From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-qk1-x729.google.com (mail-qk1-x729.google.com [IPv6:2607:f8b0:4864:20::729]) by sourceware.org (Postfix) with ESMTPS id AE5813858C27 for ; Thu, 26 Aug 2021 11:16:06 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.1 sourceware.org AE5813858C27 Received: by mail-qk1-x729.google.com with SMTP id m21so2784908qkm.13 for ; Thu, 26 Aug 2021 04:16:06 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=lWRSDE9joebqIlZqnAGzORP+YE7/+2bNEzaTVJG3Los=; b=ZXYVSQB6Xs1aeYqmHy47QUDUnY6Si1idxg7Lxbk4vUWLnNDMBOACh7oYjFtVn60NTY 85xjY6bGZio2ZnOY0tfnMmHp0bZIg3X23STpR2TILwIJsC7Wvl9nINzooV5LdhO1gGKq an2jBHI+DuTxCF54n2NEqEV4TNcDqQ6Kwk2UKGWutv4P4Ax9/p+t2WD9VXvFIZ1ra9EQ pS9PS5f45zsv5BA5Eh3o9tRU9yNEV+XXYG7EqG+r7H88e3Uc+F6+41HbvFiyLOGTQpEl p6KBSxA34zPwIr5gJ7Ml9Bwp14Jce3HyE6TExt4aF5E50F81ZlJ2USjGJrzWU2CY3DjY wlbQ== X-Gm-Message-State: AOAM531zRqxbsrG/u+YMl7YU4JsDqh4wAsXbP2onuhCVGQ4sCkLlFTkQ y0NhMjYRWfzzVDI5dArIHF3HZaFFIP9fOg== X-Google-Smtp-Source: ABdhPJwlbG67IbxsG+3ZWahZIwqLk5Gq5X8k9RxR1OkGGtDBc++6ZN30ssYawIGvsPakjJmYzvtREA== X-Received: by 2002:a05:620a:145c:: with SMTP id i28mr3035279qkl.118.1629976565893; Thu, 26 Aug 2021 04:16:05 -0700 (PDT) Received: from ?IPv6:2804:431:c7ca:1a68:4988:5e6e:21a3:3c6b? ([2804:431:c7ca:1a68:4988:5e6e:21a3:3c6b]) by smtp.gmail.com with ESMTPSA id p14sm834709qtq.43.2021.08.26.04.16.04 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 26 Aug 2021 04:16:05 -0700 (PDT) Subject: Re: glibc 2.34 and Yocto Project's "uninative" To: Richard Purdie , Libc-help References: <978104bdbebcd09d159f1713499cf1315edf40f2.camel@linuxfoundation.org> <4224ac85-83b7-6fe8-6781-b8e8f514924a@linaro.org> <55b147c8807abe56c41670b6c3e20fdbec85f291.camel@linuxfoundation.org> From: Adhemerval Zanella Message-ID: <6d63802a-dc3c-e2de-8db4-a0ec92bbb9f6@linaro.org> Date: Thu, 26 Aug 2021 08:16:03 -0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.11.0 MIME-Version: 1.0 In-Reply-To: <55b147c8807abe56c41670b6c3e20fdbec85f291.camel@linuxfoundation.org> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-5.6 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, NICE_REPLY_A, RCVD_IN_DNSWL_NONE, SPF_HELO_NONE, SPF_PASS, TXREP, URIBL_BLACK autolearn=ham autolearn_force=no version=3.4.4 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on server2.sourceware.org X-BeenThere: libc-help@sourceware.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Libc-help mailing list List-Unsubscribe: , List-Archive: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 26 Aug 2021 11:16:17 -0000 On 25/08/2021 17:11, Richard Purdie wrote: > On Wed, 2021-08-25 at 12:05 -0300, Adhemerval Zanella wrote: >> >> On 20/08/2021 11:37, Richard Purdie via Libc-help wrote: >>> Hi, >>> >>> Yocto Project is a cross compiling build system used to build customised >>> Linux, RTOSs, firmware and more. It has some interesting technology. One piece >>> of it is "pseudo" (http://git.yoctoproject.org/cgit.cgi/pseudo/) which is an >>> LD_PRELOAD which intercepts calls to libc and fakes root privileges. One way or >>> another we've managed to keep that working with multiple libc versions for the >>> last decade. >>> >>> A second piece of technology is uninative. We build a lot binary artefacts, some >>> for the target, some as tools running natively on the build system. We have a >>> cache of these artefacts people can share and reuse. Uninative is our way of >>> allowing one binary to run on any host distro. We do that by shipping a ld+libc >>> binary shim and change the interpreter in the native binary to point at our own. >>> As long as the shim is the same version or later than system version, it works. >>> >>> In glibc 2.34, the merge of libdl and libpthread into libc is causing a problem >>> for us. Basically, I've been able to make pseudo work and I can make uninative >>> work however I can't make them both work together with glibc 2.34. >>> >>> Pseudo uses minimal dl calls from libdl (dlsym, dlvsym and dlerror) and has a >>> pthread mutex, therefore it links to -ldl and -lpthread. >>> >>> The issue is that pseudo being an LD_PRELOAD, if linked against glibc 2.34 >>> doesn't "see" symbols in libdl and just links to libc. I did try forcing older >>> versions of the symbols along the lines of: >>> >>> __asm__(".symver dlerror,dlerror@GLIBC_" DLSYMVER); >>> __asm__(".symver dlvsym,dlvsym@GLIBC_" DLVSYMVER); >>> __asm__(".symver dlsym,dlsym@GLIBC_" DLSYMVER); >>> >>> with some arch specific version number defines however even if I do this, and >>> put back a libdl.so symlink to the lib, the linker ignores the weak wildcard >>> reference and links back to libc.so itself. When we then use this preloaded lib >>> on a system with an older libc: >>> >>> relocation error: [...]/libpseudo.so: symbol dlerror, version GLIBC_2.2.5 not defined in file libc.so.6 with link time reference >> >> Unfortunately this was never officially supported, since it is basically >> trying to run a binary built in a newer glibc on an older one. The >> issue is not that linker put back libc.so, but rather that with GLIBC >> 2.34 there is a lot of more default symbols that are tied to GLIBC_2.34 >> version. > > Thanks for the reply. I do appreciate this isn't officially supported. I had > hoped that by using minimal calls we might have been able to figure something > out but I hadn't realised there were the other symbols being added. That > certainly complicates it and explains a few things. > >> For instance: >> >> $ cat dl.c >> #include >> #include >> >> int main (int argc, char *argv[]) >> { >> void *h = dlopen (argv[1], RTLD_NOW); >> assert (h != 0); >> return 0; >> } >> >> asm (".symver dlopen,dlopen@GLIBC_2.2.5"); >> >> $ readelf -Ws dl | grep GLIBC_2.34 >> 1: 0000000000000000 0 FUNC GLOBAL DEFAULT UND __libc_start_main@GLIBC_2.34 (2) >> 24: 0000000000000000 0 FUNC GLOBAL DEFAULT UND __libc_start_main@GLIBC_2.34 >> >> >> The __libc_start_main has the additional issue that it is provided by crt1.o, >> so the symver in the main TU won't solve it. You will need to hack it with >> the static linker, even by adding some wrap symbol to redirect to the >> __libc_start_main@GLIBC_2.2.5. > > Needing to hack these kinds of internals starts to make me worry a lot about > whether there are details that will trip things up at runtime. > >>> I did try ensuring libpseudo.so has a RUNPATH that includes our uninative libc >>> however the loader ignores that for loading libc. I did then add our uninative >>> libc path to LD_LIBRARY_PATH however that fails: >> >> And I don't think this would work, it would force two libc with potentially >> two different versions. > > It was very clear that the ld and libc need to be matched from the kinds of > mismatches and I gave up on this route quickly. > >>> >>> libc.so.6: symbol _dl_exception_create, version GLIBC_PRIVATE not defined in file ld-linux-x86-64.so.2 with link time reference >>> >>> since the ld being used doesn't match the libc. >>> >>> Can anyone see a way we could make things work? >> I don't have easy library based solution for the requisites you posed, >> building a newer glibc and running on a older one. I think what *might* >> work is to provide a auditor library linked against the newer glibc and >> it then intercepts and routes the required library calls. You will need >> to redistribute the libc which the auditor was linked against. > > The other libc is already there so that bit is easy. I hadn't thought about > using an auditor library and I'll have to explore that. The auditor interface work on some examples, but unfortunately we also found that they are fully correct on some more specific cases. We are aiming to fix for 2.35 [1]. > > I was going to go down the route of dummy libraries to link against however I > realised it was easier for testing just to pull down 2.33 binaries and use those > to link against. I did have to replace use of pthread_atfork with > __register_atfork which is ugly but probably okish for our use as it has been > there since 2.3.2. Yes, this is what I would suggest you (use an older glibc to link this against). > > That probably gets us out the immediate problem although it does highlight we're > doing something that isn't supported and could break again in ways we may > struggle to fix. We can probably replace the pthread linkage for the mutex with > direct code/syscall usage. We're going to need the libdl usage regardless though > so it may be worth us figuring out the dummy library to link against for that > piece. Why do you need to build it on a recent glibc and potentially use it on an older one? > > Thanks for the info though, it is much appreciated and it helps a lot to > understand what was breaking and some other avenues like the auditor lib to > explore. > > Cheers, > > Richard > > [1] https://patchwork.sourceware.org/project/glibc/list/?series=2577