lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 15 Apr 2013 19:56:21 -0700 From: Yinghai Lu <yinghai@...nel.org> To: "H. Peter Anvin" <hpa@...or.com> Cc: Kees Cook <keescook@...omium.org>, Eric Northup <digitaleric@...gle.com>, Linux Kernel Mailing List <linux-kernel@...r.kernel.org>, "kernel-hardening@...ts.openwall.com" <kernel-hardening@...ts.openwall.com>, Thomas Gleixner <tglx@...utronix.de>, Ingo Molnar <mingo@...hat.com>, "the arch/x86 maintainers" <x86@...nel.org>, Jarkko Sakkinen <jarkko.sakkinen@...el.com>, Matthew Garrett <mjg@...hat.com>, Matt Fleming <matt.fleming@...el.com>, Dan Rosenberg <drosenberg@...curity.com>, Julien Tinnes <jln@...gle.com>, Will Drewry <wad@...omium.org> Subject: Re: [PATCH 6/6] x86: kaslr: relocate base offset at boot On Mon, Apr 15, 2013 at 7:36 PM, H. Peter Anvin <hpa@...or.com> wrote: > On 04/15/2013 03:00 PM, Yinghai Lu wrote: >> >> looks you are trying redo the work for bootloader to pick loaded phys addr. >> > > Well, that is exactly what they are doing. On top of that they also > need to randomize the 64-bit virtual mapping. > > I wonder if we need a bootloader bit to inhibit kaslr in addition to the > command line... so let the bootloader to parse kaslr and pick ramdom address, and kernel arch/x86/boot/compressed/head_64.S to pick random virtual address? Yinghai -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists