Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S936127Ab3DHWvI (ORCPT ); Mon, 8 Apr 2013 18:51:08 -0400 Received: from terminus.zytor.com ([198.137.202.10]:42127 "EHLO mail.zytor.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1762821Ab3DHWvG (ORCPT ); Mon, 8 Apr 2013 18:51:06 -0400 Message-ID: <51634935.9010905@zytor.com> Date: Mon, 08 Apr 2013 15:48:21 -0700 From: "H. Peter Anvin" User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130311 Thunderbird/17.0.4 MIME-Version: 1.0 To: Kees Cook CC: Ingo Molnar , linux-kernel@vger.kernel.org, Thomas Gleixner , x86@kernel.org, Konrad Rzeszutek Wilk , Jeremy Fitzhardinge , Marcelo Tosatti , Alex Shi , Borislav Petkov , Alexander Duyck , Frederic Weisbecker , Steven Rostedt , "Paul E. McKenney" , xen-devel@lists.xensource.com, virtualization@lists.linux-foundation.org, kernel-hardening@lists.openwall.com, Dan Rosenberg , Julien Tinnes , Will Drewry , Eric Northup Subject: Re: [PATCH] x86: make IDT read-only References: <20130408224328.GA17641@www.outflux.net> In-Reply-To: <20130408224328.GA17641@www.outflux.net> X-Enigmail-Version: 1.5.1 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 721 Lines: 19 On 04/08/2013 03:43 PM, Kees Cook wrote: > This makes the IDT unconditionally read-only. This primarily removes > the IDT from being a target for arbitrary memory write attacks. It has > an added benefit of also not leaking (via the "sidt" instruction) the > kernel base offset, if it has been relocated. > > Signed-off-by: Kees Cook > Cc: Eric Northup Also, tglx: does this interfere with your per-cpu IDT efforts? -hpa -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/