Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp547324pxx; Mon, 26 Oct 2020 14:55:03 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxAvdf7OoZHhw8Flq5p6IPe6Lfl12alpMn+AvBBfEpS1eM25DhHBmPcRSJQfgMPrTLUYGOo X-Received: by 2002:a50:f785:: with SMTP id h5mr16181058edn.249.1603749302755; Mon, 26 Oct 2020 14:55:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603749302; cv=none; d=google.com; s=arc-20160816; b=w5IOc9k648O5/nxmct+eL94cQ0DezAK+fJWm7LY2NEz2IsmsPuOaZBO95I4WGwxb6C QmOe3Rl+1izHkq2vYwHYUdbGp533YfPCFDiiMygUbHwxhBRtDoZBUAGB8dYRDE5Mo3NC YBEieKq01jqm+JBckxRYJ8FzEzg7jq9IhjivSiH7ZreEPf0cnQCgACsgQWPYbi15a8sC 5wHr3as8oRg7thZWAnMAqZU7h7nRYBk6CiyWfQ9SzvtBP5540YuylIn+OygnQfO9zEWB Gze7Y6sFeUKYBWCnQw31hiz/hEi1wbvQJNvfGQwwElcDpYa++kKH+6J8uCoj2g53idlV hX0A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=Xb2UwSkNcM9cbBM3zlY+jbuzH3M6a/pJtoQEPvBsp7k=; b=euVpdBdQ7ey4qsIVJwq/6E/zAPq080efoz2xWdXIcDzv/S3roZkpw/tEsHjdddcr/Q eW5kXmttwQUCntUvV5mcM4PWY4AvklteM+HlEWz3ab7qhsnIIPNS49nW+PRrmkLydEg6 UD0Ymdb3PwFx76R2wxWWW+SF12PUGxrBO+N1dNfvJbBU0S7U9L5YTLaZx39gOjLOXL2H ro7PwRQilJZ9aci1jYiqQEfiH/y9PwJnddd32zbp8PWtE+UBapshVzdgb4C2rk9wrD+m yvvOPa8XSxpI+2sYeoO2n4JHB68ZrqTkJ4P/HO6fsYHvGvr6tPNOeWkE5mO/mCOgFOt+ dXbw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=n0OeLdOt; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s6si8407597eju.387.2020.10.26.14.54.38; Mon, 26 Oct 2020 14:55:02 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=n0OeLdOt; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1786546AbgJZQwR (ORCPT + 99 others); Mon, 26 Oct 2020 12:52:17 -0400 Received: from mail.kernel.org ([198.145.29.99]:44992 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1781267AbgJZQva (ORCPT ); Mon, 26 Oct 2020 12:51:30 -0400 Received: from localhost (fw-tnat.cambridge.arm.com [217.140.96.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 66404221FC; Mon, 26 Oct 2020 16:51:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1603731089; bh=Xb2UwSkNcM9cbBM3zlY+jbuzH3M6a/pJtoQEPvBsp7k=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=n0OeLdOtic5bPMHrJNTDAZZk8om61ybbk/lRM2morVVr0p0gU5pxKpJ4ky+5XuUFC Ueqjsz/CimTtIXrSzJ4EsJ+6cFUVL3htTzpmmNkqnHb/PeJeGrvVrRpv50GvRYw3O+ hsZProyK79R1Ngd6rjPchjVWWDcfW2JaFoFrTEA0= Date: Mon, 26 Oct 2020 16:51:25 +0000 From: Mark Brown To: Dave Martin Cc: Catalin Marinas , Topi Miettinen , Mark Rutland , Salvatore Mesoraca , systemd-devel@lists.freedesktop.org, Kees Cook , kernel-hardening@lists.openwall.com, Will Deacon , "linux-kernel@vger.kernel.org" , Jeremy Linton , linux-hardening@vger.kernel.org, libc-alpha@sourceware.org, "linux-arm-kernel@lists.infradead.org" Subject: Re: BTI interaction between seccomp filters in systemd and glibc mprotect calls, causing service failures Message-ID: <20201026165125.GF7402@sirena.org.uk> References: <8584c14f-5c28-9d70-c054-7c78127d84ea@arm.com> <20201022075447.GO3819@arm.com> <78464155-f459-773f-d0ee-c5bdbeb39e5d@gmail.com> <202010221256.A4F95FD11@keescook> <20201023090232.GA25736@gaia> <20201026145245.GD3117@gaia> <20201026155628.GA27285@arm.com> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="cpvLTH7QU4gwfq3S" Content-Disposition: inline In-Reply-To: <20201026155628.GA27285@arm.com> X-Cookie: Safety Third. User-Agent: Mutt/1.10.1 (2018-07-13) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org --cpvLTH7QU4gwfq3S Content-Type: text/plain; charset=us-ascii Content-Disposition: inline On Mon, Oct 26, 2020 at 03:56:35PM +0000, Dave Martin wrote: > On Mon, Oct 26, 2020 at 02:52:46PM +0000, Catalin Marinas via Libc-alpha wrote: > > Now, if the dynamic loader silently ignores the mprotect() failure on > > the main executable, is there much value in exposing a flag in the aux > > vectors? It saves a few (one?) mprotect() calls but I don't think it > > matters much. Anyway, I don't mind the flag. > I don't see a problem with the aforementioned patch [2] to pre-set BTI > on the pages of the main binary. Me either FWIW. --cpvLTH7QU4gwfq3S Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQEzBAABCgAdFiEEreZoqmdXGLWf4p/qJNaLcl1Uh9AFAl+W/owACgkQJNaLcl1U h9BOigf8CXtljKYe6CrS8pjN5GZ0G4Ck5VOuFDx7E+7wl6HjW0EnIfZJJ+R5GO4N PgFC5QZ6B1Owa5cpdGcqRKoY17ZgkD6doR4DTvxdCUrquxRXYQIlOM9MtwGFhd1W NzfCPYvUokn9d/y76Arklbzo+pFcrGI1Bo4y78S4mz6JOfsg1+8DQsyrPRqwIIbs 4xTXIyOfSsQph8bBbkR/BZdy+z40qGNDzw0YQRIwvIcxWDQM1+Tim5uAuZLuEe7M V0giL+8RNDUFkBMCYwnlvtdnl/pUfcJ9QlWvSVJokUf3iWuDy1Gynj5Tau+/zzx0 Ch3k65pQs41XF6BKzS4lhttNnT6Rog== =Rtx1 -----END PGP SIGNATURE----- --cpvLTH7QU4gwfq3S--