Re: [PATCH v6 08/10] x86: avoid W^X being broken during modules loading

2018-11-29 Thread Masami Hiramatsu
On Wed, 28 Nov 2018 18:59:30 + Nadav Amit wrote: > > On Nov 20, 2018, at 12:35 PM, Nadav Amit wrote: > > > > When modules and BPF filters are loaded, there is a time window in > > which some memory is both writable and executable. An attacker that has > > already found another vulnerability

Re: [PATCH v6 08/10] x86: avoid W^X being broken during modules loading

2018-11-28 Thread Nadav Amit
> On Nov 20, 2018, at 12:35 PM, Nadav Amit wrote: > > When modules and BPF filters are loaded, there is a time window in > which some memory is both writable and executable. An attacker that has > already found another vulnerability (e.g., a dangling pointer) might be > able to exploit this behav

[PATCH v6 08/10] x86: avoid W^X being broken during modules loading

2018-11-20 Thread Nadav Amit
When modules and BPF filters are loaded, there is a time window in which some memory is both writable and executable. An attacker that has already found another vulnerability (e.g., a dangling pointer) might be able to exploit this behavior to overwrite kernel code. This patch prevents having writa