Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933746AbdDSKp6 (ORCPT ); Wed, 19 Apr 2017 06:45:58 -0400 Received: from mail-wr0-f177.google.com ([209.85.128.177]:34074 "EHLO mail-wr0-f177.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1761912AbdDSKpz (ORCPT ); Wed, 19 Apr 2017 06:45:55 -0400 MIME-Version: 1.0 In-Reply-To: <20170419103313.GA3238@e104818-lin.cambridge.arm.com> References: <1492088223-98232-1-git-send-email-zhangshaokun@hisilicon.com> <2414e3b3-03f6-bd6c-5aa4-ad58c66b5aa5@huawei.com> <20170418170118.GH27592@e104818-lin.cambridge.arm.com> <20170419103313.GA3238@e104818-lin.cambridge.arm.com> From: Peter Maydell Date: Wed, 19 Apr 2017 11:45:33 +0100 Message-ID: Subject: Re: [PATCH] fs: Preventing READ_IMPLIES_EXEC Propagation To: Catalin Marinas Cc: Mark Rutland , "dongbo (E)" , Peter Maydell , Will Deacon , Linuxarm , "linux-kernel@vger.kernel.org" , Al Viro , linux-fsdevel@vger.kernel.org, arm-mail-list Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1338 Lines: 37 On 19 April 2017 at 11:33, Catalin Marinas wrote: > On Tue, Apr 18, 2017 at 09:01:52PM +0100, Peter Maydell wrote: >> >> > That's affecting most architectures with a risk of ABI breakage. We >> > could do it on arm64 only, though I'm not yet clear on the ABI >> > implications (at a first look, there shouldn't be any). >> >> Is there a reason why it isn't just straightforwardly a bug >> (which we could fix) to make READ_IMPLIES_EXEC propagate to >> child processes? > > While I agree that it looks like a bug, if there are user programs > relying on such bug we call it "ABI". Can there be any? Such a program would behave differently depending on how the program that spawned it happened to have been compiled, and for instance could break when the OS happened to have its init binary updated even if the kernel didn't change. >> Behaviour shouldn't be variable across architectures either, I would >> hope. > > The behaviour has already been variable for a long time. Even on x86, > AFAICT x86_32 differs from x86_64 in this respect. That also sounds like a bug to me. > Anyway, the patch should be posted to linux-arch for a cross-arch > discussion. Agreed -- there may be something I'm missing, since it looks like this behaviour of inheriting READ_IMPLIES_EXEC has always been there. thanks -- PMM