From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 076EEEEE266 for ; Thu, 12 Sep 2024 21:10:57 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 95E716B008A; Thu, 12 Sep 2024 17:10:56 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 8E8316B008C; Thu, 12 Sep 2024 17:10:56 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 788D76B0092; Thu, 12 Sep 2024 17:10:56 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0013.hostedemail.com [216.40.44.13]) by kanga.kvack.org (Postfix) with ESMTP id 5A8096B008A for ; Thu, 12 Sep 2024 17:10:56 -0400 (EDT) Received: from smtpin13.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay05.hostedemail.com (Postfix) with ESMTP id 077D7408A2 for ; Thu, 12 Sep 2024 21:10:56 +0000 (UTC) X-FDA: 82557330912.13.1A66625 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by imf23.hostedemail.com (Postfix) with ESMTP id 2A722140014 for ; Thu, 12 Sep 2024 21:10:54 +0000 (UTC) Authentication-Results: imf23.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=HskOr6J4; dmarc=pass (policy=quarantine) header.from=kernel.org; spf=pass (imf23.hostedemail.com: domain of bugbot@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=bugbot@kernel.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1726175337; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=YMqxLW6Alu2jZTRH9yKjLV37Cii2yvEnT3k1Dnfj5T8=; b=DjtCby3D1GkmAKSMai/ThfOY2jTj/2sJ5U/IsQAm0P4BH0LOTBRwAzES6lAMRYkcfnvizm KemrfwJBiX2f+pmZUwbT9ojSGs8DBBHx4xM2OaYxZ2ykYRpIO/mzRBqJP3tDjggnbCWIJs UqdlsEbm3gTmkTGLatdaXhNf2stWsCI= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1726175337; a=rsa-sha256; cv=none; b=wI70fJ6RTKxT8bvL7+fh4mxobLIE831Ay1FPHTjJx4HDoRDxX3O+PlE4QkLO3R8WCqUYS9 +p/1zeVReVXdUq1Z3kbi1EbBZ5u+SkETBKlQXWr/15Xi77UXOPc8NvCp04P7CCKfbzb2vk xY4fF2nwmDO89LZlR1OBVe5YXQjJ4E0= ARC-Authentication-Results: i=1; imf23.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=HskOr6J4; dmarc=pass (policy=quarantine) header.from=kernel.org; spf=pass (imf23.hostedemail.com: domain of bugbot@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=bugbot@kernel.org Received: from smtp.kernel.org (transwarp.subspace.kernel.org [100.75.92.58]) by dfw.source.kernel.org (Postfix) with ESMTP id C23EF5C5BA6; Thu, 12 Sep 2024 21:10:49 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 092C7C4CEC5; Thu, 12 Sep 2024 21:10:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1726175453; bh=/JyNX643AHmG0uqEE+FAe4O4pBOLAsYAKrChOw1X3HI=; h=Date:From:To:In-Reply-To:References:Subject:From; b=HskOr6J4CRW+1GfZc0iYE524r/ahFdMsB959w8W0zZke9avzWrtiJqnuWQCn50pMm wV4zsjIQvGzUKuGL/GAsEHReFZ7oB9tlhgAR3z4Ai9dt5KPlA2s6wK4UAGjxW9x1Xc 3qto1kUScrK/y7nZDBCLe6umlsvLWh5H/sPoJedEvyT82Z5q/ccncDTA/YveYXOP6K iuJp7xbKHvzHNoafiih7yEJnIghJK3glHpR2+EV5uJ8WPBFfQEzYipYtKNY6aA+1Vo hvxsBmwjw9rHbOFIEIgf4mHytqPwQVoNKeEM8zbKt3xtBEBrsEg4Gw9eSuMkZVa31N vcNkBzYVnht7g== Received: from [10.30.226.235] (localhost [IPv6:::1]) by aws-us-west-2-korg-oddjob-rhel9-1.codeaurora.org (Postfix) with ESMTP id 713363806644; Thu, 12 Sep 2024 21:10:55 +0000 (UTC) Date: Thu, 12 Sep 2024 21:10:11 +0000 MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit From: Bugspray Bot To: akpm@linux-foundation.org, bugs@lists.linux.dev, linux-mm@kvack.org Message-ID: <20240912-b219227c2-cbc539461a3e@bugzilla.kernel.org> In-Reply-To: <20240912-b219227c0-78bee9e213fc@bugzilla.kernel.org> References: <20240912-b219227c0-78bee9e213fc@bugzilla.kernel.org> Subject: Re: MDWE does not prevent read-only, executable, shared memory regions to be updated by backing file writes X-Bugzilla-Product: Linux X-Bugzilla-Component: Kernel X-Mailer: bugspray 0.1-dev X-Rspamd-Server: rspam07 X-Rspamd-Queue-Id: 2A722140014 X-Stat-Signature: 4ftd8uj446ct1o6pk59kgkt95gsbqyup X-Rspam-User: X-HE-Tag: 1726175454-651965 X-HE-Meta: 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 3mF4SLq+ ZHY9IVn5BCQlzv4UQIyyRo9ZRsRFUUoyADP8jSG4ffoxZ5H7i1L8sHtl186TKJ3ueFKeZtzKKndoe1qaQd2gd8spFCIQ1DBXLn6gQMPpQI8ECr3IzfWFxSDyxOYTYD3fTNXV2z72Lns635j4ok7LNLZYs8ZHZ0Ox7OiMHx9sPe2jXtGzxKwu0BIaMRnNFKUpsD7SkPmFp4z17bDiPXSxJAQKX1RPbpVtubEYGfUGwP2fQH8KEFuMoRIFL8QK70VJl+sm3V9eO7Okp88Myla9A5A6jcqhclVV+nWk1OvT85fqaRf2iBwq6Rxcv+L+iQETRFWE5n3OzmwBU3KxHuRconGfPVzDtQzoI5dPmCR6YmWDdqJY= X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: alip writes via Kernel.org Bugzilla: Note, this is trivial to mitigate with a seccomp-bpf filter. Sample code in Rust. Given "ctx" is a seccomp filter context: // Prevent executable shared memory. ctx.add_rule_conditional( ScmpAction::KillProcess, ScmpSyscall::new("mmap"), // same applies for mmap2. &[scmp_cmp!($arg2 & PROT_EXEC == PROT_EXEC), scmp_cmp!($arg3 & MAP_SHARED == MAP_SHARED)], )?; This is what syd[1] does since version 3.15.1 [1]: https://man.exherbolinux.org/syd.7.html#Advanced_Memory_Protection_Mechanisms View: https://bugzilla.kernel.org/show_bug.cgi?id=219227#c2 You can reply to this message to join the discussion. -- Deet-doot-dot, I am a bot. Kernel.org Bugzilla (bugspray 0.1-dev)