Re: [PATCH 0/4] arm64/mm: migrate swapper_pg_dir

2018-06-04 Thread Jun Yao
On 1 Jun 2018 at 10:42:10, Robin Murphy wrote: >> Currently, The offset between swapper_pg_dir and _text is >> fixed. When attackers know the address of _text(no KASLR or >> breaking KASLR), they can caculate the address of >> swapper_pg_dir. Then KSMA(Kernel Space Mirroring Attack) can >> be appl

Re: [PATCH 0/4] arm64/mm: migrate swapper_pg_dir

2018-06-01 Thread Robin Murphy
On 01/06/18 09:08, Jun Yao wrote: Currently, The offset between swapper_pg_dir and _text is fixed. When attackers know the address of _text(no KASLR or breaking KASLR), they can caculate the address of swapper_pg_dir. Then KSMA(Kernel Space Mirroring Attack) can be applied. The principle of KSMA

[PATCH 0/4] arm64/mm: migrate swapper_pg_dir

2018-06-01 Thread Jun Yao
Currently, The offset between swapper_pg_dir and _text is fixed. When attackers know the address of _text(no KASLR or breaking KASLR), they can caculate the address of swapper_pg_dir. Then KSMA(Kernel Space Mirroring Attack) can be applied. The principle of KSMA is to insert a carefully constructe

[PATCH 0/4] arm64/mm: migrate swapper_pg_dir

2018-05-30 Thread YaoJun
Currently, The offset between swapper_pg_dir and _text is fixed. When attackers know the address of _text(no KASLR or breaking KASLR), they can caculate the address of swapper_pg_dir. Then KSMA(Kernel Space Mirroring Attack) can be applied. The principle of KSMA is to insert a carefully constructe