linux-2.6.21.orig/include/asm-i386/fixmap.h 2007-03-06 18:52:03.000000000 -0800
+++ linux-2.6.21/include/asm-i386/fixmap.h 2007-03-15 18:14:11.000000000 -0800
@@ -19,13 +19,9 @@
* Leave one empty page between vmalloc'ed areas and
* the start of the fixmap.
*/
-#ifndef CONFIG_COMPAT_VDSO
extern unsigned long __FIXADDR_TOP;
-#else
-#define __FIXADDR_TOP 0xfffff000
#define FIXADDR_USER_START __fix_to_virt(FIX_VDSO)
#define FIXADDR_USER_END __fix_to_virt(FIX_VDSO - 1)
-#endif
#ifndef __ASSEMBLY__
#include <linux/kernel.h>
Index: linux-2.6.21/include/linux/elf.h
===================================================================
--- linux-2.6.21.orig/include/linux/elf.h 2007-03-06 18:52:08.000000000 -0800
+++ linux-2.6.21/include/linux/elf.h 2007-03-15 18:14:11.000000000 -0800
@@ -83,6 +83,9 @@ typedef __s64 Elf64_Sxword;
#define DT_DEBUG 21
#define DT_TEXTREL 22
#define DT_JMPREL 23
+#define DT_VERSYM 0x6ffffff0
+#define DT_VERDEF 0x6ffffffc
+#define DT_VERNEED 0x6ffffffe
#define DT_LOPROC 0x70000000
#define DT_HIPROC 0x7fffffff
^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: [RFC, PATCH] Fixup COMPAT_VDSO to work with CONFIG_PARAVIRT
2007-03-16 2:47 [RFC, PATCH] Fixup COMPAT_VDSO to work with CONFIG_PARAVIRT Zachary Amsden
@ 2007-03-16 3:20 ` Jeremy Fitzhardinge
2007-03-16 4:03 ` Zachary Amsden
2007-03-16 11:56 ` Eric W. Biederman
1 sibling, 1 reply; 17+ messages in thread
From: Jeremy Fitzhardinge @ 2007-03-16 3:20 UTC (permalink / raw)
To: Zachary Amsden
Cc: Chris Wright, Andrew Morton, Linus Torvalds, Eric W. Biederman,
Virtualization Mailing List, Ingo Molnar,
Linux Kernel Mailing List, Jan Beulich
Zachary Amsden wrote:
> Invoke black magic to relocate the VDSO even when COMPAT_VDSO is enabled
> by fixing up the ELF object.
>
So does it actually work? Can you boot the broken distros with this in
place?
> Signed-off-by: Zachary Amsden <zach@vmware.com>
>
> Index: linux-2.6.21/arch/i386/kernel/entry.S
> ===================================================================
> --- linux-2.6.21.orig/arch/i386/kernel/entry.S 2007-03-06 18:51:33.000000000 -0800
> +++ linux-2.6.21/arch/i386/kernel/entry.S 2007-03-15 18:14:11.000000000 -0800
> @@ -305,16 +305,12 @@ sysenter_past_esp:
> pushl $(__USER_CS)
> CFI_ADJUST_CFA_OFFSET 4
> /*CFI_REL_OFFSET cs, 0*/
> -#ifndef CONFIG_COMPAT_VDSO
> /*
> * Push current_thread_info()->sysenter_return to the stack.
> * A tiny bit of offset fixup is necessary - 4*4 means the 4 words
> * pushed above; +8 corresponds to copy_thread's esp0 setting.
> */
> pushl (TI_sysenter_return-THREAD_SIZE+8+4*4)(%esp)
> -#else
> - pushl $SYSENTER_RETURN
> -#endif
> CFI_ADJUST_CFA_OFFSET 4
> CFI_REL_OFFSET eip, 0
>
> Index: linux-2.6.21/arch/i386/kernel/sysenter.c
> ===================================================================
> --- linux-2.6.21.orig/arch/i386/kernel/sysenter.c 2007-03-06 18:51:34.000000000 -0800
> +++ linux-2.6.21/arch/i386/kernel/sysenter.c 2007-03-15 18:27:43.000000000 -0800
> @@ -72,6 +72,99 @@ extern const char vsyscall_int80_start,
> extern const char vsyscall_sysenter_start, vsyscall_sysenter_end;
> static struct page *syscall_pages[1];
>
> +#ifdef CONFIG_COMPAT_VDSO
> +static void fixup_vsyscall_elf(char *page)
> +{
> + Elf32_Ehdr *hdr;
> + Elf32_Shdr *sechdrs;
> + Elf32_Phdr *phdr;
> + char *secstrings;
> + int i, j, n;
> +
> + hdr = (Elf32_Ehdr *)page;
> +
> + printk("Remapping vsyscall page to %08x\n", (unsigned int)VDSO_HIGH_BASE);
> +
> + /* Sanity checks against insmoding binaries or wrong arch,
> + weird elf version */
> + if (memcmp(hdr->e_ident, ELFMAG, 4) != 0 ||
> + !elf_check_arch(hdr) ||
> + hdr->e_type != ET_DYN)
> + panic("Bogus ELF in vsyscall DSO\n");
> +
> + hdr->e_entry += VDSO_HIGH_BASE;
> + sechdrs = (void *)hdr + hdr->e_shoff;
> + secstrings = (void *)hdr + sechdrs[hdr->e_shstrndx].sh_offset;
> +
> + for (i = 1; i < hdr->e_shnum; i++) {
>
Using sections is wrong; you should be going through the phdrs, and
looking for PT_DYNAMIC for relocation.
> + if (!(sechdrs[i].sh_flags & SHF_ALLOC))
> + continue;
> +
> + sechdrs[i].sh_addr += VDSO_HIGH_BASE;
> + if (strcmp(secstrings+sechdrs[i].sh_name, ".dynsym") == 0) {
> + Elf32_Sym *sym = (void *)hdr + sechdrs[i].sh_offset;
> + n = sechdrs[i].sh_size / sizeof(*sym);
> + for (j = 1; j < n; j++) {
> + int ndx = sym[j].st_shndx;
> + if (ndx == SHN_UNDEF || ndx == SHN_ABS)
> + continue;
> + sym[j].st_value += VDSO_HIGH_BASE;
> + }
>
Does anyone expect the symbolic info to be correct? It might be better
to just stomp it so nobody gets any ideas.
On the other hand, we don't want to break compatibility with anything...
> + } else if (strcmp(secstrings+sechdrs[i].sh_name, ".dynamic") == 0) {
> + Elf32_Dyn *dyn = (void *)hdr + sechdrs[i].sh_offset;
> + int tag;
> + while ((tag = (++dyn)->d_tag) != DT_NULL)
>
Um, no.
> + } else if (strcmp(secstrings+sechdrs[i].sh_name, ".useless") == 0) {
> + /* This is demonic; see vsyscall.lds.S; it puts the
> + * .got in a section named .useless */
> + uint32_t *got = (void *)hdr + sechdrs[i].sh_offset;
> + *got += VDSO_HIGH_BASE;
> + }
>
This won't get relocated with one of the other relocations? It's in the
text phdr.
> + }
> + phdr = (void *)hdr + hdr->e_phoff;
> + for (i = 0; i < hdr->e_phnum; i++) {
> + phdr[i].p_vaddr += VDSO_HIGH_BASE;
> + phdr[i].p_paddr += VDSO_HIGH_BASE;
> + }
> +
> +#if 0
> +/*
> + * To verify the binary image in memory is identical, linked in the VDSO page
> + * from a COMPAT_VDSO compile without this patch; then diff the two. For a
> + * non-relocated fixmap, the VDSO image is identical.
> + */
> +{
> + extern const char vsyscall_orig_start, vsyscall_orig_end;
> + int *l1 = (int *)page, *l2 = (int *)&vsyscall_orig_start;
> + int foo = vsyscall_orig_end - vsyscall_orig_start / 4;
> + for (i = 0; i < foo; i++) {
> + if (l1[i] != l2[i]) {
> + printk("vsyscall - delta [%03x] orig %08x new %08x\n",
> + i, l2[i], l1[i]);
> + }
> + }
> +}
> +#endif
> +}
> +#else /* !CONFIG_COMPAT_VDSO */
> +static inline void fixup_vsyscall_elf(char *page) {}
> +#endif /* CONFIG_COMPAT_VDSO */
> +
> int __init sysenter_setup(void)
> {
> void *syscall_page = (void *)get_zeroed_page(GFP_ATOMIC);
> @@ -86,20 +179,22 @@ int __init sysenter_setup(void)
> memcpy(syscall_page,
> &vsyscall_int80_start,
> &vsyscall_int80_end - &vsyscall_int80_start);
> + fixup_vsyscall_elf((char *)syscall_page);
> return 0;
> }
>
> memcpy(syscall_page,
> &vsyscall_sysenter_start,
> &vsyscall_sysenter_end - &vsyscall_sysenter_start);
> + fixup_vsyscall_elf((char *)syscall_page);
>
This could probably do with setting the addr and length in if statement,
and make the memcmp and fixup common.
J
^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: [RFC, PATCH] Fixup COMPAT_VDSO to work with CONFIG_PARAVIRT
2007-03-16 3:20 ` Jeremy Fitzhardinge
@ 2007-03-16 4:03 ` Zachary Amsden
2007-03-16 5:10 ` Jeremy Fitzhardinge
2007-03-16 23:09 ` Jan Engelhardt
0 siblings, 2 replies; 17+ messages in thread
From: Zachary Amsden @ 2007-03-16 4:03 UTC (permalink / raw)
To: Jeremy Fitzhardinge
Cc: Chris Wright, Andrew Morton, Linus Torvalds, Eric W. Biederman,
Virtualization Mailing List, Ingo Molnar,
Linux Kernel Mailing List, Jan Beulich
Jeremy Fitzhardinge wrote:
> Zachary Amsden wrote:
>
>> Invoke black magic to relocate the VDSO even when COMPAT_VDSO is enabled
>> by fixing up the ELF object.
>>
>>
>
> So does it actually work? Can you boot the broken distros with this in
> place?
>
Well testing that is not so fun. I installed SUSE Pro 9.0, and strings
on ld.so contains the magic at_sysinfo assert! But it doesn't install
TLS libraries, so I'll have to install them by hand.
In works - in theory. Look, a puppy!
Scratchbox is rumored to produce the fabled assertion even on modern
distros by installing its own toolchain which includes the dreaded glibc.
> Using sections is wrong; you should be going through the phdrs, and
> looking for PT_DYNAMIC for relocation.
>
Will do.
> Does anyone expect the symbolic info to be correct? It might be better
> to just stomp it so nobody gets any ideas.
>
> On the other hand, we don't want to break compatibility with anything...
>
I'm playing safe. Binary identical relocation to 0xffffe000 was my goal.
>> + } else if (strcmp(secstrings+sechdrs[i].sh_name, ".dynamic") == 0) {
>> + Elf32_Dyn *dyn = (void *)hdr + sechdrs[i].sh_offset;
>> + int tag;
>> + while ((tag = (++dyn)->d_tag) != DT_NULL)
>>
>>
>
> Um, no.
>
Walk based on size instead?
>> + } else if (strcmp(secstrings+sechdrs[i].sh_name, ".useless") == 0) {
>> + /* This is demonic; see vsyscall.lds.S; it puts the
>> + * .got in a section named .useless */
>> + uint32_t *got = (void *)hdr + sechdrs[i].sh_offset;
>> + *got += VDSO_HIGH_BASE;
>> + }
>>
>>
>
> This won't get relocated with one of the other relocations? It's in the
> text phdr.
>
Hmm, I can try that. Thanks for the suggestions / fixes.
Zach
^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: [RFC, PATCH] Fixup COMPAT_VDSO to work with CONFIG_PARAVIRT
2007-03-16 4:03 ` Zachary Amsden
@ 2007-03-16 5:10 ` Jeremy Fitzhardinge
2007-03-16 5:58 ` Zachary Amsden
2007-03-16 8:08 ` Jan Beulich
2007-03-16 23:09 ` Jan Engelhardt
1 sibling, 2 replies; 17+ messages in thread
From: Jeremy Fitzhardinge @ 2007-03-16 5:10 UTC (permalink / raw)
To: Zachary Amsden
Cc: Linux Kernel Mailing List, Ingo Molnar, Jan Beulich,
Rusty Russell, Andi Kleen, Eric W. Biederman, Chris Wright,
Andrew Morton, Linus Torvalds, Virtualization Mailing List
Zachary Amsden wrote:
> Well testing that is not so fun. I installed SUSE Pro 9.0, and
> strings on ld.so contains the magic at_sysinfo assert! But it doesn't
> install TLS libraries, so I'll have to install them by hand.
>
> In works - in theory. Look, a puppy!
>
> Scratchbox is rumored to produce the fabled assertion even on modern
> distros by installing its own toolchain which includes the dreaded glibc.
I think Andi and Andrew have boxes which are afflicted.
> I'm playing safe. Binary identical relocation to 0xffffe000 was my goal.
Yeah, fair enough. But as Eric likes to keep pointing out, an
executable ELF file need not have any sections at all, so the only safe
course for anything "real" is via the section headers.
So I guess the right thing to do is relocate the dynamic stuff via
PT_DYNAMIC, and relocate the symtab if its present.
>>> + } else if (strcmp(secstrings+sechdrs[i].sh_name,
>>> ".dynamic") == 0) {
>>> + Elf32_Dyn *dyn = (void *)hdr + sechdrs[i].sh_offset;
>>> + int tag;
>>> + while ((tag = (++dyn)->d_tag) != DT_NULL)
>>>
>>
>> Um, no.
>>
>
> Walk based on size instead?
No, I was just complaining about the embedded assignment, before dinner,
so I was overly terse.
J
^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: [RFC, PATCH] Fixup COMPAT_VDSO to work with CONFIG_PARAVIRT
2007-03-16 5:10 ` Jeremy Fitzhardinge
@ 2007-03-16 5:58 ` Zachary Amsden
2007-03-16 8:08 ` Jan Beulich
1 sibling, 0 replies; 17+ messages in thread
From: Zachary Amsden @ 2007-03-16 5:58 UTC (permalink / raw)
To: Jeremy Fitzhardinge
Cc: Chris Wright, Andrew Morton, Linus Torvalds, Eric W. Biederman,
Virtualization Mailing List, Ingo Molnar,
Linux Kernel Mailing List, Jan Beulich
Jeremy Fitzhardinge wrote:
>
>>>> + } else if (strcmp(secstrings+sechdrs[i].sh_name,
>>>> ".dynamic") == 0) {
>>>> + Elf32_Dyn *dyn = (void *)hdr + sechdrs[i].sh_offset;
>>>> + int tag;
>>>> + while ((tag = (++dyn)->d_tag) != DT_NULL)
>>>>
>>>>
>>> Um, no.
>>>
>>>
>> Walk based on size instead?
>>
>
> No, I was just complaining about the embedded assignment, before dinner,
> so I was overly terse.
>
My last embedded assignment was a robot microcontroller, and I dropped
out of that class. So I _need_ embedded assignments.
Zach
^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: [RFC, PATCH] Fixup COMPAT_VDSO to work with CONFIG_PARAVIRT
2007-03-16 5:10 ` Jeremy Fitzhardinge
2007-03-16 5:58 ` Zachary Amsden
@ 2007-03-16 8:08 ` Jan Beulich
2007-03-16 8:41 ` Zachary Amsden
2007-03-16 16:46 ` Jeremy Fitzhardinge
1 sibling, 2 replies; 17+ messages in thread
From: Jan Beulich @ 2007-03-16 8:08 UTC (permalink / raw)
To: Jeremy Fitzhardinge, Zachary Amsden
Cc: Ingo Molnar, Virtualization Mailing List, Andrew Morton,
Linus Torvalds, Rusty Russell, Chris Wright, Andi Kleen,
Linux Kernel Mailing List, Eric W. Biederman
>>> Jeremy Fitzhardinge <jeremy@goop.org> 16.03.07 06:10 >>>
>Zachary Amsden wrote:
>> Well testing that is not so fun. I installed SUSE Pro 9.0, and
>> strings on ld.so contains the magic at_sysinfo assert! But it doesn't
>> install TLS libraries, so I'll have to install them by hand.
>>
>> In works - in theory. Look, a puppy!
>>
>> Scratchbox is rumored to produce the fabled assertion even on modern
>> distros by installing its own toolchain which includes the dreaded glibc.
>
>I think Andi and Andrew have boxes which are afflicted.
I have one, too (which is one reasone why I created the original Xen patch).
>> I'm playing safe. Binary identical relocation to 0xffffe000 was my goal.
>
>Yeah, fair enough. But as Eric likes to keep pointing out, an
>executable ELF file need not have any sections at all, so the only safe
>course for anything "real" is via the section headers.
Program headers you mean.
>So I guess the right thing to do is relocate the dynamic stuff via
>PT_DYNAMIC, and relocate the symtab if its present.
Symtab should also be deduced from program headers.
I'm actually surprised this got re-implemented from scratch, when my patch
already had both variants (one just #ifdef-ed out), and was tested in both
forms (actually, I first implemented the ELF form, and only after seeing the
bloat it added to the sources I came up with the second variant, which in
the end unfortunately didn't add significantly less bloat to the Makefile.
Jan
^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: [RFC, PATCH] Fixup COMPAT_VDSO to work with CONFIG_PARAVIRT
2007-03-16 8:08 ` Jan Beulich
@ 2007-03-16 8:41 ` Zachary Amsden
2007-03-16 16:46 ` Jeremy Fitzhardinge
1 sibling, 0 replies; 17+ messages in thread
From: Zachary Amsden @ 2007-03-16 8:41 UTC (permalink / raw)
To: Jan Beulich
Cc: Jeremy Fitzhardinge, Ingo Molnar, Virtualization Mailing List,
Andrew Morton, Linus Torvalds, Rusty Russell, Chris Wright,
Andi Kleen, Linux Kernel Mailing List, Eric W. Biederman
Jan Beulich wrote:
>> So I guess the right thing to do is relocate the dynamic stuff via
>> PT_DYNAMIC, and relocate the symtab if its present.
>>
>
> Symtab should also be deduced from program headers.
>
Learning more all the time..
> I'm actually surprised this got re-implemented from scratch, when my patch
> already had both variants (one just #ifdef-ed out), and was tested in both
> forms (actually, I first implemented the ELF form, and only after seeing the
> bloat it added to the sources I came up her than with the second variant, which in
> the end unfortunately didn't add significantly less bloat to the Makefile.
>
This wasn't re-implemented from scratch - I did this in another lifetime:
http://lists.xensource.com/archives/html/xen-devel/2005-08/msg00284.html
Either way of doing things is fine with me - I would just prefer that if
it has to get down and dirty, we do it in source rather than hidden in a
makefile. But just a personal preference.
Zach
^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: [RFC, PATCH] Fixup COMPAT_VDSO to work with CONFIG_PARAVIRT
2007-03-16 2:47 [RFC, PATCH] Fixup COMPAT_VDSO to work with CONFIG_PARAVIRT Zachary Amsden
2007-03-16 3:20 ` Jeremy Fitzhardinge
@ 2007-03-16 11:56 ` Eric W. Biederman
2007-03-16 16:25 ` Jeremy Fitzhardinge
2007-03-16 19:38 ` Zachary Amsden
1 sibling, 2 replies; 17+ messages in thread
From: Eric W. Biederman @ 2007-03-16 11:56 UTC (permalink / raw)
To: Zachary Amsden
Cc: Chris Wright, Andrew Morton, Virtualization Mailing List,
Linus Torvalds, Ingo Molnar, Linux Kernel Mailing List,
Jan Beulich
Zachary Amsden <zach@vmware.com> writes:
> Paravirt-ops guests which move the fixmap also end up moving the syscall VDSO.
> This fails if it is prelinked at a fixed address, which is why COMPAT_VDSO is
> broken under CONFIG_VMI (and also under CONFIG_XEN). Several options are
> available to try to address this. Jan had cooked up a patch for Xen that used
> build magic to find the parts of the VDSO that need relocation. I don't like
> the idea of having auto-generated relocations, as someday something could change
> between two linked objects (timestamp, elf notes perhaps) that is not a
> relocation. So I prefer human supervision over the relocation and explicitly
> fixing everything by hand. I'm not necessarily advocating one solution over the
> other; my way is more code to maintain if the VDSO linkage changes. I'm looking
> for feedback about which way is best.
>
> Also, it appears that COMPAT_VDSO could disappear entirely. Since this approach
> should work with older broken ld.so (2.3.2 is the version, I believe), we should
> be able to switch over completely to using the gate vma style of linking the
> vdso. One can even get the address randomization benefits by simply running
> fixup on the vdso if you are prepared to take the cost of allocating an extra
> page per process. Or you could randomize just once at boot, which makes the
> randomization per-machine, still sufficient to slow network based worm attacks
> which might rely on a fixed VDSO address.
>
> Clearly this patch needs more testing and feedback, which I'm sure it will
> get...
>
> <zach ducks>
>
> Zach
>
> P.S. - Eric, I've copied you as you appear to be an ELF expert, or at least have
> a greater grasp of Elven Magic than me, and I'm hoping I got all the dynamic
> tags which need relocation right.
> Invoke black magic to relocate the VDSO even when COMPAT_VDSO is enabled
> by fixing up the ELF object.
I'm not quite familiar with the context. And I'm to lazy to look right now.
What is the difference with COMPAT_VDSO that it doesn't do relocation?
What are we preserving?
The practical question here is if we already have all of the relocation logic
for the VDSO why do we need to add more?
I'm tempted to rant on the pure insanity of address space randomization but
that is a whole other issue...
Eric
^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: [RFC, PATCH] Fixup COMPAT_VDSO to work with CONFIG_PARAVIRT
2007-03-16 11:56 ` Eric W. Biederman
@ 2007-03-16 16:25 ` Jeremy Fitzhardinge
2007-03-16 16:31 ` Ingo Molnar
2007-03-16 19:38 ` Zachary Amsden
1 sibling, 1 reply; 17+ messages in thread
From: Jeremy Fitzhardinge @ 2007-03-16 16:25 UTC (permalink / raw)
To: Eric W. Biederman
Cc: Chris Wright, Linus Torvalds, Andrew Morton,
Virtualization Mailing List, Ingo Molnar,
Linux Kernel Mailing List, Jan Beulich
Eric W. Biederman wrote:
> I'm not quite familiar with the context. And I'm to lazy to look right now.
> What is the difference with COMPAT_VDSO that it doesn't do relocation?
> What are we preserving?
>
>
The issue is that with COMPAT_VDSO, the vdso gets mapped at two places:
one random address, and one fixed address (traditionally 0xffffe000 I
think, but that's not mandatory). The important point is that the
fixed-address is the same one that the vdso itself is linked for, so
that old broken glibcs that some vendors shipped won't explode (because
they use AT_SYSINFO but not AT_SYSINFO_EHDR, so they don't account for
the difference in link and map address).
The problem with the COMPAT_VDSO with paravirt is that the hypervisor
may steal some of the kernel address space, and so push down the address
where the fixed address vdso can be mapped.
Zach's patch relocates the immobile COMPAT_VDSO version of the vdso page
so that map=link address, regardless of where the kernel's runtime
environment puts the top of the kernel address space.
I guess the other solution is to simply put the compat_vdso mapping at
some low address (like the top of the user address space), and not worry
about it moving. I don't know if this would work, but I seem to
remember someone mentioning that it had been done in the past.
> The practical question here is if we already have all of the relocation logic
> for the VDSO why do we need to add more?
>
The kernel doesn't normally ever relocate the vdso; usermode can
generally cope with it where ever it gets mapped.
J
^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: [RFC, PATCH] Fixup COMPAT_VDSO to work with CONFIG_PARAVIRT
2007-03-16 16:25 ` Jeremy Fitzhardinge
@ 2007-03-16 16:31 ` Ingo Molnar
2007-03-16 16:33 ` Jeremy Fitzhardinge
0 siblings, 1 reply; 17+ messages in thread
From: Ingo Molnar @ 2007-03-16 16:31 UTC (permalink / raw)
To: Jeremy Fitzhardinge
Cc: Eric W. Biederman, Zachary Amsden, Linux Kernel Mailing List,
Jan Beulich, Rusty Russell, Andi Kleen, Chris Wright,
Andrew Morton, Linus Torvalds, Virtualization Mailing List
* Jeremy Fitzhardinge <jeremy@goop.org> wrote:
> > The practical question here is if we already have all of the
> > relocation logic for the VDSO why do we need to add more?
>
> The kernel doesn't normally ever relocate the vdso; [...]
that's what is the case right now, but much of the intention behind the
vma based vDSO is to enable per-process randomized vdso locations, and
various distributions do that. So the 'modern' vDSO concept is very much
relocatable.
Ingo
^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: [RFC, PATCH] Fixup COMPAT_VDSO to work with CONFIG_PARAVIRT
2007-03-16 16:31 ` Ingo Molnar
@ 2007-03-16 16:33 ` Jeremy Fitzhardinge
2007-03-16 19:06 ` Eric W. Biederman
0 siblings, 1 reply; 17+ messages in thread
From: Jeremy Fitzhardinge @ 2007-03-16 16:33 UTC (permalink / raw)
To: Ingo Molnar
Cc: Chris Wright, Linus Torvalds, Eric W. Biederman, Andrew Morton,
Virtualization Mailing List, Jan Beulich,
Linux Kernel Mailing List
Ingo Molnar wrote:
> that's what is the case right now, but much of the intention behind the
> vma based vDSO is to enable per-process randomized vdso locations, and
> various distributions do that. So the 'modern' vDSO concept is very much
> relocatable.
No, the point is that it never needs relocating. The kernel can map it
anywhere and userspace can cope. Its only the broken glibcs which
require relocation.
J
^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: [RFC, PATCH] Fixup COMPAT_VDSO to work with CONFIG_PARAVIRT
2007-03-16 8:08 ` Jan Beulich
2007-03-16 8:41 ` Zachary Amsden
@ 2007-03-16 16:46 ` Jeremy Fitzhardinge
2007-03-16 17:09 ` Jan Beulich
1 sibling, 1 reply; 17+ messages in thread
From: Jeremy Fitzhardinge @ 2007-03-16 16:46 UTC (permalink / raw)
To: Jan Beulich
Cc: Zachary Amsden, Ingo Molnar, Virtualization Mailing List,
Andrew Morton, Linus Torvalds, Rusty Russell, Chris Wright,
Andi Kleen, Linux Kernel Mailing List, Eric W. Biederman
Jan Beulich wrote:
> I have one, too (which is one reasone why I created the original Xen patch).
>
It's some version of SuSE 9, right? What glibc version?
>>> I'm playing safe. Binary identical relocation to 0xffffe000 was my goal.
>>>
>> Yeah, fair enough. But as Eric likes to keep pointing out, an
>> executable ELF file need not have any sections at all, so the only safe
>> course for anything "real" is via the section headers.
>>
>
> Program headers you mean.
>
Er, yep.
>> So I guess the right thing to do is relocate the dynamic stuff via
>> PT_DYNAMIC, and relocate the symtab if its present.
>>
>
> Symtab should also be deduced from program headers.
>
Well, the normal symtab might be completely missing. But yes, the
dynamic symtab should be in the PT_DYNAMIC.
J
^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: [RFC, PATCH] Fixup COMPAT_VDSO to work with CONFIG_PARAVIRT
2007-03-16 16:46 ` Jeremy Fitzhardinge
@ 2007-03-16 17:09 ` Jan Beulich
0 siblings, 0 replies; 17+ messages in thread
From: Jan Beulich @ 2007-03-16 17:09 UTC (permalink / raw)
To: Jeremy Fitzhardinge
Cc: Ingo Molnar, Virtualization Mailing List, Andrew Morton,
Linus Torvalds, Rusty Russell, Chris Wright, Andi Kleen,
Linux Kernel Mailing List, Zachary Amsden, Eric W. Biederman
>>> Jeremy Fitzhardinge <jeremy@goop.org> 16.03.07 17:46 >>>
>Jan Beulich wrote:
>> I have one, too (which is one reasone why I created the original Xen patch).
>>
>
>It's some version of SuSE 9, right? What glibc version?
Yes. 2.3.2.
Jan
^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: [RFC, PATCH] Fixup COMPAT_VDSO to work with CONFIG_PARAVIRT
2007-03-16 16:33 ` Jeremy Fitzhardinge
@ 2007-03-16 19:06 ` Eric W. Biederman
2007-03-16 19:46 ` Jeremy Fitzhardinge
0 siblings, 1 reply; 17+ messages in thread
From: Eric W. Biederman @ 2007-03-16 19:06 UTC (permalink / raw)
To: Jeremy Fitzhardinge
Cc: Chris Wright, Linus Torvalds, Andrew Morton,
Virtualization Mailing List, Ingo Molnar,
Linux Kernel Mailing List, Jan Beulich
Jeremy Fitzhardinge <jeremy@goop.org> writes:
> Ingo Molnar wrote:
>> that's what is the case right now, but much of the intention behind the
>> vma based vDSO is to enable per-process randomized vdso locations, and
>> various distributions do that. So the 'modern' vDSO concept is very much
>> relocatable.
>
> No, the point is that it never needs relocating. The kernel can map it
> anywhere and userspace can cope. Its only the broken glibcs which
> require relocation.
Ok. So to summarize.
There are three ways of finding the VDSO.
- AT_SYSINFO
- AT_SYSINFO_EHDR
- known fixed address (see x86_64)
Currently it doesn't sound like you need to deal with the known fixed
address case but COMPAT_VDSO also provides that.
If userspace uses AT_SYSINFO the premise is that it is not expecting
not to need to perform any relocation processing.
If userspace uses AT_SYSINFO_EHDR it expects it needs to perform
relocation processing and fixes up whatever needs fixing up.
With the module code we have shown the kernel is capable of performing
relocation processing at times and it works.
So is it possible to simply relocate the normal vdso and fixup
it's program header so it shows that relocation is not necessary.
If you can do that and still export AT_SYSINFO so the problem user
space still runs you are good. (If you can relocate the vdso
you should be able to relocate it anywhere).
Otherwise it probably just make sense to simply not export a VDSO
on those systems.
This would leave COMPAT_VDSO for the case where you must use one magic
fixed address, and if user space does not require that it means
COMPAT_VDSO could be completely removed.
Eric
^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: [RFC, PATCH] Fixup COMPAT_VDSO to work with CONFIG_PARAVIRT
2007-03-16 11:56 ` Eric W. Biederman
2007-03-16 16:25 ` Jeremy Fitzhardinge
@ 2007-03-16 19:38 ` Zachary Amsden
1 sibling, 0 replies; 17+ messages in thread
From: Zachary Amsden @ 2007-03-16 19:38 UTC (permalink / raw)
To: Eric W. Biederman
Cc: Linux Kernel Mailing List, Ingo Molnar, Jan Beulich,
Rusty Russell, Jeremy Fitzhardinge, Andi Kleen, Chris Wright,
Andrew Morton, Linus Torvalds, Virtualization Mailing List
Eric W. Biederman wrote:
> I'm not quite familiar with the context. And I'm to lazy to look right now.
> What is the difference with COMPAT_VDSO that it doesn't do relocation?
> What are we preserving?
>
COMPAT_VDSO causes the link address to be fixed at compile time to match
the virtual address of the VDSO. !COMPAT_VDSO just links at zero.
> The practical question here is if we already have all of the relocation logic
> for the VDSO why do we need to add more?
>
There wasn't relocation logic before, the VDSO just got remapped to a
different virtual address without any relocation at all. Which is safe,
because it is all hand-coded assembly, relocatable code. But not
complete, since the ELF headers don't have any fixup applied for the
relocation, and there are broken linkers which look at the ELF headers
and assert fail if ph->p_vaddr != _rtld_local._dl_sysinfo_dso; these
broken dynamic linkers are what COMPAT_VDSO is protecting.
> I'm tempted to rant on the pure insanity of address space randomization but
> that is a whole other issue...
>
Firesticks in ant nests is all I'm saying about that.
Zach
^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: [RFC, PATCH] Fixup COMPAT_VDSO to work with CONFIG_PARAVIRT
2007-03-16 19:06 ` Eric W. Biederman
@ 2007-03-16 19:46 ` Jeremy Fitzhardinge
0 siblings, 0 replies; 17+ messages in thread
From: Jeremy Fitzhardinge @ 2007-03-16 19:46 UTC (permalink / raw)
To: Eric W. Biederman
Cc: Ingo Molnar, Zachary Amsden, Linux Kernel Mailing List,
Jan Beulich, Rusty Russell, Andi Kleen, Chris Wright,
Andrew Morton, Linus Torvalds, Virtualization Mailing List
Eric W. Biederman wrote:
> There are three ways of finding the VDSO.
> - AT_SYSINFO
> - AT_SYSINFO_EHDR
> - known fixed address (see x86_64)
>
> Currently it doesn't sound like you need to deal with the known fixed
> address case but COMPAT_VDSO also provides that.
>
Yes, I don't think any 32-bit userspace expects a fixed address any
more. 64-bit is another matter.
> If userspace uses AT_SYSINFO the premise is that it is not expecting
> not to need to perform any relocation processing.
>
> If userspace uses AT_SYSINFO_EHDR it expects it needs to perform
> relocation processing and fixes up whatever needs fixing up.
>
Correct.
> With the module code we have shown the kernel is capable of performing
> relocation processing at times and it works.
>
Good point. It would be good to reuse that machinery.
> So is it possible to simply relocate the normal vdso and fixup
> it's program header so it shows that relocation is not necessary.
> If you can do that and still export AT_SYSINFO so the problem user
> space still runs you are good. (If you can relocate the vdso
> you should be able to relocate it anywhere).
>
Yes. The plan is to map the relocated compat vdso at some fixed address
in all processes, and map a non-relocated non-compat vdso at some
randomized address (it will probably be the same bits in either case).
We could map a relocated vdso to a randomized address (ie, only one vdso
mapping), but that would require a per-process copy of the vdso and
effort to relocate on each exec.
> Otherwise it probably just make sense to simply not export a VDSO
> on those systems.
>
We did that in an earlier version of the patch, and Ingo complained,
with some justification.
> This would leave COMPAT_VDSO for the case where you must use one magic
> fixed address, and if user space does not require that it means
> COMPAT_VDSO could be completely removed.
>
FC1 and SuSE 9 both shipped with broken glibcs which require
weak-COMPAT_VDSO (not fixed address, but pre-relocated). There are
still enough of these around that we need to cater to them.
J
^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: [RFC, PATCH] Fixup COMPAT_VDSO to work with CONFIG_PARAVIRT
2007-03-16 4:03 ` Zachary Amsden
2007-03-16 5:10 ` Jeremy Fitzhardinge
@ 2007-03-16 23:09 ` Jan Engelhardt
1 sibling, 0 replies; 17+ messages in thread
From: Jan Engelhardt @ 2007-03-16 23:09 UTC (permalink / raw)
To: Zachary Amsden
Cc: Jeremy Fitzhardinge, Linux Kernel Mailing List, Ingo Molnar,
Jan Beulich, Rusty Russell, Andi Kleen, Eric W. Biederman,
Chris Wright, Andrew Morton, Linus Torvalds,
Virtualization Mailing List
On Mar 15 2007 20:03, Zachary Amsden wrote:
> Well testing that is not so fun. I installed SUSE Pro 9.0, and strings on
> ld.so contains the magic at_sysinfo assert! But it doesn't install TLS
> libraries, so I'll have to install them by hand.
9.0 is kinda old. And if you want some TLS libs, install the _i686_ glibc
package (not done by default).
Jan
--
^ permalink raw reply [flat|nested] 17+ messages in thread
end of thread, other threads:[~2007-03-16 23:09 UTC | newest]
Thread overview: 17+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2007-03-16 2:47 [RFC, PATCH] Fixup COMPAT_VDSO to work with CONFIG_PARAVIRT Zachary Amsden
2007-03-16 3:20 ` Jeremy Fitzhardinge
2007-03-16 4:03 ` Zachary Amsden
2007-03-16 5:10 ` Jeremy Fitzhardinge
2007-03-16 5:58 ` Zachary Amsden
2007-03-16 8:08 ` Jan Beulich
2007-03-16 8:41 ` Zachary Amsden
2007-03-16 16:46 ` Jeremy Fitzhardinge
2007-03-16 17:09 ` Jan Beulich
2007-03-16 23:09 ` Jan Engelhardt
2007-03-16 11:56 ` Eric W. Biederman
2007-03-16 16:25 ` Jeremy Fitzhardinge
2007-03-16 16:31 ` Ingo Molnar
2007-03-16 16:33 ` Jeremy Fitzhardinge
2007-03-16 19:06 ` Eric W. Biederman
2007-03-16 19:46 ` Jeremy Fitzhardinge
2007-03-16 19:38 ` Zachary Amsden
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).