Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1161911Ab3DEOuC (ORCPT ); Fri, 5 Apr 2013 10:50:02 -0400 Received: from mail.skyhub.de ([78.46.96.112]:42564 "EHLO mail.skyhub.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1161785Ab3DEOuA (ORCPT ); Fri, 5 Apr 2013 10:50:00 -0400 Date: Fri, 5 Apr 2013 16:49:54 +0200 From: Borislav Petkov To: Kees Cook Cc: linux-kernel@vger.kernel.org, kernel-hardening@lists.openwall.com, "H. Peter Anvin" , Thomas Gleixner , Ingo Molnar , x86@kernel.org, Jarkko Sakkinen , Matthew Garrett , Matt Fleming , Eric Northup , Dan Rosenberg , Julien Tinnes , Will Drewry Subject: Re: [PATCH 3/3] x86: kernel base offset ASLR Message-ID: <20130405144954.GC29290@pd.tnic> Mail-Followup-To: Borislav Petkov , Kees Cook , linux-kernel@vger.kernel.org, kernel-hardening@lists.openwall.com, "H. Peter Anvin" , Thomas Gleixner , Ingo Molnar , x86@kernel.org, Jarkko Sakkinen , Matthew Garrett , Matt Fleming , Eric Northup , Dan Rosenberg , Julien Tinnes , Will Drewry References: <1365106055-22939-1-git-send-email-keescook@chromium.org> <1365106055-22939-4-git-send-email-keescook@chromium.org> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <1365106055-22939-4-git-send-email-keescook@chromium.org> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1298 Lines: 36 On Thu, Apr 04, 2013 at 01:07:35PM -0700, Kees Cook wrote: > This creates CONFIG_RANDOMIZE_BASE, so that the base offset of the kernel > can be randomized at boot. Right, if I'm reading this whole deal correctly, I have an issue with this in the sense that if this thing is enabled by default and people are running stripped kernels, an oops which is being reported is worth sh*t since all the addresses there are random and one simply can't map them back to which functions the callstack frames are pointing to. Which will majorly hinder debuggability, IMHO... [ … ] > When built into the kernel, the "noaslr" kernel command line option > will disable the feature. ... so the saner thing to do, IMHO, would be to flip the meaning of this option to "kaslr" or whatever and let people and distros enable randomization on kernels which are bug free and don't oops (good luck finding those :-)). Generally make the thing opt-in instead of opt-out. Thanks. -- Regards/Gruss, Boris. Sent from a fat crate under my desk. Formatting is fine. -- -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/