All of lore.kernel.org
 help / color / mirror / Atom feed
* non-x86 per-task stack canaries
@ 2017-06-26 21:04 ` Kees Cook
  0 siblings, 0 replies; 9+ messages in thread
From: Kees Cook @ 2017-06-26 21:04 UTC (permalink / raw)
  To: kernel-hardening; +Cc: LKML, linux-arm-kernel

Hi,

The stack protector functionality on x86_64 uses %gs:0x28 (%gs is the
percpu area) for __stack_chk_guard, and all other architectures use a
global variable instead. This means we never change the stack canary
on non-x86 architectures which allows for a leak in one task to expose
the canary in another task.

I'm curious what thoughts people may have about how to get this
correctly implemented. Teaching the compiler about per-cpu data sounds
exciting. :)

-Kees

-- 
Kees Cook
Pixel Security

^ permalink raw reply	[flat|nested] 9+ messages in thread

end of thread, other threads:[~2017-06-27 10:07 UTC | newest]

Thread overview: 9+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2017-06-26 21:04 non-x86 per-task stack canaries Kees Cook
2017-06-26 21:04 ` [kernel-hardening] " Kees Cook
2017-06-26 21:04 ` Kees Cook
2017-06-26 22:52 ` [kernel-hardening] " Daniel Micay
2017-06-26 22:52   ` Daniel Micay
2017-06-26 22:52   ` Daniel Micay
2017-06-27 10:06   ` Mark Rutland
2017-06-27 10:06     ` Mark Rutland
2017-06-27 10:06     ` Mark Rutland

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.