Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAGXu5jLGFd2UY89bPm_WQvcsX+RDMg0XoJvuXwfknJrGxpn4Ng@mail.gmail.com>
Date: Fri, 1 Feb 2019 08:59:21 +1300
From: Kees Cook <keescook@...omium.org>
To: Thomas Garnier <thgarnie@...omium.org>
Cc: Kernel Hardening <kernel-hardening@...ts.openwall.com>, 
	Kristen Carlson Accardi <kristen@...ux.intel.com>, Thomas Gleixner <tglx@...utronix.de>, 
	Ingo Molnar <mingo@...hat.com>, Borislav Petkov <bp@...en8.de>, "H. Peter Anvin" <hpa@...or.com>, 
	X86 ML <x86@...nel.org>, Jonathan Corbet <corbet@....net>, 
	Masahiro Yamada <yamada.masahiro@...ionext.com>, Michal Marek <michal.lkml@...kovi.net>, 
	Herbert Xu <herbert@...dor.apana.org.au>, "David S. Miller" <davem@...emloft.net>, 
	Andy Lutomirski <luto@...nel.org>, Paolo Bonzini <pbonzini@...hat.com>, 
	Radim Krčmář <rkrcmar@...hat.com>, 
	Juergen Gross <jgross@...e.com>, Alok Kataria <akataria@...are.com>, Dennis Zhou <dennis@...nel.org>, 
	Tejun Heo <tj@...nel.org>, Christoph Lameter <cl@...ux.com>, "Rafael J. Wysocki" <rjw@...ysocki.net>, 
	Len Brown <len.brown@...el.com>, Pavel Machek <pavel@....cz>, Steven Rostedt <rostedt@...dmis.org>, 
	Joerg Roedel <joro@...tes.org>, Dave Hansen <dave.hansen@...ux.intel.com>, 
	Peter Zijlstra <peterz@...radead.org>, Boris Ostrovsky <boris.ostrovsky@...cle.com>, 
	Stefano Stabellini <sstabellini@...nel.org>, Luis Chamberlain <mcgrof@...nel.org>, 
	Greg Kroah-Hartman <gregkh@...uxfoundation.org>, Arnd Bergmann <arnd@...db.de>, 
	Luc Van Oostenryck <luc.vanoostenryck@...il.com>, Jason Baron <jbaron@...mai.com>, 
	"Kirill A. Shutemov" <kirill.shutemov@...ux.intel.com>, Andrey Ryabinin <aryabinin@...tuozzo.com>, 
	Thomas Garnier <thgarnie@...gle.com>, Baoquan He <bhe@...hat.com>, 
	Alexander Popov <alex.popov@...ux.com>, Jordan Borgner <mail@...dan-borgner.de>, 
	Nathan Chancellor <natechancellor@...il.com>, Cao jin <caoj.fnst@...fujitsu.com>, 
	"H.J. Lu" <hjl.tools@...il.com>, Alexey Dobriyan <adobriyan@...il.com>, Nadav Amit <namit@...are.com>, 
	Yonghong Song <yhs@...com>, Nick Desaulniers <ndesaulniers@...gle.com>, 
	Arnaldo Carvalho de Melo <acme@...hat.com>, Jann Horn <jannh@...gle.com>, 
	Ard Biesheuvel <ard.biesheuvel@...aro.org>, Andrew Morton <akpm@...ux-foundation.org>, 
	Andi Kleen <ak@...ux.intel.com>, Francis Deslauriers <francis.deslauriers@...icios.com>, 
	Masami Hiramatsu <mhiramat@...nel.org>, Mimi Zohar <zohar@...ux.ibm.com>, 
	Nayna Jain <nayna@...ux.ibm.com>, Michael Ellerman <mpe@...erman.id.au>, 
	Jan Kiszka <jan.kiszka@...mens.com>, Jia Zhang <qianyue.zj@...baba-inc.com>, 
	Konrad Rzeszutek Wilk <konrad.wilk@...cle.com>, Brijesh Singh <brijesh.singh@....com>, 
	Jan Beulich <JBeulich@...e.com>, Tim Chen <tim.c.chen@...ux.intel.com>, 
	Mike Rapoport <rppt@...ux.vnet.ibm.com>, Michal Hocko <mhocko@...e.com>, 
	Stephen Rothwell <sfr@...b.auug.org.au>, Rafael Ávila de Espíndola <rafael@...indo.la>, 
	Mathieu Desnoyers <mathieu.desnoyers@...icios.com>, Nicholas Piggin <npiggin@...il.com>, 
	Adrian Hunter <adrian.hunter@...el.com>, Song Liu <songliubraving@...com>, 
	Alexander Shishkin <alexander.shishkin@...ux.intel.com>, Michael Forney <forney@...gle.com>, 
	Palmer Dabbelt <palmer@...ive.com>, James Hogan <jhogan@...nel.org>, 
	Joe Lawrence <joe.lawrence@...hat.com>, nixiaoming <nixiaoming@...wei.com>, 
	LKML <linux-kernel@...r.kernel.org>, 
	"open list:DOCUMENTATION" <linux-doc@...r.kernel.org>, linux-kbuild <linux-kbuild@...r.kernel.org>, 
	linux-crypto <linux-crypto@...r.kernel.org>, KVM <kvm@...r.kernel.org>, 
	virtualization@...ts.linux-foundation.org, 
	Linux PM list <linux-pm@...r.kernel.org>, xen-devel <xen-devel@...ts.xenproject.org>, 
	linux-arch <linux-arch@...r.kernel.org>, 
	Sparse Mailing-list <linux-sparse@...r.kernel.org>
Subject: Re: [PATCH v6 00/27] x86: PIE support and option to extend KASLR randomization

On Fri, Feb 1, 2019 at 8:28 AM Thomas Garnier <thgarnie@...omium.org> wrote:
> These patches make the changes necessary to build the kernel as Position
> Independent Executable (PIE) on x86_64. A PIE kernel can be relocated below
> the top 2G of the virtual address space. It allows to optionally extend the
> KASLR randomization range from 1G to 3G. The chosen range is the one currently
> available, future changes will allow the kernel module to have a wider
> randomization range.

This also lays the groundwork for doing compilation-unit-granularity
KASLR, as Kristen has been working on. With PIE working, the
relocations are more sane and boot-time reordering becomes possible
(or at least, it becomes the same logically as doing the work on
modules, etc).

-- 
Kees Cook

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.