From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 65C77EEE25C for ; Thu, 12 Sep 2024 21:10:42 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id DCB316B0088; Thu, 12 Sep 2024 17:10:41 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id D54F46B0089; Thu, 12 Sep 2024 17:10:41 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id BF5386B008A; Thu, 12 Sep 2024 17:10:41 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0011.hostedemail.com [216.40.44.11]) by kanga.kvack.org (Postfix) with ESMTP id A12376B0088 for ; Thu, 12 Sep 2024 17:10:41 -0400 (EDT) Received: from smtpin30.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay06.hostedemail.com (Postfix) with ESMTP id 2687DA9D29 for ; Thu, 12 Sep 2024 21:10:41 +0000 (UTC) X-FDA: 82557330282.30.FD9268C Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by imf30.hostedemail.com (Postfix) with ESMTP id 61CFA80015 for ; Thu, 12 Sep 2024 21:10:39 +0000 (UTC) Authentication-Results: imf30.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=DE6Hs9J2; dmarc=pass (policy=quarantine) header.from=kernel.org; spf=pass (imf30.hostedemail.com: domain of bugbot@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=bugbot@kernel.org ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1726175361; a=rsa-sha256; cv=none; b=oLB+AqOfVqLKCFXTTzCXQSzj1YpXSjmv6Q24k1fjTgJrZGDU/ku2GQTpIHyWk4p5u4GBaj ZY7FOo6rS+O2Uf5xF8JrZuiDH0AEtLAkxQ++bg141x82VSsexHmnpQ5bTFZqaaMl2ANIRQ dRQYlkYHfW94Z88wUQBgQ+nK+JXpLJ4= ARC-Authentication-Results: i=1; imf30.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=DE6Hs9J2; dmarc=pass (policy=quarantine) header.from=kernel.org; spf=pass (imf30.hostedemail.com: domain of bugbot@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=bugbot@kernel.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1726175361; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=rfUdWWiBt2QrZ7gpvEazkQmWSQgMsfBqHuT0Z2mb9BQ=; b=PVNyREsQ4imwQbvoMZLMLkVPovlnh/JGMws5Fy4w8kx/CAZ8S1osfIcE/VWzbkNAzY8JsW UwBYU9+VWwOyz7nFHQpEmMVvWGK6AufqLMdLgLikjuCglUTXlJoNeG7TB02J5iayfWMtS2 QKOH8XmnKKBBx5qgjazJaF7HdGgu16I= Received: from smtp.kernel.org (transwarp.subspace.kernel.org [100.75.92.58]) by dfw.source.kernel.org (Postfix) with ESMTP id BC2AF5C5AF0; Thu, 12 Sep 2024 21:10:34 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 0E67DC4CEC3; Thu, 12 Sep 2024 21:10:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1726175438; bh=cGS80oDgBo4AFvk2xrRLx9dibznv4g5D0hKMt9bF0NE=; h=Date:From:To:In-Reply-To:References:Subject:From; b=DE6Hs9J20f2A3vqy7nZatwTkyOuDJt/9Op+Z4UwrgakTyrG9/j0fA0YLAwSjY3IOf EZoJ6g6VOxJInGs3TWQDyv57JupyvdQ5aHX7L9TLBbvoo1GYPxsUM4s3/IZxpL++JL gdGzjCX7q7zSnPk42smE56W2H70V5n/CI4q2bMQ/qQwN1h3wHcOFsE/seE1+PRiJdi n2kKvKTyZqboXtc4HbvVV78YEr0iJrgWW3P0blkAAtpXBuDYcbN1xK/jgoM60KC92H bapLjdEzAk55RiQxj6VzonmvaS1KMGYGIlc8oL369ugNFC7OxY21wEtdktLH9SYtlk AZkwD15Cl9XRw== Received: from [10.30.226.235] (localhost [IPv6:::1]) by aws-us-west-2-korg-oddjob-rhel9-1.codeaurora.org (Postfix) with ESMTP id 717473806644; Thu, 12 Sep 2024 21:10:40 +0000 (UTC) Date: Thu, 12 Sep 2024 21:10:10 +0000 MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit From: Bugspray Bot To: akpm@linux-foundation.org, bugs@lists.linux.dev, linux-mm@kvack.org Message-ID: <20240912-b219227c1-1be2c7de9e2b@bugzilla.kernel.org> In-Reply-To: <20240912-b219227c0-78bee9e213fc@bugzilla.kernel.org> References: <20240912-b219227c0-78bee9e213fc@bugzilla.kernel.org> Subject: Re: MDWE does not prevent read-only, executable, shared memory regions to be updated by backing file writes X-Bugzilla-Product: Linux X-Bugzilla-Component: Kernel X-Mailer: bugspray 0.1-dev X-Rspamd-Queue-Id: 61CFA80015 X-Rspam-User: X-Rspamd-Server: rspam05 X-Stat-Signature: nobhjqtzixfxfaimedpix7xtnkeht8iw X-HE-Tag: 1726175439-711245 X-HE-Meta: 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 qRh8C8An 824g3BIkB4OZ7/tIP3mFJVz8NnqD3MqI/9pIq36cAUI7kp5aDG0oLC9ou6f/Od4Z6mgcRJtXoow7Eu/KcDmQcpuRue/3HKynbAnbij6eaKbXnOCv/QbFKUdVstBMGWmFuQNuGszYplaAJPBh6ew+ld+fktxHZ6MV2odWVisw+z3vcnp3UdlqBtomI6WFSY3ZAfr0xIiUTDZPbNeL+YoUXKxOnv7UJoFogwfgjMv0wyes0HBO74Vg+X4aMhYpTxG6CEJYVk9scYfKz4jkbThgRgwRIt/Lat9HSWP2EjC9EURO92qKGVl7uz5VyamsYglRoPDgR X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: alip writes via Kernel.org Bugzilla: I am sorry, I forgot to post the output of the PoC. On a system with Linux kernel 6.8 I get: ⇒ ./a.out [*] Mapped Content: malicious code [!] RX memory updated thru a backing file write under MDWE. View: https://bugzilla.kernel.org/show_bug.cgi?id=219227#c1 You can reply to this message to join the discussion. -- Deet-doot-dot, I am a bot. Kernel.org Bugzilla (bugspray 0.1-dev)