kernel-hardening.lists.openwall.com archive mirror
 help / color / mirror / Atom feed
* [kernel-hardening] Re: [kernel hardening]Could we do something for KSPP?
       [not found] ` <CAGXu5jK+YQoDofEJa_1Ai9anKpQ836sQ=RVOCD-Ny_pfAVmkgw@mail.gmail.com>
@ 2017-06-23  4:21   ` Li Kun
  2017-06-23  4:31     ` Kees Cook
  0 siblings, 1 reply; 2+ messages in thread
From: Li Kun @ 2017-06-23  4:21 UTC (permalink / raw)
  To: Kees Cook; +Cc: Wangkai (Morgan, Euler), kernel-hardening

Hi

在 2017/6/23 0:51, Kees Cook 写道:
> On Thu, Jun 22, 2017 at 6:25 AM, Li Kun <hw.likun@huawei.com> wrote:
>> Hi Kees,
>>
>> My name is Li Kun, from a new formed Huawei kernel security team.
> Hi! Thanks for the email. Feel free to email the
> kernel-hardening@lists.openwall.com list to make a similar
> introduction.
>
>> My companion and me have been working on kernel and arm64 for sevral
>> years,but don't have much experiences in kernel security yet.
>>
>> We have studied Pax&Grsecurity for few months , and have seen that there is
>> much progress in KSPP recently.
>>
>> I'm wondering that if there is something we can do for KSPP? Maybe we can
>> implement the "vmalloc kernel stack for arm64" or
>>
>> "fast refcount overflow protection for arm64" or if you have some
>> suggestions ,please let me know.
> I think either of these would be great. Mark Rutland mentioned in
> private to me that AKASHI Takahiro had been working a bit on
> VMAP_STACK for arm64, but that they had issues with catching
> over/under-flows. Perhaps send an email to the public list with them
> CCed asking on the status and how you can help?
  Thank you for the information :)
  I will send another email to discuss this and see what can i do.
>> The vmapping itself is simple, and we don't need to do anything special
>> there. IIRC Takahiro-san had done some tests with HAVE_ARCH_VMAP_STACK,
>> and there weren't any obvious problems.
> As for refcount overflow protection, the starting point is likely the
> arm protection in the last public grsecurity patch, which is discussed
> here:
> https://forums.grsecurity.net/viewtopic.php?f=7&t=4173#ARM
>
> For the refcount implementation, though, it'll likely need tweaking to
> be a _refcount_ protection rather than a generalized atomic_t
> protection, which is what grsecurity uses. Since upstream is splitting
> out refcount_t from atomic_t, we can actually be a little bit tighter
> in how the checks are performed.
I noticed that you have send a patch set of fast refcount overflow 
protection as below.

http://kernel-hardening.openwall.narkive.com/qTKqEF4F/patch-v5-0-3-implement-fast-refcount-overflow-protection

I think it is nearing accomplishment if i haven't get it wrong. Maybe i 
can do the job on arm64 based on your latest patch set?

Thank you very much!
>
> Please follow up on the public mailing list; the more people involved
> the better. :)
>
> Thanks for reaching out!
>
> -Kees
>

-- 
Best Regards
Li Kun

^ permalink raw reply	[flat|nested] 2+ messages in thread

* [kernel-hardening] Re: [kernel hardening]Could we do something for KSPP?
  2017-06-23  4:21   ` [kernel-hardening] Re: [kernel hardening]Could we do something for KSPP? Li Kun
@ 2017-06-23  4:31     ` Kees Cook
  0 siblings, 0 replies; 2+ messages in thread
From: Kees Cook @ 2017-06-23  4:31 UTC (permalink / raw)
  To: Li Kun; +Cc: Wangkai (Morgan, Euler), kernel-hardening

On Thu, Jun 22, 2017 at 9:21 PM, Li Kun <hw.likun@huawei.com> wrote:
> I noticed that you have send a patch set of fast refcount overflow
> protection as below.
>
> http://kernel-hardening.openwall.narkive.com/qTKqEF4F/patch-v5-0-3-implement-fast-refcount-overflow-protection
>
> I think it is nearing accomplishment if i haven't get it wrong. Maybe i can
> do the job on arm64 based on your latest patch set?

It's certainly getting close. I'll post a v6 version for x86 soon
here, but if you want to start from v5, I think it should be
relatively easy to update it to match what gets accepted for x86.

Thanks!

-Kees

-- 
Kees Cook
Pixel Security

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2017-06-23  4:31 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
     [not found] <cf7e6840-1019-020f-ad4a-0adbe0ee79cf@huawei.com>
     [not found] ` <CAGXu5jK+YQoDofEJa_1Ai9anKpQ836sQ=RVOCD-Ny_pfAVmkgw@mail.gmail.com>
2017-06-23  4:21   ` [kernel-hardening] Re: [kernel hardening]Could we do something for KSPP? Li Kun
2017-06-23  4:31     ` Kees Cook

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).