|
Message-ID: <CAGXu5jLGFd2UY89bPm_WQvcsX+RDMg0XoJvuXwfknJrGxpn4Ng@mail.gmail.com> Date: Fri, 1 Feb 2019 08:59:21 +1300 From: Kees Cook <keescook@...omium.org> To: Thomas Garnier <thgarnie@...omium.org> Cc: Kernel Hardening <kernel-hardening@...ts.openwall.com>, Kristen Carlson Accardi <kristen@...ux.intel.com>, Thomas Gleixner <tglx@...utronix.de>, Ingo Molnar <mingo@...hat.com>, Borislav Petkov <bp@...en8.de>, "H. Peter Anvin" <hpa@...or.com>, X86 ML <x86@...nel.org>, Jonathan Corbet <corbet@....net>, Masahiro Yamada <yamada.masahiro@...ionext.com>, Michal Marek <michal.lkml@...kovi.net>, Herbert Xu <herbert@...dor.apana.org.au>, "David S. Miller" <davem@...emloft.net>, Andy Lutomirski <luto@...nel.org>, Paolo Bonzini <pbonzini@...hat.com>, Radim Krčmář <rkrcmar@...hat.com>, Juergen Gross <jgross@...e.com>, Alok Kataria <akataria@...are.com>, Dennis Zhou <dennis@...nel.org>, Tejun Heo <tj@...nel.org>, Christoph Lameter <cl@...ux.com>, "Rafael J. Wysocki" <rjw@...ysocki.net>, Len Brown <len.brown@...el.com>, Pavel Machek <pavel@....cz>, Steven Rostedt <rostedt@...dmis.org>, Joerg Roedel <joro@...tes.org>, Dave Hansen <dave.hansen@...ux.intel.com>, Peter Zijlstra <peterz@...radead.org>, Boris Ostrovsky <boris.ostrovsky@...cle.com>, Stefano Stabellini <sstabellini@...nel.org>, Luis Chamberlain <mcgrof@...nel.org>, Greg Kroah-Hartman <gregkh@...uxfoundation.org>, Arnd Bergmann <arnd@...db.de>, Luc Van Oostenryck <luc.vanoostenryck@...il.com>, Jason Baron <jbaron@...mai.com>, "Kirill A. Shutemov" <kirill.shutemov@...ux.intel.com>, Andrey Ryabinin <aryabinin@...tuozzo.com>, Thomas Garnier <thgarnie@...gle.com>, Baoquan He <bhe@...hat.com>, Alexander Popov <alex.popov@...ux.com>, Jordan Borgner <mail@...dan-borgner.de>, Nathan Chancellor <natechancellor@...il.com>, Cao jin <caoj.fnst@...fujitsu.com>, "H.J. Lu" <hjl.tools@...il.com>, Alexey Dobriyan <adobriyan@...il.com>, Nadav Amit <namit@...are.com>, Yonghong Song <yhs@...com>, Nick Desaulniers <ndesaulniers@...gle.com>, Arnaldo Carvalho de Melo <acme@...hat.com>, Jann Horn <jannh@...gle.com>, Ard Biesheuvel <ard.biesheuvel@...aro.org>, Andrew Morton <akpm@...ux-foundation.org>, Andi Kleen <ak@...ux.intel.com>, Francis Deslauriers <francis.deslauriers@...icios.com>, Masami Hiramatsu <mhiramat@...nel.org>, Mimi Zohar <zohar@...ux.ibm.com>, Nayna Jain <nayna@...ux.ibm.com>, Michael Ellerman <mpe@...erman.id.au>, Jan Kiszka <jan.kiszka@...mens.com>, Jia Zhang <qianyue.zj@...baba-inc.com>, Konrad Rzeszutek Wilk <konrad.wilk@...cle.com>, Brijesh Singh <brijesh.singh@....com>, Jan Beulich <JBeulich@...e.com>, Tim Chen <tim.c.chen@...ux.intel.com>, Mike Rapoport <rppt@...ux.vnet.ibm.com>, Michal Hocko <mhocko@...e.com>, Stephen Rothwell <sfr@...b.auug.org.au>, Rafael Ávila de Espíndola <rafael@...indo.la>, Mathieu Desnoyers <mathieu.desnoyers@...icios.com>, Nicholas Piggin <npiggin@...il.com>, Adrian Hunter <adrian.hunter@...el.com>, Song Liu <songliubraving@...com>, Alexander Shishkin <alexander.shishkin@...ux.intel.com>, Michael Forney <forney@...gle.com>, Palmer Dabbelt <palmer@...ive.com>, James Hogan <jhogan@...nel.org>, Joe Lawrence <joe.lawrence@...hat.com>, nixiaoming <nixiaoming@...wei.com>, LKML <linux-kernel@...r.kernel.org>, "open list:DOCUMENTATION" <linux-doc@...r.kernel.org>, linux-kbuild <linux-kbuild@...r.kernel.org>, linux-crypto <linux-crypto@...r.kernel.org>, KVM <kvm@...r.kernel.org>, virtualization@...ts.linux-foundation.org, Linux PM list <linux-pm@...r.kernel.org>, xen-devel <xen-devel@...ts.xenproject.org>, linux-arch <linux-arch@...r.kernel.org>, Sparse Mailing-list <linux-sparse@...r.kernel.org> Subject: Re: [PATCH v6 00/27] x86: PIE support and option to extend KASLR randomization On Fri, Feb 1, 2019 at 8:28 AM Thomas Garnier <thgarnie@...omium.org> wrote: > These patches make the changes necessary to build the kernel as Position > Independent Executable (PIE) on x86_64. A PIE kernel can be relocated below > the top 2G of the virtual address space. It allows to optionally extend the > KASLR randomization range from 1G to 3G. The chosen range is the one currently > available, future changes will allow the kernel module to have a wider > randomization range. This also lays the groundwork for doing compilation-unit-granularity KASLR, as Kristen has been working on. With PIE working, the relocations are more sane and boot-time reordering becomes possible (or at least, it becomes the same logically as doing the work on modules, etc). -- Kees Cook
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.