security harden by gcc Plugins on powerpc

Discuss usability issues, general maintenance, and general support issues for a grsecurity-enabled system.

security harden by gcc Plugins on powerpc

Postby lynliuyan » Fri Jun 12, 2015 3:32 am

In the miscellaneous hardening features
1.Sanitize kernel stack
2.Automatically constify eligible structures
3.Prevent various integer overflows in function size parameters
was implement by gcc plugins, why does not support on powerpc?
lynliuyan
 
Posts: 18
Joined: Wed Mar 04, 2015 11:47 pm

Re: security harden by gcc Plugins on powerpc

Postby PaX Team » Fri Jun 12, 2015 6:40 am

lynliuyan wrote:1.Sanitize kernel stack
this feature does not only depend on a plugin but also needs some arch specific low-level code that actually clears the kernel stack on kernel->userland transitions and it's not been done on anything but x86 so far. patches are accepted ;).
2.Automatically constify eligible structures
this one depends on KERNEXEC since that's the one feature that actually enforces read-only kernel memory and as you can see, KERNEXEC doesn't exist for powerpc. patches are welcome (but it's a lot of work ;)).
3.Prevent various integer overflows in function size parameters
this one could actually be trivially enabled as the arch restriction exists solely because we didn't want to bother with cross-compilation and qemu to test the result. there may also be additional work required to build the hash table for other archs since it relies on LTO (not part of the public release) and i have no idea if that works on powerpc yet. in any case, if you're interested in bringing this up on powerpc, contact Emese and she can guide you through the hash table building/updating process.
PaX Team
 
Posts: 2310
Joined: Mon Mar 18, 2002 4:35 pm


Return to grsecurity support