From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.3 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,USER_AGENT_SANE_1 autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id A19C9C43331 for ; Mon, 11 Nov 2019 16:58:28 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 81DF92173B for ; Mon, 11 Nov 2019 16:58:28 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727142AbfKKQ61 (ORCPT ); Mon, 11 Nov 2019 11:58:27 -0500 Received: from outgoing-auth-1.mit.edu ([18.9.28.11]:39040 "EHLO outgoing.mit.edu" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727027AbfKKQ6Z (ORCPT ); Mon, 11 Nov 2019 11:58:25 -0500 Received: from callcc.thunk.org (guestnat-104-133-0-98.corp.google.com [104.133.0.98] (may be forged)) (authenticated bits=0) (User authenticated as tytso@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id xABGw1ir031439 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 11 Nov 2019 11:58:02 -0500 Received: by callcc.thunk.org (Postfix, from userid 15806) id C0DC94202FD; Mon, 11 Nov 2019 11:58:00 -0500 (EST) Date: Mon, 11 Nov 2019 11:58:00 -0500 From: "Theodore Y. Ts'o" To: Jann Horn Cc: "Michael Kerrisk (man-pages)" , Christian Brauner , Florian Weimer , Christian Brauner , lkml , linux-man , Kees Cook , Oleg Nesterov , Arnd Bergmann , David Howells , Pavel Emelyanov , Andrew Morton , Adrian Reber , Andrei Vagin , Linux API , Ingo Molnar Subject: Re: For review: documentation of clone3() system call Message-ID: <20191111165800.GD7017@mit.edu> References: <20191107151941.dw4gtul5lrtax4se@wittgenstein> <2eb2ab4c-b177-29aa-cdc4-420b24cfd7b3@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.12.2 (2019-09-21) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Nov 11, 2019 at 03:55:35PM +0100, Jann Horn wrote: > Not on Linux, but on OpenBSD, they do use MAP_STACK now AFAIK; this > was announced here: > . > Basically they periodically check whether the userspace stack pointer > points into a MAP_STACK region, and if not, they kill the process. So > even if it's a no-op on Linux... Hmm, is that something we should do in Linux? Even if we only check on syscall entry, which should be pretty inexpensive, it seems like it would be very effective in protecting various ROP techniques. - Ted