All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH v4 0/2] provide check for ro_after_init memory sections
@ 2017-03-26 21:08 ` Eddie Kovsky
  0 siblings, 0 replies; 22+ messages in thread
From: Eddie Kovsky @ 2017-03-26 21:08 UTC (permalink / raw)
  To: jeyu, rusty, keescook; +Cc: linux-kernel, kernel-hardening

Provide a mechanism for other functions to verify that their arguments
are read-only.

This implements the first half of a suggestion made by Kees Cook for
the Kernel Self Protection Project:

    - provide mechanism to check for ro_after_init memory areas, and
      reject structures not marked ro_after_init in vmbus_register()

      http://www.openwall.com/lists/kernel-hardening/2017/02/04/1

The idea is to prevent structures (including modules) that are not
read-only from being passed to functions. It builds upon the functions
in kernel/extable.c that test if an address is in the text section.

I have dropped the third patch that uses these features to check the
arguments to vmbus_register() because the maintainers have not been
receptive to using it. My goal right now is to get the API right.

I have test compiled this series on next-20170324 for x86.

Eddie Kovsky (2):
  module: verify address is read-only
  extable: verify address is read-only

 include/linux/kernel.h |  2 ++
 include/linux/module.h | 12 ++++++++++++
 kernel/extable.c       | 29 +++++++++++++++++++++++++++
 kernel/module.c        | 53 ++++++++++++++++++++++++++++++++++++++++++++++++++
 4 files changed, 96 insertions(+)

-- 
2.12.1

^ permalink raw reply	[flat|nested] 22+ messages in thread

end of thread, other threads:[~2017-04-03 22:10 UTC | newest]

Thread overview: 22+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2017-03-26 21:08 [PATCH v4 0/2] provide check for ro_after_init memory sections Eddie Kovsky
2017-03-26 21:08 ` [kernel-hardening] " Eddie Kovsky
2017-03-26 21:08 ` [PATCH v4 1/2] module: verify address is read-only Eddie Kovsky
2017-03-26 21:08   ` [kernel-hardening] " Eddie Kovsky
2017-03-30  3:31   ` Jessica Yu
2017-03-30  3:31     ` [kernel-hardening] " Jessica Yu
2017-03-26 21:08 ` [PATCH v4 2/2] extable: " Eddie Kovsky
2017-03-26 21:08   ` [kernel-hardening] " Eddie Kovsky
2017-03-27  8:43   ` kbuild test robot
2017-03-27  8:43     ` [kernel-hardening] " kbuild test robot
2017-03-27 18:42     ` Kees Cook
2017-03-27 18:42       ` [kernel-hardening] " Kees Cook
2017-03-29  3:28       ` Eddie Kovsky
2017-03-29  3:28         ` [kernel-hardening] " Eddie Kovsky
2017-03-30  3:27         ` Jessica Yu
2017-03-30  3:27           ` [kernel-hardening] " Jessica Yu
2017-03-30 16:24           ` Kees Cook
2017-03-30 16:24             ` [kernel-hardening] " Kees Cook
2017-03-31  3:09             ` Eddie Kovsky
2017-03-31  3:09               ` [kernel-hardening] " Eddie Kovsky
2017-04-03 22:10           ` Kees Cook
2017-04-03 22:10             ` [kernel-hardening] " Kees Cook

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.