From: Lev Olshvang <levonshe@gmail.com>
To: arnd@arndb.de
Cc: kernel-hardening@lists.openwall.com, Lev Olshvang <levonshe@gmail.com>
Subject: [RFC PATCH 0/5] Prevent write to read-only pages (text, PLT/GOT
Date: Mon, 6 Apr 2020 17:20:40 +0300 [thread overview]
Message-ID: <20200406142045.32522-1-levonshe@gmail.com> (raw)
The purpose of this patch is produce hardened kernel for Embedded
or Production systems.
Typically debuggers, such as gdb, write to read-only code [text]
sections of target process.(ptrace)
This kind of page protectiion violation raises minor page fault, but
kernel's fault handler allows it by default.
This is clearly attack surface for adversary.
The proposed kernel hardening configuration option checks the type of
protection of the foreign vma and blocks writes to read only vma.
When enabled, it will stop attacks modifying code or jump tables, etc.
Lev Olshvang (5):
security : hardening : prevent write to proces's read-only pages from
another process
Prevent write to read-only pages (text, PLT/GOT tables from another
process
Prevent write to read-only pages (text, PLT/GOT tables from another
process
X86:Prevent write to read-only pages (text, PLT/GOT tables from
another process
UM:Prevent write to read-only pages (text, PLT/GOT tables from another
process
arch/powerpc/include/asm/mmu_context.h | 7 ++++++-
arch/powerpc/mm/book3s64/pkeys.c | 5 +++++
arch/um/include/asm/mmu_context.h | 11 ++++++++---
arch/unicore32/include/asm/mmu_context.h | 7 ++++++-
arch/x86/include/asm/mmu_context.h | 9 ++++++++-
include/asm-generic/mm_hooks.h | 5 +++++
security/Kconfig | 10 ++++++++++
7 files changed, 48 insertions(+), 6 deletions(-)
--
2.17.1
next reply other threads:[~2020-04-06 14:57 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-04-06 14:20 Lev Olshvang [this message]
2020-04-06 14:20 ` [RFC PATCH 1/5] security : hardening : prevent write to proces's read-only pages from another process Lev Olshvang
2020-04-06 19:15 ` Kees Cook
2020-04-07 10:16 ` Lev R. Oshvang .
2020-04-07 16:25 ` Kees Cook
2020-04-06 14:20 ` [RFC PATCH 2/5] Prevent write to " Lev Olshvang
2020-04-06 14:20 ` [RFC PATCH 3/5] Prevent write to read-only pages text, PLT/GOT tables " Lev Olshvang
2020-04-06 14:20 ` [RFC PATCH 4/5] X86:Prevent write to read-only pages :text, " Lev Olshvang
2020-04-06 14:20 ` [RFC PATCH 5/5] UM:Prevent " Lev Olshvang
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20200406142045.32522-1-levonshe@gmail.com \
--to=levonshe@gmail.com \
--cc=arnd@arndb.de \
--cc=kernel-hardening@lists.openwall.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox