From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 62B25C3DA79 for ; Mon, 15 Jan 2024 16:53:23 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id E57056B0072; Mon, 15 Jan 2024 11:53:22 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id E07206B0074; Mon, 15 Jan 2024 11:53:22 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id CCED16B0075; Mon, 15 Jan 2024 11:53:22 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0015.hostedemail.com [216.40.44.15]) by kanga.kvack.org (Postfix) with ESMTP id B20676B0072 for ; Mon, 15 Jan 2024 11:53:22 -0500 (EST) Received: from smtpin21.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay04.hostedemail.com (Postfix) with ESMTP id 6FFDB1A08E2 for ; Mon, 15 Jan 2024 16:53:22 +0000 (UTC) X-FDA: 81682141044.21.A810F7D Received: from casper.infradead.org (casper.infradead.org [90.155.50.34]) by imf30.hostedemail.com (Postfix) with ESMTP id DF6F480011 for ; Mon, 15 Jan 2024 16:53:18 +0000 (UTC) Authentication-Results: imf30.hostedemail.com; dkim=pass header.d=infradead.org header.s=casper.20170209 header.b="PW/IUjkd"; dmarc=none; spf=none (imf30.hostedemail.com: domain of willy@infradead.org has no SPF policy when checking 90.155.50.34) smtp.mailfrom=willy@infradead.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1705337599; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=WS8y6SUEc04QHFhGEGQ39dj6zwqeCrM39wd3kpLvyWc=; b=P0SfpTIvTDKGwgyb4cDMvDxwJgH3xOevEIaEpBSqf93ZBVqVsq0CNyTpN8E9PQSg9uiolQ 9jY8L4H4ePw6IoU/o6niK5Jq97rlmiUAF23swDy3GnaBneAHebU0DKiS3tTVhN7kRCGf2H C828WUkX3b+AP2GjvSG7jZAif2ZwSmM= ARC-Authentication-Results: i=1; imf30.hostedemail.com; dkim=pass header.d=infradead.org header.s=casper.20170209 header.b="PW/IUjkd"; dmarc=none; spf=none (imf30.hostedemail.com: domain of willy@infradead.org has no SPF policy when checking 90.155.50.34) smtp.mailfrom=willy@infradead.org ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1705337599; a=rsa-sha256; cv=none; b=K9Gl5HfuttyiXB0h4Ae+NypcGRvATOvzPvBQHenqOLNv8UGfMrKBX1cbqUC2NNnA4sF55Q oTANft9VQwk5zLHOx+mPk739irSnDg9/tRXa84e4fu3leBJYl7eEGqbvzPUrgMKgyl+D6C x6V9zdNO5Y4MouTboXgZ7E4ILhFkr+o= DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=casper.20170209; h=In-Reply-To:Content-Type:MIME-Version: References:Message-ID:Subject:Cc:To:From:Date:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description; bh=WS8y6SUEc04QHFhGEGQ39dj6zwqeCrM39wd3kpLvyWc=; b=PW/IUjkdt3kfQs1mEDi7rlvmp8 on8Aug6QxLDeBZ3JCEsnAMiuhJF07OitIm++3VSF8N6YJbljNJ6R9xxyp3GlrL3j3PGxH7QWEoLga 4PHKKF8FBFv/1sG87YtjyeCfjDi1meRCc0rSXu6ShKT61mpjvRIfQyS6b1ZE9YK8YdMhNjTc3hjAD KLYVT72VzXkZTiPr5NrLZpSJGOxxx4FVj1ZgoZfwfD3XdnPxTjuqoTCoGxUfsc1DC4wtHvlQ7Rrqo UssZuzwELHFPE7FmzJyOglcTb173WACcUqvPMz0gJ7kGG+W8Ap4Fhe9cmcSsIjR9UeNDDskoqw7tC mTT8YmOQ==; Received: from willy by casper.infradead.org with local (Exim 4.94.2 #2 (Red Hat Linux)) id 1rPQCh-00AGHj-0c; Mon, 15 Jan 2024 16:52:51 +0000 Date: Mon, 15 Jan 2024 16:52:50 +0000 From: Matthew Wilcox To: Sam James Cc: mail@horotw.com, linux-hardening@vger.kernel.org, Jakub Wilk , Salvatore Bonaccorso , Linux Memory Management List , William Kucharski Subject: Re: Limited/Broken functionality of ASLR for Libs >= 2MB Message-ID: References: <69fa6015256613ed10aee996e181ebd4@horotw.com> <87il3ur1ik.fsf@gentoo.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <87il3ur1ik.fsf@gentoo.org> X-Rspamd-Server: rspam09 X-Rspamd-Queue-Id: DF6F480011 X-Stat-Signature: onaehh3ubh8k9y9zacfo674gnfz8e16w X-Rspam-User: X-HE-Tag: 1705337598-934163 X-HE-Meta: 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 WyIm3K5f bIb81wpkWLdKitvnJ1s5IxymNtCZ5+wjWvXW54f5Ojbz0Dj3ksMha5jGrBghqrECISpa761wYgm74Zq3McL17lSOnnLX83dPvyx5TsWYf+qtRnBz+hxPK5B/Ts9aKS/I2Ujg8qT+uvloR1KEbaNiDSKn36CDtgbhRE15YpkpJoCiBm52uzCxUugrhEQMHfItzlRX+fm3oV/13+jBTwAX8Iix0iarccEd3QRnuippiTCgc1dVnBKWu6ziR8evfqrfjLcGFkyI0W45eEsMZM5JCwf4ZuVEIxo6uJ2dIUxmPmyMP3A1qAdBBOtVegVzP97EKcKrB X-Bogosity: Ham, tests=bogofilter, spamicity=0.000003, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: On Mon, Jan 15, 2024 at 04:40:36PM +0000, Sam James wrote: > mail@horotw.com writes: > > Hey, I read that ASLR is currently (since kernel >=5.18) broken for > > 32bit libs and reduced in effectiveness for 64bit libs... (the issue > > only arises if a lib is over 2MB). > > I confirmed this for myself but only for the 64bit case. > > > > I saw that this issue is being tracked by ubuntu > > (https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1983357). > > If this is the wrong place and I should instead report it elsewhere I > > am very sorry. > > See also https://bugs.debian.org/1024149. Unfortunately, I don't > think the issue found its way upstream until now (thanks). > > CCing relevant maintainers (per the Debian bug). You know, my email address is all over that commit and the doofus who "discovered the vulnerability" didn't even have the courtesy to let me know. I've had several private emails about this over the last few days and I just don't care. Who's running 32-bit code and cares about security? 32-bit kernels are known-vulnerable to all kinds of security problems, and I think this is the least of your worries. This was intended to happen, it's not a surprise.