Received: by 10.213.65.68 with SMTP id h4csp213834imn; Fri, 30 Mar 2018 04:12:02 -0700 (PDT) X-Google-Smtp-Source: AIpwx482Jzis6qB38+jl1NE5X7k4mV1I7+Xaw6XPQx0nOIUdigGtJcOvhvYRB7h+KRIQT3/KznaH X-Received: by 10.101.97.9 with SMTP id z9mr7419639pgu.446.1522408322749; Fri, 30 Mar 2018 04:12:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1522408322; cv=none; d=google.com; s=arc-20160816; b=p7BRxiMfc1XyX7ndlT7d1PW/a++xtNzveTnOqY782yyhHGQ1HWnmrHIVta/IQyFNlH V5kE+tdYZVhny/XtCqI9lsoTJV2d2c3qcdaBScDYmxat3abW+UGRAUWJlwsw5pC9hsT+ gj5xCU15qbQC27msfjlIFJNKJTy636wt9r/+3W1niSD6l6xBtwqna9MrntzH9hGBhhTn 8hsL4M2/YBsj+iELtFgddCe6zTS2vvOFNsvnrHZH7d/AGeHP3hUW8++A0/MweVvGW8/y F9+kzTxFA+AnBQ4OP2shZ45IaodULHQfHGsGN8LRCekayC3bfZHqm1Z8azYDE2Y+0EbA gKPQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:to:references:message-id :content-transfer-encoding:cc:date:in-reply-to:from:subject :mime-version:dkim-signature:arc-authentication-results; bh=DMv1OHAJmnEuxAnHztpCW3t3RuKwa0Ou1+EXusdSHqQ=; b=THdROWEq3HfdnkPbQEE/Zrn2bBZjZGxWAQFyIDZz6iY4EVo7Ua07hdLTHxs9fNnTfR WCtcnr8QiXFVH3RnwPzMs0zxQu0x3aTxGUpb8QDEsp4w5AfwMUDjAEcc5vTCd+q03c4H oAGPVK7A87H0WY/hhO/S+Mz2zTpsmqfU41MyVI+mOlCBXqjIA6brc20jkhgjW/DzFiVh 29pSh53un3YXaet+8ffLf/6Apnw95/L5auqNldkJ90YZHqdkxH5cshQ+Bgc+ZgdH92Mp MANqsqZO8MwjqqzJ0X2+jC0pYM06eQ9xQ3DKude71XHafCv9Ahw34Np0VAs3K3QKPHCp Je6A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=c6OeY3LG; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x4-v6si7993527plv.81.2018.03.30.04.11.48; Fri, 30 Mar 2018 04:12:02 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=c6OeY3LG; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751312AbeC3LKb (ORCPT + 99 others); Fri, 30 Mar 2018 07:10:31 -0400 Received: from mail-lf0-f68.google.com ([209.85.215.68]:35951 "EHLO mail-lf0-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751096AbeC3LK1 (ORCPT ); Fri, 30 Mar 2018 07:10:27 -0400 Received: by mail-lf0-f68.google.com with SMTP id z143-v6so12163393lff.3; Fri, 30 Mar 2018 04:10:25 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=DMv1OHAJmnEuxAnHztpCW3t3RuKwa0Ou1+EXusdSHqQ=; b=c6OeY3LG3/SmGB2/VJasz3Jj1Hl1qs0qDK02ShrL9GqU7fI0AEKmpelcTMKCO85SMQ gtPSuao6g/t6hVKuBSTvL6NzEa5UKjxGQYwtxpI8N621RaKLGW1gjaUBl4VmxhR1VaCK 5u81T57afjTslrmEOAyZfWWa/xMhaWkcfKLeJ7adeGpJplpq6REV/Oqg05kn+j511X6k ugbrSRQqCvRyHe9AvD/1SqZamn/VJUqI61Z4dJJ+ZTiiR2nChbu7ug4phF/lPNYmFQFY tfjd1OqikW7SJCpbz8CCSxvJvKRs0bq5yLp0i2NYZYtoPUz0R+CYfFsnaF8fpOWUD/ws tkFg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=DMv1OHAJmnEuxAnHztpCW3t3RuKwa0Ou1+EXusdSHqQ=; b=nhHT5PNPZLeDUSQinwTkwqvDZUmHTdfj1f7kGeCA0z9SKEf4tbl0Uy5lTURvIEcxnU EdWHVka+RUMfwk4xRo34/c3EiFy3MVWfxDhEbow5/WNHHy5dgEUteMCwX+YN8eNdOnpZ ivuk768H8cNS33gtX5TrAb65BOcQYibWjvNkIqnubon9AbjHSNQkBc6iiCMp4vXSfaMq 0pTYKRx1IDAq3T2YJcOHO00FobNPIYIRvlQAIeGK4tm84Yz1AdqLoNXHErcoia4gLeih auaPBmwACnjbAve5RsQqTh7QhBMfmusTeYJAbnUiBp/CFxy6VJ3/62jqtCGPLjZ9fAEM IRZg== X-Gm-Message-State: AElRT7FBzO3ehKgcgsR5KC3Y1TO91g5xQN0dJ7OwSz3YAMo4mKPApe9P YbsvaVTCuGDaMnbyeOzEI84= X-Received: by 10.46.135.139 with SMTP id n11mr8188891lji.65.1522408224891; Fri, 30 Mar 2018 04:10:24 -0700 (PDT) Received: from [10.0.36.208] ([31.44.93.2]) by smtp.gmail.com with ESMTPSA id q28-v6sm1622452lfb.84.2018.03.30.04.10.22 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 30 Mar 2018 04:10:23 -0700 (PDT) Content-Type: text/plain; charset=utf-8 Mime-Version: 1.0 (Mac OS X Mail 11.2 \(3445.5.20\)) Subject: Re: [RFC PATCH v2 0/2] Randomization of address chosen by mmap. From: Ilya Smith In-Reply-To: <20180330095735.GA15641@amd> Date: Fri, 30 Mar 2018 14:10:21 +0300 Cc: rth@twiddle.net, ink@jurassic.park.msu.ru, mattst88@gmail.com, vgupta@synopsys.com, linux@armlinux.org.uk, tony.luck@intel.com, fenghua.yu@intel.com, jhogan@kernel.org, ralf@linux-mips.org, jejb@parisc-linux.org, Helge Deller , benh@kernel.crashing.org, paulus@samba.org, mpe@ellerman.id.au, schwidefsky@de.ibm.com, heiko.carstens@de.ibm.com, ysato@users.sourceforge.jp, dalias@libc.org, davem@davemloft.net, tglx@linutronix.de, mingo@redhat.com, hpa@zytor.com, x86@kernel.org, nyc@holomorphy.com, viro@zeniv.linux.org.uk, arnd@arndb.de, gregkh@linuxfoundation.org, deepa.kernel@gmail.com, Michal Hocko , hughd@google.com, kstewart@linuxfoundation.org, pombredanne@nexb.com, akpm@linux-foundation.org, steve.capper@arm.com, punit.agrawal@arm.com, paul.burton@mips.com, aneesh.kumar@linux.vnet.ibm.com, npiggin@gmail.com, keescook@chromium.org, bhsharma@redhat.com, riel@redhat.com, nitin.m.gupta@oracle.com, kirill.shutemov@linux.intel.com, dan.j.williams@intel.com, jack@suse.cz, ross.zwisler@linux.intel.com, jglisse@redhat.com, willy@infradead.org, aarcange@redhat.com, oleg@redhat.com, linux-alpha@vger.kernel.org, linux-kernel@vger.kernel.org, linux-snps-arc@lists.infradead.org, linux-arm-kernel@lists.infradead.org, linux-ia64@vger.kernel.org, linux-metag@vger.kernel.org, linux-mips@linux-mips.org, linux-parisc@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, linux-s390@vger.kernel.org, linux-sh@vger.kernel.org, sparclinux@vger.kernel.org, linux-mm@kvack.org Content-Transfer-Encoding: quoted-printable Message-Id: <4F529F89-6595-4DE9-87C2-C3D971C76658@gmail.com> References: <1521736598-12812-1-git-send-email-blackzert@gmail.com> <20180330075508.GA21798@amd> <95EECC28-7349-4FB4-88BF-26E4CF087A0B@gmail.com> <20180330095735.GA15641@amd> To: Pavel Machek X-Mailer: Apple Mail (2.3445.5.20) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > On 30 Mar 2018, at 12:57, Pavel Machek wrote: >=20 > On Fri 2018-03-30 12:07:58, Ilya Smith wrote: >> Hi >>=20 >>> On 30 Mar 2018, at 10:55, Pavel Machek wrote: >>>=20 >>> Hi! >>>=20 >>>> Current implementation doesn't randomize address returned by mmap. >>>> All the entropy ends with choosing mmap_base_addr at the process >>>> creation. After that mmap build very predictable layout of address >>>> space. It allows to bypass ASLR in many cases. This patch make >>>> randomization of address on any mmap call. >>>=20 >>> How will this interact with people debugging their application, and >>> getting different behaviours based on memory layout? >>>=20 >>> strace, strace again, get different results? >>>=20 >>=20 >> Honestly I=E2=80=99m confused about your question. If the only one = way for debugging=20 >> application is to use predictable mmap behaviour, then something went = wrong in=20 >> this live and we should stop using computers at all. >=20 > I'm not saying "only way". I'm saying one way, and you are breaking > that. There's advanced stuff like debuggers going "back in time". >=20 Correct me if I wrong, when you run gdb for instance and try to debug = some=20 application, gdb will disable randomization. This behaviour works with = gdb=20 command: set disable-randomization on. As I know, gdb remove flag = PF_RANDOMIZE=20 from current personality thats how it disables ASLR for debugging = process.=20 According to my patch, flag PF_RANDOMIZE is checked before calling=20 unmapped_area_random. So I don=E2=80=99t breaking debugging. If you = talking about the=20 case, when your application crashes under customer environment and you = want to debug it; in this case layout of memory is what you don=E2=80=99t = control at all and=20 you have to understand what is where. So for debugging memory process = layout is not what you should care of. Thanks, Ilya