Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932145AbbKXVjb (ORCPT ); Tue, 24 Nov 2015 16:39:31 -0500 Received: from smtp.outflux.net ([198.145.64.163]:54238 "EHLO smtp.outflux.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754190AbbKXVj0 (ORCPT ); Tue, 24 Nov 2015 16:39:26 -0500 From: Kees Cook To: linux-kernel@vger.kernel.org Cc: Kees Cook , Andy Lutomirski , Ingo Molnar , Thomas Gleixner , "H. Peter Anvin" , x86@kernel.org, Arnd Bergmann , Michael Ellerman , linux-arch@vger.kernel.org, kernel-hardening@lists.openwall.com Subject: [PATCH 0/2] introduce post-init read-only memory Date: Tue, 24 Nov 2015 13:38:32 -0800 Message-Id: <1448401114-24650-1-git-send-email-keescook@chromium.org> X-Mailer: git-send-email 1.9.1 X-HELO: www.outflux.net Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 953 Lines: 21 One of the easiest ways to protect the kernel from attack is to reduce the internal attack surface exposed when a "write" flaw is available. By making as much of the kernel read-only as possible, we reduce the attack surface. Many things are written to only during __init, and never changed again. These cannot be made "const" since the compiler will do the wrong thing (we do actually need to write to them). Instead, move these items into a memory region that will be made read-only during mark_rodata_ro() which happens after all kernel __init code has finished. This introduces __read_only as a way to mark such memory, and uses it on the x86 vDSO to kill an extant kernel exploitation method. -Kees -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/