* [kernel-hardening] RE: Still working on PAX_USERCOPY
@ 2016-02-19 0:36 Schaufler, Casey
0 siblings, 0 replies; 2+ messages in thread
From: Schaufler, Casey @ 2016-02-19 0:36 UTC (permalink / raw)
To: kernel-hardening; +Cc: Kees Cook
[-- Attachment #1: Type: text/plain, Size: 1836 bytes --]
On 1/19/2016 3:59 PM, Kees Cook wrote:
> On Thu, Jan 14, 2016 at 5:43 PM, Schaufler, Casey
> <casey.schaufler@intel.com<mailto:casey.schaufler@intel.com>> wrote:
>> Just a brief status update on my work on PAX_USERCOPY. I've ditched my first
>> two attempts at doing somewhat simple minded cut'n'patch and am going to
>> have to take a more engineering (e.g. understanding what's really going on)
>> approach. The good news is that I've made enough mistakes to think there
>> aren't that many left for a project this size.
> Thanks for the report! Were you able to use or improve on the
> lib/test_user_copy.c tests during your experiments? (Or maybe we just
> need a separate lkdtm test?)
No, but hopefully before too long ...
> What kinds of dead-ends did you run into?
There are a few things that are "obvious", the GFP_USERCOPY
and CONFIG_PAX_USERCOPY (duh?) bits being the most so. And
yet, they turn out not to be so obvious. Much of what's under
ifdef isn't actually part of the feature, it's special cases
in other PAX features. PAX_USERCOPY appears to have come along
fairly late in the PAX feature set, and counts on a bunch of
previously implemented facilities. There are chunks of stack
management, for example, that (I think) have to be included.
It's not enough to understand PAX_USERCOPY. You really have
to understand all of the PAX and grsecurity memory management
changes to come up with something that works. That's what I'm
working on now, and while there's progress, it's a slog.
I'm embarking on what Intel calls a "mini-sabbatical", which
will take me away from my keyboard for 4 weeks. When I return
I plan to pick up where I left off. Hopefully with fresher and
better rested eyes.
> -Kees
>
[-- Attachment #2: Type: text/html, Size: 5477 bytes --]
^ permalink raw reply [flat|nested] 2+ messages in thread
* [kernel-hardening] Re: Still working on PAX_USERCOPY
2016-01-15 1:43 [kernel-hardening] " Schaufler, Casey
@ 2016-01-19 23:59 ` Kees Cook
0 siblings, 0 replies; 2+ messages in thread
From: Kees Cook @ 2016-01-19 23:59 UTC (permalink / raw)
To: Schaufler, Casey; +Cc: kernel-hardening
On Thu, Jan 14, 2016 at 5:43 PM, Schaufler, Casey
<casey.schaufler@intel.com> wrote:
> Just a brief status update on my work on PAX_USERCOPY. I’ve ditched my first
> two attempts at doing somewhat simple minded cut’n’patch and am going to
> have to take a more engineering (e.g. understanding what’s really going on)
> approach. The good news is that I’ve made enough mistakes to think there
> aren’t that many left for a project this size.
Thanks for the report! Were you able to use or improve on the
lib/test_user_copy.c tests during your experiments? (Or maybe we just
need a separate lkdtm test?)
What kinds of dead-ends did you run into?
-Kees
--
Kees Cook
Chrome OS & Brillo Security
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2016-02-19 0:36 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2016-02-19 0:36 [kernel-hardening] RE: Still working on PAX_USERCOPY Schaufler, Casey
-- strict thread matches above, loose matches on Subject: below --
2016-01-15 1:43 [kernel-hardening] " Schaufler, Casey
2016-01-19 23:59 ` [kernel-hardening] " Kees Cook
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).