Happy to see a new entry here! Looking forward to all the missing entries for 5.1{1..8} ;-) Thanks for these summaries, I didn't know about nosymfollow before.
Oops! Thank you both. I've fixed that now. :)
The very first item appears both in the list for 5.9 and 5.10: ie, its at the top of both posts.
Your first entry is duplicated from v5.9!
I'm sad that these ended or are on hiatus as they are great!
Hi Cook, thanks for the article! We implemented a KCFI fine-grained forward edge protection (refer to the open source implementation of PAX RAP) and scs back edge protection based on the gcc plug...
Thanks so much for essential posts and articles, they are a wonderful resource for security engineer. Now that v5.12 has been released, do you have any pla to post 'security things in Linux v5.12...
With the arm64 arch extensions we might see some implementations on earlier revisions of the architecture - an implementation can provide some features from newer architecture revisions without i...
o/ Thanks for catching up on those summaries :-D With so many code additions per release, it's good to see some folks focusing on security as well.
Yeah, I'm a bit behind. Currently working on fixing that. :) Thanks for your patience!
Thank you Kees for summarizing all-things-security for each kernel release. I always enjoyed these articles. Maybe I (and others?) should have said so before, because now...I'm missing these entr...
I'm sorry you consider Alexander's work to be plagiarism; I think it is clearly not. I agree it's a similar idea, but even that idea already existed in the kernel (e.g. CONFIG_PAGE_POISONING), bu...
No mention to previous work implementing exactly the same such as https://lkml.org/lkml/2009/5/24/284 (or the PaX project). Part of it was also formally copyrighted in 2015. How long is this kind...
I'm not aware of a CFI implementation in gcc. Hopefully this will change soon, but for now it's just Clang.
For recommended CONFIGs, see here: http://kernsec.org/wiki/index.php/Kernel_Self_Protection_Project/Recommended_Settings
Whoops! Thanks (to many people) for catching the CONFIG_SLAB_FREELIST_HARDENED typo! I've fixed it now. :)
Hello Kees, thanks for the article! I want to ask if the linux kernel has plans to support CFI based on gcc in the future, or if I want to use CFI, I must use clang to compile the kernel. Best re...
Is there a list of recommended CONFIG* settings for security somewhere on your blog, so that I can verify them and recompile my kernel? E.g. on the Ubuntu bug tracker you recommended setting CONF...
Shouldn't be there CONFIG_SLAB_FREELIST_HARDENED instead of CONFIG_SLAB_FREELIST_HARDENING?
Kees, you hero! Thank you for updating the blog post! :)
Oops, yes; I've added CLONE_PIDFD now. I was thinking too much about P_PIDFD in v5.3 that I forgot CLONE_PIDFD was in v5.2. :) Thanks for the reminder!
Thanks for producing these summaries each release.
We also landed CLONE_PIDFD with clone(). :)
Very cool charts! Just having the knowledge out there that some flags compiler features could be enabled to improve quality and performance is likely to help drive more adoption of these features...
Hello Kees, thanks for the article! Let me add two brief remarks: 1. The STACKLEAK plugin adds stack tracking to functions with a big stack frame (>=CONFIG_STACKLEAK_TRACK_MIN_SIZE), not to leaf ...
I'm not sure I know what you mean. Do you mean Kernel Page Table Isolation? That would be entirely unrelated. Normal (non-buggy) callers of kmalloc() and kmalloc_array() will get the same memory ...
Variable Length Array removals, part 2 -What would be impact of KPI for this Kernel hardening feature i.e kmalloc(m*n,GFP_XXX )assign memory of m items of n size or directly calling kmalloc_array...
Reading between the lines, my UEFI firmware has Intel Matrix Raid driver built-in hence it can read ESP off RAID. So all we need is a clean-room BSD-2 implementation of an mdadm driver for OVMF/E...
https://outflux.net/blog/archives/2018/04/19/uefi-booting-and-raid1/comment-page-1/#comment-2794
> With UEFI, the boot firmware is actually examining the GPT partition table, looking for the partition marked with the “EFI System Partition” (ESP) UUID. The UEFI specification doesn't requi...
https://outflux.net/blog/archives/2018/04/19/uefi-booting-and-raid1/comment-page-1/#comment-1922
It looks like the UEFI thinktank completely sidestepped the issue of ESP redundancy and left it all to the hardware vendors. Which predictably leads to vendor specific (often braindead) solutions...
https://outflux.net/blog/archives/2018/04/19/uefi-booting-and-raid1/comment-page-1/#comment-1921