Re: [PATCH 0/4] migrate swapper_pg_dir

2018-05-29 Thread Mark Rutland
Hi, On Tue, May 29, 2018 at 12:37:28PM +0800, YaoJun wrote: > Because the offset between swapper_pg_dir and _text is fixed, when > attackers break KASLR, they can calculate the address of swapper_pg_dir, > and then they can apply KSMA(Kernel Space Mirror Attack). The principle > of KSMA is to

Re: [PATCH 0/4] migrate swapper_pg_dir

2018-05-29 Thread Mark Rutland
Hi, On Tue, May 29, 2018 at 12:37:28PM +0800, YaoJun wrote: > Because the offset between swapper_pg_dir and _text is fixed, when > attackers break KASLR, they can calculate the address of swapper_pg_dir, > and then they can apply KSMA(Kernel Space Mirror Attack). The principle > of KSMA is to

[PATCH 0/4] migrate swapper_pg_dir

2018-05-28 Thread YaoJun
Because the offset between swapper_pg_dir and _text is fixed, when attackers break KASLR, they can calculate the address of swapper_pg_dir, and then they can apply KSMA(Kernel Space Mirror Attack). The principle of KSMA is to insert an entry to PGD, and this entry has type of block with AP = 01,

[PATCH 0/4] migrate swapper_pg_dir

2018-05-28 Thread YaoJun
Because the offset between swapper_pg_dir and _text is fixed, when attackers break KASLR, they can calculate the address of swapper_pg_dir, and then they can apply KSMA(Kernel Space Mirror Attack). The principle of KSMA is to insert an entry to PGD, and this entry has type of block with AP = 01,