> On 3 Jan 2017, at 21:40, PaX Team <pagee...@freemail.hu> wrote:
> 
> in other words, if you were to kexec into a SANITIZE enabled kernel,
> you'd get your memory clearing for free automatically, earlier than
> any initramfs would execute even and it'd cover most kernel memory
> that the kernel ever cares about (or cared in its previous incarnation
> at least).
> 
> now this brings us to the other topic you raised about grsecurity's
> KMEM hardening. technically it's not incompatible with kexec, so you
> can re-enable kexec, however note that until some signed kexec mechanism
> enters the kernel, it carries a risk of executing potentially malicious
> kernels (but maybe that's not a problem in your use cases). perhaps
> embedding or loading the kexec kernel from initramfs would get around
> those concerns for good.

Can you kexec from a running kernel into itself? If so, then this single use 
case could be enabled without opening a hole for arbitrary code. It would crash 
when it discovers the boot disk is missing, but by that time sanitize should 
have done its job.

A.
_______________________________________________
Tails-dev mailing list
Tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
tails-dev-unsubscr...@boum.org.

Reply via email to