lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CA+55aFwieC1-nAs+NFq9RTwaR8ef9hWa4MjNBWL41F-8wM49eA@mail.gmail.com> Date: Mon, 30 Apr 2018 16:31:52 +0000 From: Linus Torvalds <torvalds@...ux-foundation.org> To: Kees Cook <keescook@...omium.org> Cc: Anna-Maria Gleixner <anna-maria@...utronix.de>, Linux Kernel Mailing List <linux-kernel@...r.kernel.org>, tcharding <me@...in.cc>, Steven Rostedt <rostedt@...dmis.org> Subject: Re: Hashed pointer issues On Mon, Apr 30, 2018 at 9:11 AM Kees Cook <keescook@...omium.org> wrote: > I (or other folks?) had proposed this before, but, AIUI, Linus remains > opposed. Yeah, I hate this, because it will make people paper over their problems by just booting with that option. I think it should just be fixed. Is there really any reason why trace buffers have to be dumped so early that the entropy hasn't even taken yet? And if we really want a command line option, can we make that still hash the pointer, just force the entropy early. That way kernel developers that test that command line option are still testing the *hashing*, they just are missing the good entropy. Linus
Powered by blists - more mailing lists