|
Message-ID: <CAGXu5jJgzLZHAcDd4jn_h7+VFujyrQnDVdFc7f-rBotRtvht8A@mail.gmail.com> Date: Fri, 10 Feb 2017 10:43:53 -0800 From: Kees Cook <keescook@...omium.org> To: Ard Biesheuvel <ard.biesheuvel@...aro.org> Cc: "linux-arm-kernel@...ts.infradead.org" <linux-arm-kernel@...ts.infradead.org>, Mark Rutland <mark.rutland@....com>, Will Deacon <will.deacon@....com>, Catalin Marinas <catalin.marinas@....com>, Laura Abbott <labbott@...oraproject.org>, James Morse <james.morse@....com>, kvmarm@...ts.cs.columbia.edu, Marc Zyngier <marc.zyngier@....com>, Christoffer Dall <christoffer.dall@...aro.org>, "kernel-hardening@...ts.openwall.com" <kernel-hardening@...ts.openwall.com>, andre.przywara@....com Subject: Re: [PATCH 4/4] arm64: mmu: apply strict permissions to .init.text and .init.data On Fri, Feb 10, 2017 at 9:16 AM, Ard Biesheuvel <ard.biesheuvel@...aro.org> wrote: > To avoid having mappings that are writable and executable at the same > time, split the init region into a .init.text region that is mapped > read-only, and a .init.data region that is mapped non-executable. > > This is possible now that the alternative patching occurs via the linear > mapping, and the linear alias of the init region is always mapped writable > (but never executable). Er, so, that means kernel text is still basically RWX... you just write to the linear mapping and execute the kernel mapping. Can't we make the linear mapping match the kernel mapping permissions? -Kees -- Kees Cook Pixel Security
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.