NetBSD/doc/TODO.kaslr

50 lines
1.5 KiB
Plaintext
Raw Normal View History

====== POINTER LEAKS ======
2018-08-02 20:34:51 +03:00
[DONE] -- Change the permissions of /dev/ksyms, as discussed in:
http://mail-index.netbsd.org/tech-kern/2018/01/17/msg022960.html
-- The address of a non-public section is leaked because of Meltdown,
"jmp handler". This can easily be fixed by pushing the handlers into
their own section.
-- Replace the "%p" fmt by something relative to the kernel section (if
any). Eg, from
printf("%p", &some_global_var); --> "0xffffffffe38010f0"
to
printf("%p", &some_global_var); --> ".data.4:0x8010f0"
This eases debugging and also prevents leaks if a driver prints
kernel addresses as debug (I've seen that already).
2018-08-24 20:09:30 +03:00
[DONE] -- PPPoE sends a kernel address as host unique. (What is this shit.)
2018-09-04 18:41:08 +03:00
-- Several entry points leak kernel addresses:
[DONE] - "modstat -k"
[DONE] - kern.proc
[DONE] - kern.proc2
[DONE] - kern.file
[DONE] - kern.file2
[DONE] - kern.lwp
[DONE] - sysctl_inpcblist
[DONE] - sysctl_unpcblist
[DONE] - sysctl_doevcnt
[DONE] - sysctl_dobuf
-- Be careful with dmesg.
====== RANDOMIZATION ======
2018-08-12 18:33:36 +03:00
[DONE] -- Randomize the PTE space.
2018-08-12 18:33:36 +03:00
[DONE] -- Randomize the kernel main memory (VM_MIN_KERNEL_ADDRESS).
2018-08-02 20:34:51 +03:00
[DONE] -- Randomize the direct map.
[POINTLESS, BECAUSE CPU LEAKY] -- Randomize the PCPU area.
====== GENERAL ======
-- Sort the kernel sections by size, from largest to smallest, to save
memory.
-- Add the "pkboot" command in the EFI bootloader.