lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 15 Sep 2015 17:05:40 +0800
From:	yalin wang <yalin.wang2010@...il.com>
To:	慕冬亮 <mudongliangabcd@...il.com>
Cc:	linux-kernel@...r.kernel.org
Subject: Re: why is text address constant with full randomization?


> On Sep 15, 2015, at 16:36, 慕冬亮 <mudongliangabcd@...il.com> wrote:
> 
> First, my linux kernel is Linux 114-212-83-136 4.1.0-2-amd64.
> Second, I copy /bin/cat in system to mycat , and see the address space
> layout below.
> 
> mdl@...-212-83-136:~$ ./mycat /proc/self/maps
> 00400000-0040c000 r-xp 00000000 08:03 1046776
> /home/mdl/mycat
> 0060b000-0060c000 r--p 0000b000 08:03 1046776
> /home/mdl/mycat
> 0060c000-0060d000 rw-p 0000c000 08:03 1046776
> /home/mdl/mycat
> 01da7000-01dc8000 rw-p 00000000 00:00 0
> [heap]
> ......
> 
> The starting address of executable image is constant with my aslr
> configuration 2 (full randomization).
> I think text segment should be inconstant to defeat the attack like
> reusing text code!
> Is it related to fixing offset2lib attack?
> Thanks for any help!
>    - mudongliang

 your mycat elf is executable elf file,
it is not possible to random the .text section address,
only relocatable elf file can be random,
you should build your elf with  gcc -fPIC to make it relocatable .

Thanks

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ