From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-yw0-f198.google.com (mail-yw0-f198.google.com [209.85.161.198]) by kanga.kvack.org (Postfix) with ESMTP id D6F4C6B025F for ; Mon, 7 Aug 2017 15:40:22 -0400 (EDT) Received: by mail-yw0-f198.google.com with SMTP id t139so19709245ywg.6 for ; Mon, 07 Aug 2017 12:40:22 -0700 (PDT) Received: from mail-yw0-x22c.google.com (mail-yw0-x22c.google.com. [2607:f8b0:4002:c05::22c]) by mx.google.com with ESMTPS id a65si2225505ybb.41.2017.08.07.12.40.21 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 07 Aug 2017 12:40:21 -0700 (PDT) Received: by mail-yw0-x22c.google.com with SMTP id l82so8944344ywc.2 for ; Mon, 07 Aug 2017 12:40:21 -0700 (PDT) MIME-Version: 1.0 In-Reply-To: References: <1502131739.1803.12.camel@gmail.com> From: Kostya Serebryany Date: Mon, 7 Aug 2017 12:40:20 -0700 Message-ID: Subject: Re: binfmt_elf: use ELF_ET_DYN_BASE only for PIE breaks asan Content-Type: multipart/alternative; boundary="001a1147cb6c6fee2e05562f04c5" Sender: owner-linux-mm@kvack.org List-ID: To: Kees Cook Cc: Daniel Micay , Dmitry Vyukov , Michal Hocko , Andrew Morton , "linux-mm@kvack.org" , Rik van Riel , Reid Kleckner , Peter Collingbourne , Evgeniy Stepanov --001a1147cb6c6fee2e05562f04c5 Content-Type: text/plain; charset="UTF-8" On Mon, Aug 7, 2017 at 12:34 PM, Kees Cook wrote: > (To be clear, this subthread is for dealing with _future_ changes; I'm > already preparing the revert, which is in the other subthread.) > > On Mon, Aug 7, 2017 at 12:26 PM, Kostya Serebryany wrote: > > Oh, a launcher (e.g. just using setarch) would be a huge pain to deploy. > > Would loading the executable into the mmap region work? This is beyond my knowledge. :( Could you explain? If we can do this w/o a launcher (and w/o re-executing), we should try. > We could find > a way to mark executables that want this treatment. > > -- > Kees Cook > Pixel Security > --001a1147cb6c6fee2e05562f04c5 Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable


On Mon, Aug 7, 2017 at 12:34 PM, Kees Cook <keescook@google.com&= gt; wrote:
(To be clear, this subt= hread is for dealing with _future_ changes; I'm
already preparing the revert, which is in the other subthread.)

On Mon, Aug 7, 2017 at 12:26 PM, Kostya Serebryany <kcc@google.com> wrote:
> Oh, a launcher (e.g. just using setarch) would be a huge pain to deplo= y.

Would loading the executable into the mmap region work?

This is beyond my knowledge. :(=C2=A0
Could = you explain?=C2=A0

If we can do this w/o a launche= r (and w/o re-executing), we should try.=C2=A0

=C2= =A0
We could find
a way to mark executables that want this treatment.

--
Kees Cook
Pixel Security

--001a1147cb6c6fee2e05562f04c5-- -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: email@kvack.org